Trebellar can automatically pull raw data you already produce — occupancy feeds, badge events, work-order exports, utility usage, and anything else you want to put to work in the platform — and import it on a recurring schedule.
This page explains the two transport options (SFTP and object storage) and the two hosting options (your infrastructure or Trebellar-managed) that combine to form the four setup modes available from the admin panel.
All raw bulk import options are configured from the Trebellar admin panel at my.trebellar.app, under Organization → Settings → Data Management. For non-standard origins (e.g. FTPS, Azure Blob, vendor APIs without a generic S3 interface), reach out to your Customer Success contact and we’ll coordinate a bespoke connector.
Regardless of transport, the flow is the same:
archive/ prefix (or an archive/ directory
on SFTP) with a timestamp suffix. If validation fails, it is moved to errors/
instead, alongside a sibling .error.json explaining what went wrong.File-naming conventions and dataset schemas are defined per-organization in the admin panel. The transport options below only control how Trebellar reaches the files — the shape of the files themselves is independent.
Use object storage when your upstream systems already export to a bucket, or when you want to land files over HTTPS using the AWS/GCS SDKs.
Recommended when the source data must stay in your cloud tenancy for compliance or contractual reasons.
You provide:
Steps:
s3:GetObject, s3:ListBucket, s3:PutObject (used to move files into
archive/ or errors/), and s3:DeleteObject on the configured prefix only.storage.objects.get, storage.objects.list, storage.objects.create,
storage.objects.delete on the configured prefix only.Scope the IAM principal to the prefix you configured, not the whole bucket.
Trebellar never needs access outside of inbox/, archive/, and errors/ under
that prefix.
If your security policy requires bucket access to be pinned to a known set of
source IPs, Trebellar publishes a stable list of egress addresses used by the
ingestion workers. You can attach these to your bucket policy (aws:SourceIp on
S3 or a VPC Service Controls perimeter on GCS) so that reads, writes, and deletes
are only accepted from Trebellar’s infrastructure.
To avoid drift between these docs and the live set, we don’t publish the ranges inline. To request the current list:
Trebellar provisions a tenant-isolated bucket and issues you write-only credentials scoped to a single prefix. Your upstream systems use these to drop files exactly as they would against a bucket you own.
Steps:
Credentials issued in this mode have PutObject only — they cannot list, read,
or delete. This is by design so that a leaked credential cannot be used to
exfiltrate previously-uploaded files.
Use SFTP when your upstream systems can’t write to object storage — common with legacy BAS/BMS exports, facility-management vendors, and scheduled jobs running on on-prem servers.
Trebellar connects to an SFTP endpoint you operate.
You provide:
Steps:
archive/ and errors/ subdirectories Trebellar will create.If your SFTP server is exposed to the internet and you’d like to restrict inbound connections to Trebellar only, request the current egress IP ranges for the ingestion workers from your Customer Success representative or at support@trebellar.com. Specify the region you expect connections from — we’ll send back the narrowest range. Add them to your firewall / security group rules on port 22.
We keep the live list out of these docs on purpose so customers never pin a stale range. Changes are announced 30 days in advance in the changelog.
Trebellar spins up a per-organization SFTP endpoint. This is the fastest path when you want an SFTP drop but don’t want to run a server.
You receive:
sftp.trebellar.app/inboxThat’s it — point your upstream job at the endpoint and start pushing.
For SFTP you can optionally configure client-side PGP encryption so that the file contents are encrypted end-to-end, from your exporter all the way to Trebellar’s decryption step.
How it works:
gpg --encrypt --recipient trebellar@yourorg .... Encrypted files should use the
.gpg or .pgp extension.You can also use your own PGP keypair instead of the Trebellar-generated one — upload the public key to the admin panel and keep the private key on your side, decrypting files yourself via an egress to your environment. Ask Customer Success if you need this mode; it’s a small variant of Option 2a.
Before uploading, see the Initial Data Requirements article in our help center for the complete list of supported data types and the required fields for each.
Each upload folder should contain the dated snapshot of your data based on the date provided in the folder’s name.
For every snapshot, create a folder named in YYYY-MM-DD format using the date the data reflects. All files placed in that folder should correspond to that same snapshot date.
Each file within a folder should follow this naming pattern:
For example, if your employee and building data reflects your organization as of 2026-05-02, upload both files into:
This tells Trebellar that all files in that folder are semantically linked and belong to the same reporting snapshot.
Trebellar’s raw bulk importer is focused on SFTP and S3/GCS because those cover the vast majority of enterprise data export paths. If your source is something else — FTPS, Azure Blob Storage, a vendor-specific REST API, an email attachment pipeline, or a file drop behind a VPN — contact your Customer Success representative. We’ll scope a bespoke connector; most common variants can be onboarded in under a week.