Annotator for Clinical Data

Configuration Editor Overview

Welcome to the Annotator for Clinical Data Configuration Editor

Notice: The Annotator for Clinical Data Configuration Editor is provided as-is (non-warranted) and at no cost to ACD customers. See license for terms of use.


In this document, find instructions for:

Introduction

Annotator for Clinical Data Configuration Editor is used to build knowledge cartridges which are used to configure and customize Annotator for Clinical Data. It is focused on providing domain adaptation to Annotator for Clinical Data service through the construction of knowledge cartridges.

Each customer's use case and data sets are unique, however, there are common cognitive patterns within health data text that can be captured into artifacts so they can be reused across projects. Configuration Editor allows the domain expert to build a cognitive model, contained in a cartridge, to extract structured data from unstructured text in order to derive valuable insights. The tool provides a mechanism for the domain expert to share cognitive models or pieces of a model with other customer engagements. The tool's purpose is to enable customization, reduce development time, and improve accuracy of building cognitive models that run on Annotator for Clinical Data service.

In a cartridge, there are domain-specific artifacts chosen or created by the domain expert detailing Annotator for Clinical Data configuration information. There are various types of artifacts that include: dictionaries, clinical attributes, derived clinical attributes, derived concepts, ontologies, qualifiers, filters, etc. The artifacts are contained in a cartridge, which represents the cognitive model. A cartridge has the ability to include one or more dependencies on other cartridges.

The tool allows the domain expert to view Annotator for Clinical Data analytic insights as they are building their cartridge in order for them to refine their model to meet their business needs. Once the cartridge captures desired cognitive insights, the domain expert will customize Annotator for Clinical Data by deploying a snapshot of the cartridge to Annotator for Clinical Data. The deployment of the cartridge snapshot will create 'flow' and 'profile' objects within the Annotator for Clinical Data service. These objects can then be referenced as part of the request when invoking Annotator for Clinical Data service to analyze your unstructured text.

Feature summary

Access to the Configuration Editor

The Configuration Editor can be deployed locally to a single Linux system using Docker or can be deployed on OpenShift.

Once installed, use the instructions on the Install page to access the Configuration Editor using a browser on the host it was deployed to.

Learning materials

Videos and other educational content.

Annotator for Clinical Data documentation

For information about Annotator for Clinical Data, click the link to go to the documentation.

Support and questions

Configuration Editor is provided to you as-is and free of charge. For support or questions, please refer to Support.

Program Terms

Acceptance of terms of use is required to use the tool.

View Program Terms

Install Configuration Editor
using Docker

Overview

The following will walk through the steps necessary to set up and configure a system with the Annotator for Clinical Data Configuration Editor (ACD Configuration Editor) using Docker. This sets up a local copy of the Configuration Editor in an "all-in-one" single system that can be used to create, edit and preview Annotator for Clinical Data (ACD) cartridges. The Configuration Editor can also deploy and test against a remote ACD instance that you have access to. The diagram below shows the flows in and out of the server you'll be setting up. Ensure any firewalls are open to allow this traffic.

Configuration Editor on Docker

Prerequisites

The ACD Configuration Editor setup we use here should be installed on a dedicated system with these requirements:

System requirements

NOTE: The disk where Docker stores its images and where ACD Configuration Editor is installed needs to have 200GB of storage free.

Software requirements

Refer to the Installation and configuration of prerequisite software instructions below.

Installation and configuration of prerequisite software

  • Install and configure HTTP proxy

    The ACD Configuration Editor needs to access several services through a reverse proxy (single host endpoint). The instructions below are to set up an Apache HTTP server, however, any reverse proxy server could be configured for this. Note also this setup will end up with a self-signed certificate being used by Apache HTTP and presented to the browser/client. For installing a real certificate see http://httpd.apache.org/docs/2.4/ssl/ssl_faq.html#realcert or use Let's Encrypt to generate one such as https://www.digitalocean.com/community/tutorials/how-to-secure-apache-with-let-s-encrypt-on-centos-7

