/
AC Cloud End-To-End Customer Onboarding Process

AC Cloud End-To-End Customer Onboarding Process


Objective

  • Provides step-by-step instructions for the end-to-end validation of the Customer Onboarding Process in AC Cloud.

  • Designed to prepare learners for validating a customer on-boarding workflow end-to-end

    • Verifying credentials

    • Setting network security settings for virtual machines

  • Comprehensive step-by-step directions on:

    • Downloading and installing prerequisite software

      • CLI for Windows

      • Chocolatey

      • The Helm client from the local directory (e.g., kubectl)

    • Important introduction to setting up and configuring databases

      • Creating users

      • Database creation

      • Assignment of privileges

  • Preparation of YAML files according to customer tier.


AC Cloud Customer Onboarding Process

Process Step

Actions

Sales/Pre-Sales Transition to Managed Services

  • Sales provides client profile to support and MST (Managed Services Team).

  • MST enters Client Profile in the "AC Cloud Client Profile"

  • MST submits license request to Tech Support as per Client Profile and also inform subscription ID (customername-environment such as Nuvem-prod, paychex-dev etc.) to Tech Support.

  • Support generates license keys per client profile and sends them to MST.

Submit Infra Resource Ticket to Connectria

  • MST compiles environment request details along with a variable script based on "AC Cloud Client Profile".

  • MST member submits for manager approval.

  • MST manager approves with or without changes.

  • MST Submits environment request ticket (Sample: 938883) in TRIA Support system to Connectria as per Client Profile along with variable script file

Provision Environment

  • Connectria sets up the Azure resources.

  • Connectria sets up 1st and 2nd part of the monitoring via script.

  • MST verifies environment setup per environment checklist.

  • MST Updates "AC Cloud Client Environment Info" sheet to include the New Customer Environments

Setup Environment - Jump Host

  • IInstall Azure Client (Azure CLI).

  • Install Kubernetes Client (kubectl).

  • Install MySQL Client WorkBench.

  • Set up connection info to the MySQL database through WorkBench.

  • Create databases (Backend Log Quartz).

  • Create users.

  • Assign necessary privileges for the user on the databases.

Setup Environment - Adeptia Connect

  • MST sets up MySQL and databases.

  • MST sets up and configures AC.

  • Install Adeptia Connect.

  • Install Adeptia Connect license.

  • Configure email accounts.

  • Configure performance optimizations.

  • Install Ingress.

  • Configure Ingress.

  • Configure EAR (encryption at rest).

  • Bind DNS with Ingress external IP.

  • Test the AC with DNS URL.

  • Conduct Functionality testing

Once customer confirms the Sys Admin user name in response to Welcome email then:

  • Create Customer Admin Account

Setup Monitoring

  • Install Prometheus/Grafana.

  • Import Adeptia provided dashboards.

  • Configure Grafana alert threshold.

  • Install EFK (Elasticsearch, Fluentd, Kibana).

  • Configure EFK.

  • Install Lens.

Complete Connectria Monitoring Setup

  • Update the ticket with the AC environment URLs.

  • Connectria sets up the remaining monitoring configuration.

Notify Accounts for Billing

  • MST Notifies Tech Support of the AC Could Readiness so Tech Support send Welcome kit to the Customer.

  • Tech Support notifies accounts of the service readiness for the customer.

Invoice Customer

  • Accounts send an invoice to the customer.

Onboard Client

  • Tech Support sends welcome email with access info and reference links.

  • Sales team and Customer Success connect with the customer to know their training needs.

  • Schedule kick-off call.

  • Conduct kick-off call.

  • Discuss Environment Access, Training, VPN, Services start, Project Timelines, Communication, Status Update, Support Channels etc.

Conduct Training

  • Customer Success schedules the training with the customer.

  • Customer Success conducts the training.


