The Administration application enables account administrators to manage their users, applications, rules and stored files, as well as configure a number of options for their account. Here you can:

The Home Screen

The "Home" screen provides navigation links to the main parts of the administration application. It also shows subscription information for your account. The subscription information describes how much capacity you have used and the optional applications you are subscribed to. The capacity section shows:

  • API requests: It counts whenever some function in Cumulocity is invoked, regardless of whether the function is invoked from a device (for example, sending a measurement) or from an application (for example, viewing the list of devices).
  • Device API requests: Counted only when the API is called from a device (for example, sending a measurement)
  • Storage: The total amount of data stored in your account. This amount can be changed by retention policies and by the amount and size of stored files.
  • Storage quota: If the storage limit per device is set, the user is restricted to a maximum data usage.
  • Devices: The total number of devices connected to your account. This is the sum of the devices listed in the "All devices" menu of the Device Management application and their direct and indirect child devices.
  • Users: The sum of all users configured in this account, active and inactive.

"This month" shows the usage information starting with the current month. "Last month" shows the last full month.


Managing users

In order to manage users in your tenant account, click on the "Users" menu. New tenants will usually find two users: The initial administrator user and the "sysadmin" user. The initial administrator user was configured when your account was created. This user cannot be removed, only edited. The "sysadmin" user is a user that the Cumulocity support uses to guide you through your trial phase.

Note that the sysadmin user may not be present depending on your provider.

Click Users

Adding users

To add additional users, click on "Add user".

  • Enter a username for this user to log on.
  • Choose if the user will be active.

If the switch is set to "disabled", the user will not be able to log in.

  • Enter first and last name of the user. This will be shown on the top right next to the user symbol when the user logs in.
  • Enter the e-mail address of the user. You need to provide a valid, unique e-mail address to enable users to reset their password.
  • Enter a telephone number.
  • If you choose to check "User must reset password on next login", the user will have to choose a new password after the next login.
  • If you choose to check "Send password reset link as e-mail", the e-mail message will be sent to provided e-mail address with link to set a password.
  • Enter a password and confirm the password. (See "Logging in" for more information on password strength.)
  • Add users to user groups.
  • Assign devices and applications permissions.
  • Click the "Save" button to save all the previous data.

Add User

Fields without an asterisk ("*", like "First name", "Last name") are optional.

Editing users

To edit an existing user, just click on the user in the list. All user details other than the username, "User must reset password on next login" and "Send password reset link as e-mail" checkbox can be modified. To change the password, click on "Change password". Click "Save" after you finished editing.

Deactivating or deleting users

Hovering over a user displays the deactivate and delete buttons on the right side. The "Deactivate" button simply disables the user. The user still exists, but will not be able to log in. The delete button ("X") permanently deletes a user.

Delete User

Using two-factor authentication

The Two-factor authentication(TFA) is an extra layer of security that requires not only a username and password, but SMS verification as well. TFA can only be set up by administrators. When TFA is enabled, it is impossible to configure it from the "User settings", it is configurable from the administration UI.

Note that a phone number is required when adding a user and TFA is enabled. When users without a phone number try to login using TFA, the user will be redirected to a window, to enter his/her mobile phone number. Without a phone number a login is impossible.

To see whether TFA is enabled for a certain user, go to the "Users" menu and check the TFA status column.

TFA satus

Enable two-factor authentication for a user:

  • Go to the "Users" menu.
  • Click on the user name.
  • Click on the checkbox next to "Enable two-factor authentication.
  • Click "Save".

Enable TFA

Managing user groups

Users with the same permissions can be placed into user groups representing typical permission sets. A single user can be part of multiple user groups. New tenant accounts have four user groups by default. These user groups have different default permission settings:

  • Admins: A group with all permissions by default.
  • Business: A group to work with all devices and their data but without administration rights.
  • Readers: A group who can read all data but cannot edit.
  • Devices: A group with typical minimal default permissions for devices.

All groups can be modified and deleted.

