You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
@@ -80,6 +80,7 @@ This construct library facilitates the deployment of Bedrock AgentCore primitive
80
80
-[Creating a Runtime](#creating-a-runtime)
81
81
-[Option 1: Use an existing image in ECR](#option-1-use-an-existing-image-in-ecr)
82
82
-[Option 2: Use a local asset](#option-2-use-a-local-asset)
83
+
-[Option 3: Use direct code deployment](#option-3-use-direct-code-deployment)
83
84
-[Granting Permissions to Invoke Bedrock Models or Inference Profiles](#granting-permissions-to-invoke-bedrock-models-or-inference-profiles)
84
85
-[Runtime Versioning](#runtime-versioning)
85
86
-[Managing Endpoints and Versions](#managing-endpoints-and-versions)
@@ -163,6 +164,8 @@ to production by simply updating the endpoint to point to the newer version.
163
164
|`authorizerConfiguration`|`RuntimeAuthorizerConfiguration`| No | Authorizer configuration for the agent runtime. Use `RuntimeAuthorizerConfiguration` static methods to create configurations for IAM, Cognito, JWT, or OAuth authentication |
164
165
|`environmentVariables`|`{ [key: string]: string }`| No | Environment variables for the agent runtime. Maximum 50 environment variables |
165
166
|`tags`|`{ [key: string]: string }`| No | Tags for the agent runtime. A list of key:value pairs of tags to apply to this Runtime resource |
167
+
|`lifecycleConfiguration`| LifecycleConfiguration | No | The life cycle configuration for the AgentCore Runtime. Defaults to 900 seconds (15 minutes) for idle, 28800 seconds (8 hours) for max life time |
168
+
|`requestHeaderConfiguration`| RequestHeaderConfiguration | No | Configuration for HTTP request headers that will be passed through to the runtime. Defaults to no configuration |
166
169
167
170
### Runtime Endpoint Properties
168
171
@@ -180,7 +183,7 @@ to production by simply updating the endpoint to point to the newer version.
With the container deployment method, developers create a Dockerfile, build ARM-compatible containers, manage ECR repositories, and upload containers for code changes. This works well where container DevOps pipelines have already been established to automate deployments.
221
+
222
+
However, customers looking for fully managed deployments can benefit from direct code deployment, which can significantly improve developer time and productivity. Direct code deployment provides a secure and scalable path forward for rapid prototyping agent capabilities to deploying production workloads at scale.
223
+
224
+
With direct code deployment, developers create a zip archive of code and dependencies, upload to Amazon S3, and configure the bucket in the agent configuration. A ZIP archive containing Linux arm64 dependencies needs to be uploaded to S3 as a pre-requisite to Create Agent Runtime.
225
+
226
+
For more information, please refer to the [documentation](https://docs.aws.amazon.com/bedrock-agentcore/latest/devguide/runtime-get-started-code-deploy.html).
The LifecycleConfiguration input parameter to CreateAgentRuntime lets you manage the lifecycle of runtime sessions and resources in Amazon Bedrock AgentCore Runtime. This configuration helps optimize resource utilization by automatically cleaning up idle sessions and preventing long-running instances from consuming resources indefinitely.
588
+
589
+
You can configure:
590
+
591
+
- idleRuntimeSessionTimeout: Timeout in seconds for idle runtime sessions. When a session remains idle for this duration, it will trigger termination. Termination can last up to 15 seconds due to logging and other process completion. Default: 900 seconds (15 minutes)
592
+
- maxLifetime: Maximum lifetime for the instance in seconds. Once reached, instances will initialize termination. Termination can last up to 15 seconds due to logging and other process completion. Default: 28800 seconds (8 hours)
593
+
594
+
For additional information, please refer to the [documentation](https://docs.aws.amazon.com/bedrock-agentcore/latest/devguide/runtime-lifecycle-settings.html).
Custom headers let you pass contextual information from your application directly to your agent code without cluttering the main request payload. This includes authentication tokens like JWT (JSON Web Tokens, which contain user identity and authorization claims) through the Authorization header, allowing your agent to make decisions based on who is calling it. You can also pass custom metadata like user preferences, session identifiers, or trace context using headers prefixed with X-Amzn-Bedrock-AgentCore-Runtime-Custom-, giving your agent access to up to 20 pieces of runtime context that travel alongside each request. This information can be also used in downstream systems like AgentCore Memory that you can namespace based on those characteristics like user_id or aud in claims like line of business.
616
+
617
+
For additional information, please refer to the [documentation](https://docs.aws.amazon.com/bedrock-agentcore/latest/devguide/runtime-header-allowlist.html).
The Amazon Bedrock AgentCore Browser provides a secure, cloud-based browser that enables AI agents to interact with websites. It includes security features such as session isolation, built-in observability through live viewing, CloudTrail logging, and session replay capabilities.
@@ -583,6 +671,7 @@ For more information on VPC connectivity for Amazon Bedrock AgentCore Browser, p
583
671
|`recordingConfig`|`RecordingConfig`| No | Recording configuration for browser. Defaults to no recording |
584
672
|`executionRole`|`iam.IRole`| No | The IAM role that provides permissions for the browser to access AWS services. A new role will be created if not provided |
585
673
|`tags`|`{ [key: string]: string }`| No | Tags to apply to the browser resource |
674
+
|`browserSigning`| BrowserSigning | No | Browser signing configuration. Defaults to DISABLED |
// when recording is enabled, so no additional IAM configuration is needed
710
799
```
711
800
801
+
### Browser with Browser signing
802
+
803
+
AI agents need to browse the web on your behalf. When your agent visits a website to gather information, complete a form, or verify data, it encounters the same defenses designed to stop unwanted bots: CAPTCHAs, rate limits, and outright blocks.
804
+
805
+
Amazon Bedrock AgentCore Browser supports Web Bot Auth. Web Bot Auth is a draft IETF protocol that gives agents verifiable cryptographic identities. When you enable Web Bot Auth in AgentCore Browser, the service issues cryptographic credentials that websites can verify. The agent presents these credentials with every request. The WAF may now additionally check the signature, confirm it matches a trusted directory, and allow the request through if verified bots are allowed by the domain owner and other WAF checks are clear.
806
+
807
+
To enable the browser to sign requests using the Web Bot Auth protocol, create a browser tool with the browserSigning configuration:
0 commit comments