You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
Copy file name to clipboardExpand all lines: docs/enterprise/deployment-permissions.mdx
+56-1Lines changed: 56 additions & 1 deletion
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -60,6 +60,32 @@ Create an IAM role in your AWS account with the policy below. Make sure to repla
60
60
}
61
61
```
62
62
63
+
In addition to these role permissions, make sure this role also has a Trust Relationship policy that allows the Kubernetes service account to assume it.
64
+
65
+
Below, you can see an example of a Trust Relationship policy using IRSA (IAM Roles for Service Accounts) to allow the `briefer-pull` Kubernetes service account to assume the role. Make sure to replace the placeholders with the actual values for your AWS account and EKS cluster.
This permission allows the CronJob to assume a cross-account role in our AWS account and pull enterprise container images from our private ECR.
65
91
@@ -72,6 +98,8 @@ Once the role is properly configured, the CronJob will handle authentication and
72
98
73
99
To enable Briefer's AI capabilities, your deployment role must have permission to invoke specific foundation models on AWS Bedrock.
74
100
101
+
First, make sure that you enable the desired models (Claude 3.5, Claude 3.7 and Titan) in your AWS account. You can do this by going to the AWS Bedrock console and enabling the models you want to use, [as explained in the AWS docs here](https://docs.aws.amazon.com/bedrock/latest/userguide/model-access-modify.html).
102
+
75
103
The following policy grants the required access:
76
104
77
105
```json
@@ -85,7 +113,8 @@ The following policy grants the required access:
@@ -97,6 +126,32 @@ The following policy grants the required access:
97
126
}
98
127
```
99
128
129
+
Just like the ECR permissions, make sure this role also has a Trust Relationship policy that allows the Kubernetes service account to assume it.
130
+
131
+
As an example, here is a Trust Relationship policy using IRSA (IAM Roles for Service Accounts) to allow the `briefer-api` service account to assume the role. Make sure to replace the placeholders with the actual values for your AWS account and EKS cluster.
0 commit comments