    Run this command to install the Apache HTTP server and set it to auto-start with the system:

       sudo yum install httpd mod_ssl
       
  • Allow outbound connections (SELinux-enabled systems need to allow connections):
       sudo /usr/sbin/setsebool -P httpd_can_network_connect on
       
  • (Optional) If your server is set up with a firewall locally, allow incoming connections on your firewall to port 443. If the system has a local firewall daemon running, you can use:
       
       sudo firewall-cmd --permanent --add-port=443/tcp
       sudo firewall-cmd --reload
       
  • Configure HTTP

    As root, update the file /etc/httpd/conf.d/ssl.conf by adding the following lines near the end of the file, right before the </VirtualHost> at the end of the file. This configures the HTTP proxy to route incoming calls.

       
       # Add these lines to /etc/httpd/conf.d/ssl.conf right before the ending </VirtualHost> entry
       # block access to swagger docs
       <LocationMatch "/services/.*/api/swagger">
           ProxyPass "!"
       </LocationMatch>
       <LocationMatch "/services/.*/documentation">
           ProxyPass "!"
       </LocationMatch>
       # sets up httpd as a proxy to front end calls to the ACD Configuration Editor services and a target acd endpoint
       # you may need to change localhost to the actual localhost name if you cannot do a curl https://localhost:9281/services/cartridge for example
       SSLProxyEngine on
       ProxyRequests Off
       ProxyPass /services/cartridge https://localhost:9281/services/cartridge
       ProxyPassReverse /services/cartridge https://localhost:9281/services/cartridge
       #ProxyPass /services/clinical_data_annotator  https://localhost:9272/services/clinical_data_annotator
       #ProxyPassReverse /services/clinical_data_annotator https://localhost:9272/services/clinical_data_annotator
       # reverse proxy to add in an ACD target deployment instance - change this to your acd instance(s) url endpoints.
       # note you will also need to add configuration to the acd-ce.properties file for each acd target instance as documented below.
       #ProxyPass /acd-dev/api https://acdroute.yourdevserver.com/services/clinical_data_annotator/api
       #ProxyPassReverse /acd-dev/api https://acdroute.yourdevserver.com/services/clinical_data_annotator/api
       #ProxyPass /acd/api https://acdroute.yourserver.com/services/clinical_data_annotator/api
       #ProxyPassReverse /acd/api https://acdroute.yourserver.com/services/clinical_data_annotator/api
       # =========
       # USERS: add additional reverse proxy aliases to any other ACD targets here like entry above
       # =======
       ProxyTimeout 120
       SSLProxyVerify none
       SSLProxyCheckPeerCN off
       SSLProxyCheckPeerName off
       SSLProxyCheckPeerExpire off
       
  • Change history for the default ssl.conf file:


  • Start HTTP proxy by running:
      sudo apachectl start
      
  • Configure HTTP proxy to restart when the system starts by running:
      sudo systemctl enable httpd
      
  • Install Java - you can use this command:
      sudo yum install java-1.8.0-openjdk
      
  • Install Docker and set it up to allow use from non-root and to auto-start
  • Verify Perl is installed (or install it)

    Run the command:

      perl -version
      

    If you get an error that the command is not installed, install it with:

      sudo yum install perl
      
  • Installing ACD Configuration Editor

    Download the ACD Configuration Editor deployment bundle and place it on the target machine:

    Note: If updating an existing installation, be sure to back up and merge changes into your acd-ce.properties file (see Updating the Configuration Editor).

    Untar the install files by running the command:

      tar -xvf config-editor-<timestamp>.tar.gz
      

    Change the current directory using the command:

      cd Docker
      

    Update the properties file with the name of the host your users will be accessing the Configuration Editor from (the host name they will enter into the browser) by using the following command against the acd-ce.properties file:

      sed -i 's/%SERVER%/<hostname>/g' acd-ce.properties
      
    Note: If the host name changes (the host used by the browser to get to the system) you'll need to update it in acd-ce.properties and restart the acd-ce processes.

