Amazon Bedrock AgentCore is in preview release and is subject to change.
Deploy A2A servers in AgentCore Runtime
Amazon Bedrock AgentCore AgentCore Runtime lets you deploy and run Agent-to-Agent (A2A) servers in the AgentCore Runtime. This guide walks you through creating, testing, and deploying your first A2A server.
In this section, you learn:
How Amazon Bedrock AgentCore supports A2A
-
How to create an A2A server with agent capabilities
-
How to test your server locally
-
How to deploy your server to AWS
-
How to invoke your deployed server
-
How to retrieve agent cards for discovery
How Amazon Bedrock AgentCore supports A2A
Amazon Bedrock AgentCore's A2A protocol support enables seamless integration with A2A servers by acting as a transparent proxy layer. When configured for A2A, Amazon Bedrock AgentCore expects containers to run stateless, streamable HTTP servers on port 9000 at the root path (0.0.0.0:9000/), which aligns perfectly with default A2A server configuration.
The service provides enterprise-grade session isolation while maintaining protocol
transparency - JSON-RPC payloads from the InvokeAgentRuntime
API are passed
through directly to the A2A container without modification. This architecture preserves
the standard A2A protocol features like built-in agent discovery through Agent Cards at
/.well-known/agent-card.json and JSON-RPC communication, while adding enterprise
authentication (SigV4/OAuth 2.0) and scalability.
The key differentiators from other protocols are the port (9000 vs 8080 for HTTP), mount path (/ vs /invocations), and the standardized agent discovery mechanism, making Amazon Bedrock AgentCore an ideal deployment platform for A2A agents in production environments.
Key differences from other protocols:
- Port
-
A2A servers run on port 9000 (vs 8080 for HTTP, 8000 for MCP)
- Path
-
A2A servers are mounted at
/
(vs/invocations
for HTTP,/mcp
for MCP) - Agent Cards
-
A2A provides built-in agent discovery through Agent Cards at
/.well-known/agent-card.json
- Protocol
-
Uses JSON-RPC for agent-to-agent communication
- Authentication
-
Supports both SigV4 and OAuth 2.0 authentication schemes
For more information, see https://a2a-protocol.org/
Using A2A with AgentCore Runtime
In this tutorial you create, test, and deploy an A2A server.
Topics
Prerequisites
-
Python 3.10 or higher installed and basic understanding of Python
-
An AWS account with appropriate permissions and local credentials configured
-
Understanding of the A2A protocol and agent-to-agent communication concepts
Step 1: Create your A2A server
We are showing an example with strands, but you can use other ways to build with A2A.
Install required packages
First, install the required packages for A2A:
pip install strands-agents[a2a] pip install bedrock-agentcore pip install strands-agents-tools
Create your first A2A server
Create a new file called my_a2a_server.py
:
import logging import os from strands_tools.calculator import calculator from strands import Agent from strands.multiagent.a2a import A2AServer import uvicorn from fastapi import FastAPI logging.basicConfig(level=logging.INFO) # Use the complete runtime URL from environment variable, fallback to local runtime_url = os.environ.get('AGENTCORE_RUNTIME_URL', 'http://127.0.0.1:9000/') logging.info(f"Runtime URL: {runtime_url}") strands_agent = Agent( name="Calculator Agent", description="A calculator agent that can perform basic arithmetic operations.", tools=[calculator], callback_handler=None ) host, port = "0.0.0.0", 9000 # Pass runtime_url to http_url parameter AND use serve_at_root=True a2a_server = A2AServer( agent=strands_agent, http_url=runtime_url, serve_at_root=True # Serves locally at root (/) regardless of remote URL path complexity ) app = FastAPI() @app.get("/ping") def ping(): return {"status": "healthy"} app.mount("/", a2a_server.to_fastapi_app()) if __name__ == "__main__": uvicorn.run(app, host=host, port=port)
Understanding the code
- Strands Agent
-
Creates an agent with specific tools and capabilities
- A2AServer
-
Wraps the agent to provide A2A protocol compatibility
- Agent Card URL
-
Dynamically constructs the correct URL based on deployment context using the
AGENTCORE_RUNTIME_URL
environment variable - Port 9000
-
A2A servers run on port 9000 by default in AgentCore Runtime
Step 2: Test your A2A server locally
Run and test your A2A server in a local development environment.
