Phildram1 commited on
Commit
6340249
·
verified ·
1 Parent(s): d87105c

Delete app.py

Browse files
Files changed (1) hide show
  1. app.py +0 -626
app.py DELETED
@@ -1,626 +0,0 @@
1
- import gradio as gr
2
- import re
3
- import os
4
- from datetime import datetime, timedelta
5
-
6
- # Simple in-memory rate limiting (resets when app restarts)
7
- request_tracker = {}
8
- MAX_REQUESTS_PER_HOUR = 20 # Limit to 20 AI requests per hour total
9
- MAX_REQUESTS_PER_USER = 5 # Limit to 5 requests per user per hour
10
-
11
- def check_rate_limit(user_ip):
12
- """Check if request is within rate limits"""
13
- current_time = datetime.now()
14
-
15
- # Clean old entries
16
- cutoff_time = current_time - timedelta(hours=1)
17
- request_tracker[user_ip] = [t for t in request_tracker.get(user_ip, []) if t > cutoff_time]
18
-
19
- # Check user limit
20
- user_requests = len(request_tracker.get(user_ip, []))
21
- if user_requests >= MAX_REQUESTS_PER_USER:
22
- return False, f"Rate limit reached. Please try again in an hour. (Limit: {MAX_REQUESTS_PER_USER} requests/hour per user)"
23
-
24
- # Check total limit
25
- total_requests = sum(len(times) for times in request_tracker.values())
26
- if total_requests >= MAX_REQUESTS_PER_HOUR:
27
- return False, "System rate limit reached. Please try again later. (Demo usage limit)"
28
-
29
- return True, None
30
-
31
- def record_request(user_ip):
32
- """Record a successful request"""
33
- if user_ip not in request_tracker:
34
- request_tracker[user_ip] = []
35
- request_tracker[user_ip].append(datetime.now())
36
-
37
- # Known SBC Misconfiguration Detection Rules
38
- def check_codec_issues(config):
39
- """Check for codec-related problems"""
40
- config_lower = config.lower()
41
- issues = []
42
-
43
- # Check if only one codec
44
- codec_keywords = ['opus', 'pcmu', 'pcma', 'g729', 'g711']
45
- codec_count = sum(1 for c in codec_keywords if c in config_lower)
46
-
47
- if codec_count == 1 and 'opus' in config_lower and 'pcmu' not in config_lower:
48
- issues.append({
49
- "finding": "Codec Mismatch - Only Opus configured, PCMU/PCMA missing",
50
- "impact": "Leads to one-way audio or call setup failure for carriers requiring PCMU/PCMA. Media negotiation will fail when remote endpoint doesn't support Opus.",
51
- "fix": "Add PCMU and PCMA codecs: codecs=pcmu,pcma,opus,g729",
52
- "confidence": 0.92,
53
- "root_cause": "Codec list not aligned between SIP trunk and carrier requirements",
54
- "severity": "high"
55
- })
56
-
57
- return issues
58
-
59
- def check_security_issues(config):
60
- """Check for security problems"""
61
- config_lower = config.lower()
62
- issues = []
63
-
64
- # Check SRTP
65
- if 'srtp=optional' in config_lower or ('srtp' not in config_lower):
66
- issues.append({
67
- "finding": "SRTP Not Enforced (Security Risk)",
68
- "impact": "Media encryption not enforced. Voice traffic exposed to eavesdropping. Fails PCI-DSS and HIPAA compliance requirements.",
69
- "fix": "Enforce SRTP encryption: srtp=required, crypto_suites=AES_CM_128_HMAC_SHA1_80",
70
- "confidence": 0.97,
71
- "root_cause": "Default configuration prioritizes compatibility over security",
72
- "severity": "critical"
73
- })
74
-
75
- # Check TLS version
76
- if 'tls_version=1.0' in config_lower or 'tls_version=1.1' in config_lower:
77
- issues.append({
78
- "finding": "Deprecated TLS Version (1.0 or 1.1)",
79
- "impact": "Security vulnerability to downgrade attacks. Modern carriers reject TLS 1.0/1.1 connections, causing trunk registration failure.",
80
- "fix": "Upgrade to TLS 1.2 minimum: tls_version=1.2, tls_min_version=1.2",
81