    In the acd-ce.properties file is also the configuration file where configuration data goes. It defaults to %HOME%/acd-ce/installs/config/. You need to change this to a real directory that is read/write for the Docker process user (set below) and should be a directory you will back up. For example (replace <user> with your user name):

      sed -i 's/%HOME%/\/home\/<user>/g' acd-ce.properties
      

    Finally, in the acd-ce.properties file, is the user and group that Docker will start the containers as. It is defined near the top on a line that starts with something similar to this: clinical_data_annotator_common_docker_user=:<groupid>;\

    Edit this line in the file. The <userid> should be a user id on your local system that has RWX permission to the acd-ce/installs/config target directory defined above. The group should be set to 0.

    The user can be a uid (the id of the user, e.g. 1001, or your own user id which you can get by using the id command on Linux).

    You can test what you use here by running:

      docker run -u <userid>:0 hello-world
      

    Back up your properties file. Every time you update it, the file will be overwritten and you'll want to merge back any changes you made here:

      cp acd-ce.properties acd-ce.properties.bak
      

    Create the target directory for the Configuration Editor configuration data (the directory you set in the acd-ce.properties file above) and set the permissions to the user and group you set in the properties file. For example (replace <user> with your user name):

      configdir=/home/<user>/acd-ce/installs/config \ 
      mkdir -p ${configdir}/certs/keystore   \
      mkdir -p ${configdir}/certs/truststore \
      keytool -genkey -alias 'wh-int'  -dname "CN=cluster.internal,O=merative.com,OU=ACD"  -keyalg RSA -keypass wats0n  -keysize 2048  -keystore ${configdir}/certs/keystore/tls.p12  -noprompt -storetype pkcs12 -storepass wats0n -validity 3650 \
      keytool -exportcert -keystore ${configdir}/certs/keystore/tls.p12 -alias 'wh-int' -storepass wats0n -rfc -file ${configdir}/certs/truststore/trust.cer
      

    Sign on to the container registry with the credentials provided when the product was purchased:

      docker login acdcontaineredition.azurecr.io -u <application-ID>
      

    Now to start the acd-ce processes (i.e. the Docker containers), run the following command:

      ./run-acd-ce.sh
      

    This command will stop any running containers, remove any old images, load the current images and start the Docker containers. The command is complete once all the containers are started and you are returned to the command prompt.

    To restart the acd-ce processes with the latest configuration from acd-ce.properties, you can use:

      ./run-acd-ce.sh -restart
      

    The ACD Configuration Editor should now be running. To test it, open your browser and go to: https://<hostname>/services/cartridge/cartridge-main.html

    You will get an error about the self-signed certificate in the browser, but you can use advanced option to continue to the site. In Google Chrome, if there is no button to proceed, click on the advanced warning text and type thisisunsafe (all one word lower-case--type it after clicking on the warning) and it should proceed. This is only needed the first time in. To fix this, add a trusted CA-issued certificate to the Apache HTTP server.

    The first prompt is going to ask for your name and email to identify any configuration items you create and what you have access to. Note that there is no actual authentication configured unless you added it to the HTTP server above (with the OIDC module).

    After you are in, you are at the main ACD Configuration Editor catalog page. Initially, there are no default cartridges. You can install the base Clinical Insights cartridge via an import and extend that cartridge or create your own new cartridge.

    Note: If you had previously copied the ACD Clinical Insights cartridge, you will want to refer to the ACD Cartridges Github repository to make sure you are using the most current version of the cartridge in your new Configuration Editor installation.

    In the upper right corner of the ACD Configuration Editor main page, you can click the mortar board tutorial link to see Introductory videos and click the "?" icon to view the Getting Started Guide.

    Configuration Editor Main

    Periodically, refer to this Configuration Editor documentation for updates to the Configuration Editor packages and see below for Updating the Configuration Editor instructions.

    When analyzing text in the ACD Configuration Editor the first time after installation or a restart, it is common to experience an initial error while the data model is beinging loaded. Wait a few minutes after the initial error is received and retry the operation.

    Enabling outbound connections (optional)

    If you are going to connect to an external ACD instance, you need to add the standard certifying authorities to the Java trust store used by the services. Copy the default Java cacerts file certificates into the trust store used by the ACD Configuration Editor services and then restart the services with the following command.

