Versions Compared

Key

  • This line was added.
  • This line was removed.
  • Formatting was changed.
Table of Contents
minLevel1
maxLevel6
outlinefalse
stylenone
typelist
printabletrue

Objective

This is designed to prepare the learners in validating a customer onboarding workflow end-to-end by verifying credentials and setting network security settings for virtual machines. Comprehensive step-by-step directions on downloading and installing prerequisite software like CLI for Windows, Chocolatey,the Helm client from the local directory (for example kubectl), etc. It also takes through the important introduction setting up, configuring databases... creating users and database creation.. assignment privileges.... In-order to get prepared ready with YAML files as per the customer standards.


Overview

This document provides step-by-step instructions for the end-to-end validation of the Customer Onboarding Process using AC4.


Prerequisites

  1. Obtain bastion access from Connectria.

  2. Verify credentials and allow the Adeptia office IP in the VM network security group inbound rules.

  1. Download required software from the Google Drive link.

  2. Install the CLI for Windows.


Installation Steps

  1. Install Choco in PowerShell:

    Code: Set-ExecutionPolicy Bypass -Scope Process -Force; [System.Net.ServicePointManager]::SecurityProtocol = [System.Net.ServicePointManager]::SecurityProtocol -bor 3072; iex ((New-Object System.Net.WebClient).DownloadString('https://community.chocolatey.org/install.ps1'))

  1. Create and Configure Database:

    • Create a connection from the workbench.

    • Create the database and users with necessary privileges.

    Code: create user '<<customer_name>>productionuser'@'%' IDENTIFIED BY 'password'; GRANT ALL PRIVILEGES ON <<custome_name>>_backend.* TO '<<customer_name>>productionuser'@'%' WITH GRANT OPTION; GRANT ALL PRIVILEGES ON <<custome_name>>_logs.* TO '<<customer_name>>productionuser'@'%' WITH GRANT OPTION; GRANT SELECT SHOW VIEW ON sic_dev_backend.* TO 'sic_r_user'@'%';

  1. Prepare and Install Software:

    • Prepare the YAML file as per client's license and details provided in the email.

    • Add the bastion IP in the AKS cluster network security.

    • Install Helm: Code choco install kubernetes-helm

  1. Disable SSL Setting from Database Server.

  1. Install Adeptia Connect:

    Code: helm install adeptia-connect-nuvem-prod adeptia-connect/adeptia-connect --version 4.3.4 -f nuvem_prod_4_3_04.yaml --timeout 10m --debug -n nuvem-prod

  1. Download and Install Nginx:

    • Download Nginx v9.3.32.

    • Go to the folder containing tls.key, tls.crt, and star.adeptia.com files and create a secret:

      Code: kubectl create secret tls <<secretname>> --key="tls.key" --cert="tls.crt" --namespace <<namespace>>

    • Update and apply the ingress rules:

      Code: kubectl apply -f ingress.yaml

  1. Create EAR Folder and Place EAR File in Shared Path.

  1. Deploy Latest License and Restart License Microservice.

  1. Provide Ingress IP and Application Domain Name to (Example: Milon) via Ticketing Portal.


Post-Installation Configuration

  1. Log in and Perform Initial Setup:

    • Enter the client name and email ID as provided in the client sheet.

    • Enable the following settings:

      • EAR settings

      • SMTP configuration

      • AI MAP

      • Adeptia Assistance feature

      • Change logging level to Error for all microservices

      • Enable EAR setting from the application setting (default password: changeit)

    • Change environment display name

    • Configure mail server parameters:

      Code: emailID: donotreply@adeptia.com Password: refer myglu

  2. Install EFK Stack:

    • Download EFK.

    • Install EFK:

      Code: helm install efk efk-stack -n logs

  1. Install Grafana:

    • Download Grafana.

    • Extract and install Grafana:

      Code: helm install grafana-prometheus kube-prometheus-stack -n monitoring

  1. Apply Ingress Rules:

    • Remove s from HTTP and provide the ingress release name in the YAML file.

  2. Create Namespace for Velero:

    • Create a container in Azure Blob Storage.