- "confidence": 0.94,
82
- "root_cause": "Legacy TLS version not updated after security advisories (RFC 8996)",
83
- "severity": "critical"
84
- })
85
-
86
- return issues
87
-
88
- def check_nat_issues(config):
89
- """Check for NAT traversal problems"""
90
- config_lower = config.lower()
91
- issues = []
92
-
93
- if 'nat_traversal=disabled' in config_lower or 'nat' not in config_lower:
94
- issues.append({
95
- "finding": "NAT Traversal Disabled",
96
- "impact": "One-way audio or no audio on calls traversing NAT boundaries. RTP packets cannot find return path. Critical for cloud-based SBCs.",
97
- "fix": "Enable NAT traversal: nat_traversal=enabled, ice_support=enabled, stun_server=stun.l.google.com:19302",
98
- "confidence": 0.93,
99
- "root_cause": "NAT handling disabled or STUN/ICE not configured for cloud deployment",
100
- "severity": "high"
101
- })
102
-
103
- return issues
104
-
105
- def check_port_issues(config):
106
- """Check for port configuration problems"""
107
- config_lower = config.lower()
108
- issues = []
109
-
110
- # Check if port is non-standard
111
- if 'port=' in config_lower:
112
- port_match = re.search(r'port=(\d+)', config_lower)
113
- if port_match:
114
- port = int(port_match.group(1))
115
- if port != 5060 and port != 5061:
116
- issues.append({
117
- "finding": f"Non-Standard SIP Port ({port})",
118
- "impact": "Most carriers expect SIP on port 5060 (UDP) or 5061 (TLS). Non-standard ports may be blocked by firewalls or rejected by carriers.",
119
- "fix": "Use standard ports: port=5060 for UDP/TCP, port=5061 for TLS",
120
- "confidence": 0.88,
121
- "root_cause": "Custom port configuration during migration or testing",
122
- "severity": "medium"
123
- })
124
-
125
- # Check RTP port range
126
- if 'rtp_port_range' in config_lower:
127
- range_match = re.search(r'rtp_port_range=(\d+)-(\d+)', config_lower)
128
- if range_match:
129
- start, end = int(range_match.group(1)), int(range_match.group(2))
130
- range_size = end - start
131
- if range_size < 1000:
132
- issues.append({
133
- "finding": f"Insufficient RTP Port Range ({range_size} ports)",
134
- "impact": "Port exhaustion during high call volume (>50 concurrent calls). New calls fail with 'No RTP resources available'.",
135
- "fix": f"Expand RTP port range to at least 1000 ports: rtp_port_range=10000-11000",
136
- "confidence": 0.91,
137
- "root_cause": "Default narrow port range not scaled for production load",
138
- "severity": "medium"
139
- })
140
-
141
- return issues
142
-
143
- def check_session_timer(config):
144
- """Check session timer settings"""
145
- config_lower = config.lower()
146
- issues = []
147
-
148
- if 'session_expires' in config_lower:
149
- timer_match = re.search(r'session_expires=(\d+)', config_lower)
150
- if timer_match:
151
- timer = int(timer_match.group(1))
152
- if timer < 900:
153
- issues.append({
154
- "finding": f"Session Timer Too Short ({timer} seconds)",
155
- "impact": "Long-duration calls terminated prematurely during brief network issues. Customer complaints about dropped calls after {timer//60} minutes.",
156
- "fix": "Increase session timer: session_expires=1800, min_se=900",
157
- "confidence": 0.86,
158
- "root_cause": "Conservative timer settings from legacy PBX migration",
159
- "severity": "medium"
160
- })
161
-
162
- return issues
163
-
164
- def check_dtmf_issues(config):
165
- """Check DTMF configuration"""
166
- config_lower = config.lower()
167
- issues = []
168
-
169
- if 'dtmf_relay=inband' in config_lower or 'dtmf' not in config_lower:
170
- issues.append({
171
- "finding": "DTMF Method Not Optimal",