Start your A2A server
Run your A2A server locally:
python my_a2a_server.py
You should see output indicating the server is running on port
9000
.
Invoke agent
curl -X POST http://0.0.0.0:9000 \ -H "Content-Type: application/json" \ -d '{ "jsonrpc": "2.0", "id": "req-001", "method": "message/send", "params": { "message": { "role": "user", "parts": [ { "kind": "text", "text": "what is 101 * 11?" } ], "messageId": "12345678-1234-1234-1234-123456789012" } } }' | jq .
Test agent card retrieval
You can test the agent card endpoint locally:
curl http://localhost:9000/.well-known/agent-card.json | jq .
You can also test your deployed server using the A2A Inspector as described in
Remote testing with A2A inspector
Step 3: Deploy your A2A server to Bedrock AgentCore Runtime
Deploy your A2A server to AWS using the Amazon Bedrock AgentCore starter toolkit.
Install deployment tools
Install the Amazon Bedrock AgentCore starter toolkit:
pip install bedrock-agentcore-starter-toolkit
Start by creating a project folder with the following structure:
## Project Folder Structure your_project_directory/ ├── a2a_server.py # Your main agent code ├── requirements.txt # Dependencies for your agent
Create a new file called requirements.txt
, add the
following to it:
strands-agents[a2a] bedrock-agentcore strands-agents-tools
Set up Cognito user pool for authentication
Configure authentication for secure access to your deployed server. For detailed Cognito setup instructions, see Set up Cognito user pool for authentication. This provides the OAuth tokens required for secure access to your deployed server.
Configure your A2A server for deployment
After setting up authentication, create the deployment configuration:
agentcore configure -e my_a2a_server.py --protocol A2A
-
Select protocol as A2A
-
Configure with OAuth configuration as setup in the previous step
Deploy to AWS
Deploy your agent:
agentcore launch
After deployment, you'll receive an agent runtime ARN that looks like:
arn:aws:bedrock-agentcore:us-west-2:accountId:runtime/my_a2a_server-xyz123
Step 4: Get the agent card
Agent Cards are JSON metadata documents that describe an A2A server's identity, capabilities, skills, service endpoint, and authentication requirements. They enable automatic agent discovery in the A2A ecosystem.
Set up environment variables
Set up environment variables
-
Export bearer token as an environment variable. For bearer token setup, see Bearer token setup.
export BEARER_TOKEN="<BEARER_TOKEN>"
-
Export the agent ARN.
export AGENT_ARN="arn:aws:bedrock-agentcore:us-west-2:accountId:runtime/my_a2a_server-xyz123"
Retrieve agent card
import os import json import requests from uuid import uuid4 from urllib.parse import quote def fetch_agent_card(): # Get environment variables agent_arn = os.environ.get('AGENT_ARN') bearer_token = os.environ.get('BEARER_TOKEN') if not agent_arn: print("Error: AGENT_ARN environment variable not set") return if not bearer_token: print("Error: BEARER_TOKEN environment variable not set") return # URL encode the agent ARN escaped_agent_arn = quote(agent_arn, safe='') # Construct the URL url = f"https://bedrock-agentcore.us-west-2.amazonaws.com/runtimes/{escaped_agent_arn}/invocations/.well-known/agent-card.json" # Generate a unique session ID session_id = str(uuid4()) print(f"Generated session ID: {session_id}") # Set headers headers = { 'Accept': '*/*', 'Authorization': f'Bearer {bearer_token}', 'X-Amzn-Bedrock-AgentCore-Runtime-Session-Id': session_id } try: # Make the request response = requests.get(url, headers=headers) response.raise_for_status() # Parse and pretty print JSON agent_card = response.json() print(json.dumps(agent_card, indent=2)) return agent_card except requests.exceptions.RequestException as e: print(f"Error fetching agent card: {e}") return None if __name__ == "__main__": fetch_agent_card()
After you get the URL from the Agent Card, export AGENTCORE_RUNTIME_URL
as an environment variable:
export AGENTCORE_RUNTIME_URL="https://bedrock-agentcore.us-west-2.amazonaws.com/runtimes/<ARN>/invocations/"
Step 5: Invoke your deployed A2A server
Create client code to invoke your deployed Amazon Bedrock AgentCore A2A server and send messages to test the functionality.
