Solved

IBM Enterprise Integrator - ZID File

Posted on 2014-12-11
1
166 Views
Last Modified: 2014-12-11
FYI....I changed the extension of the file from .zid to .txt so I could upload it.


I have IBM Enterprise Integrator and I am attempting to do a Direct Transfer from a Text File to a Notes Database.

I have setup the ZID File and it imports records into my Domino Database however I am receiving an error in the log document.

12/11/2014 12:28:03 PM      Activity started
12/11/2014 12:28:03 PM      WARNING: Unable to set MailingFax for [Input Record 1], field exceeds record length (168),  Connector 'TXT - DOT - Carrier',  Method -Fetch-
12/11/2014 12:28:03 PM      WARNING: Unable to set MailingFax for [Input Record 2], field exceeds record length (157),  Connector 'TXT - DOT - Carrier',  Method -Fetch-
12/11/2014 12:28:03 PM      WARNING: Unable to set MailingFax for [Input Record 3], field exceeds record length (126),  Connector 'TXT - DOT - Carrier',  Method -Fetch-
12/11/2014 12:28:03 PM      WARNING: Unable to set MailingFax for [Input Record 5], field exceeds record length (133),  Connector 'TXT - DOT - Carrier',  Method -Fetch-
12/11/2014 12:28:03 PM      WARNING: Unable to set MailingFax for [Input Record 6], field exceeds record length (166),  Connector 'TXT - DOT - Carrier',  Method -Fetch-
12/11/2014 12:28:03 PM      Activity finished: DOT - 01 - File Import - 01 - Carrier

I have tried all the following without success:
MailingFax: TYPE TEXT UNTIL ""
MailingFax: TYPE TEXT UNTIL \r
MailingFax: TYPE TEXT UNTIL \n
MailingFax: TYPE TEXT UNTIL \r\n
MailingFax: TYPE TEXT UNTIL \n\r

Am I not closing the ZID File out correctly ?
Carrier.txt
0
Comment
Question by:nbtnotes
1 Comment
 

Accepted Solution

by:
nbtnotes earned 0 total points
ID: 40495301
Added a "~" to the end of the row on the Carrier.txt file.

I also changed the MailFax line to:
MailingFax: TYPE TEXT UNTIL "~"

All is working properly now.
0

Featured Post

Why You Should Analyze Threat Actor TTPs

After years of analyzing threat actor behavior, it’s become clear that at any given time there are specific tactics, techniques, and procedures (TTPs) that are particularly prevalent. By analyzing and understanding these TTPs, you can dramatically enhance your security program.

Join & Write a Comment

For users on the Lotus Notes 8 Standard client, this article provides information on checking the Java Heap size and adjusting it to half of your system RAM in attempt to get the Lotus Notes 8.x Standard client to run faster.  I've had to exercise t…
Problem "Can you help me recover my changes?  I double-clicked the attachment, made changes, and then hit Save before closing it.  But when I try to re-open it, my changes are missing!"    Solution This solution opens the Outlook Secure Temp Fold…
This video demonstrates how to create an example email signature rule for a department in a company using CodeTwo Exchange Rules. The signature will be inserted beneath users' latest emails in conversations and will be displayed in users' Sent Items…
You have products, that come in variants and want to set different prices for them? Watch this micro tutorial that describes how to configure prices for Magento super attributes. Assigning simple products to configurable: We assigned simple products…

707 members asked questions and received personalized solutions in the past 7 days.

Join the community of 500,000 technology professionals and ask your questions.

Join & Ask a Question

Need Help in Real-Time?

Connect with top rated Experts

13 Experts available now in Live!

Get 1:1 Help Now