@Generated(value="com.amazonaws:aws-java-sdk-code-generator") public class OutputDataConfig extends Object implements Serializable, Cloneable, StructuredPojo
Provides information about how to store model training results (model artifacts).
Constructor and Description |
---|
OutputDataConfig() |
Modifier and Type | Method and Description |
---|---|
OutputDataConfig |
clone() |
boolean |
equals(Object obj) |
String |
getKmsKeyId()
The AWS Key Management Service (AWS KMS) key that Amazon SageMaker uses to encrypt the model artifacts at rest
using Amazon S3 server-side encryption.
|
String |
getS3OutputPath()
Identifies the S3 path where you want Amazon SageMaker to store the model artifacts.
|
int |
hashCode() |
void |
marshall(ProtocolMarshaller protocolMarshaller)
Marshalls this structured data using the given
ProtocolMarshaller . |
void |
setKmsKeyId(String kmsKeyId)
The AWS Key Management Service (AWS KMS) key that Amazon SageMaker uses to encrypt the model artifacts at rest
using Amazon S3 server-side encryption.
|
void |
setS3OutputPath(String s3OutputPath)
Identifies the S3 path where you want Amazon SageMaker to store the model artifacts.
|
String |
toString()
Returns a string representation of this object.
|
OutputDataConfig |
withKmsKeyId(String kmsKeyId)
The AWS Key Management Service (AWS KMS) key that Amazon SageMaker uses to encrypt the model artifacts at rest
using Amazon S3 server-side encryption.
|
OutputDataConfig |
withS3OutputPath(String s3OutputPath)
Identifies the S3 path where you want Amazon SageMaker to store the model artifacts.
|
public void setKmsKeyId(String kmsKeyId)
The AWS Key Management Service (AWS KMS) key that Amazon SageMaker uses to encrypt the model artifacts at rest
using Amazon S3 server-side encryption. The KmsKeyId
can be any of the following formats:
// KMS Key ID
"1234abcd-12ab-34cd-56ef-1234567890ab"
// Amazon Resource Name (ARN) of a KMS Key
"arn:aws:kms:us-west-2:111122223333:key/1234abcd-12ab-34cd-56ef-1234567890ab"
// KMS Key Alias
"alias/ExampleAlias"
// Amazon Resource Name (ARN) of a KMS Key Alias
"arn:aws:kms:us-west-2:111122223333:alias/ExampleAlias"
If you use a KMS key ID or an alias of your master key, the Amazon SageMaker execution role must include
permissions to call kms:Encrypt
. If you don't provide a KMS key ID, Amazon SageMaker uses the
default KMS key for Amazon S3 for your role's account. Amazon SageMaker uses server-side encryption with
KMS-managed keys for OutputDataConfig
. If you use a bucket policy with an s3:PutObject
permission that only allows objects with server-side encryption, set the condition key of
s3:x-amz-server-side-encryption
to "aws:kms"
. For more information, see KMS-Managed Encryption
Keys in the Amazon Simple Storage Service Developer Guide.
The KMS key policy must grant permission to the IAM role that you specify in your CreateTrainingJob
,
CreateTransformJob
, or CreateHyperParameterTuningJob
requests. For more information,
see Using Key Policies in AWS
KMS in the AWS Key Management Service Developer Guide.
kmsKeyId
- The AWS Key Management Service (AWS KMS) key that Amazon SageMaker uses to encrypt the model artifacts at
rest using Amazon S3 server-side encryption. The KmsKeyId
can be any of the following
formats:
// KMS Key ID
"1234abcd-12ab-34cd-56ef-1234567890ab"
// Amazon Resource Name (ARN) of a KMS Key
"arn:aws:kms:us-west-2:111122223333:key/1234abcd-12ab-34cd-56ef-1234567890ab"
// KMS Key Alias
"alias/ExampleAlias"
// Amazon Resource Name (ARN) of a KMS Key Alias
"arn:aws:kms:us-west-2:111122223333:alias/ExampleAlias"
If you use a KMS key ID or an alias of your master key, the Amazon SageMaker execution role must include
permissions to call kms:Encrypt
. If you don't provide a KMS key ID, Amazon SageMaker uses the
default KMS key for Amazon S3 for your role's account. Amazon SageMaker uses server-side encryption with
KMS-managed keys for OutputDataConfig
. If you use a bucket policy with an
s3:PutObject
permission that only allows objects with server-side encryption, set the
condition key of s3:x-amz-server-side-encryption
to "aws:kms"
. For more
information, see KMS-Managed
Encryption Keys in the Amazon Simple Storage Service Developer Guide.