User groups

Adding user groups

To add a user group:

  • Click on "Create user group".
  • Enter the name of the user group.
  • Edit the permissions.
  • Click on the "Save" button.

Editing groups

All user group details can be edited. To edit a group, click on the name of the group in the group list. After you have finished modifying the group, click on the "Save" button.

Editing a user group can change the permission for all users in the group and can affect the correct functioning of devices.

Confirm group editing

Removing groups

To remove a group, simply hover over the group name and click on the "X" button. A confirmation dialog will appear. Click on "OK" will delete the group.

Remove Group

Managing Permissions

Cumulocity distinguishes three types of permissions that are assigned to users and user groups:

  • Account-wide permissions ("roles"): These flags enable a user to read or modify all data in an account, like seeing all devices and being able to edit all devices.
  • Device- or device group-specific permissions: These permissions define a specific level access to data in your account, restricted to a group of devices.
  • Application access permissions: These define the applications that users will see in their application switcher.

From the view point of a user:

  • A user has the sum of permissions granted to all groups the user is part of.
  • If a user has account-wide permissions, other permissions are ignored.
  • Device-/group-specific permissions are inherited to all direct and indirect child devices and child assets. If you assign "read" permission to a group of devices, the user will be automatically able to see all devices in the group.

Assigning account-wide permissions

When you edit a group, a table with "roles" is listed below the group name. They represent permissions within the following types of data:

  • Tenant management: View, create, edit or delete subtenants.
  • Tenant statistics: View the usage data for this account, as shown on the home page of the administration application.
  • Option management: View or edit account options such as password policies.
  • Application management: View or edit the applications available in this account.
  • User management: View or edit users, user groups and permissions.
  • Own user management: View or edit your own user.
  • Identity: View or edit identifiers for devices.
  • Inventory: View or edit inventory data.
  • Measurements: View or create measurements for devices.
  • Events: View or create events for devices.
  • Alarms: View or edit alarms for devices.
  • Audits: View or create audit records for devices.
  • Device control: View or edit commands for devices resp. send commands to devices.
  • CEP management: View or edit Cumulocity Event Language rules.
  • Retention rules: View or edit retention rules.
  • Bulk operations: View or create bulk operations.
  • Support operations: Allows user to log in to other tenants as support user.

For the various types, the following permissions are available:

  • Read: Read specified data.
  • Admin: Create, modify and delete specified data. (Not including "Read"!)

Not all types of data can be modified ( audit records). For inventory data, there is one additional type of permission: "Create". The "Create" permission enables the user to create devices in the inventory and to fully manage these devices owned by the user. The user cannot read or manage devices owned by other users. This is mainly used to limit the permissions available to devices.

To assign permissions click on the relevant checkbox. If you wish to select or clear ALL entries in a particular column, use the buttons at the top:

  • Clear all: Clears all of the checked roles.
  • Select all: Selects all of the roles.
  • Select all Read: Selects "Read" for all types and deselects the other roles.
  • Select all Admin: Selects "Admin" for all types and deselects the rest.

All roles

Using Support Permission


Support users are users in the management tenant area with a special permission to login to tenants accounts. To allow login to tenants, the support user account must have support access rights. When a support user logs into a tenant account, the user has the same privileges as a subtenant user. This user type is specified on the login page.

Please note that support users cannot access "own applications" of other tenants. For example, if you are a user of the management tenant and you want to access a private application in another tenant, an error will occur. In order to go around this, you can move the application to the management tenant and subscribe the other tenant to it. This way, the app will be available for both tenants.

Support users can login using own passwords and usernames:


The "support_user" is the name of the support user obviously, "user" is the name of the user whose environment will be accessed.



The "support_user" is the name of this user in the management tenant area. In this use case, the support user will access the environment of one of the admin users.


The support user function is enabled by default. If it is disabled by the platform operator, then every user has an "Activate support access" option. It is available in the upper right menu. After selecting this option, support users have access to this tenant account for one day.

