Version: 17.07
Supported Since: 17.07
Azure File Ingress Connector can be used to pull Azure objects from Azure containers. The default behaviour of this connector is that it will pull objects from the container and persist temporarily in the local file system and inject it to the UltraESB-X engine. After successfully completing the integration flow, it will then delete the original object from the container.
Azure credentials associated with an account which has write permission to the source bucket will be necessary when configuring this connector. |
In order to use the Azure File Ingress Connector, you must first select the Azure Connector dependency from the connector list when you are creating an empty Ultra project. If you have already created a project, you can add the Azure Connector dependency via Component Registry. From Tools menu, select Ultra Studio → Component Registry and from the Connectors list, select the Azure Connector dependency. |
Processor |
The message will be emitted from this out port after an Object has been obtained from the file share. The payload of the message will be the Object which has been pulled from the container. |
On Exception |
The message will be emitted from this out port if the processing element fails to prepare a message from the object pulled from the container. |
* marked fields are mandatory
Azure Account Name |
Basic |
Azure Account Name is required. |
Azure Account Key |
Basic |
Azure Account Key is required. |
Default Endpoints protocol * |
Basic |
Name of the endpoints protocol to be used, which is located in the configured Azure storage account. |
Source share name * |
Basic |
Name of the Azure container, which is located in the configured Azure storage account. |
Source share prefix * |
Basic |
If searches are conducted across shares, the prefix can be used to select multiple shares. |
File prefix name * |
Basic |
If there are multiple files to be extracted using the prefix, this can be used. |
Temporary Buffer location * |
Basic |
Name of the temporary buffer location, on the local file system |
Scheduler Configuration |
Scheduling |
Bean reference of the scheduler configuration bean which should be declared as a resource in the project.xpml file. By default there is internal scheduler configuration within the framework which will be shared by all the polling connectors. If you need to configure higher level of concurrent processing threads which will fetch the objects from the Azure share, you can configure your own thread pool configuration while declaring the parameters of the scheduler configuration bean as below.
In this configuration,
|
Polling Cron Expression |
Scheduling |
Cron expression for the Azure object polling schedule. Cron expression should be a valid Quartz cron expression since the Framework is underneath using Quartz to extract the schedule from the cron expression. |
Polling Start Delay |
Scheduling |
Delay in milliseconds to start the polling schedule. Any iteration which comes within this time period from the startup time of the framework, won’t be considered as a valid file polling iteration. |
Polling Repeat Interval |
Scheduling |
Interval in milliseconds for the next iteration of the polling schedule. This will be considered if there isn’t a configured cron schedule. |
Polling Repeat Count |
Scheduling |
Number of iterations which should go through the polling schedule. If this is set to 1 which means only the first iteration of the polling schedule will be considered as a valid file polling iteration and all other iterations of the schedule will be ignored. By default, this value is set to -1 which means it will consider all the iterations of the polling schedule as a valid iteration. |
Concurrent Polling Count |
Scheduling |
Maximum number of concurrent threads which can be used to poll the configured Azure share to fetch objects. By default, this value is 1. |
Concurrent Execution Count |
Scheduling |
Maximum number of concurrent threads which can be used to process the fetched objects from the Azure share. By default, this value is 4. |
In this scenario, assume that an Agency allows remote branches to upload their files to an Azure File storage and they want to distribute those files immediately to various 3rd parties etc. Assume, 3rd parties have provided their SFTP credentials to the Agency.
Now the 3rd parties will receive the required files into their SFTP destinations.
Product and company names and marks mentioned are the property of their respective owners and are mentioned for identification purposes only.