172
- "impact": "In-band DTMF unreliable with compressed codecs. IVR systems may not receive digits correctly, causing customer frustration in phone menus.",
173
- "fix": "Use RFC2833 for DTMF: dtmf_relay=rfc2833 (preferred by most carriers)",
174
- "confidence": 0.89,
175
- "root_cause": "Default in-band DTMF not suitable for VoIP environments",
176
- "severity": "medium"
177
- })
178
-
179
- return issues
180
-
181
- def check_dns_issues(config):
182
- """Check DNS configuration"""
183
- config_lower = config.lower()
184
- issues = []
185
-
186
- if 'dns_srv_lookup=disabled' in config_lower or 'dns_srv=disabled' in config_lower:
187
- issues.append({
188
- "finding": "DNS SRV Lookup Disabled",
189
- "impact": "SBC cannot discover carrier SIP servers via DNS SRV records. Loses automatic failover and load balancing capabilities.",
190
- "fix": "Enable DNS SRV resolution: dns_srv_lookup=enabled",
191
- "confidence": 0.85,
192
- "root_cause": "DNS SRV disabled to work around temporary DNS issues",
193
- "severity": "low"
194
- })
195
-
196
- return issues
197
-
198
- def analyze_configuration(config_text):
199
- """Comprehensive configuration analysis"""
200
-
201
- if not config_text.strip():
202
- return "Please enter a configuration to analyze."
203
-
204
- # Run all checks
205
- all_issues = []
206
- all_issues.extend(check_codec_issues(config_text))
207
- all_issues.extend(check_security_issues(config_text))
208
- all_issues.extend(check_nat_issues(config_text))
209
- all_issues.extend(check_port_issues(config_text))
210
- all_issues.extend(check_session_timer(config_text))
211
- all_issues.extend(check_dtmf_issues(config_text))
212
- all_issues.extend(check_dns_issues(config_text))
213
-
214
- # Build output
215
- if not all_issues:
216
- return """# ✅ Configuration Validation: PASSED
217
-
218
- **Status:** No critical issues detected
219
-
220
- **Summary:** Your SBC configuration follows Amazon Connect BYOC best practices. The configuration includes:
221
- - ✅ Proper codec negotiation (PCMU/PCMA/Opus)
222
- - ✅ SRTP encryption enforced
223
- - ✅ TLS 1.2+ for signaling security
224
- - ✅ NAT traversal enabled with ICE support
225
- - ✅ Standard SIP ports (5060/5061)
226
- - ✅ Adequate RTP port range for scaling
227
- - ✅ Appropriate session timers
228
- - ✅ RFC2833 DTMF for IVR compatibility
229
-
230
- **Next Steps:**
231
- 1. Test with a trial call to verify audio quality
232
- 2. Monitor call metrics for 24-48 hours
233
- 3. Review Amazon Connect contact flow integration
234
-
235
- **Need Help?** Contact AWS Support or your carrier's technical team for deployment assistance.
236
- """
237
-
238
- # Issues found - categorize by severity
239
- critical = [i for i in all_issues if i['severity'] == 'critical']
240
- high = [i for i in all_issues if i['severity'] == 'high']
241
- medium = [i for i in all_issues if i['severity'] == 'medium']
242
- low = [i for i in all_issues if i['severity'] == 'low']
243
-
244
- output = []
245
-
246
- # Customer impact header
247
- if critical or high:
248
- output.append("# ⚠️ Configuration Validation: ISSUES DETECTED\n")
249
- output.append("**Customer Impact:** This configuration will likely cause audio quality issues, call failures, or security vulnerabilities in production.\n")
250
- else:
251
- output.append("# ⚠️ Configuration Validation: WARNINGS\n")
252
- output.append("**Status:** Configuration will work but has optimization opportunities.\n")
253
-
254
- output.append(f"\n**Issues Found:** {len(all_issues)} ({len(critical)} critical, {len(high)} high, {len(medium)} medium, {len(low)} low)\n")