    The following command will copy all CAs from the Java cacerts file into the trust store used by the Configuration Editor processes. You may need to adjust the srckeystore path to match your exact Java version or location. Adjust the java-1.8.0-... directory to your level and the /tmp target should match where you pointed the install to run from in the acd-ce.properties file.

      keytool -importkeystore -srckeystore /usr/lib/jvm/java-1.8.0-openjdk-1.8.0.262.b10-1.el7.x86_64/jre/lib/security/cacerts -destkeystore /tmp/installs/config/truststore/trust.jks -srcstorepass changeit -deststorepass wats0n
      

    After running this successfully, run the following command to restart the containers to pick up the change:

      ./run-acd-ce.sh -restart
      

    To configure external ACD Hosts for deploying published cartridges from the Configuration Editor, you must provide them in the acd-ce.properties file and provide proxy redirects in the ssl.conf Apache HTTP configuration file. To add ACD target hosts, you can add them to the acd-ce.properties file. An example of adding an ACD target to an ACD container edition instance is:

      
      clinical_data_annotator_car_acd_host_1_label="Annotator_for_Clinical_Data_Container_Edition";\
      clinical_data_annotator_car_acd_host_1_url=https://<your container edition url>;\
      clinical_data_annotator_car_acd_host_1_proxy=acd-ce;\
      clinical_data_annotator_car_acd_host_1_auth=Bearer;\
      clinical_data_annotator_car_acd_host_1_phi=false;\
      

    ACD Hosts must be indexed in the properties file using clinical_data_annotator_car_acd_host_<index> as the beginning of their property name. The possible properties are:

    As you add new ACD Hosts, you must configure a proxy in your ssl.conf file in order to allow requests to the hosts and avoid CORS errors. The proxy specified in your ssl.conf file must match the proxy in your acd-ce.properties file for that host.

    Adding security to HTTP server (optional)

    You can use the OIDC module in Apache HTTP server to provide an authentication layer. You will need an OpenID Connect Provider to do the actual authentication and need to add this Configuration Editor HTTP server as a client to it. Below are the basic steps to do this. See the detailed usage and support instructions of this plugin at https://github.com/zmartzone/mod_auth_openidc.

    Backing up your data

    All configuration data such as cartridges, flows, dictionaries, filters, etc., are stored by default in the %HOME%/acd-ce/installs/config/artifactstore/ directory on the local machine. This is set in the acd-ce.properties file and you can change this as needed. Back up this directory often and if you have to recover your ACD Configuration Editor machine you can restore this from the point of your last backup.

    Stopping the Configuration Editor

    Run the following command to stop the containers running the Configuration Editor:

      ./run-acd-ce.sh -stop
      

    Updating the Configuration Editor

    To update to a newer version of the ACD Configuration Editor, follow these steps:

    1. Back up existing acd-ce.properties file

    2. Download the latest acd-ce tar file again and unpack it as above (see Installing ACD Configuration Editor)

    3. Modify the default acd-ce.properties file to merge in any changes you made from your backup (replacing the %SERVER% with the host name and updating the shared configuration directory, for example)

    4. Clear out the shared keystore/truststore. To do this, go to the shared config directory set in the acd-ce.properties file with the *_shared_config_dir property and run these commands to clear the shared certificates and truststore:
        
        rm -r certs
        rm -r keystore
        rm -r truststore
        
    5. Sign on to the container registry with the credentials provided when the product was purchased:
        docker login acdcontaineredition.azurecr.io -u <application-ID>
        
    6. Back in the acd-ce directory where the tar file was unpacked to, run the following command to update all the images and restart the containers with the latest build and your modified properties file:
        ./run-acd-ce.sh
        

    Install Configuration Editor
    on Red Hat OpenShift

    Overview

    The following will walk through the steps necessary to set up and configure the Annotator for Clinical Data Configuration Editor running in an existing Red Hat OpenShift cluster. Setup includes setting up the Configuration Editor and its required ACD sandbox instance. This environment can be used to create, edit and preview Annotator for Clinical Data (ACD) cartridges. The Configuration Editor can also be configured to deploy and test against other ACD instances, either running on the same cluster or elsewhere. The diagram below shows the flows in and out of the server you'll be setting up. Ensure any firewalls are open to allow this traffic.

