When to use this connector
Use this connector to create Flows that work with files in WebDAV.
Create a Connection
Step 1. In the
Connections window, click
+, and select
Step 2. Select
Step 3. Enter Connection parameters.
//host:optional-port. Example (with no port):
https://yourcompany.com. Example (with port):
Directory: the actual directory containing the files. This parameter is optional.
Files: the actual file name or a wildcard file name, for example,
Preemptive Authentication: select this to enable preemptive authentication.
Enable ZIP Compression: select this to enable ZIP compression.
Add Suffix When Creating Files in Transformation: you can select one of the predefined suffixes for the files created using this Connection. For example, if you select
uuidas a suffix and the original filename is
dest.csv, Etlworks Integrator will create files with the name
dest_uuid.csv, where uuid is a globally unique identifier such as
This parameter works only when the file is created using source-to-destination-transformation. Read how to add a suffix to the files created when copying, moving, renaming, and zipping files.
Enable Wildcard File Name: if there are multiple source files in a folder, you can specify an algorithm that will be used to select the next source file to process. For example, if
Filesis set to
oldestis selected, Etlworks Integrator will always select the oldest file in the folder which matches the wildcard
Override Wildcard File Name set for Connection: if
Wildcard File Namesare allowed,
Override Wildcard File Name set for Connectionis enabled, and the file name entered in the
FROMfield of the transformation is a wildcard file name, the system will override the file name entered at the Connection level. The default behavior is to use the wildcard file name entered when configuring the Connection.
When WebDAV Connection is used as a source (
FROM) in the source-to-destination transformation, it is possible to configure the automatic decryption of the encrypted source files using the PGP algorithm and private key uploaded to the secure key storage.
If the private key is available, all source files processed by the transformation will be automatically decrypted using the PGP algorithm and given key. Note that the private key requires a password.
Please sign in to leave a comment.