Copy/Move (Push) File to Host Action

(Available in EFT Server Enterprise) You can configure EFT Server to copy or move (also known as "offload") files to a specific location using a particular protocol whenever certain events occur, such as when a report is created. You must provide EFT Server with connection information (protocol and login details) and file information (source path and destination path). (Also refer to Download Action.)

The copy/move Action can be applied to all File System events, the User Events "Quota Exceeded," "User Login," "User Logout," and EFT Server Events "On Timer" and "On Rotate Log." The example below uses the On File Upload event.

To configure EFT Server to copy/move files

  1. Follow the procedure in Creating Event Rules, or select the rule to which you want to add the Action (Once an Event Rule is triggered and assuming all conditions are met, EFT Server launches one or more user-definable Actions, such as executing a command, sending an e-mail, offloading a file, etc. or a combination of multiple actions). For example, create a Scheduler (Timer) Event.

  2. In the right pane, in the Actions list, click Copy/Move (push) file to host.

  3. In the Rule Builder, click Copy to toggle between Copy and Move to choose the Action you want for this Rule.

  4. In the Rule Builder, click one of the undefined parameters (e.g., '%FS.PATH%').



    The Offload Action Wizard appears.

  5. On the Offload method box, specify a protocol type for the connection: Local (Local File or LAN), FTP (standard File Transfer Protocol), FTP SSL/TLS (AUTH TLS), FTP with SSL (Explicit encryption), FTP with SSL (Implicit encryption), SFTP using SSH2 (Secure Shell), HTTP (HyperText Transfer Protocol), HTTPS (Secure HTTP access).

  6. If you chose anything but Local do the following; if you chose Local, skip to step 11.

    1. In the Host address box, type the IP address.

    2. The Port number for the selected protocol changes automatically based on the offload method. Provide a different port number, if necessary.

    3. Provide the Username and Password needed to establish the connection.

  7. Select the Use connected client's login credentials to authenticate check box if you want to use the local system account to authenticate.

  8. If you chose SFTP:

    1. In the SFTP Public Key File Path box, type the path or click the folder icon to browse to and select the path.

    2. In the SFTP Private Key File Path box, type the path or click the folder icon to browse to and select the path.

    3. In the SFTP Key Passphrase box, provide the key's passphrase.

  9. If are connecting to a remote host through a SOCKS server, click SOCKS.

    1. Specify the Socks Type (SOCKS4 or SOCKS5).

    2. Specify the Host name and Port.

    3. If you specified SOCKS5 and the server requires authentication, select the Use Authentication check box, then provide a Username and Password.

    4. Click OK.

  10. If you are connecting to a remote host through a proxy, click Proxy.

    1. Specify the Proxy type, Host name, Port, Username, and Password.

    2. Using the DMZ Gateway as proxy is available only in the Enterprise edition of EFT Server.

    3. To specify an Authentication Type and login sequence, configure the Advanced settings.

    4. Specify one of the following Authentication Types:

  11. To specify transfer options and time stamps, click Advanced. The Advanced Options dialog box appears.

    1. In the General transfer options area, you can provide more control over Max concurrent transfer threads, Connection timeout, Connection retry attempts, and Delay between retries. When files are being transferred with Event Rules (copy/move), if there are connection problems (e.g., the network is unavailable), the Server will attempt to establish a connection the number of times specified in Connection retry attempts. When EFT Server is able to re-establish the connection, it continues to transfer the file even if there are multiple interruptions.

    2. Select the Validate file integrity after transfer check box to specify that EFT Server should double check binary files to ensure the files downloaded completely and correctly. (Not applicable to SFTP.)

    3. In the Data port mode box, click the drop-down list and select one of the following (not applicable to SFTP):

      • Auto - (selected by default) EFT Server initially makes connections in PASV mode. If the PASV connection fails, EFT Server attempts to connect in PORT mode automatically.

      • PASV - Helps avoid conflicts with security systems. PASV support is necessary for some firewalls and routers, because with PASV, the client opens the connection to an IP Address and port that EFT Server supplies.

      • PORT - Use PORT when connections or transfer attempts fail in PASV mode, or when you receive data socket errors. When a client connects using PORT, EFT Server opens a connection to an IP address and port that the client supplies. If you select Port, specify the Port range.

    4. Select the Clear command channel check box to send FTP commands in clear text. (Only available when FTPS is specified.)

    5. Select the Clear data channel check box to transfer files without encryption. (Only available when FTPS is specified.)

    6. In the ASCII transfer mode area, specify the file types that can be transferred. Use a comma and a space between extensions. If you use only a comma with no space, then the rule will not recognize the extension/file type. (TXT, INF, HTML, and HTM are specified by default.)

    7. In the Time stamps area, select one of the following:

    8. Click OK.

  12. Click Next. The Source File Path page appears.

  13. In the Source path box, provide the path to the file(s) that you want to offload. (No validation is performed.) For example, type:
    /pub/usr/jsmith/file.txt or \\mydomain\common\jsmith\file.txt

  14. If you want to Delete source file after it has been offloaded, select the check box.

  15. Click Next. The Destination File Path page appears.

  16. In the Destination path box, click the folder icon  and specify the location in which to save the offloaded file. (No validation is performed.)

  17. Click Finish then click Apply to save the changes on EFT Server and/or add other Actions and Conditions to the Rule.

If you are copying or moving the file to another location, and the file upload is a regularly occurring event with a file of the same name, in the Offload Action wizard, add the variables %EVENT.DATESTAMP% and/or %EVENT.TIMESTAMP% to the path so that the date (YYYYMMDD) and/or time (HHMMSS) are added to the filename when it is moved/copied. Do not use %EVENT.TIME%, because the colon (e.g., 28 Aug 07 10:01:56) makes it unsuitable for file naming.

For example, in the Offload Action wizard, in the Destination path box, provide the path and variables. For example, type:

C:\Documents and Settings\Administrator\My Documents\upload/%EVENT.DATESTAMP%_%EVENT.TIMESTAMP%_%FS.FILE_NAME%

With this path and variables, when a file is uploaded to the monitored folder, the file is moved to \My Documents\upload and the date and time are prepended to the filename. For example, 20080422_101212_mydailyprogress.doc.

To create a custom authentication method for a proxy server

  1. In the Advanced Proxy Settings dialog box, click Custom, then specify the login sequence in the text box using the following variables:

  2. Type each variable with percent signs before and after.

  3. Press ENTER to separate commands.

  4. Type any other commands and variables, separating commands with a line break (press ENTER).

  5. Click OK.

Contact your system administrator for the proper Host name, Port, User name, Password, and proxy type, as well as any required advanced authentication methods.

Related Topics

Using Wildcards with Event Rule Actions

Copying or Moving a File Triggered on Monitor Folder Event and Renamed