    Configuration Editor on OpenShift

    Prerequisites

    Hardware Prerequisites

    The ACD Configuration Editor hardware prerequisites are in addition to those required by an installation of ACD Container Edition as a dedicated sandbox instance. Refer to ACD Container Edition Prerequisites.

    Component Number of worker nodes CPU/node Memory/node (G)
    ACD Configuration Editor 3 (In addition to those for ACD Container Edition) 8 32

    2 replicas are recommended for the two ACD Configuration Editor deployments: Cartridge service and Dictionary service.

    Software Prerequisites

    Installing ACD Configuration Editor

    1. Download the ACD Configuration Editor deployment bundle from the ACD Container Edition repository.

    2. Untar the deployment bundle:
        tar -xvf config-editor-<timestamp>.tar.gz
        
    3. Change directory:
        cd Kubernetes
        
    4. Update the imagePullSecrets entry in the deployment.yaml files for each service if not using the suggested global pull secret from the operator install.

    5. For the concept dictionary service:
        cd merative-acd-ce/cdc/chart/cdc/templates
        
    6. For the cartridge service:
        cd merative-acd-ce/crtg/chart/crtg/templates
        
    7. Log in to the OpenShift cluster on the command line:
        oc login ...
        
    8. Switch to the same namespace that the sandbox instance of ACD is running in.
    9. Install the Concept Dictionary microservice using Helm:
        
        helm install merative-acd-ce-cdc \
           merative-acd-ce/cdc/chart/cdc \
           --set replicas=1 \
           --set configurationStorage.file.volume.existingClaimName=<pvc name> \
           --namespace ${acd_namespace}
        

    10. Verify the Concept Dictionary microservice is running.

      Find the merative-acd-cdc pod by running the command:

        kubectl get pods -n ${acd_namespace}
        

      Run a health check against the pod using the following command. It should list "serviceState":"OK".

        kubectl exec <pod name> -c merative-acd-cdc -n ${acd_namespace} -- curl -sk 'https://localhost:9443/services/concept_dictionary/api/v1/status/health_check'
        
    11. Install the Cartridge microservice using Helm:
        
        helm install merative-acd-ce-crtg \
           merative-acd-ce/crtg/chart/crtg \
           --set replicas=1 \
           --set configurationStorage.file.volume.existingClaimName=<pvc name> \
           --namespace ${acd_namespace}
        

    12. Verify the Cartridge microservice is running.

      Find the merative-acd-crtg pod by running the command:

        kubectl get pods -n ${acd_namespace}
        

      Run a health check against the pod using the following command. It should list "serviceState":"OK".

        kubectl exec <pod name> -c merative-acd-crtg -n ${acd_namespace} -- curl -sk 'https://localhost:9443/services/cartridge/api/v1/status/health_check'
        

    ACD Configuration Editor authentication

    Accessing ACD Configuration Editor can be set up with no authentication or using an Identity Provider for authentication.

    Option 1: No authentication

    If ACD Configuration Editor is running in a restricted environment and no authentication is needed, a simple OpenShift route can be configured as follows:

    1. Download the yaml below and save it as merative-acd-ce-macroservice.yaml
        
        apiVersion: route.openshift.io/v1
        kind: Route
        metadata:
          name: merative-acd-crtg
        spec:
          host:
          port:
            targetPort: crtg-https-pxy
          tls:
            termination: passthrough
          to:
            kind: Service
            name: merative-acd-crtg
        
    2. Create the ACD Configuration Editor route:
        oc create -f merative-acd-ce-macroservice.yaml -n ${acd_namespace}
        

    Option 2: Identity Provider authentication

    There are multiple Identity Providers for providing an authentication layer for ACD Configuration Editor (Azure Active Directory, Google, etc). This section will discuss the configuration using OIDC with standard OAuth2 Proxy.

