When to use this connector
Use this connector to create Flows that work with files in FTP.
Create a Connection
Step 1. In the
Connections window, click
+, and select
Step 2. Select
Step 3. Enter Connection parameters.
URL: the hostname and optional port of the FTP server.
The FTP URL must start with
Directory: the actual directory with files. This parameter is optional.
Files: the actual file name or a wildcard file name, for example,
Passive Mode: must be selected if the Etlworks Integrator is running behind a firewall (always select this when using the Etlworks Integrator in a cloud).
Add Suffix When Creating Files in Transformation: you can select one of the predefined suffixes for the files created using this Connection. For example, if you select
uuidas a suffix and the original filename is
dest.csv, the Etlworks Integrator will create files with the name
dest_uuid.csv, where uuid is a globally unique identifier such as
This parameter works only when the file is created using source-to-destination-transformation. Read how to add a suffix to the files created when copying, moving, renaming, and zipping files.
Enable Wildcard File Name: if there are multiple source files in a folder, you can specify an algorithm that will be used to select the next source file to process. For example, if
Filesis set to
oldestis selected, the Etlworks Integrator will always select the oldest file in the folder which matches the wildcard
Override Wildcard File Name set for Connection: if
Wildcard File Namesare allowed,
Override Wildcard File Name set for Connectionis enabled, and the file name entered in the
FROMfield of the transformation is a wildcard file name, the system will override the file name entered at the Connection level. Otherwise, the default behavior is to use the wildcard file name entered when the Connection was configured.
When FTP Connection is used as a source (
FROM) in the source-to-destination transformation, it is possible to configure the automatic decryption of the encrypted source files using the PGP algorithm and private key uploaded to the secure key storage.
If the private key is available, all source files processed by the transformation will be automatically decrypted using the PGP algorithm and given key. Note that the private key requires a password.
Please sign in to leave a comment.