This article provides several comparative methods to avoid primary key conflicts across multiple sites.