    1. Use the following commands to create a project/namespace for the proxy and set the current namespace to it. For the remainder of the steps listed here for Option 2, we will use the example namespace merative-acd-ce-oauth.
        
        oc create namespace merative-acd-ce-oauth
        oc project merative-acd-ce-oauth
        
    2. Download the yaml below and save it as merative-acd-ce-oauth.yaml:
        
        kind: List
        apiVersion: v1
        items:
        # Create a secure connection to the proxy via a route
        - apiVersion: route.openshift.io/v1
          kind: Route
          metadata:
            name: proxy
          spec:
            to:
              kind: Service
              name: proxy
            tls:
              termination: Reencrypt
        - apiVersion: v1
          kind: Service
          metadata:
            name: proxy
            annotations:
              service.alpha.openshift.io/serving-cert-secret-name: proxy-tls
          spec:
            ports:
            - name: public-https
              port: 443
              targetPort: 8443
            selector:
              app: proxy
        # Launch a proxy as a deployment
        - apiVersion: apps/v1
          kind: Deployment
          metadata:
            name: proxy
          spec:
            replicas: 1
            selector:
              matchLabels:
                app: proxy
            spec:
              containers:
              - name: oauth-proxy
                image: quay.io/oauth2-proxy/oauth2-proxy
                imagePullPolicy: IfNotPresent
                ports:
                - containerPort: 8443
                  name: public-https
                args:
                - --client-id=<client id>
                - --client-secret=<client secret>
                - --cookie-secret=<cookie secret>
                - --cookie-secure=true
                - --email-domain=*
                - --https-address=:8443
                - --oidc-issuer-url=<oidc issuer url>
                - --pass-host-header=true
                - --pass-user-headers=true
                - --provider=oidc
                - --provider-display-name="ACD OIDC Provider"
                - --redirect-url=https://<hostname>/oauth2/callback
                - --request-logging=true
                - --set-authorization-header=true
                - --set-xauthrequest=true
                - --show-debug-on-error=true
                - --skip-auth-strip-headers=true
                - --skip-provider-button=true
                - --ssl-upstream-insecure-skip-verify=true
                - --upstream=https://merative-acd-crtg.merative-acd-operator-system.svc:443/
                - --tls-cert-file=/etc/tls/private/tls.crt
                - --tls-key-file=/etc/tls/private/tls.key
                volumeMounts:
                - mountPath: /etc/tls/private
                  name: proxy-tls
              volumes:
              - name: proxy-tls
                secret:
                  secretName: proxy-tls
        

    3. Create the proxy's deployment, proxy's service, and proxy's route:
        oc create -f merative-acd-ce-macroservice.yaml
        

      More options and details for the proxy are available in the OAuth2 Proxy Docs. Information on troubleshooting the OAuth Proxy is found at Troubleshooting the OAuth Proxy.

    After configuring a route, you may need to update the cartridge service deployment.yaml clinical_data_annotator_car_url environment variable to set the proper hostname for the service.

    Verification

    Go to the following URL to verify authentication and the proxy route: https://<hostname>/services/cartridge/cartridge-main.html

    You may get an error about the self-signed certificate in the browser, but you can use advanced option to continue to the site. In Google Chrome, if there is no button to proceed, click on the advanced warning text and type thisisunsafe (all one word lower-case--type it after clicking on the warning) and it should proceed. This is only needed the first time in. To fix this, add a trusted CA-issued certificate to the Apache HTTP server.

    After you are in, you are at the main ACD Configuration Editor catalog page. Initially, there are no default cartridges so your list will be empty. You can install the base Clinical Insights cartridge via an import and extend that cartridge or create your own new cartridge. In the upper right corner of the page, click the mortar board tutorial link to see Introductory videos and click the "?" icon to view the Getting Started Guide.

    Configuration Editor Main

    Periodically, refer to this documentation for updates to the Configuration Editor packages and see below for update instructions.

    Additional Configurations

    The ACD Configuration Editor can be configured to put a 'Logout' button on the user interface. This button can clear cookies and redirect to an authentication URL to perform logout. In order to configure the ability to logout of your instance, you can configure certain parameters under the Cartridge service in the merative-acd-ce/crtg/chart/crtg/values.yaml file.