The KMS key policy must grant permission to the IAM role that you specify in your
CreateTrainingJob
, CreateTransformJob
, or
CreateHyperParameterTuningJob
requests. For more information, see Using Key Policies in AWS
KMS in the AWS Key Management Service Developer Guide.
public String getKmsKeyId()
The AWS Key Management Service (AWS KMS) key that Amazon SageMaker uses to encrypt the model artifacts at rest
using Amazon S3 server-side encryption. The KmsKeyId
can be any of the following formats:
// KMS Key ID
"1234abcd-12ab-34cd-56ef-1234567890ab"
// Amazon Resource Name (ARN) of a KMS Key
"arn:aws:kms:us-west-2:111122223333:key/1234abcd-12ab-34cd-56ef-1234567890ab"
// KMS Key Alias
"alias/ExampleAlias"
// Amazon Resource Name (ARN) of a KMS Key Alias
"arn:aws:kms:us-west-2:111122223333:alias/ExampleAlias"
If you use a KMS key ID or an alias of your master key, the Amazon SageMaker execution role must include
permissions to call kms:Encrypt
. If you don't provide a KMS key ID, Amazon SageMaker uses the
default KMS key for Amazon S3 for your role's account. Amazon SageMaker uses server-side encryption with
KMS-managed keys for OutputDataConfig
. If you use a bucket policy with an s3:PutObject
permission that only allows objects with server-side encryption, set the condition key of
s3:x-amz-server-side-encryption
to "aws:kms"
. For more information, see KMS-Managed Encryption
Keys in the Amazon Simple Storage Service Developer Guide.
The KMS key policy must grant permission to the IAM role that you specify in your CreateTrainingJob
,
CreateTransformJob
, or CreateHyperParameterTuningJob
requests. For more information,
see Using Key Policies in AWS
KMS in the AWS Key Management Service Developer Guide.
KmsKeyId
can be any of the following
formats:
// KMS Key ID
"1234abcd-12ab-34cd-56ef-1234567890ab"
// Amazon Resource Name (ARN) of a KMS Key
"arn:aws:kms:us-west-2:111122223333:key/1234abcd-12ab-34cd-56ef-1234567890ab"
// KMS Key Alias
"alias/ExampleAlias"
// Amazon Resource Name (ARN) of a KMS Key Alias
"arn:aws:kms:us-west-2:111122223333:alias/ExampleAlias"
If you use a KMS key ID or an alias of your master key, the Amazon SageMaker execution role must include
permissions to call kms:Encrypt
. If you don't provide a KMS key ID, Amazon SageMaker uses
the default KMS key for Amazon S3 for your role's account. Amazon SageMaker uses server-side encryption
with KMS-managed keys for OutputDataConfig
. If you use a bucket policy with an
s3:PutObject
permission that only allows objects with server-side encryption, set the
condition key of s3:x-amz-server-side-encryption
to "aws:kms"
. For more
information, see KMS-Managed
Encryption Keys in the Amazon Simple Storage Service Developer Guide.