Audit logs

Audit logs for all actions performed by support users will have information about the actual author. In column "Who?" the author's name will be shown in form of:


Tenant-specific permissions

Sometimes, it is required to assign support access rights to specific tenants only. It can be done by device-specific permissions for the user and tenant managed object with scope "SUPPORT", type "*" and permission "*".

The screenshot below shows you, how to grant access to the tenant "myTenant".

Support permission

A tenant managed object can be found by type "c8y_Tenant" or name equal to tenant id.

In addition, tenant managed objects can be put into a group (like other device objects in device management UI) that can be used to provide access for support user to multiple tenants at a time. To achieve that, the group should be passed in device-specific-permissions instead of tenant managed object.

Restricting tenant deletion

Users with tenant management function and "Admin" permissions can create, update and delete tenants. To prevent a user from deleting tenants only a "create and update" permission should be granted.

tenant delete restriction

Tenant management objects

Tenant management objects are devices in tenant "management" representing existing tenants. Once a new tenant is created, a new tenant management object is also created in the tenant "management" with type "c8y_Tenant" and a name equal to tenant ID. This object contains also fragment "customProperties" with "externalReference" and other custom properties of the associated tenant.

Warning: If the tenant management object is accidentally deleted, it can be recovered by updating any property of the associated tenant. Tenant-specific permissions related to the tenant account will be lost.

Assigning device-specific permissions

To assign more specific permissions on device level or device group level, go to the "User permissions" section while editing users, or "Group permissions" section while editing user groups.

  • Select a managed object (device or group of devices) by typing the ID or the name of the managed object.
  • Select the scope of the permission for the selected managed object. The scope limits the permission to particular types of data for this managed object. Use an asterisk ("*") to grant permission to all types of data of the managed object.
  • Limit the permission to particular content in the data ("type"). For example, to limit a user to only send restart commands to a device, use "OPERATION" as scope and "c8y_Restart" as type. Again, use an asterisk ("*") as wildcard for any content.
  • Select the permission to grant: Use "Read" to read the data. Use "Admin" to create, modify and delete the data. Use an asterisk ("*") to assign both read and admin permission.
  • Click on the "Add" button.
  • Click on the "Save" button.

User Permissions

As mentioned above, permissions for groups of devices are inherited to the child devices and child assets of the group.

Assigning application access permissions

To assign applications to particular users and user groups, go to the "Application access" section of that user or user group. The application access section is not visible if the user or user group already has access to all applications. The section shows marketplace applications and own applications. Marketplace applications are generally subscribed applications for your account. Own applications are applications that you added to your account, see Applications. Check all applications that should be made available to the user or user group.

Application access

Viewing audit logs

By visiting the "Audit logs" menu you can view all operations that users have carried out. The following fields can be observed:

  • "When?": Shows the server time when the change occurred.
  • "What?": This field shows what changed. ("Smart Rule Deleted")
  • "Who?": Displays the user who did the change.
  • "Text": Small summary of the change. ("Cep module "smartRule" updated") - "Type": Type of change. ("Smart rule", "Alarm", "User")
  • "Time": Shows the device time when the change occurred. It can be different from the server time.

Only the last 100 logs are visible, in order to view more press the "search more" button.

Audit logs

Filtering logs

In order to easily search through logs, you have the ability to filter them. The following filters can be used:

  • Type: There are six types of logs, "Alarm", "Event processing", "Group", "Operation", "Smart rule" and "User".
  • Date from: Simply select date from which you wish to filter the log.
  • Date to: Select date to which you wish to filter the log.
  • User: View logs of a specific user only.

Filter settings

It is not necessary to use all filters.

To apply filters, simply click on the "Apply filters" button.

To discard filters or to see all audit logs, click on the "cross" button.

Managing applications

Besides the available applications, you can also provide own applications in your account by checking the "Own applications" menu. These applications can be "Smartapps" or generic HTML5 applications. “Smartapps” applications are HTML5 applications that can be extended by adding plugins. When deploying, the plugins are deployed into a specific application. For example, a plugin might add a specific widget to the Cockpit dashboard.

