You do not have permission to edit this page, for the following reason:
You can view and copy the source of this page:
Return to Self-Serve Tools.
Self-Serve tools include tools and features of ICI that can be used out-of-the-box by authorized users. Besides serving ICI users with specific feature and performance goals, being self-sufficient is the primary goal of these tools. These tools are user-friendly and time-saving, enabling users to perform tasks by themselves instead of reaching out to Icertis Solutions Engineering, Database or Support teams based on the requirement. Sometimes, these changes were minor and of low complexity, but the turnaround time was substantial.
The ICI Self-Serve tools include:
The Search Sync tool gets data from Icertis Search for a given instance’s Sys Id and synchronizes it if required. Using the fetched ES value, the tool validates if the Sys Id is the latest for the respective instance or if sync is required. This tool can be accessed by the Administrator from the Admin Task on the "Admin" tile.
If the key exists, the latest value from ES will be displayed. If the key does not exist, the system displays an error message indicating that the value could not be fetched for the provided Sys Id. The Sys Id can be provided as an input CSV file or as a comma-separated. Either comma-separated Sys Ids can be entered or a CSV file can be uploaded.
This helps to make the entity search more streamlined and efficient. Users can quickly refer to related agreements at the time of deals or audits.
Note: Data can be fetched from only one instance at a time. A dedicated key must exist for ES sync to work with Sys ID.
Refer to Search Sync Tool on the Admin Task page for more details.
Users can now get data from Icertis search for a given instance’s SysId so that they can look up the value and identify whether it is the latest or if a sync is needed. If the key exists, the latest value from ES will be displayed. If the key does not exist, the system will display the error message “Could not fetch value for provided SysId”.
The ICI platform is available in different languages and different languages label text are available for localization. However, to make any changes to the localization values, users had to reach out to the Solutions Engineering or Database teams. Sometimes, these changes were minor and of low complexity, but the turnaround time was substantial.
Hence, a self-service Translations Editor tool has been introduced that contains all strings that are localized. The Translations Editor tool supports adding localized values in different languages for Reason Codes as well.
Users can now download all keys and their localization values as an Excel file, modify multiple values, and upload the modified changes to ICI. Once the values are updated in ICI, the caches are updated automatically to avoid the cache flush and server restart. This has significantly enhanced productivity as the turnaround time to update the Resource Key values has been eradicated.
Using this tool, users can now:
To use the Translations Editor Tool:
Refer to Translation Editor in Admin Task page for more details
The ICI platform hosted on Azure Cloud uses services such as Icertis Search, Redis along with internal components such as APIs and Task services. However, no services were used to provide an insight on the application health except for the ICI Health Check page that provided regular application health checks and application monitoring to be able to detect issues before they became full-fledged outages.
The ICI Health Check page has been further extended to cover additional parameters to help identify potential outages and diagnose issues. The health insights will provide information on how well the ICI Instance and its service is performing, its overall health, as well as its usefulness to users. Users will now be able to access a dashboard (without logging into ICI) that tracks application health alongside usage metrics and application crash data.
The health statuses are classified into three categories:
The following details are displayed in the Health Check:
To check the health of your system:
1. Enter your domain name/health/viewhealth at the end of the URL of your ICI instance. The various tools and their health are displayed.
Icertis Search Health
The details for the Icertis Search Health include the status, node total, primary and relocating shards, version, heap percent, uptime, and so on. For example, the Status is green.
Redis Cache Health
The details for the Redis Cache Health include the uptime in days. Connected or blocked clients, rejected connections, CPU usage, and so on. For example, the Uptime in Days is 28.
API Health
The API Health provides the response time. For example, 94 ms.
Task Service Health
The Task Service Health provides the failed count for keys and when it was last successful.
Database Server Metrics
The details for the Database Server Metrics Health include the edition, SQL server resource pool stats, and so on.
IIS Server Metrics
The details for the IIS Server Metrics Health include the total method requests/sec, number of seconds an IIS Worker process has been running, the percentage of CPU utilization per process, and so on.
The Configuration Key Editor tool facilitates a logged-in user (who has access to Azure subscription) to search and update configuration keys, as and when required. It has been introduced for easier instance management and improved productivity, thus reducing the dependency on the Engineering and DevOps teams.
It includes:
The "Config Editor" is a self-service tool that allows teams to edit instance configurations without having to connect to the instance machines. Once the key values are changed, the cache is automatically updated to avoid the server restart. The tool only works for non-production environments. The production environment configuration changes are controlled by the Operations team, and the tool would not be available for the production environment.