255
- output.append("\n" + "="*80 + "\n\n")
256
-
257
- # Show issues by severity
258
- issue_num = 1
259
-
260
- for severity_name, severity_list in [("🔴 CRITICAL", critical), ("🟠 HIGH", high), ("🟡 MEDIUM", medium), ("⚪ LOW", low)]:
261
- if severity_list:
262
- output.append(f"## {severity_name} PRIORITY\n\n")
263
-
264
- for issue in severity_list:
265
- output.append(f"### Issue #{issue_num}: {issue['finding']}\n\n")
266
- output.append(f"**📊 Confidence:** {issue['confidence']:.0%} | ")
267
- output.append(f"**🎯 Root Cause:** {issue['root_cause']}\n\n")
268
- output.append(f"**💥 Customer Impact:**\n{issue['impact']}\n\n")
269
- output.append(f"**✅ How to Fix:**\n```\n{issue['fix']}\n```\n\n")
270
- output.append("-"*80 + "\n\n")
271
- issue_num += 1
272
-
273
- # Action items
274
- output.append("## 📋 Recommended Actions\n\n")
275
- if critical:
276
- output.append("1. **URGENT:** Address all critical issues before deploying to production\n")
277
- if high:
278
- output.append("2. Fix high-priority issues to prevent customer-impacting audio problems\n")
279
- if medium:
280
- output.append("3. Optimize medium-priority items for better call quality and reliability\n")
281
-
282
- output.append("\n**Testing Checklist:**\n")
283
- output.append("- [ ] Make test call and verify two-way audio\n")
284
- output.append("- [ ] Test DTMF input in IVR menu\n")
285
- output.append("- [ ] Verify TLS handshake with carrier\n")
286
- output.append("- [ ] Confirm NAT traversal in cloud environment\n")
287
-
288
- return "".join(output)
289
-
290
- def ai_troubleshoot(symptom_description, request: gr.Request):
291
- """AI-powered troubleshooting using Claude API with rate limiting"""
292
-
293
- if not symptom_description.strip():
294
- return "Please describe the issue you're experiencing with your SBC or calls."
295
-
296
- # Rate limiting
297
- user_ip = request.client.host if request else "unknown"
298
- allowed, error_msg = check_rate_limit(user_ip)
299
- if not allowed:
300
- return f"## ⚠️ Rate Limit Reached\n\n{error_msg}\n\nThis is a demo with usage limits to control costs."
301
-
302
- # Check for API key
303
- api_key = os.environ.get("ANTHROPIC_API_KEY")
304
- print(f"DEBUG: API key detected: {bool(api_key)}") # Debug log
305
- if not api_key:
306
- # Fallback to pattern-based analysis if no API key
307
- print("DEBUG: No API key found, using fallback") # Debug log
308
- return fallback_troubleshoot(symptom_description)
309
-
310
- try:
311
- # Use Claude API for real AI-powered analysis
312
- import anthropic
313
-
314
- client = anthropic.Anthropic(api_key=api_key)
315
-
316
- prompt = f"""You are an expert SBC (Session Border Controller) troubleshooting assistant for Amazon Connect BYOC deployments.
317
-
318
- A customer reports the following issue:
319
- "{symptom_description}"
320
-
321
- Provide a diagnostic analysis with:
322
- 1. **Likely Root Causes** - What SBC misconfigurations could cause this
323
- 2. **Configuration Parameters to Check** - Specific config settings to verify
324
- 3. **Recommended Fixes** - Exact configuration commands to try
325
- 4. **Confidence Level** - How confident you are in this diagnosis (as a percentage)
326
-
327
- Focus on common BYOC issues like:
328
- - NAT traversal for audio problems
329
- - DTMF configuration for IVR issues
330
- - TLS/security for connection failures
331
- - Codec negotiation for audio quality
332
- - Session timers for dropped calls
333
- - Port configuration for firewall issues
334
-
335
- Format your response in clear sections with markdown. Be specific and actionable."""