Customer Environment Setup

Prerequisites

  1. Obtain Jump host access credential from Connectria.

  2. Verify credentials and allow the Adeptia Noida office’s IP in the VM network security group inbound rules.

  1. Download required software from the Google Drive link.

  2. Install the CLI for Windows.


Installation Steps

  1. Install Choco in PowerShell:

    Code: Set-ExecutionPolicy Bypass -Scope Process -Force; [System.Net.ServicePointManager]::SecurityProtocol = [System.Net.ServicePointManager]::SecurityProtocol -bor 3072; iex ((New-Object System.Net.WebClient).DownloadString('https://community.chocolatey.org/install.ps1'))

 

  1. Create and Configure Database:

    • Create a connection from the workbench.

    • Create the database and users with necessary privileges.

    Code: create user '<<customer_name>>productionuser'@'%' IDENTIFIED BY 'password'; GRANT ALL PRIVILEGES ON <<custome_name>>_backend.* TO '<<customer_name>>productionuser'@'%' WITH GRANT OPTION; GRANT ALL PRIVILEGES ON <<custome_name>>_logs.* TO '<<customer_name>>productionuser'@'%' WITH GRANT OPTION; GRANT SELECT SHOW VIEW ON sic_dev_backend.* TO 'sic_r_user'@'%';

 

  1. Prepare and Install Software:

    • Prepare the YAML file as per client's license and details provided in the email.

    • Add the bastion IP in the AKS cluster network security.

    • Install Helm: Code choco install kubernetes-helm

 

  1. Disable SSL Setting from Database Server.

 

  1. Install Adeptia Connect:

    Code: helm install adeptia-connect-nuvem-prod adeptia-connect/adeptia-connect --version 4.3.4 -f nuvem_prod_4_3_04.yaml --timeout 10m --debug -n nuvem-prod

 

  1. Download and Install Nginx:

    • Download Nginx v9.3.32.

    • Go to the folder containing tls.key, tls.crt, and star.adeptia.com files and create a secret:

      Code: kubectl create secret tls <<secretname>> --key="tls.key" --cert="tls.crt" --namespace <<namespace>>

    • Update and apply the ingress rules:

      Code: kubectl apply -f ingress.yaml

 

  1. Create EAR Folder and Place EAR File in Shared Path.

 

  1. Deploy Latest License and Restart License Microservice.

 

  1. Provide Ingress IP and Application Domain Name to Local IT team to add that into Public DNS Portal (Cloudflare) via Ticketing Portal.


Post-Installation Configuration

  1. Log in and Perform Initial Setup:

    • Enter the client name and email ID as provided in the client sheet.

    • Enable the following settings:

      • EAR settings

      • SMTP configuration

      • AI MAP

      • Adeptia Assistance feature

      • Change logging level to Error for all microservices

      • Enable EAR setting from the application setting (default password: changeit)

         

    • Change environment display name

    • Configure mail server parameters:

      Code: emailID: donotreply@adeptia.com Password: refer myglue

       

  2. Install EFK Stack:

    • Download EFK.

    • Install EFK:

      Code: helm install efk efk-stack -n logs

  1. Install Grafana:

    • Download Grafana.

    • Extract and install Grafana:

      Code: helm install grafana-prometheus kube-prometheus-stack -n monitoring

  1. Apply Ingress Rules:

    • Remove s from HTTP and provide the ingress release name in the YAML file.

       

  2. Create Namespace for Velero:

    • Create a container in Azure Blob Storage.

    • Create credentials-velero.txt:

      Code: AZURE_SUBSCRIPTION_ID= AZURE_TENANT_ID=<<ID>> AZURE_CLIENT_ID=<<ID>> AZURE_CLIENT_SECRET=<<value>> AZURE_RESOURCE_GROUP=<<name>> AZURE_CLOUD_NAME=<<name>>

    • Install Velero:

      Code: velero install --provider azure --plugins velero/velero-plugin-for-microsoft-azure:v1.5.0 --bucket $BLOB_CONTAINER --secret-file <<file path>>/credentials-velero.txt --backup-location-config resourceGroup=$AZURE_BACKUP_RESOURCE_GROUP storageAccount=$AZURE_STORAGE_ACCOUNT_ID subscriptionId=$AZURE_BACKUP_SUBSCRIPTION_ID --use-restic

