Table of Contents

Search

  1. Preface
  2. Transformations
  3. Source transformation
  4. Target transformation
  5. Aggregator transformation
  6. Cleanse transformation
  7. Data Masking transformation
  8. Deduplicate transformation
  9. Expression transformation
  10. Filter transformation
  11. Hierarchy Builder transformation
  12. Hierarchy Parser transformation
  13. Hierarchy Processor transformation
  14. Input transformation
  15. Java transformation
  16. Java transformation API reference
  17. Joiner transformation
  18. Labeler transformation
  19. Lookup transformation
  20. Mapplet transformation
  21. Normalizer transformation
  22. Output transformation
  23. Parse transformation
  24. Python transformation
  25. Rank transformation
  26. Router transformation
  27. Rule Specification transformation
  28. Sequence Generator transformation
  29. Sorter transformation
  30. SQL transformation
  31. Structure Parser transformation
  32. Transaction Control transformation
  33. Union transformation
  34. Velocity transformation
  35. Verifier transformation
  36. Web Services transformation

Transformations

Transformations

Create the source file

Create the source file

Create the source file as a comma-delimited flat file. Save the file in a directory that the Secure Agent can access.
Use the following data:
EMP_ID,EMP_NAME,EMP_AGE,EMP_DESC,EMP_PARENT_EMPID 1,James Davis,50,CEO, 4,Elaine Masters,40,Vice President - Sales,1 5,Naresh Thiagarajan,40,Vice President - HR,1 6,Jeanne Williams,40,Vice President - Software,1 9,Geetha Manjunath,34,Senior HR Manager,5 10,Dan Thomas,32,Senior Software Manager,6 14,Shankar Rahul,34,Senior Software Manager,6 20,Juan Cardenas,32,Technical Lead,10 21,Pramodh Rahman,36,Lead Engineer,14 22,Sandra Patterson,24,Software Engineer,10 23,Tom Kelly,32,Lead Engineer,10 35,Betty Johnson,27,Lead Engineer,14 50,Dave Chu,26,Software Engineer,23 70,Srihari Giran,23,Software Engineer,35 71,Frank Smalls,24,Software Engineer,35