Operata Cloud Collector Overview

What is Operata Cloud Collector?

Operata Cloud Collector collects relevant contact and performance metadata for your Customers interactions within Amazon Connect and securely sends this data to the Operata Platform.

This data is correlated with both softphone performance metrics and other events collected for the lifecycle for the interaction.

This end-to-end view is presented inside the Operata UI with rich visualisations providing clear insights, powerful reporting, learning and alerting.

How Cloud Collector Works

Operata Cloud Collector Architecture Overview

At the heart of Cloud Collector is a pre-built Lambda function provided by Operata which is implemented within your AWS instance using CloudFormation.

This Lambda function is fully configurable to ensure you are in total control of what data is sent to Operata.

Cloud Collector monitors your Amazon Connect instance for new or updated Contact Flow Logs (delivered to CloudWatch) and Contact Trace Records (delivered via Kinesis).

The data is securely shipped to the Operata platform via HTTPS, using SHA-256 with RSA Encryption.

Pre-Requisites

Before you begin, please ensure you have:

  • An active Operata subscription: if you do not already have an active Operata subscription you can sign up for a free trial here
  • Your Operata Group Credentials: if you do not already have your group credentials please contact us to have them generated.
  • Approval from your Operata Customer Success Manager: if you do not already have permission to install please contact us.
❗️

Terms of Service

By installing Operata Software, you agree to and accept the Operata Terms Of Service

Skills required for deployment

This guide is intended for users familiar with AWS and the following services:

  • CloudFormation
  • Lambda
  • Amazon Connect
  • IAM
  • Kinesis

Time to complete deployment

Allow 1 hour for deployment and testing of Operata Cloud Collector, comprised of:

  • 0.5 hours for initial deployment
  • 0.5 hours for testing
🚧

Deployment Scheduling

Deployment of this service must be scheduled with Operata prior to deployment. Please contact your Customer Success Manager regarding scheduling.

Operata is not responsible for costs or damages caused by incorrect or unscheduled deployments.

Architecture Overview

Operata Cloud Collector Diagram

Resources Deployed

The Operata CloudFormation template will deploy the following resources:

  1. Lambda Function
  2. Kinesis Stream (if not pre-existing)
  3. IAM Role & Policy
  4. CloudWatch log subscription filter

Deployment Options

This deployment type supports a single availability zone (AZ) only and is not designed for High Availability (HA). Should you require support for multi-AZ or multi-region please contact Operata support or your Customer Success Manager to discuss options.

Supported Regions

Operata supports all regions where Amazon Connect is available

IAM Roles & Policies Used by Cloud Collector

📘

IAM Privileges

Operata Cloud Collector uses a policy of least privilege for all access granted as part of the deployment.

❗️

Root Privileges

We strongly recommend that you do not use the root user for your everyday tasks, even the administrative ones. As a best practice, safeguard your root user credentials and don't use them for everyday tasks.

The following Roles & Policies will be created during deployment

Role/PolicyDescription
Lambda ExecutionAllows the execution of the Lambda Function, Kinesis consumption & logging
Kinesis CreationAllows the creation of a Kinesis Data Stream
CloudWatch Kinesis SubscriptionAllows the Kinesis data stream to subscribe to CloudWatch a specified log group
S3Get Object

Detailed Roles & Policies information can be found within the Operata CloudFormation templates

S3 Policies

There is no requirement for the Amazon S3 buckets to be deployed with policies allowing public access.

Secrets Management

An API key needs to be created within the Operata app and used when deploying Cloud Collector so that the Lambda function can securely send data to Operata.

Customer-sensitive data in the context of Cloud Collector relates to the API secret used in the service. Operata utilises AWS Secrets Manager to keep these secure. More information on AWS Secrets Manager and Operata Secret key rotation can be found below:

  • AWS Secrets Manager documentation can be found here

  • Operata Secret key rotation can be achieved within the Operata Console

Key Rotation process

Key Rotation

📘

Key Rotation Frequency

Operata recommends a key rotation frequency of 90 days.

Steps to rotate keys:

  1. Log into Operata
  2. Go to Settings > Config > API
  3. Create a new key and copy the secret
  4. Log into AWS
  5. Go to Secrets Manager.
  6. Find your Secret labelled operata/{GROUP_ID}/secret
  7. Under Secret Value select Retrieve Secret Value
  8. Click Edit
  9. Paste your copied key secret from Step 3 and Save
  10. Return to Operata
  11. Select your old secret and choose delete

Data Encryption

Operata supports Data Encryption being enabled in Kinesis. For more information please see link to the AWS guides below. Please notify Operata support prior to deployment should you enable this service.