336
-
337
- message = client.messages.create(
338
- model="claude-3-5-haiku-20241022", # Using Haiku for cost efficiency
339
- max_tokens=800, # Limit response length to control costs
340
- messages=[{
341
- "role": "user",
342
- "content": prompt
343
- }]
344
- )
345
-
346
- # Record successful request
347
- record_request(user_ip)
348
-
349
- # Format response
350
- analysis = f"# 🤖 AI-Powered Troubleshooting Analysis\n\n"
351
- analysis += f"**Your Issue:** {symptom_description}\n\n"
352
- analysis += "**Powered by Claude 3.5 Haiku**\n\n"
353
- analysis += "---\n\n"
354
- analysis += message.content[0].text
355
- analysis += "\n\n---\n\n"
356
- analysis += "## 📋 Next Steps\n\n"
357
- analysis += "1. Review the configuration parameters listed above in your SBC\n"
358
- analysis += "2. Switch to the **Configuration Validator** tab to paste your full config for detailed analysis\n"
359
- analysis += "3. Apply the recommended fixes\n"
360
- analysis += "4. Test with a trial call\n"
361
-
362
- return analysis
363
-
364
- except Exception as e:
365
- # Fallback to pattern-based if API fails
366
- return fallback_troubleshoot(symptom_description)
367
-
368
- def fallback_troubleshoot(symptom_description):
369
- """Pattern-based fallback troubleshooting when API is unavailable"""
370
-
371
- symptom_lower = symptom_description.lower()
372
-
373
- # Pattern-based analysis (original logic)
374
- analysis = []
375
- analysis.append("# 🔍 Troubleshooting Analysis\n")
376
- analysis.append(f"**Your Issue:** {symptom_description}\n\n")
377
- analysis.append("**Note:** AI analysis temporarily unavailable. Using pattern-based diagnosis.\n\n")
378
- analysis.append("---\n\n")
379
-
380
- recommendations = []
381
-
382
- # One-way audio symptoms
383
- if any(keyword in symptom_lower for keyword in ['one-way audio', 'one way audio', 'cant hear', "can't hear", 'no audio', 'audio not working']):
384
- recommendations.append({
385
- 'issue': 'One-Way Audio / No Audio',
386
- 'likely_causes': [
387
- 'NAT traversal disabled',
388
- 'Incorrect RTP port configuration',
389
- 'Firewall blocking RTP ports',
390
- 'Media anchoring disabled'
391
- ],
392
- 'configs_to_check': [
393
- 'nat_traversal=enabled',
394
- 'ice_support=enabled',
395
- 'rtp_port_range=10000-20000',
396
- 'media_anchoring=enabled'
397
- ],
398
- 'confidence': 0.95
399
- })
400
-
401
- # IVR/DTMF issues
402
- if any(keyword in symptom_lower for keyword in ['ivr', 'dtmf', 'keypad', 'menu', 'press 1', 'touch tone', 'dial pad']):
403
- recommendations.append({
404
- 'issue': 'IVR / DTMF Not Working',
405
- 'likely_causes': [
406
- 'DTMF relay method mismatch',
407
- 'In-band DTMF with compressed codecs',
408
- 'Carrier expects RFC2833 but SBC using SIP INFO'
409
- ],
410
- 'configs_to_check': [
411
- 'dtmf_relay=rfc2833',
412
- 'dtmf_mode=rfc2833',
413
- 'Verify codec supports DTMF (avoid highly compressed codecs)'
414
- ],
415
- 'confidence': 0.92
416
- })
417
-
418
- # Call setup failures
419
- if any(keyword in symptom_lower for keyword in ['call fails', 'cant connect', "can't connect", 'wont connect', "won't connect", '408', '503', '481', 'timeout']):
420
- recommendations.append({
421
- 'issue': 'Call Setup Failures',
422
- 'likely_causes': [
423
- 'SIP port misconfiguration',
424
- 'DNS SRV lookup disabled',
425
- 'TLS handshake failure',
426
- 'Incorrect Contact header IP'
427
- ],
428
- 'configs_to_check': [
429
- 'port=5060 (UDP) or port=5061 (TLS)',
430
- 'dns_srv_lookup=enabled',
431
- 'tls_version=1.2',
432
- 'contact_ip=<public_IP>'