 


Adeptia Assistance Configuration

  1. Whitelist AKS Cluster Public IP in Internal Azure Portal

  1. Update Adeptia Assistant Settings:

    • Navigate to: Setting >> Common >> Adeptia Assistant

    • Set the following properties:

      Code: abpm.services.chatbot.adeptiaai.enable = true abpm.services.chatbot.adeptiaai.endpoint = https://ai.adeptia.com/v1.0 abpm.services.chatbot.adeptiaai.oauth.clientid = f3f7e482-0b5a-41f6-aa6b-4b44494be419 abpm.services.chatbot.adeptiaai.oauth.clientsecret = wM48Q~IE-hOKMahzZ7QjoROdOkSumNwQoPOmmaRb abpm.services.chatbot.adeptiaai.oauth.scope = api://f4e48d6e-8d68-460c-9314-d78c0eeafc75/.default abpm.services.chatbot.adeptiaai.oauth.tokenurl = https://login.microsoftonline.com/45549897-61ee-4cfa-b596-04ca9df5c105/oauth2/v2.0/token abpm.services.chatbot.adeptiaai.tagname = ProductDocumentation

 

Values

Property name

Description

Default value

abpm.services.chatbot.adeptiaai.enable

Set this property to true/yes to enable the Adeptia Assistant feature.

true

abpm.services.chatbot.adeptiaai.endpoint

The API endpoint to interact with the Adeptia Assistant knowledge base.

https://ai.adeptia.com/v1.0

abpm.services.chatbot.adeptiaai.oauth.clientid

The client identifier provided by the third-party application used for authentication.

f3f7e482-0b5a-41f6-aa6b-4b44494be419

abpm.services.chatbot.adeptiaai.oauth.clientsecret

The client secret provided by the third-party application for authentication.

wM48Q~IE-hOKMahzZ7QjoROdOkSumNwQoPOmmaRb

abpm.services.chatbot.adeptiaai.oauth.scope

The scope of the access request. The application's access token will be limited to the granted scopes.

api://f4e48d6e-8d68-460c-9314-d78c0eeafc75/.default

abpm.services.chatbot.adeptiaai.oauth.tokenurl

The token URL issued by the third-party application for authentication.

https://login.microsoftonline.com/45549897-61ee-4cfa-b596-04ca9df5c105/oauth2/v2.0/token

abpm.services.chatbot.adeptiaai.tagname

The tag name bound to the endpoint. 

ProductDocumentation

​Knowledge base “Note: Check this with Adeptia MST Tesm”

------------------------------------

MST (used for maintainence & support)

------------------------------------

client id

c0471393-ccd2-4f2b-86d8-39ae8e54b18f

client secret

Jk~8Q~1bbLGhO0aZQuPyQuJEz5U_7xWQVQaoIaq9

------------------------------------

helpbot (used for Adeptia Connect helpbot)

------------------------------------

client id

f3f7e482-0b5a-41f6-aa6b-4b44494be419

client secret

wM48Q~IE-hOKMahzZ7QjoROdOkSumNwQoPOmmaRb

 

  1. Enable Adeptia Knowledge Base:

    • Create a database in Milvus with a name starting with an underscore (_) and replacing dashes (-) with underscores (_).

       

  2. Create Customer App Registration:

    • Create certification and secrets for Adeptia configuration.

    • Add client ID in the app registration.

    • Add settings in the knowledge base to enable the knowledge base.

 

By following these instructions, you will successfully install and configure the AC4 system, enabling comprehensive customer onboarding and ensuring all necessary features and services are operational.

 


References:

 

Related content

Application Health Check and Scheduled Maintenance
Application Health Check and Scheduled Maintenance
Read with this
Catalog: Comprehensive Learning Material
Catalog: Comprehensive Learning Material
More like this
Karmak - FTP Design and Setup
Karmak - FTP Design and Setup
Read with this
Adeptia AI Services
More like this