Create a new file my_a2a_client_remote.py
to invoke your deployed A2A server:
import asyncio import logging import os from uuid import uuid4 import httpx from a2a.client import A2ACardResolver, ClientConfig, ClientFactory from a2a.types import Message, Part, Role, TextPart logging.basicConfig(level=logging.INFO) logger = logging.getLogger(__name__) DEFAULT_TIMEOUT = 300 # set request timeout to 5 minutes def create_message(*, role: Role = Role.user, text: str) -> Message: return Message( kind="message", role=role, parts=[Part(TextPart(kind="text", text=text))], message_id=uuid4().hex, ) async def send_sync_message(message: str): # Get runtime URL from environment variable runtime_url = os.environ.get('AGENTCORE_RUNTIME_URL') # Generate a unique session ID session_id = str(uuid4()) print(f"Generated session ID: {session_id}") # Add authentication headers for Amazon Bedrock AgentCore headers = {"Authorization": f"Bearer {os.environ.get('BEARER_TOKEN')}", 'X-Amzn-Bedrock-AgentCore-Runtime-Session-Id': session_id} async with httpx.AsyncClient(timeout=DEFAULT_TIMEOUT, headers=headers) as httpx_client: # Get agent card from the runtime URL resolver = A2ACardResolver(httpx_client=httpx_client, base_url=runtime_url) agent_card = await resolver.get_agent_card() # Agent card contains the correct URL (same as runtime_url in this case) # No manual override needed - this is the path-based mounting pattern # Create client using factory config = ClientConfig( httpx_client=httpx_client, streaming=False, # Use non-streaming mode for sync response ) factory = ClientFactory(config) client = factory.create(agent_card) # Create and send message msg = create_message(text=message) # With streaming=False, this will yield exactly one result async for event in client.send_message(msg): if isinstance(event, Message): logger.info(event.model_dump_json(exclude_none=True, indent=2)) return event elif isinstance(event, tuple) and len(event) == 2: # (Task, UpdateEvent) tuple task, update_event = event logger.info(f"Task: {task.model_dump_json(exclude_none=True, indent=2)}") if update_event: logger.info(f"Update: {update_event.model_dump_json(exclude_none=True, indent=2)}") return task else: # Fallback for other response types logger.info(f"Response: {str(event)}") return event # Usage - Uses AGENTCORE_RUNTIME_URL environment variable asyncio.run(send_sync_message("what is 101 * 11"))
Appendix
Set up Cognito user pool for authentication
For detailed Cognito setup instructions, see Set up Cognito user pool for authentication in the MCP documentation.
Remote testing with A2A inspector
See https://github.com/a2aproject/a2a-inspector
Troubleshooting
Common A2A-specific issues
The following are common issues you might encounter:
- Port conflicts
-
A2A servers must run on port 9000 in the AgentCore Runtime environment
- JSON-RPC errors
-
Check that your client is sending properly formatted JSON-RPC 2.0 messages
- Authorization method mismatch
-
Make sure your request uses the same authentication method (OAuth or SigV4) that the agent was configured with
Exception handling
A2A specifications for Error handling: https://a2a-protocol.org/latest/specification/#81-standard-json-rpc-errors
A2A servers return errors as standard JSON-RPC error responses with HTTP 200 status codes. Internal Runtime errors are automatically translated to JSON-RPC internal errors to maintain protocol compliance.
The service now provides proper A2A-compliant error responses with standardized JSON-RPC error codes:
JSON-RPC Error Code | Runtime Exception | HTTP Error Code | JSON-RPC Error Message |
---|---|---|---|
N/A | AccessDeniedException |
403 | N/A |
-32501 | ResourceNotFoundException |
404 | Resource not found – Requested resource does not exist |
-32502 | ValidationException |
400 | Validation error – Invalid request data |
-32503 | ThrottlingException |
429 | Rate limit exceeded – Too many requests |
-32503 | ServiceQuotaExceededException |
429 | Rate limit exceeded – Too many requests |
-32504 | ResourceConflictException |
409 | Resource conflict – Resource already exists |
-32505 | RuntimeClientError |
424 | Runtime client error – Check your CloudWatch logs for more information. |