The "Redis Flush" is a self-service tool that allows Administrators to flush the cache or look up a particular key for its value of Delete a Key. The tool can also be used to perform "Role Restart" on the instances to which the user has access.
4. Click "Submit" after selecting the environment. The configuration JSON files for the selected environment are displayed for all available features, security details, database connections, and so on related to the selected instance.
5. Select a Config Key from the list to change its value as required. For example, the Config Key AgreementAutoRenewReminderNotificationPeriod has the reminder period set at 3 days may be changed to 2 days.
6. Click "Save and Role Restart" to save the new value of 2 days. The specific JSON file for the respective CName will be reset (i.e. perform a role restart). This means that the configuration is reset in the Icertis search and the server is restarted so that the new value is reflected on the instance.
7. Click "Download" to download the entire file so that you can edit it offline and then upload it directly to the instance.
The Promote to Production (P2P) process of the ICI platform helps to move ICI Configuration from source (Config/UAT) environment to target environment, thus reducing the manual efforts to do so. P2P process enables to selectively move ICI configuration. The Promote Configuration Tool or P2P is designed to accomplish just that.
The tool already supported contract types, contract type attributes, clauses and templates (along with the documents), notification templates, rules, masterdata, users, user groups and security groups. The Icertis search sync is also supported by the tool.
With the 7.15 release, to provide a seamless P2P experience, enhancements have been made in ICI to support the following additional entities :
Here is an overview of the P2P process:
To access the P2P tool:
Click "Configure" >"P2P Configuration" tile or menu on the top navigation. The "Promote Configuration" page opens.
The Promote Configurationsdisplays the current status of P2P requests and their status.
Note: Users cannot edit a request that is in the Completed state.
To create a P2P Request:
1. Click "Configure" > "Promote Configurations"> "Create Request". The "Create Request" page opens.
2. Enter a "Request Name".
3. Select a "Target" from the drop-down.
4. Select the "P2P Request Start Date Time".
5. Select the time to trigger an email to the recipient from the "Intimation Email minutes before P2P Starts" drop-down list. For example, 15 Min.
6. Enter the intimation recipient Email Id in the "Notification Email – Intimation" field.
7. Enter the notification recipient Email Id in the "Notification Email – Success" field.
8. Enter the notification recipient email Id in the "Notification Email– Failure" field.
9. Enter the notification recipient email Id in the "Notification Email – Cancel" field.
10. Click "Next". The "Contract Type" tab opens.
11. Select the "Contract Type" from the "Available Contract Types".
12. Click the right arrow to move the selected contract type to the "Selected Contract Types".
14. Select a template from the "Available Templates" columns.
15. Click the arrow key to move the selected template to the "Selected Templates" column.
17. Click the arrow key to move the selected clause to the "Selected Clauses" column.
20. Select the Rules that appear.
21. Click "Next". The "Notifications" tab opens.
22. Select the notifications from the grid.
24. Click "Next". The "Master Data & Core Seed Data" tab opens.
25. Click the arrow key to move the selected rule to the "Selected Master Data" column.
26. Select the seed data from the "Available Core Seed Data column".
27. Click the arrow key to move the selected master data to the "Selected Core Seed Data" column.
31. Select the users on the "Select Users" pane.
32. Click "Selected Users" from the top right of the pane to view the list of users that have been selected.
33. Click "Filter Users" to view the list of users by an attribute or click "Add Another Attribute" to filter users by additional attributes. For example, Email ID, Phone Number.
35. Click "Next" if any or no user or user group is selected. The "Security Groups" tab opens.
36. Select the security group from the "Available Security Groups" columns.
37. Click the arrow key to move the selected security group to the "Selected Security Groups" column.
38. Select the KPI from the "Available KPI’s" columns.
39. Click the arrow key to move the selected KPI to the "Selected SaveSearchKPIs" column.
41. Verify details of the contract types, attributes, templates, clauses, ruleset information, notification templates, transactional master data, core seed data, user and user groups, save search KPI, and security groups that you have selected.
42. Click "Create". The confirmation window opens indicating that downtime is required for this request.
43. Click "Yes" if you wish to proceed. The success message opens indicating that the P2P request created successfully.
The P2P request status changes to "ADDED".
On completion of the P2P request, the status changes to "Completed".
Related Topics: Agreement Management | Association Management | Compliance Management | Template Management | Clause Management | Configuration | Reports | Localizing ICI |
You do not have permission to edit this page, for the following reason:
The action you have requested is limited to users in one of the groups: Users, User.
You can view and copy the source of this page:
Return to Self-Serve Tools.