Copy/Move (Push) File to Host Action

(Available in EFT Enterprise) You can configure EFT to copy or move (also known as "offload") files to a specific location using a particular protocol whenever certain Events occur, such as when a report is created. You must provide EFT with connection information (protocol and login details) and file information (source path and destination path). The copy/move Action can be applied to all File System Events; the User Events "User Quota Exceeded," "User Logged In," and "User Logged Out"; and the Server Events "Timer" and "Log Rotated."

Refer to EventRuleExamples.pdf for examples of defining an Event Rule using the Copy/Move File to Host Action.

To configure EFT to copy/move files

  1. Follow the procedure in Creating Event Rules, or select the Rule to which you want to add the Action. For example, create a Scheduler (Timer) Event.

  2. In the right pane, in the Actions list, double-click Copy/Move (push) file to host.

  3. In the Rule Builder, click Copy to toggle between Copy and Move to choose the Action you want for this Rule.

  4. In the Rule Builder, click one of the undefined parameters (e.g., '%FS.PATH%').

    The Offload Action Wizard appears.

  5. On the Offload method box, specify a protocol type for the connection.

  6. (Optional) If you selected Local (Local Files or LAN), under Optional credentials override, provide the Windows account username and Password  for connecting to remote shares (not local folders).

  7. These credentials are used only if/when a resource cannot be accessed using the credentials under which the EFT service is running. The Optional credentials override feature allows you to specify an alternate set of logon credentials for accessing remote network shares to which the EFT service account may not have access (due to security constraints). If alternate credentials are specified, EFT will use its current security token (associated with the “Log on as” account specified in the EFT service settings) for local folder access and then new security token (associated with the alternate logon credentials) for the remote destination folder accessed over network connections (e.g. network shares).

  8. If you chose anything but Local do the following; if you chose Local, skip to the Source File Path page step.

    1. In the Host address box, type the IP address.

    2. The Port number for the selected protocol changes automatically based on the offload method. Provide a different port number, if necessary.

    3. Provide the Username and Password needed to establish the connection.

  9. Select the Use connected client's login credentials to authenticate check box if you want to use the local system account to authenticate. The availability of this check box is controlled by the Persist username and password credentials for use in Event Rule context variables check box on the Site's Security tab.

  10. If you chose SFTP, provide the client SFTP certificate information.

  11. If you chose a protocol that uses SSL (FTPS or HTTPS), provide the client SSL certificate information.

  12. If are connecting to a remote host through a SOCKS server, click SOCKS.

    1. Specify the Socks Type (SOCKS4 or SOCKS5).

    2. Specify the Host name and Port.

    3. If you specified SOCKS5 and the server requires authentication, select the Use Authentication check box, then provide a Username and Password.

    4. Click OK.

  13. If you are connecting to a remote host through a proxy, click Proxy. The Proxy Settings dialog box appears.

    1. Specify the Proxy type, Host name, Port, Username, and Password.

    2. Using the DMZ Gateway as proxy is available only in the Enterprise edition of EFT. Contact your system administrator for the proper host name, port, username, password, and proxy type, as well as any required advanced authentication methods.

    3. To specify an Authentication Type and login sequence, click Advanced. You must select FTP Proxy or HTTP Proxy to specify advanced settings. (Advanced proxy settings are not available when using the DMZ Gateway as the outbound proxy.)

    4. Specify one of the following Authentication Types:

    5. Click OK to accept the changes and close the Proxy Settings dialog box.

  14. To specify transfer options and time stamps, in the Offload wizard, click Advanced. The Advanced Options dialog box appears.

    1. In the General transfer options area, you can provide more control over Max concurrent transfer threads, Connection timeout, Connection retry attempts, and Delay between retries. When files are being transferred with Event Rules (copy/move), if there are connection problems (e.g., the network is unavailable), the server will attempt to establish a connection the number of times specified in Connection retry attempts. When EFT is able to re-establish the connection, it continues to transfer the file even if there are multiple interruptions.

    2. In the Use the following local IP for outbound connections box, click the down arrow to specify an IP address. If the computer has multiple IP addresses available and/or both IPv4 and IPv6 addresses, you can let EFT choose which IP address to use or you can specify which one it is to use.

    3. Select the Validate file integrity after transfer check box to specify that EFT should double check binary files to ensure the files downloaded completely and correctly. (Not applicable to SFTP.)

    4. In the Data port mode box, click the drop-down list and select one of the following (not applicable to SFTP):

    5. Select the Clear command channel check box to send FTP commands in clear text. (Only available when FTPS is specified.)

    6. Select the Clear data channel check box to transfer files without encryption. (Only available when FTPS is specified.)

    7. In the Filename encoding area, specify whether the filename is encoded as UTF-8 or ASCII.

    8. In the ASCII transfer mode area, specify the file types that can be transferred. Use a comma and a space between extensions. If you use only a comma with no space, then the Rule will not recognize the extension/file type. TXT, INF, HTML, and HTM are specified by default. If an asterisk (*) is specified, all files are downloaded in ASCII mode, even if that file doesn't have an extension. (To conserve Unicode file content, you must transfer the file using binary transfer mode. To force download in binary, clear the file types box.)

    9. In the Time stamps area, select one of the following:

    10. Click OK.

  15. Click Next. The Source File Path page appears.

  16. In the Source path box, provide the path to the file(s) that you want to offload. (No validation is performed.) For example, type:

  17. C:\Staging\*.dat or \\mydomain\common\jsmith\file.txt

    You can leave Source path blank or use %FS.PATH% to offload the files associated with the Event that triggered the Action. In a Timer Event, there is no context variable available for the path, so you must specify a filename.

  18. Select the Delete source file after it has been offloaded check box if you want to delete the file after it is copied/moved. (If the file is marked read-only, it will not be deleted.)

  19. Select the If the source file is missing treat as success check box if you want the Action to be considered successful even if the source file is missing.

  20. Click Next. The Destination File Path page appears.

  21. In the Destination path box, specify the location in which to save the offloaded file. (No validation is performed when you type a path; the Folder icon is only available for local transfers.)

  22. If you type a path to a folder that does not exist, the Event Rule will fail. Be sure you have the path defined correctly, e.g., make sure to use the proper slash. In general, forward slashes / are used in remote paths, and backward slashes \ are used in local Windows paths. Do not use both.

  23. Click Finish then click Apply to save the changes on EFT and/or add other Actions and Conditions to the Rule.

  24. If you are copying or moving the file to another location, and the file upload is a regularly occurring Event with a file of the same name, in the Offload Action wizard, add the variables %EVENT.DATESTAMP% and/or %EVENT.TIMESTAMP% to the path so that the date (YYYYMMDD) and/or time (HHMMSS) are added to the filename when it is moved/copied. Do not use %EVENT.TIME%, because the colon (e.g., 28 Aug 07 10:01:56) makes it unsuitable for file naming.

    For example, in the Offload Action wizard, in the Destination path box, provide the path and variables. For example, type:

    C:\Documents and Settings\Administrator\My Documents\upload\%EVENT.DATESTAMP%_%EVENT.TIMESTAMP%_%FS.FILE_NAME%

    With this path and variables, when a file is uploaded to the monitored folder, the file is moved to \My Documents\upload and the date and time are prepended to the filename. For example, 20080422_101212_mydailyprogress.doc.

Related Topics