Plugins can only be added to own applications because the application itself is modified when adding the plugin. When adding a plugin to subscribed applications, the application must be cloned first into an own application. Afterward the plugin can be added. This process is supported by the Administration Application wizard.

"Smartapps" insert the plugin into the application. This has changed from the old Smartapps referencing plugins stored in other applications.

When an application has been created it will be available in the application switcher.

The "Open" button of the application appears when you hover over the application's name.

List of own applications

Creating an application

To add an application, you can upload a "ZIP file" application.

  • Click on "Add application".
  • Click on "Upload ZIP file".
  • Either drop the file into the box or simply browse your computer.

Cloning applications

This option will copy the application. Cloning a subscribed application creates a copy of the application as an own application, with a link to the original application.

In order to clone an application:

  • Click on "Add application"
  • Click on "Clone existing application"
  • Select the desired application that you wish to clone. Note that also subscribed applications are shown.
  • Enter the name of the application. The name will be shown as title on the top left of the application. It will also be shown in the application switcher.
  • Enter an application key. The application key is used to identify requests from this application and to make it available for subscription, see the Concepts guide.
  • Enter the application path. This path will be part of the URL to invoke the application. For example, if you use "hello" as application path, the URL of the application will be "/apps/hello".
  • Click on the "Clone" button.

Adding and removing plugins

In order to configure and extend the function provided with a smartapp, you can add plugins (as ZIP files) to your applications. To add additional plugins, go to “Own applications”, move the cursor over your desired applications and click on “Add Plugin”. You can drag the plugin into the box or just select them from your computer.


To remove a plugin, click on the cogwheel next to the desired plugin and click remove. The following tables list the navigator items, menu items and their respective plugins:

Navigator Item Plugin
Welcome Welcome screen
Home Cockpit Home
Smart Rules Smart Rules UI
Groups Groups Hierarchy
Data Explorer Data Point Explorer UI
Data Point Library Data Point Explorer UI
Reporting Reporting
Reports Dashboard (Note: There are two plugins with this name. Select the one with the description: "Reports are stand alone dashboards without a context")
Alarms Alarm Management
Menu Item Plugin
Info Not possible to disable
Subassets Not possible to disable
Permissions Device Permission Management Plugin
Data Explorer Data Point Explorer UI

Please note the "UI" at the end of the plugin names.

Restoring to an older application version

Users can restore old versions of an application. If you “set active” a specific version of the app, then this will be the version used by users.

Note that the “Archive” tab is not available for subscribed applications, as only the owner of the application can perform this action.

Uploading archives

Multiple archive ZIP file versions can be stored in Cumulocity when they were created by uploading ZIP files. Each version is called an archive. You can upload different versions at the same time and switch between these versions. To upload an archive:

  • Select the application by clicking on its name.
  • Click on the "Archives" tab.
  • Click on "Upload archive" and navigate to the archive in your folder.
  • Click on "Upload" to upload the archive to Cumulocity.

Upload archive

Once uploaded, archives can be downloaded, activated or removed if necessary. The active archive (indicated by a cloud icon) is the version of the application that is currently being served to the users of your account. This version cannot be deleted.

Working with bitbucked hosted application (Deprecated)

Assume that you are developing a web application, using Bitbucket as code repository. In this case, exposing the application through Cumulocity can be done as follows:

  • Click on "Add application".
  • Click on "HTTP(S) proxy".
  • Enter the name of the application, as shown in the application switcher.
  • Enter an application key. The application key is used to identify requests from this application and to make it available for subscription.
  • Enter the application path. This path will b e part of the URL to invoke the application. For example, if you use "hello" as application path, the URL of the application will be "/apps/hello".
  • Enter the server URL where your application is hosted. At this URL, there needs to be an index.html file that provides the entry point to your application.
  • Enter a username to access your repository (optional).
  • Enter a password to access your repository (optional).
  • Click "Save".

https proxy app

Note that, username and password are transmitted using HTTP Basic Authentication.

We do not recommend to use bitbucket hosted application anymore, because downtime of bitbucket results into downtime of the application.