433
- ],
434
- 'confidence': 0.88
435
- })
436
-
437
- # Dropped calls
438
- if any(keyword in symptom_lower for keyword in ['dropped', 'disconnect', 'call drops', 'hangs up']):
439
- recommendations.append({
440
- 'issue': 'Calls Dropping / Premature Disconnection',
441
- 'likely_causes': [
442
- 'Session timer too short',
443
- 'Network instability with aggressive timers',
444
- 'Keep-alive mechanism not configured'
445
- ],
446
- 'configs_to_check': [
447
- 'session_expires=1800',
448
- 'min_se=900',
449
- 'session_refresh=uac'
450
- ],
451
- 'confidence': 0.86
452
- })
453
-
454
- # Generate output
455
- if not recommendations:
456
- analysis.append("## 🔍 General Diagnostic Approach\n\n")
457
- analysis.append("I don't recognize specific symptoms in your description. Here's how to diagnose:\n\n")
458
- analysis.append("1. **Paste your SBC configuration** into the validator tab for automated analysis\n")
459
- analysis.append("2. **Check common issues:**\n")
460
- analysis.append(" - NAT traversal settings for audio issues\n")
461
- analysis.append(" - DTMF configuration for IVR problems\n")
462
- analysis.append(" - TLS/port settings for connection failures\n")
463
- analysis.append("3. **Review carrier documentation** for specific requirements\n")
464
- else:
465
- for rec in recommendations:
466
- analysis.append(f"## 🎯 Diagnosis: {rec['issue']}\n\n")
467
- analysis.append(f"**Confidence:** {rec['confidence']:.0%}\n\n")
468
- analysis.append("**Likely Root Causes:**\n")
469
- for cause in rec['likely_causes']:
470
- analysis.append(f"- {cause}\n")
471
- analysis.append("\n**Configuration Parameters to Check:**\n```\n")
472
- for config in rec['configs_to_check']:
473
- analysis.append(f"{config}\n")
474
- analysis.append("```\n\n")
475
- analysis.append("---\n\n")
476
-
477
- return "".join(analysis)
478
-
479
- # Example configurations
480
- BROKEN_CONFIG = """transport=udp
481
- port=5060
482
- codecs=opus
483
- srtp=optional
484
- nat_traversal=disabled
485
- tls_version=1.0
486
- session_expires=90
487
- dtmf_relay=inband
488
- rtp_port_range=10000-10100
489
- dns_srv_lookup=disabled"""
490
-
491
- VALID_CONFIG = """transport=tcp
492
- port=5061
493
- codecs=pcmu,pcma,opus,g729
494
- srtp=required
495
- crypto_suites=AES_CM_128_HMAC_SHA1_80
496
- nat_traversal=enabled
497
- ice_support=enabled
498
- stun_server=stun.l.google.com:19302
499
- tls_version=1.2
500
- tls_min_version=1.2
501
- cipher_suites=ECDHE-RSA-AES256-GCM-SHA384
502
- session_expires=1800
503
- min_se=900
504
- dtmf_relay=rfc2833
505
- rtp_port_range=10000-20000
506
- dns_srv_lookup=enabled
507
- media_anchoring=enabled"""
508
-
509
- def load_broken_config():
510
- return BROKEN_CONFIG
511
-
512
- def load_valid_config():
513
- return VALID_CONFIG
514
-
515
- # Create Gradio interface
516
- demo = gr.Blocks(theme=gr.themes.Soft(), title="Amazon Connect BYOC - AI-Powered SBC Validator")
517
-
518
- with demo:
519
-
520
- gr.Markdown("""
521
- # 🔒 Amazon Connect BYOC - AI-Powered Configuration Validator
522
- ### Intelligent SBC Analysis & Troubleshooting
523
-
524
- **For Amazon Connect Customers Using Bring Your Own Carrier (BYOC)**
525
-
526
- Validate your SBC configuration and get AI-powered troubleshooting recommendations before connecting to Amazon Connect.
527
- """)
528
-
529
- with gr.Tabs():
530
- with gr.Tab("🤖 AI Troubleshoot"):
531
- gr.Markdown("""
532
- ### Describe Your Issue in Plain English
533
- Tell me what's wrong with your calls and I'll diagnose the likely SBC configuration issues.
