Dear Google Cloud Support Team,
I hope this message finds you well.
We are currently working on a PostgreSQL-to-AlloyDB data migration and replication pipeline, and have encountered a critical limitation: AlloyDB does not permit setting the session_replication_role parameter, even for privileged users.
This parameter is essential for tools like pgcopydb, pg_recvlogical, and others that rely on it to disable triggers and constraints while applying logical changes during replication.
We would like to request:
Clarification on whether there is any roadmap or possibility of enabling session_replication_role in AlloyDB.
Temporary workaround or alternate recommended approaches for logical replication and CDC (Change Data Capture) where this parameter is required.
If not supported, confirmation that this limitation is by design and non-negotiable due to security or platform constraints.
This capability is especially important for seamless migration and hybrid setups using tools like pgcopydb, which are standard in the PostgreSQL ecosystem.
Please advise on any alternatives, feature requests, or support plan escalation steps we can take to proceed with our project.
Looking forward to your guidance.
Thanks and Regards
Shubham,
Hi @shubhzpatil45,
Welcome to Google Cloud Community!
Here’s a breakdown addressing your points:
Currently, there are no confirmed plans to support session_replication_role in AlloyDB, and public documentation offers no indication that this capability will be added soon. AlloyDB is a fully-managed, PostgreSQL-compatible database for demanding transactional workloads, and Google Cloud often restricts direct access to certain PostgreSQL parameters that could affect its architecture or stability.
While there's no official roadmap to re-enable this setting, submitting a feature request through Google Cloud Support or your Customer Engineer may help prioritize it, especially if multiple customers express the same need.
AlloyDB does not support the session_replication_role parameter, likely by design due to its fully managed, secure, and opinionated architecture. This restriction applies even to privileged roles like cloudsqlsuperuser, reflecting Google’s intent to abstract low-level configurations that could risk data integrity, stability, or security.
You can also refer to these documentations, which might help for future reference.
Additionally, consider consulting with our Google Cloud Support to help ensure your options about your migration process.
Was this helpful? If so, please accept this answer as “Solution”. If you need additional assistance, reply here within 2 business days and I’ll be happy to help.
Does alloyDb allows to create the subscription on the RDS publisher ?