Running analytics queries against a production database that stores PHI is a compounding problem; every new dashboard, every new report, every new stakeholder request adds load to a system that exists to serve live clinical workloads. It also creates an access-pattern problem: direct production queries are difficult to scope, log, and provide evidence under audit. Before we configured a single connector, we needed to understand the full picture of how data was moving and where the compliance and performance boundaries were being crossed.
- Analytics flow audit and architecture design: We audited the existing reporting and BI setup, mapping every query pattern, scheduled job, and ad-hoc access path that touched the production database. The audit confirmed what the performance data suggested: analytics workloads were creating contention during peak clinical hours, and the access patterns were inconsistent with what a HIPAA audit would expect to see. We selected Fivetran as the ingestion layer based on its structured incremental sync model, clear state tracking, and predictable ingestion behavior properties that matter in a regulated environment where data lineage needs to be demonstrable.
- Read replica and VPC endpoint architecture: Rather than allowing Fivetran to connect to the production primary, we designed the ingestion architecture around a dedicated read replica as the data source. Private connectivity was implemented via AWS VPC Endpoint, ensuring data never traversed the public internet between source and destination. This architecture eliminated production write contention from analytics workloads entirely and established a network boundary that could be documented and evidenced for compliance purposes. We proactively recommended this topology over a simpler direct-connection approach; the added configuration cost was minimal, and the compliance and performance benefits were not.