    • Create credentials-velero.txt:

      Code: AZURE_SUBSCRIPTION_ID= AZURE_TENANT_ID=<<ID>> AZURE_CLIENT_ID=<<ID>> AZURE_CLIENT_SECRET=<<value>> AZURE_RESOURCE_GROUP=<<name>> AZURE_CLOUD_NAME=<<name>>

    • Install Velero:

      Code: velero install --provider azure --plugins velero/velero-plugin-for-microsoft-azure:v1.5.0 --bucket $BLOB_CONTAINER --secret-file <<file path>>/credentials-velero.txt --backup-location-config resourceGroup=$AZURE_BACKUP_RESOURCE_GROUP storageAccount=$AZURE_STORAGE_ACCOUNT_ID subscriptionId=$AZURE_BACKUP_SUBSCRIPTION_ID --use-restic


Adeptia Assistance Configuration

  1. Whitelist AKS Cluster Public IP.

  1. Update Adeptia Assistant Settings:

    • Navigate to: Setting >> Common >> Adeptia Assistant

    • Set the following properties:

      Code: abpm.services.chatbot.adeptiaai.enable = true abpm.services.chatbot.adeptiaai.endpoint = https://ai.adeptia.com/v1.0 abpm.services.chatbot.adeptiaai.oauth.clientid = f3f7e482-0b5a-41f6-aa6b-4b44494be419 abpm.services.chatbot.adeptiaai.oauth.clientsecret = wM48Q~IE-hOKMahzZ7QjoROdOkSumNwQoPOmmaRb abpm.services.chatbot.adeptiaai.oauth.scope = api://f4e48d6e-8d68-460c-9314-d78c0eeafc75/.default abpm.services.chatbot.adeptiaai.oauth.tokenurl = https://login.microsoftonline.com/45549897-61ee-4cfa-b596-04ca9df5c105/oauth2/v2.0/token abpm.services.chatbot.adeptiaai.tagname = ProductDocumentation

Values

Property name

Description

Default value

abpm.services.chatbot.adeptiaai.enable

Set this property to true/yes to enable the Adeptia Assistant feature.

true

abpm.services.chatbot.adeptiaai.endpoint

The API endpoint to interact with the Adeptia Assistant knowledge base.

https://ai.adeptia.com/v1.0

abpm.services.chatbot.adeptiaai.oauth.clientid

The client identifier provided by the third-party application used for authentication.

f3f7e482-0b5a-41f6-aa6b-4b44494be419

abpm.services.chatbot.adeptiaai.oauth.clientsecret

The client secret provided by the third-party application for authentication.

wM48Q~IE-hOKMahzZ7QjoROdOkSumNwQoPOmmaRb

abpm.services.chatbot.adeptiaai.oauth.scope

The scope of the access request. The application's access token will be limited to the granted scopes.

api://f4e48d6e-8d68-460c-9314-d78c0eeafc75/.default

abpm.services.chatbot.adeptiaai.oauth.tokenurl

The token URL issued by the third-party application for authentication.

https://login.microsoftonline.com/45549897-61ee-4cfa-b596-04ca9df5c105/oauth2/v2.0/token

abpm.services.chatbot.adeptiaai.tagname

The tag name bound to the endpoint. 

ProductDocumentation

​Knowledge base 

Panel
panelIconIdatlassian-note
panelIcon:note:
bgColor#DEEBFF

------------------------------------

MST (used for maintainence & support)

------------------------------------

client id

c0471393-ccd2-4f2b-86d8-39ae8e54b18f

client secret

Jk~8Q~1bbLGhO0aZQuPyQuJEz5U_7xWQVQaoIaq9

------------------------------------

helpbot (used for Adeptia Connect helpbot)

------------------------------------

client id

f3f7e482-0b5a-41f6-aa6b-4b44494be419

client secret

wM48Q~IE-hOKMahzZ7QjoROdOkSumNwQoPOmmaRb

  1. Enable Adeptia Knowledge Base:

    • Create a database in Milvus with a name starting with an underscore (_) and replacing dashes (-) with underscores (_).

  2. Create Customer App Registration:

    • Create certification and secrets for Adeptia configuration.

    • Add client ID in the app registration.

    • Add settings in the knowledge base to enable the knowledge base.

By following these instructions, you will successfully install and configure the AC4 system, enabling comprehensive customer onboarding and ensuring all necessary features and services are operational.


References: