When to use this connector
Use this connector to create Flows that work with files in WebDAV.
Create a Connection
Step 1. In the Connections
window, click +
, and select Files
.
Step 2. Select WebDAV
.
Step 3. Enter Connection parameters.
Connection parameters
-
URL
: protocol://host:optional-port
. Example (with no port):https://yourcompany.com
. Example (with port):https://p112345.prod.phx3.secureserver.net:2078
. -
Directory
: the actual directory containing the files. This parameter is optional. -
Files
: the actual file name or a wildcard file name, for example,*.csv
. -
User
: username. -
Password
: password. -
Preemptive Authentication
: select this to enable preemptive authentication. -
Enable ZIP Compression
: select this to enable ZIP compression. -
Add Suffix When Creating Files in Transformation
: you can select one of the predefined suffixes for the files created using this Connection. For example, if you selectuuid
as a suffix and the original filename isdest.csv
, Etlworks will create files with the namedest_uuid.csv
, where uuid is a globally unique identifier such as21EC2020-3AEA-4069-A2DD-08002B30309D
.
This parameter works only when the file is created using source-to-destination-transformation. Read how to add a suffix to the files created when copying, moving, renaming, and zipping files.
-
File Processing Order
: Specifies the order in which source files are processed when using wildcard patterns in ETL and file-based flows (e.g., copy, move, delete). The default setting is Oldest, meaning files are processed starting with the oldest by creation or modification time. Choose from various criteria such as file age, size, or name to determine the processing sequence:- Disabled: wildcard processing is disabled,
- Oldest/Newest: Process files based on their creation or modification time, Ascending/Descending: Process files in alphabetical order, Largest/Smallest: Process files based on their size.
Decryption
When WebDAV Connection is used as a source (FROM
) in the source-to-destination transformation, it is possible to configure the automatic decryption of the encrypted source files using the PGP algorithm and private key uploaded to the secure key storage.
If the private key is available, all source files processed by the transformation will be automatically decrypted using the PGP algorithm and given key. Note that the private key requires a password.
Comments
0 comments
Please sign in to leave a comment.