Struct aws_sdk_sagemaker::types::OutputDataConfig
source · #[non_exhaustive]pub struct OutputDataConfig {
pub kms_key_id: Option<String>,
pub s3_output_path: Option<String>,
pub compression_type: Option<OutputCompressionType>,
}Expand description
Provides information about how to store model training results (model artifacts).
Fields (Non-exhaustive)§
This struct is marked as non-exhaustive
Struct { .. } syntax; cannot be matched against without a wildcard ..; and struct update syntax will not work.kms_key_id: Option<String>The Amazon Web Services Key Management Service (Amazon Web Services KMS) key that SageMaker uses to encrypt the model artifacts at rest using Amazon S3 server-side encryption. The KmsKeyId can be any of the following formats:
-
// KMS Key ID
"1234abcd-12ab-34cd-56ef-1234567890ab" -
// Amazon Resource Name (ARN) of a KMS Key
"arn:aws:kms:us-west-2:111122223333:key/1234abcd-12ab-34cd-56ef-1234567890ab" -
// KMS Key Alias
"alias/ExampleAlias" -
// Amazon Resource Name (ARN) of a KMS Key Alias
"arn:aws:kms:us-west-2:111122223333:alias/ExampleAlias"
If you use a KMS key ID or an alias of your KMS key, the SageMaker execution role must include permissions to call kms:Encrypt. If you don't provide a KMS key ID, SageMaker uses the default KMS key for Amazon S3 for your role's account. SageMaker uses server-side encryption with KMS-managed keys for OutputDataConfig. If you use a bucket policy with an s3:PutObject permission that only allows objects with server-side encryption, set the condition key of s3:x-amz-server-side-encryption to "aws:kms". For more information, see KMS-Managed Encryption Keys in the Amazon Simple Storage Service Developer Guide.
The KMS key policy must grant permission to the IAM role that you specify in your CreateTrainingJob, CreateTransformJob, or CreateHyperParameterTuningJob requests. For more information, see Using Key Policies in Amazon Web Services KMS in the Amazon Web Services Key Management Service Developer Guide.
s3_output_path: Option<String>Identifies the S3 path where you want SageMaker to store the model artifacts. For example, s3://bucket-name/key-name-prefix.
compression_type: Option<OutputCompressionType>The model output compression type. Select None to output an uncompressed model, recommended for large model outputs. Defaults to gzip.
Implementations§
source§impl OutputDataConfig
impl OutputDataConfig
sourcepub fn kms_key_id(&self) -> Option<&str>
pub fn kms_key_id(&self) -> Option<&str>
The Amazon Web Services Key Management Service (Amazon Web Services KMS) key that SageMaker uses to encrypt the model artifacts at rest using Amazon S3 server-side encryption. The KmsKeyId can be any of the following formats:
-
// KMS Key ID
"1234abcd-12ab-34cd-56ef-1234567890ab" -
// Amazon Resource Name (ARN) of a KMS Key
"arn:aws:kms:us-west-2:111122223333:key/1234abcd-12ab-34cd-56ef-1234567890ab" -
// KMS Key Alias
"alias/ExampleAlias" -
// Amazon Resource Name (ARN) of a KMS Key Alias
"arn:aws:kms:us-west-2:111122223333:alias/ExampleAlias"
If you use a KMS key ID or an alias of your KMS key, the SageMaker execution role must include permissions to call kms:Encrypt. If you don't provide a KMS key ID, SageMaker uses the default KMS key for Amazon S3 for your role's account. SageMaker uses server-side encryption with KMS-managed keys for OutputDataConfig. If you use a bucket policy with an s3:PutObject permission that only allows objects with server-side encryption, set the condition key of s3:x-amz-server-side-encryption to "aws:kms". For more information, see KMS-Managed Encryption Keys in the Amazon Simple Storage Service Developer Guide.
The KMS key policy must grant permission to the IAM role that you specify in your CreateTrainingJob, CreateTransformJob, or CreateHyperParameterTuningJob requests. For more information, see Using Key Policies in Amazon Web Services KMS in the Amazon Web Services Key Management Service Developer Guide.
sourcepub fn s3_output_path(&self) -> Option<&str>
pub fn s3_output_path(&self) -> Option<&str>
Identifies the S3 path where you want SageMaker to store the model artifacts. For example, s3://bucket-name/key-name-prefix.
sourcepub fn compression_type(&self) -> Option<&OutputCompressionType>
pub fn compression_type(&self) -> Option<&OutputCompressionType>
The model output compression type. Select None to output an uncompressed model, recommended for large model outputs. Defaults to gzip.
source§impl OutputDataConfig
impl OutputDataConfig
sourcepub fn builder() -> OutputDataConfigBuilder
pub fn builder() -> OutputDataConfigBuilder
Creates a new builder-style object to manufacture OutputDataConfig.
Trait Implementations§
source§impl Clone for OutputDataConfig
impl Clone for OutputDataConfig
source§fn clone(&self) -> OutputDataConfig
fn clone(&self) -> OutputDataConfig
1.0.0 · source§fn clone_from(&mut self, source: &Self)
fn clone_from(&mut self, source: &Self)
source. Read moresource§impl Debug for OutputDataConfig
impl Debug for OutputDataConfig
source§impl PartialEq for OutputDataConfig
impl PartialEq for OutputDataConfig
source§fn eq(&self, other: &OutputDataConfig) -> bool
fn eq(&self, other: &OutputDataConfig) -> bool
self and other values to be equal, and is used
by ==.