Select the subnet for application VPC and switch to the Flow logs
tab.
Create a flow log or edit an existing flow log.
Enter a Name.
Under Destination, select Send to an Amazon S3 bucket
you created in the previous section and provide the ARN for the
S3 bucket.
Enter the S3 bucket ARN.
For Log record format, choose Custom Format and select all
the Standard attributes.
(Optional) To partition your flow logs per hour, choose
Every 1 hour (60 mins) in Partition logs by time.
Leave the remaining settings as default, unless your use case
requires specific configurations.
Choose Create flow log or Save.
Go to the AWS Bedrock Console to manage
model permissions and enable model access.
In the left navigation pane, select Settings under the
Bedrock Configurations section.
Toggle Model invocation logging to enable logging.
Choose S3 only as the logging destination.
In the S3 location field, select the S3 bucket name you
created earlier for storing logs.
Click Save settings to apply your changes.
Enable Access from AWS in EKS Authentication
Allow the EKS clusters to authenticate users based on their IAM roles.
Configure the following so the AI Runtime Security: Network intercept
can discover the pod assets.
Click on your EKS cluster and select the Access tab within that
cluster page.
Click Manage access.
Under Cluster authentication mode, select EKS API and
ConfigMap.
Save changes.
Add the following IP addresses to allow the Strata Cloud Manager
to access your public cluster for discovery (This step is applicable
when you have enabled Public access to your cluster
endpoint):
Navigate back to your cluster and go to Networking >
Manage endpoint access.
Under cluster endpoint access select
Public.
Expand Advanced settings to allow the perimeter
firewall and add the following IP addresses to access this
cluster:
34.71.64.3/32
34.28.60.186/32
Code copied to clipboard
Unable to copy due to lack of browser support.
Save Changes.
Associate a Role for VM Model Invocation
Grant EC2 instances permissions to invoke Bedrock models. Associate a role to
log actions under that role, enhancing security and simplifying permission
management without using local keys.