AC Cloud End-To-End Customer Onboarding Process
Objective
Provides step-by-step instructions for the end-to-end validation of the Customer Onboarding Process in AC Cloud.
Designed to prepare learners for validating a customer on-boarding workflow end-to-end
Verifying credentials
Setting network security settings for virtual machines
Comprehensive step-by-step directions on:
Downloading and installing prerequisite software
CLI for Windows
Chocolatey
The Helm client from the local directory (e.g., kubectl)
Important introduction to setting up and configuring databases
Creating users
Database creation
Assignment of privileges
Preparation of YAML files according to customer tier.
AC Cloud Customer Onboarding Process
Process Step | Actions |
Sales/Pre-Sales Transition to Managed Services |
|
Submit Infra Resource Ticket to Connectria |
|
Provision Environment |
|
Setup Environment - Jump Host |
|
Setup Environment - Adeptia Connect |
Once customer confirms the Sys Admin user name in response to Welcome email then:
|
Setup Monitoring |
|
Complete Connectria Monitoring Setup |
|
Notify Accounts for Billing |
|
Invoice Customer |
|
Onboard Client |
|
Conduct Training |
|
Customer Environment Setup
Prerequisites
Obtain Jump host access credential from Connectria.
Verify credentials and allow the Adeptia Noida office’s IP in the VM network security group inbound rules.
Download required software from the Google Drive link.
Install the CLI for Windows.
Installation Steps
Install Choco in PowerShell:
Code:
Set-ExecutionPolicy Bypass -Scope Process -Force; [System.Net.ServicePointManager]::SecurityProtocol = [System.Net.ServicePointManager]::SecurityProtocol -bor 3072; iex ((New-Object System.Net.WebClient).DownloadString('https://community.chocolatey.org/install.ps1'))
Create and Configure Database:
Create a connection from the workbench.
Create the database and users with necessary privileges.
Code:
create user '<<customer_name>>productionuser'@'%' IDENTIFIED BY 'password'; GRANT ALL PRIVILEGES ON <<custome_name>>_backend.* TO '<<customer_name>>productionuser'@'%' WITH GRANT OPTION; GRANT ALL PRIVILEGES ON <<custome_name>>_logs.* TO '<<customer_name>>productionuser'@'%' WITH GRANT OPTION; GRANT SELECT SHOW VIEW ON sic_dev_backend.* TO 'sic_r_user'@'%';
Prepare and Install Software:
Prepare the YAML file as per client's license and details provided in the email.
Add the bastion IP in the AKS cluster network security.
Install Helm: Code
choco install kubernetes-helm
Disable SSL Setting from Database Server.
Install Adeptia Connect:
Code:
helm install adeptia-connect-nuvem-prod adeptia-connect/adeptia-connect --version 4.3.4 -f nuvem_prod_4_3_04.yaml --timeout 10m --debug -n nuvem-prod
Download and Install Nginx:
Download Nginx v9.3.32.
Go to the folder containing
tls.key
,tls.crt
, andstar.adeptia.com
files and create a secret:Code:
kubectl create secret tls <<secretname>> --key="tls.key" --cert="tls.crt" --namespace <<namespace>>
Update and apply the ingress rules:
Code:
kubectl apply -f ingress.yaml
Create EAR Folder and Place EAR File in Shared Path.
Deploy Latest License and Restart License Microservice.
Provide Ingress IP and Application Domain Name to Local IT team to add that into Public DNS Portal (Cloudflare) via Ticketing Portal.
Post-Installation Configuration
Log in and Perform Initial Setup:
Enter the client name and email ID as provided in the client sheet.
Enable the following settings:
EAR settings
SMTP configuration
AI MAP
Adeptia Assistance feature
Change logging level to Error for all microservices
Enable EAR setting from the application setting (default password:
changeit
)
Change environment display name
Configure mail server parameters:
Code:
emailID: donotreply@adeptia.com Password: refer myglue
Install EFK Stack:
Download EFK.
Install EFK:
Code:
helm install efk efk-stack -n logs
Install Grafana:
Download Grafana.
Extract and install Grafana:
Code:
helm install grafana-prometheus kube-prometheus-stack -n monitoring
Apply Ingress Rules:
Remove
s
from HTTP and provide the ingress release name in the YAML file.