Adding a smartapp (Deprecated)

Note that this functionality is depreciated and will be removed in future versions of the product.

To add a smartapp:

  • Click on "Add application".
  • Click on "Create legacy smartapp".
  • Enter the name of the application. The name will be shown as title on the top left of the application. It will also be shown in the application switcher.
  • Enter the application path. This path will be part of the URL to invoke the application. For example, if you use "hello" as application path, the URL of the application will be "/apps/hello".
  • Click the "Create" button.

Please note that these are the old "Smartapps" in which the plugins that you wish to add to your application must be selected from a list.

Legacy smartapps

Working with external applications

"External applications" are links to applications running elsewhere. Enter name of the application and application key, then provide the URL of that application and click "Save" to make the link available in the application switcher.

Editing applications

To edit an application, simply click on its name. Depending on the type of the application (e.g. Hosted, External), different fields can be modified.

Note that "ID", "Application key" and "Path" cannot be changed once configured.

Removing applications

If you remove an application that overwrites a subscribed application, the currently subscribed application becomes available to all users. Additionally the users will then also benefit from future upgrades of the subscribed application. It is not possible to remove subscribed apps. This is only possible for the owner of the subscribed application.

To overwrite a "Subscribed application" the "Own Application" must have the same context-path as the "Subscribed application".

To remove an application, simply hover over the application name and click on the cogwheel, then press the "Remove" button. A confirmation pop-up window will appear. Click "OK" and the application will be deleted.

Managing tenants

With the subtenant concept you can separate the data of the individual tenants one hundred percent.

Background: As a tenant administrator, all data in your tenant account is 100% separated from the data of other tenants. The data inside your tenant is shared with all account users by default unless it is restricted by user permissions.

If you want 100% data safety instead of dealing with user permissions, then use the subtenants. Each subtenant has a seperated data area. All Cumulocity features (e.g. user management, app management, rule management) are available for each subtenant without visibility to other subtenants.

This feature is an optional feature which is not available for all tenants.

In case you are subscribed to the feature, but you do not see it, contact support.

In order to manage subtenants click on the subtenants menu. Subtenant management includes: Tenant creation, activation, suspension, subscribed applications and options.


Tenant ID's must remain unique, two tenants cannot create subtenants with the same "URL/ID". Subtenants cannot create an additional level of subtenants.

Adding sub-tenants

To add a new subtenant, click on "Create Tenant"

Please note that fields with an asterisk (" * ") are mandatory.

  • Enter unique domain/URL of the new tenant. This URL will be used to access the application (e.g.
  • Enter the name of the company.
  • Enter the administrator's e-mail. You must provide a valid e-mail address to enable users to reset their password.
  • Enter username of the administrator for logging in.
  • Enter contact name. This field is optional.
  • Enter contact phone. Again, this field is optional.
  • Choose whether you wish to have the password reset link sent as an e-mail. If you have not selected this option you will have to enter a password and confirm the password. (See "Logging in" for more information on password strength.)
  • Click the "Save" button.


Editing, suspending and removing sub-tenants

To edit subtenants, click on the desired subtenant. All the fields can be edited except "ID" and "Administrators Username".

When you have finished editing, click on the "Save" button.

If a tenant is suspended, his data still remains in the database and he can be reactivated at any time later. If the tenant is removed his data will be deleted.

Hovering over a tenant will bring up the "Suspend" and the "Remove" buttons. The "Remove" button is shown as a red cross.

Please note that there is an additional check during tenant suspension. The user will have to provide his own password in order to proceed. After the tenant is suspended, an e-mail is sent to the suspended tenant administrator. The e-mail is sent only if the property in the config file is enabled and if the tenant administrator provided an e-mail address during creation.

Retrieving usage statistics

The usage statistics menu provides you with information about each subtenant. The statistics show:

  • Id: Unique id of the subtenant.
  • External reference: This field is for individual usage, for example, you can add a link to the CRM system here or an internal customer number.
  • API requests: Number of API requests, including requests from devices and applications.
  • Device API requests: Number of API requests from devices
  • Storage (MB): The amount of data stored in your account.
  • Devices: Total number of devices connected to the tenant.
  • Subscribed application: This column shows number of applications that the subtenant is subscribed to.
  • Creation time: The date and time of the creation of the subtenant.

