Handling Files

Contents

1Understanding File Management
1.1Key File Management Concepts

2

Basic File Management Procedures

3

Advanced File Management Procedures
3.1Security Management

4

File Management-Related Alarms

1   Understanding File Management

1.1   Key File Management Concepts

File Management provides a management interface to a logical file system in the Managed Element (ME).

The logical file system exposes files produced by functions on the ME, for example, performance measurement report files and alarm logs. In addition, files can be imported to the logical file system. Such files are located in directories, which are exposed as file groups on the logical file system.

A file group can contain other file groups forming a file group subtree.

File Management enables a mapping between a Managed Object (MO) Distinguished Name (DN) and a path on the logical file system, for example, as follows:

The FileM Managed Objects Classes (MOCs) can be found in the Managed Object Model (MOM). For general information about the Managed Objects, cardinality, and related concepts, refer to Managed Object Model User Guide.

A preventive maintenance policy is a routine that can automatically delete files or raise alarms when limits are exceeded. A preventive maintenance policy can be associated with one or more file groups, it is applied recursively to all files and file groups within a file group. File deletion applies either to the newest or the oldest file.

There are seven predefined file groups. Five of the seven file groups have system-controlled preventive maintenance policies; these file groups are:

There are two additional predefined file groups; however, these files groups do not have any system-controlled preventive maintenance policies. A preventive maintenance policy can be specified separately for these file groups:

File Management policies are only to be applied to file groups that are not already subject to specific system controlled or user-defined preventive maintenance policies.

The files and file groups in the logical file system can be accessed through the Ericsson Command-Line Interface (ECLI), NETCONF, and the standard SSH File Transfer Protocol (SFTP).

Note:  
Special characters, such as + in filenames, appear as ?? in the ECLI. For more information, refer to Interwork Description Ericsson Command-Line Interface.

2   Basic File Management Procedures

File Management is accessed using NETCONF or the ECLI to manipulate the Management Information Base (MIB):

3   Advanced File Management Procedures

3.1   Security Management

Access to the logical file system is configured through security management rules. For more information, refer to User Management. By setting rules to FileGroup instances, different permission types can be applied.

Table 1    File Group Permission Types

Permission Type

Description

NO_ACCESS

The file group is invisible to the user.

R (read)

The file group and its contained FileInformation instances are visible to the user. The user can export files from the group.

RW (read and write)

The file group and its contained FileInformation instances are visible to the user. The user can set writable attributes of a FileGroup instance. The user can import and export files into/from the group.

RWX (read, write, and execute)

The file group and its contained FileInformation instances are visible to the user. The user can set writable attributes and execute actions of a FileGroup instance. The user can import and export files into/from the group. When using SFTP for transfer of files, all operations offered by the protocol are possible to execute without restrictions.

4   File Management-Related Alarms

Table 2    File Management Related Alarms

Alarm

Description

File Management, Number of Files in FileGroup Exceeded

 

Raised when the total number of files in the FileGroup subtree has exceeded a configured threshold.

File Management, Max Size in FileGroup Exceeded

 

Raised when the size of the FileGroup subtree has exceeded a configured threshold.



Copyright

© Ericsson AB 2016–2018. All rights reserved. No part of this document may be reproduced in any form without the written permission of the copyright owner.

Disclaimer

The contents of this document are subject to revision without notice due to continued progress in methodology, design and manufacturing. Ericsson shall have no liability for any error or damage of any kind resulting from the use of this document.

Trademark List
All trademarks mentioned herein are the property of their respective owners. These are shown in the document Trademark Information.

    Handling Files