Bedrock AgentCore Runtime App - Troubleshooting Guide
This guide helps you diagnose and resolve common issues when deploying Bedrock AgentCore Runtimes.
Table of Contents
X-Ray Transaction Search Config Already Exists
Symptom
Deployment fails with the following error:
CREATE_FAILED | AWS::XRay::TransactionSearchConfig | bedrockagentcoreru...archConfig2B8A09A6
Resource handler returned message: "null" (RequestToken: 91702d2a-d5aa-c0a2-761c-1db8808b6e20, HandlerErrorCode: AlreadyExists)
Cause
The X-Ray TransactionSearchConfig resource is a singleton per AWS account per region. This error occurs when: - Another AgentCore runtime has already created this resource in the same account/region - Another AWS service or deployment has configured X-Ray transaction search - A previous deployment created the resource and it still exists
Solution
Set enableTransactionSearch: false in your configuration to skip creating this resource.
agentRuntimeName: myAgentRuntime
enableTransactionSearch: false # Add this line
agentRuntimeArtifact:
containerConfiguration:
containerUri: "123456789012.dkr.ecr.us-east-1.amazonaws.com/my-runtime:latest"
networkConfiguration:
securityGroups:
- sg-12345678
subnets:
- subnet-12345678
Cross-Account ECR Access Denied
Symptom
Runtime deployment succeeds, but the container fails to start with an error in CloudWatch Logs:
Failed to pull image: <account>.dkr.ecr.<region>.amazonaws.com/<repository>:latest!
Message: failed to resolve image: unexpected status from HEAD request to
https://<account>.dkr.ecr.<region>.amazonaws.com/v2/<repository>/manifests/latest: 403 Forbidden
Or you see errors like:
Error response from daemon: pull access denied for <account>.dkr.ecr.<region>.amazonaws.com/<repository>
Cause
The runtime is trying to pull a container image from an ECR repository in a different AWS account, but the ECR repository policy doesn't grant the runtime role permission to pull the image.
Example scenario: Runtime deployed in Account A, container image stored in ECR in Account B.
Solution
Add an ECR repository policy in the source account (Account B) to grant the runtime role access. Check Cross-Account ECR Access in README.