The KMS key policy must grant permission to the IAM role that you specify in your
CreateTrainingJob
, CreateTransformJob
, or
CreateHyperParameterTuningJob
requests. For more information, see Using Key Policies in AWS
KMS in the AWS Key Management Service Developer Guide.
public OutputDataConfig withKmsKeyId(String kmsKeyId)
The AWS Key Management Service (AWS KMS) key that Amazon SageMaker uses to encrypt the model artifacts at rest
using Amazon S3 server-side encryption. The KmsKeyId
can be any of the following formats:
// KMS Key ID
"1234abcd-12ab-34cd-56ef-1234567890ab"
// Amazon Resource Name (ARN) of a KMS Key
"arn:aws:kms:us-west-2:111122223333:key/1234abcd-12ab-34cd-56ef-1234567890ab"
// KMS Key Alias
"alias/ExampleAlias"
// Amazon Resource Name (ARN) of a KMS Key Alias
"arn:aws:kms:us-west-2:111122223333:alias/ExampleAlias"
If you use a KMS key ID or an alias of your master key, the Amazon SageMaker execution role must include
permissions to call kms:Encrypt
. If you don't provide a KMS key ID, Amazon SageMaker uses the
default KMS key for Amazon S3 for your role's account. Amazon SageMaker uses server-side encryption with
KMS-managed keys for OutputDataConfig
. If you use a bucket policy with an s3:PutObject
permission that only allows objects with server-side encryption, set the condition key of
s3:x-amz-server-side-encryption
to "aws:kms"
. For more information, see KMS-Managed Encryption
Keys in the Amazon Simple Storage Service Developer Guide.
The KMS key policy must grant permission to the IAM role that you specify in your CreateTrainingJob
,
CreateTransformJob
, or CreateHyperParameterTuningJob
requests. For more information,
see Using Key Policies in AWS
KMS in the AWS Key Management Service Developer Guide.
kmsKeyId
- The AWS Key Management Service (AWS KMS) key that Amazon SageMaker uses to encrypt the model artifacts at
rest using Amazon S3 server-side encryption. The KmsKeyId
can be any of the following
formats:
// KMS Key ID
"1234abcd-12ab-34cd-56ef-1234567890ab"
// Amazon Resource Name (ARN) of a KMS Key
"arn:aws:kms:us-west-2:111122223333:key/1234abcd-12ab-34cd-56ef-1234567890ab"
// KMS Key Alias
"alias/ExampleAlias"
// Amazon Resource Name (ARN) of a KMS Key Alias
"arn:aws:kms:us-west-2:111122223333:alias/ExampleAlias"
If you use a KMS key ID or an alias of your master key, the Amazon SageMaker execution role must include
permissions to call kms:Encrypt
. If you don't provide a KMS key ID, Amazon SageMaker uses the
default KMS key for Amazon S3 for your role's account. Amazon SageMaker uses server-side encryption with
KMS-managed keys for OutputDataConfig
. If you use a bucket policy with an
s3:PutObject
permission that only allows objects with server-side encryption, set the
condition key of s3:x-amz-server-side-encryption
to "aws:kms"
. For more
information, see KMS-Managed
Encryption Keys in the Amazon Simple Storage Service Developer Guide.
The KMS key policy must grant permission to the IAM role that you specify in your
CreateTrainingJob
, CreateTransformJob
, or
CreateHyperParameterTuningJob
requests. For more information, see Using Key Policies in AWS
KMS in the AWS Key Management Service Developer Guide.
public void setS3OutputPath(String s3OutputPath)
Identifies the S3 path where you want Amazon SageMaker to store the model artifacts. For example,
s3://bucket-name/key-name-prefix
.
s3OutputPath
- Identifies the S3 path where you want Amazon SageMaker to store the model artifacts. For example,
s3://bucket-name/key-name-prefix
.public String getS3OutputPath()
Identifies the S3 path where you want Amazon SageMaker to store the model artifacts. For example,
s3://bucket-name/key-name-prefix
.
s3://bucket-name/key-name-prefix
.public OutputDataConfig withS3OutputPath(String s3OutputPath)
Identifies the S3 path where you want Amazon SageMaker to store the model artifacts. For example,
s3://bucket-name/key-name-prefix
.
s3OutputPath
- Identifies the S3 path where you want Amazon SageMaker to store the model artifacts. For example,
s3://bucket-name/key-name-prefix
.public String toString()
toString
in class Object
Object.toString()
public OutputDataConfig clone()
public void marshall(ProtocolMarshaller protocolMarshaller)
StructuredPojo
ProtocolMarshaller
.marshall
in interface StructuredPojo
protocolMarshaller
- Implementation of ProtocolMarshaller
used to marshall this object's data.