Usage statistics

Managing event processing

Using event processing, you can specify real-time business logic that is automatically run by Cumulocity as soon as new data arrives or existing data is modified. The logic is deployed in so-called "modules". Modules consist of a set of statements that you write in Cumulocity Event Language. Click on "Event processing" to see the current modules or to create new modules.

Event processing

A user-friendly way to specify real-time business logic is provided in the Cockpit application through the so-called "Smart Rules". Smart Rules are "under the hood" also implemented as Cumulocity Event Language statements, and you can see them when you click on "Event Processing". However, you cannot edit Smart Rules from the Event Processing user interface.

Creating new modules

To create a new module, click on "New module".

  • Enter a name for the module. You can only use alphanumeric characters without blanks.
  • If you want to run the statements in the module immediately, leave the status set to "Deployed". Otherwise, set the status to "Not deployed".
  • Start typing your CEL statements into the large text field labeled "Body". To get some inspiration, select an example from the "Examples" drop-down menu and click "Append example". The example CEL statement will be pasted into the "Body" text field at the position of the cursor.
  • Click the "Save" button.

New module

If you selected the "Deployed" status, you will see a small green "Connected" box in the user interface. Whenever your statements produce some output, you will see it below this "Connected" box. Clicking on a line of output unfolds the detailed output of the statement. Clicking "Clear all" removes the output from the screen.

Managing modules

To modify your module, simply click on the module's name. To remove your module, hover over the module's name and click the "X" button. A confirmation window will pop up. Press "OK" and the module will be removed.

Remove modules

Instead of deleting the module, you can also disable it temporarily by setting the "Status" in the edit menu to "Not deployed". Click on the "Save" button afterward.

Reprioritizing alarms

"Alarm mapping" enables you to change the severity and text of alarms to adapt them to your business priorities. For example, a loss of the connection to a device may be critical to you, but it is, by default, a "MAJOR" alarm. To change this, add an alarm mapping to change alarms related to connection losses to "CRITICAL".

Alarm mapping

Adding an alarm mapping

To modify the severity of an alarm, determine the type of the alarm that you want to modify by clicking on an alarm in the alarm list. Then click "Add alarm mapping" in the "Alarm mapping" menu.

  • Enter the alarm type to modify.
  • Select desired new severity, or select "Drop" to not show the alarm at all.
  • Enter a new text for the alarm. This step is optional. If you do not enter any text, the original text in the alarm will be preserved.
  • Click "Save".

Changing or deleting alarm mappings

To change an alarm mapping,

  • Locate the alarm in the "Alarm mapping" section and click on its name.
  • Change the severity and/or text.
  • Click "Save".

To delete alarm severities, hover over the alarm type and click the "X" button. A confirmation window will pop up. Press "OK" to delete the alarm mapping.

Changing settings

By expanding the "Settings" menu, administrators can:

Changing the password policy

To change password settings, click on "Password". To limit the validity of user passwords, set the number of days when users have to change their passwords. If you do not want to force your users to change passwords, use "0" for unlimited validity of passwords.

By default, users can use any password with eight characters or more. If you select "Enforce that all password are "strong" (green)", your users must provide strong passwords as described in "Logging in".

"Enforce that all password are green" and the "Password validity limit" can be mandatory and non-editable, if configured by the platform administrator.

Strong (green) passwords must have M characters. By default, the system restricts users to not use passwords used in history, in other words, last N passwords provided by a user are remembered by the system and the system restricts users to not use them. The default value for N is 10.

"M" and "N" can be configured by the platform administrator.

Click "Save" to store the settings.

