Versions Compared

Key

  • This line was added.
  • This line was removed.
  • Formatting was changed.

...

  1. Prepare YAML Configuration:

    • Prepare the YAML file as per the client’s license and details provided via email.

  2. AKS Cluster Setup:

    • Add the Bastion IP in the AKS cluster network security settings.

...

5. Helm and Adeptia Connect Installation

  1. Install Helm:

    • Install Helm in the Bastion:

      Copy code

      choco install kubernetes-helm

  2. Disable SSL Setting:

    • Disable the SSL setting from the database server.

...

  1. Install Adeptia Connect:

    • Install Adeptia Connect using Helm (Follow Adeptia documentation) :

      Copy code

      helm install <<release name>> <<adeptia connect helmcharts path>>/ --timeout 10m --debug -n <<namespace>>

...

6. NGINX and Ingress Setup

  1. Install NGINX:

    • Download NGINX v9.3.32 and apply the ingress rules:

      Copy code

      kubectl apply -f ingress.yaml

...

7. EAR Setup and License Deployment

Once a secret is created, update the ingress.yaml file to apply the ingress rules.

...

  1. Create EAR Folder:

    • Create an EAR folder in the shared path and place the EAR file.

...

  1. Deploy the Latest License:

    • Deploy the latest license provided by the support team and restart the license microservice. (Shared Drive)

...

8. Environment Configuration

  1. Configure Client Environment:

    • Log in to the environment and configure the following:

      • EAR Settings

      • SMTP Configuration

      • AI MAP Settings

      • Logging Level (Set to Error)

      • Application Password: Default password is changeit.

...

Info

EmailID : donotreply@adeptia.com

Password: (refer) myglu

...

9. Monitoring and Backup Setup

  1. Install EFK:

    • Download and install the EFK stack:

      Copy code

      helm install efk efk-stack/ -n logs

    • After EFK installation is completed create the secret and apply the ingress rule

...

  1. Install Grafana:

    • Download and install Grafana using Helm:

    • Extract the zip file and run the below command from the following folder

      Copy code

      helm install grafana-prometheus kube-prometheus-stack -n monitoring

...

  • Once grafana is installed create the secret and apply the ingress rule

  • Apply the ingress yaml file with below changes 

  • Remove the s from the HTTP and provide the ingress release name

...

10. Velero Backup Configuration

  • Velero Backup Configuration:

    • Create a namespace velero and a container in Azure Blob Storage.

...

  • Install Velero using the command:

    Copy code

    velero install --provider azure --plugins velero/velero-plugin-for-microsoft-azure:v1.5.0 --bucket <<BLOB_CONTAINER>> --secret-file <<file path>>/credentials-velero.txt

  • Create credentials-velero.txt using below lines: (Note: you can get the details from MST Team)

Code Block
AZURE_SUBSCRIPTION_ID=  
AZURE_TENANT_ID=<<ID>>
AZURE_CLIENT_ID=<<ID>>
AZURE_CLIENT_SECRET=<<value>>
AZURE_RESOURCE_GROUP=<<name>>
AZURE_CLOUD_NAME=<<name>>
  • Use the below command to install the velero 

Code Block
velero install --provider azure --plugins velero/velero-plugin-for-microsoft-azure:v1.5.0 --bucket $BLOB_CONTAINER --secret-file <<file path>>/credentials-velero.txt --backup-location-config resourceGroup=$AZURE_BACKUP_RESOURCE_GROUP,storageAccount=$AZURE_STORAGE_ACCOUNT_ID,subscriptionId=$AZURE_BACKUP_SUBSCRIPTION_ID --use-restic

OR

Code Block
velero install --provider azure --plugins velero/velero-plugin-for-microsoft-azure:v1.5.0 --bucket nuvem1-velero-backup --secret-file ./credentials-velero.txt --backup-location-config resourceGroup=Velero_Backups,storageAccount=accloudbackupswus,subscriptionId=a9db97f9-3138-4644-bab4-0e233fcf7b7a --use-restic -n velero
Info

Notre: In case of getting errors kindly reachout to MST Team

...

11. Final Generative AI Configuration

...