Create Namespace for Velero:
Create a container in Azure Blob Storage.
Create
credentials-velero.txt
:Code:
AZURE_SUBSCRIPTION_ID= AZURE_TENANT_ID=<<ID>> AZURE_CLIENT_ID=<<ID>> AZURE_CLIENT_SECRET=<<value>> AZURE_RESOURCE_GROUP=<<name>> AZURE_CLOUD_NAME=<<name>>
Install Velero:
Code:
velero install --provider azure --plugins velero/velero-plugin-for-microsoft-azure:v1.5.0 --bucket $BLOB_CONTAINER --secret-file <<file path>>/credentials-velero.txt --backup-location-config resourceGroup=$AZURE_BACKUP_RESOURCE_GROUP storageAccount=$AZURE_STORAGE_ACCOUNT_ID subscriptionId=$AZURE_BACKUP_SUBSCRIPTION_ID --use-restic
Adeptia Assistance Configuration
Whitelist AKS Cluster Public IP in Internal Azure Portal
Update Adeptia Assistant Settings:
Navigate to: Setting >> Common >> Adeptia Assistant
Set the following properties:
Code:
abpm.services.chatbot.adeptiaai.enable = true abpm.services.chatbot.adeptiaai.endpoint = https://ai.adeptia.com/v1.0 abpm.services.chatbot.adeptiaai.oauth.clientid = f3f7e482-0b5a-41f6-aa6b-4b44494be419 abpm.services.chatbot.adeptiaai.oauth.clientsecret = wM48Q~IE-hOKMahzZ7QjoROdOkSumNwQoPOmmaRb abpm.services.chatbot.adeptiaai.oauth.scope = api://f4e48d6e-8d68-460c-9314-d78c0eeafc75/.default abpm.services.chatbot.adeptiaai.oauth.tokenurl = https://login.microsoftonline.com/45549897-61ee-4cfa-b596-04ca9df5c105/oauth2/v2.0/token abpm.services.chatbot.adeptiaai.tagname = ProductDocumentation
Values
Property name | Description | Default value |
abpm.services.chatbot.adeptiaai.enable | Set this property to true/yes to enable the Adeptia Assistant feature. | true |
abpm.services.chatbot.adeptiaai.endpoint | The API endpoint to interact with the Adeptia Assistant knowledge base. | |
abpm.services.chatbot.adeptiaai.oauth.clientid | The client identifier provided by the third-party application used for authentication. |
|
abpm.services.chatbot.adeptiaai.oauth.clientsecret | The client secret provided by the third-party application for authentication. |
|
abpm.services.chatbot.adeptiaai.oauth.scope | The scope of the access request. The application's access token will be limited to the granted scopes. |
|
abpm.services.chatbot.adeptiaai.oauth.tokenurl | The token URL issued by the third-party application for authentication. |
|
abpm.services.chatbot.adeptiaai.tagname | The tag name bound to the endpoint. | ProductDocumentation |
Knowledge base “Note: Check this with Adeptia MST Tesm”
------------------------------------
MST (used for maintainence & support)
------------------------------------
client id
c0471393-ccd2-4f2b-86d8-39ae8e54b18f
client secret
Jk~8Q~1bbLGhO0aZQuPyQuJEz5U_7xWQVQaoIaq9
------------------------------------
helpbot (used for Adeptia Connect helpbot)
------------------------------------
client id
f3f7e482-0b5a-41f6-aa6b-4b44494be419
client secret
wM48Q~IE-hOKMahzZ7QjoROdOkSumNwQoPOmmaRb
Enable Adeptia Knowledge Base:
Create a database in Milvus with a name starting with an underscore (
_
) and replacing dashes (-
) with underscores (_
).
Create Customer App Registration:
Create certification and secrets for Adeptia configuration.
Add client ID in the app registration.
Add settings in the knowledge base to enable the knowledge base.
By following these instructions, you will successfully install and configure the AC4 system, enabling comprehensive customer onboarding and ensuring all necessary features and services are operational.
References:
Title | Link |
---|---|
AC 4.x Installation Guide
AC Cloud Customer Onboarding Process |