Password settings

Changing the TFA settings

To change the TFA settings, click on "Password" under the "Settings" menu item. There are two TFA settings that can be changed:

  • "Limit token validity"- You can set the lifetime of each session. When the session expires, the user has to enter a new verification code.
  • "Limit PIN validity"- Set the lifetime of each verification code sent via SMS. When the verification code expires, in order to login the user has to request a new verification code.
  • When ready, click "Save TFA settings".

TFA settings

To disable two-factor authentication, simply deselect the box "Allow two-factor authentication". Click on "Save TFA settings" to apply your changes.

Changing the default application

With the "Application" menu, administrators can change the default application view for all users within the tenant when no application was defined in the URL. All users also must have access to this application.

Changing access control settings

With the "Application" menu, administrators can enable cross-origin resource sharing or "CORS" on the Cumulocity API. For more information, see

Enabling server-side agents

In the "Server-side agents" menu, the "Send dashboard via e-mail" smart rule can be enabled or disabled. To enable, select the checkbox and click "Save".

Enter OpenIT credentials

SMS sending is used by several features within the application. It can be used to make login more secure with two-factors authentication. An SMS can be sent when an alarm is triggered. SMSes can be used to send instructions to devices. The service provided by Openit can be used similar. In this section, the user can enter credentials to activate features requiring SMS messages.

Managing data retention

"Retention rules" gives you control how long data is stored in your account. For example, you want to store measurements for 90 days, but delete alarms already after 10 days. By default, all historical data is deleted after 60 days (This can be edited in system settings).

Retention rules are usually run during the night. When you edit a retention rule, you will not see an immediate effect in the usage section on the home page of the administration application.

Add rule

To add additional "Retention rules", click on "Add rule". Up to the "Maximum age" field, you can enter an asterisk ("*") into all fields to permit any value in that field.

  • Select the type of data to clean up (alarms, measurements, events, operations, audit logs).
  • Enter a fragment type, if you want to be more specific about the data to be cleaned up. To clean up all connection loss alarms with this rule, select "alarms" and enter "c8y_UnavailabilityAlarm" into "type".
  • If you want to remove only data from a specific device, enter the device ID into "Source".
  • Enter the "Maximum age" in days (max. allowed value is 10 years in days).
  • Click the "Save" button.

Add retention rule

Note that alarms are only removed if they are in "CLEARED" state.

To delete a rule, click on the "X" button and then press "OK" after the pop-up window appears.

Managing storage quota warning e-mail

This section is only visible if a storage quota was set for the tenant. The tenant administrators can set a user group and threshold for an e-mail to be sent once a day if the storage used is higher than a percentage of the storage quota. The e-mail warning can also be disabled. The default setup is sending an e-mail to the "admin" group when the storage reaches 80% of maximum storage.

Managing files

The file repository provides an overview of the files stored in your account. To see the files, click on "Files repository" in the administration menu. The files listed can come from various sources. They can be software images, configuration snapshots taken from devices, log files from devices or web applications uploaded using the "Own applications" menu. To delete a file, click the "X" button next to the file.

Files repository

If the file corresponds to an active application, it cannot be deleted. You first need to remove or upgrade the application to be able to delete it.

Storage quota

The storage quota is in place for a tenant when a storage quota per device is set by the platform administrator. The total storage available to the user is calculated using the formula storage quota per device x number of devices. A check is performed every night to ensure the quota is not exceeded.

In case the quota is exceeded, an e-mail is sent to all tenant administrators to warn them that data will be deleted the following night. After 24h, if the quota is still exceeded, all data retention limits are reduced by a fixed percentage. The storage quota per device will be reduced as a result of this rule.

Let us assume that a tenant has a storage quota of 10GB. Retention rules are 80 days for measurements, 90 days for all other data.

  • Day 1: In the nightly check, the total storage is calculated at 13GB. An e-mail is sent to all the tenant administrators.

  • Day 2: the total storage is still at 13GB. The system determines that a 15% reduction of the retention rules is sufficient to be under the storage quota. So any measurement older than 68 days (80 days - 15%) and any other data older that 77 days (90 days - 15% results in 76.5 days, rounded to 77 days) is deleted.

The total storage is now at 9.8GB.