    Custom properties include:

    Deploying cartridges to ACD installations (optional)

    ACD Configuration Editor provides the ability to deploy published cartridges to ACD instances in production environments. To configure additional custom environments, the following files must be modified and the Cartridge microservice must be redeployed using Helm (see Installing ACD Configuration Editor instructions).

    1. merative-acd-ce/crtg/chart/crtg/nginx-server.conf
        
        location /<identifier>/ {
            resolver <dns_host>;
            proxy_set_header Authorization $http_authorization;
            set $acd_host "<hostname>";
            proxy_set_header Host $acd_host;
            proxy_ssl_server_name on;
            if ($request_uri ~* "/<identifier>(/.*$)") {
                set  $path_remainder $1;
            }
            proxy_pass https://$acd_host/services/clinical_data_annotator$path_remainder;
        

    2. merative-acd-ce/crtg/chart/crtg/values.yaml
        
        - name: "clinical_data_annotator_car_acd_host_<n>_label"
          value: "Annotator for Clinical Data - <identifier>"
        - name: "clinical_data_annotator_car_acd_host_<n>_url"
          value: "https://<hostname>/services/clinical_data_annotator/api"
        - name: "clinical_data_annotator_car_acd_host_<n>_proxy"
          value: "<identifier>"
        - name: "clinical_data_annotator_car_acd_host_<n>_auth"
          value: "Bearer"
        - name: "clinical_data_annotator_car_acd_host_<n>_phi"
          value: "false"
        

      ACD Hosts must be indexed in the properties file using clinical_data_annotator_car_acd_host_<index> as the beginning of their property name. The index must start at 1. The properties are:

    Backing up your data

    All configuration data such as cartridges, flows, dictionaries, filters, etc., are stored in the storage set up as part of the ACD prerequisites. The recommendation is to use file-based storage via a persistent volume claim (PVC). Backup of this storage is implementation-specific. It is recommended to have at least daily backups in case a restore is needed.

    Updating ACD Configuration Editor

    To update to a newer version of the ACD Configuration Editor follow these steps:

    1. Back up any customizations you made to the following files:

    2. Download the latest ACD Configuration Editor deployment bundle and untar it (see Installing ACD Configuration Editor section).

    3. Delete the existing Helm deployments using the following commands:
        
        helm delete merative-acd-ce-crtg
        helm delete merative-acd-ce-cdc
        
    4. Merge in any customizations to the new project files.

    Migrating Existing
    Early Access Program Data

    Overview

    Customers that were part of the Early Access Program (EAP) can use the following steps to migrate their existing IBM Watson ACD Configuration Editor cartridges and artifacts to their newly installed Merative ACD Configuration Editor instance.

    1. From the acd-ce directory, stop the Merative Configuration Editor:
        ./run-acd-ce.sh -stop
        
    2. Navigate to the %HOME%/installs/config/artifactstore directory in the IBM Watson ACD EAP environment. The %HOME% value is where the IBM Watson ACD Configuration Editor was installed.

    3. Create an archive of the tenant data directories:
        tar -czv --exclude=SHAREDBASE <archive-name>.tar.gz *
        
    4. Copy the archive file to the Merative ACD Configuration Editor environment.

    5. Navigate to the %HOME%/installs/config/artifactstore directory in the Merative environment. The %HOME% value is where the Merative ACD Configuration Editor was installed.

    6. Extract the archive to the %HOME%/installs/config/artifactstore directory using the fully qualified path to the archive file:
        tar xvf <archive-path>/<archive-name>.tar.gz .
        
    7. From the acd-ce directory, start the Merative ACD Configuration Editor:
        ./run-acd-ce.sh
        
    8. NOTE: When analyzing text the first time after restarting Merative ACD Configuration Editor, it is common to experience an initial error while the data model is being loaded. Wait a few minutes after the initial error is received and retry the operation.

    Learning Resources

    Configuration Editor Learning Resources

    The following is a list of videos and links to educational content about Annotator for Clinical Data Configuration Editor.

    Note: Our name changed since these videos were recorded. The features are still the same.