1. Detect delete from the change log table on the source.
  2. Fetch the entry or table rows from affected tables on the source.
  3. The entry or table row exists on the source.
  4. Delete request is dropped.