AWS Service Quotas

This deployment uses services that may impact the service quotas for your organisation. For more information on viewing your quotas or requesting increases please review the AWS service quotas guide

Billable AWS Services used in the deployment

Operata Cloud Collector uses the following services within your AWS Account. All usage is billable to the customers AWS account and is the responsibility of the customer to manage according to their own billing policies.

ServiceQuantityMandatory
Lambda1 FunctionTrue
Kinesis1 ShardTrue
S31 ObjectFalse
AWS Secrets Manager1 SecretTrue
AWS Secrets Manager1 API call per Lambda invocationTrue

Further information on usage cost estimation can be found here

Billable components

Lambda Sizing

Cloud Collector is sized as per below:

Memory AllocationTimeout
128MB20 seconds
📘

Performance

Operata Cloud Collector has been suitably sized for most enterprise deployments, however, may need to be changed for some high-use circumstances. Please contact Operata support or your Customer Success Manager for further information.

Testing the deployment

  • Customers will be assigned an Operata Engineer to test & certify the installation post-deployment.
  • Logs are also available in the Lambda Console and/or CloudWatch to verify the installation.
🚧

Event Delays

Events can take up to 5-minutes to appear within the Operata Console.

Troubleshooting the deployment

  1. Check for Lambda execution failures
  2. Confirm the correct credentials are being used against the correct GroupId
  3. Check Lambda Console and/or CloudWatch logs for information on failures

Please contact Operata support or your Customer Success Manager for further troubleshooting.

Monitoring Lambda

Logs and metrics are enabled by default. Lambda metrics and logs can be found in the Lambda Console and/or CloudWatch.

Viewing metrics In Lambda:

  1. Go to Lambda > Functions > Name of Lambda Function Deployed by CF Stack
  2. Choose Monitor > Metrics
  3. A good start to view the health of the Lambda is the Error count and success rate (%) metrics

Viewing logs In CloudWatch

  1. Go to CloudWatch > Logs > Log Groups > /aws/lambda/{Name of Lambda Function Deployed by CF Stack}
  2. Full DEBUG messages are available here to sort and filter.
  3. For more information on using filter patterns to match terms in log events see this AWS help guide

Updates and Patches

Should an update or patch be required to the Lambda function, Operata will contact your listed account administrator with instructions.

Failure Recovery

This service is not designed to be High Availability (HA). Should you have a requirement for HA or if you suffer a prolonged outage please contact Operata support or your Customer Success Manager to discuss options.

Other steps to recovery that can be attempted:

  1. Delete the CloudFormation stack.
  2. Re-deploy the CloudFormation stack.
  3. Monitor the CloudFormation output for errors.

Should an error be observed during stack creation contact Operata support or your Customer Success Manager for further support.

Updates

Operata will provide an updated CloudFormation template as part of updates or critical patches. Once you receive a notification from your Customer Success Manager or the Operata support team you can implement by following these steps:

  1. Login to AWS CloudFormation Console
  2. Find the previously created Operata stack
  3. Follow this AWS guide to delete the stack
  4. To install the update, follow the original instructions to deploy the Operata Lambda by following this guide
❗️

Outage Window Required

Please note: after deleting the CloudFormation stack your instance will not send Contact Trace Records or Contact Flow Logs until the new stack is installed. Please ensure this task is carried out during an appropriate window as per your business requirements.

Support

Business day support is available with all Operata plans. 24 x 7 Support is available on application.

ChannelDetails
ChatIn-app
Email[email protected]
PhoneOn Application

Support SLA

Operata will use reasonable endeavors to provide an initial response to the Support Services requests promptly and in any event within the corresponding timeframe set out below:

Severity LevelUnderlying IssueInitial Response TimeframeRestoration Target
CriticalInability to collect any Customer data2 Business Hours6 Business Hours
SeriousNo access to the Operata platform or collected data4 Business Hours12 Business Hours
ModerateNon-critical data or functionality issue8 Business Hours24 Business Hours
MinorAny impairment of the Software not falling into the above categories; and any cosmetic issue affecting the Software16 Business Hours160 Business Hours

What’s Next

Get started with the installation: