SCAM
In allegato le istruzioni per intervenire su alcune richiesta per quanto riguarda il servizio in oggetto.
password1 = fastweb
password2 = Alosys1!

SCAM - Instruction manual
Add new provider
Insert List of clients
V. 1.0.0
Summary
1. Access client network via VPN. 3
2. Add new provider. 3
3. Upload new clients. 5
4. What to do when there is an error during the process. 6
1. Access client network via VPN
Preconditions: Installed BIG-IP Edge Client, Token, Username, PIN
In the username$nomegruppo enter value for "VPN user"
In the Password enter "PIN" + "Number from the token"

2. Add new provider
Preconditions: Successfully login on VPN (Point 1), terminal emulator Putty (https://www.chiark.greenend.org.uk/~sgtatham/putty/latest.html), Credentials for OS and DB, New provider Code and Name, db script add_new_provider.sql
Login to the Server at Ip: 10.31.184.100

Username: root
Password: password1
Login to MySql
[root@ws014ips ~]# mysql -u root -p SCAM
Password:password2
In the script add_new_provider.sql change the variables, provider_code, provider_name with the info provided by the client
Copy the whole script in the putty terminal following the procedure explained below:
A. Set the variables:
SET @provider_code = '1013049';
SET @provider_name = 'STACK EMEA-Italy S.r.l.';
B. Check if the provider already exists:
SELECT * FROM providers WHERE code = @provider_code;
Fare attenzione all'output di : SELECT * FROM providers WHERE code = @provider_code;
Questo SELECT, ci indica se eventualmente l'ID è già assegnato ad un altro provider.
if the provider already exists or if the code is already used by another provider, stop the procedure and inform the client on fastbee sending back the tt to the Tier I Fastweb (see the Alosys procedures)
If the provider doesn't exist, go on with this procedure
C. Insert the new provider:
INSERT INTO `SCAM`.`providers`
(`NAME`,
`CODE`,
`STATUS`)
VALUES
(@provider_name,
@provider_code,
1);
E. Update ODA and RDA connecting the new provider:
UPDATE oda
SET PROVIDER_ID = (SELECT ID FROM providers WHERE code = @provider_code)
WHERE fornitore like CONCAT('%',@provider_code, '%');
UPDATE rda
SET PROVIDER_ID = (SELECT ID FROM providers WHERE code = @provider_code)
WHERE fornitore like CONCAT('%',@provider_code, '%');
- Query OK for each query in the script
- SELECT * FROM SCAM.providers where code like '%1000467%';
- The provider to exist in the application :
For checking this you need to login to the application,(http://10.31.184.100:8793/fastweb/)
got to the new provider and there is a menu PO and PR where the user can check if there are some PR/PO connected to the new provider.
Application Credentials :
Username : superuser1
Password : superuser1
- Gestione fornitore >> fornitore
- Gestione documenti
- Verifica la presenza in :
- P.R / RDA
- P.O /ODA
3. Upload new clients
Preconditions: Successfully login on VPN (Point 1), WinSCP (https://winscp.net/eng/downloads.php ), Credentials for OS, Excel file received from the client (.xlsx)
Open WinSCP and use
IP address: 10.31.184.100
username: root
password: password1

Click with the right click on the title and choose Open Directory/Bookmark…

Enter /home/scam/Supply_Chain/LA and click OK
Copy the file into this directory
After 2h the file will be uploaded automatically and it will be necessary to check the logs as explaind below.
3.3 Check log file
OK = In the directory /home/scam/Supply_Chain/LA/archive there will be excel file with the same name of the file that was uploaded and the date of the upload: file_name_DATE.
NOT OK = then you can find the file is in: /home/scam/Supply_Chain/error_files, you can send the error file to the Product owner.
4. What to do when there is an error during the process.
If there are errors during the deployment process open a Jira Issue towards Tier II support in MK providing as much information can be provided.