534
- """)
535
-
536
- with gr.Row():
537
- with gr.Column(scale=1):
538
- symptom_input = gr.Textbox(
539
- label="What issue are you experiencing?",
540
- lines=5,
541
- placeholder="Examples:\n- 'My calls have one-way audio'\n- 'IVR menu not responding to key presses'\n- 'Calls dropping after 2 minutes'\n- 'TLS handshake failing with carrier'",
542
- )
543
-
544
- with gr.Row():
545
- example_btn1 = gr.Button("Example: One-way audio", variant="secondary", size="sm")
546
- example_btn2 = gr.Button("Example: IVR not working", variant="secondary", size="sm")
547
-
548
- troubleshoot_btn = gr.Button("🔍 Diagnose Issue", variant="primary", size="lg")
549
-
550
- with gr.Column(scale=1):
551
- gr.Markdown("### AI Diagnosis")
552
- troubleshoot_output = gr.Markdown()
553
-
554
- # Example button actions
555
- example_btn1.click(fn=lambda: "I can hear the other person but they can't hear me", outputs=symptom_input)
556
- example_btn2.click(fn=lambda: "Customers can't navigate our IVR menu by pressing numbers", outputs=symptom_input)
557
- troubleshoot_btn.click(fn=ai_troubleshoot, inputs=symptom_input, outputs=troubleshoot_output)
558
-
559
- with gr.Tab("⚙️ Configuration Validator"):
560
- gr.Markdown("""
561
- ### Paste Your SBC Configuration
562
- Get detailed analysis of specific configuration parameters.
563
- """)
564
-
565
- with gr.Row():
566
- with gr.Column(scale=1):
567
- config_input = gr.Textbox(
568
- label="Paste your configuration here",
569
- lines=20,
570
- placeholder="Example:\ntransport=tcp\nport=5061\ncodecs=pcmu,pcma,opus\nsrtp=required\nnat_traversal=enabled\n...",
571
- )
572
-
573
- with gr.Row():
574
- broken_btn = gr.Button("📛 Load Example: Common Mistakes", variant="secondary", size="sm")
575
- valid_btn = gr.Button("✅ Load Example: Best Practice Config", variant="secondary", size="sm")
576
-
577
- analyze_btn = gr.Button("🔍 Validate Configuration", variant="primary", size="lg")
578
-
579
- with gr.Column(scale=1):
580
- gr.Markdown("### Validation Results")
581
- output = gr.Markdown()
582
-
583
- # Button actions
584
- broken_btn.click(fn=load_broken_config, outputs=config_input)
585
- valid_btn.click(fn=load_valid_config, outputs=config_input)
586
- analyze_btn.click(fn=analyze_configuration, inputs=config_input, outputs=output)
587
-
588
- gr.Markdown("""
589
- ---
590
- ## About This Validator
591
-
592
- This tool checks for 10+ common SBC misconfigurations in Amazon Connect BYOC deployments:
593
-
594
- **Security Issues:**
595
- - Weak or missing SRTP encryption
596
- - Deprecated TLS versions (1.0/1.1)
597
- - Unsecure cipher suites
598
-
599
- **Audio Quality Issues:**
600
- - Codec mismatches causing one-way audio
601
- - NAT traversal problems in cloud environments
602
- - Incorrect DTMF signaling for IVR systems
603
-
604
- **Connectivity Issues:**
605
- - Non-standard SIP ports
606
- - Session timer misconfigurations
607
- - DNS SRV lookup disabled
608
- - Insufficient RTP port ranges
609
-
610
- **Confidence Scores:** Each finding includes an AI-powered confidence score (85-97%) and specific remediation steps.
611
-
612
- **Who Should Use This:**
613
- - AWS customers setting up Amazon Connect BYOC
614
- - Telecom engineers configuring SBCs for cloud connectivity
615
- - Operations teams troubleshooting audio quality issues
616
- - Compliance teams validating security configurations
617
-
618
- ---
619
-
620
- 💡 **Pro Tip:** Run this validator before submitting support tickets. Most BYOC issues can be resolved by following these recommendations.
621
-
622
- Built by Philip Drammeh | Former Microsoft Operator Connect SRE | [LinkedIn](https://linkedin.com/in/philip-drammeh)
623
- """)
624
-
625
- if __name__ == "__main__":
626
- demo.launch()