@Generated(value="com.amazonaws:aws-java-sdk-code-generator") public class OutputDataConfig extends Object implements Serializable, Cloneable, StructuredPojo
Provides information about how to store model training results (model artifacts).
| Constructor and Description | 
|---|
OutputDataConfig()  | 
| Modifier and Type | Method and Description | 
|---|---|
OutputDataConfig | 
clone()  | 
boolean | 
equals(Object obj)  | 
String | 
getKmsKeyId()
 The Amazon Web Services Key Management Service (Amazon Web Services KMS) key that SageMaker uses to encrypt the
 model artifacts at rest using Amazon S3 server-side encryption. 
 | 
String | 
getS3OutputPath()
 Identifies the S3 path where you want SageMaker to store the model artifacts. 
 | 
int | 
hashCode()  | 
void | 
marshall(ProtocolMarshaller protocolMarshaller)
Marshalls this structured data using the given  
ProtocolMarshaller. | 
void | 
setKmsKeyId(String kmsKeyId)
 The Amazon Web Services Key Management Service (Amazon Web Services KMS) key that SageMaker uses to encrypt the
 model artifacts at rest using Amazon S3 server-side encryption. 
 | 
void | 
setS3OutputPath(String s3OutputPath)
 Identifies the S3 path where you want SageMaker to store the model artifacts. 
 | 
String | 
toString()
Returns a string representation of this object. 
 | 
OutputDataConfig | 
withKmsKeyId(String kmsKeyId)
 The Amazon Web Services Key Management Service (Amazon Web Services KMS) key that SageMaker uses to encrypt the
 model artifacts at rest using Amazon S3 server-side encryption. 
 | 
OutputDataConfig | 
withS3OutputPath(String s3OutputPath)
 Identifies the S3 path where you want SageMaker to store the model artifacts. 
 | 
public void setKmsKeyId(String kmsKeyId)
 The Amazon Web Services Key Management Service (Amazon Web Services KMS) key that SageMaker uses to encrypt the
 model artifacts at rest using Amazon S3 server-side encryption. The KmsKeyId can be any of the
 following formats:
 
// KMS Key ID
 "1234abcd-12ab-34cd-56ef-1234567890ab"
 
// Amazon Resource Name (ARN) of a KMS Key
 "arn:aws:kms:us-west-2:111122223333:key/1234abcd-12ab-34cd-56ef-1234567890ab"
 
// KMS Key Alias
 "alias/ExampleAlias"
 
// Amazon Resource Name (ARN) of a KMS Key Alias
 "arn:aws:kms:us-west-2:111122223333:alias/ExampleAlias"
 
 If you use a KMS key ID or an alias of your KMS key, the SageMaker execution role must include permissions to
 call kms:Encrypt. If you don't provide a KMS key ID, SageMaker uses the default KMS key for Amazon
 S3 for your role's account. SageMaker uses server-side encryption with KMS-managed keys for
 OutputDataConfig. If you use a bucket policy with an s3:PutObject permission that only
 allows objects with server-side encryption, set the condition key of s3:x-amz-server-side-encryption
 to "aws:kms". For more information, see KMS-Managed Encryption
 Keys in the Amazon Simple Storage Service Developer Guide.
 
 The KMS key policy must grant permission to the IAM role that you specify in your CreateTrainingJob,
 CreateTransformJob, or CreateHyperParameterTuningJob requests. For more information,
 see Using Key Policies in
 Amazon Web Services KMS in the Amazon Web Services Key Management Service Developer Guide.
 
kmsKeyId - The Amazon Web Services Key Management Service (Amazon Web Services KMS) key that SageMaker uses to
        encrypt the model artifacts at rest using Amazon S3 server-side encryption. The KmsKeyId can
        be any of the following formats: 
        // KMS Key ID
        "1234abcd-12ab-34cd-56ef-1234567890ab"
        
// Amazon Resource Name (ARN) of a KMS Key
        "arn:aws:kms:us-west-2:111122223333:key/1234abcd-12ab-34cd-56ef-1234567890ab"
        
// KMS Key Alias
        "alias/ExampleAlias"
        
// Amazon Resource Name (ARN) of a KMS Key Alias
        "arn:aws:kms:us-west-2:111122223333:alias/ExampleAlias"
        
        If you use a KMS key ID or an alias of your KMS key, the SageMaker execution role must include permissions
        to call kms:Encrypt. If you don't provide a KMS key ID, SageMaker uses the default KMS key
        for Amazon S3 for your role's account. SageMaker uses server-side encryption with KMS-managed keys for
        OutputDataConfig. If you use a bucket policy with an s3:PutObject permission
        that only allows objects with server-side encryption, set the condition key of
        s3:x-amz-server-side-encryption to "aws:kms". For more information, see KMS-Managed
        Encryption Keys in the Amazon Simple Storage Service Developer Guide.
        
        The KMS key policy must grant permission to the IAM role that you specify in your
        CreateTrainingJob, CreateTransformJob, or
        CreateHyperParameterTuningJob requests. For more information, see Using Key Policies in
        Amazon Web Services KMS in the Amazon Web Services Key Management Service Developer Guide.
public String getKmsKeyId()
 The Amazon Web Services Key Management Service (Amazon Web Services KMS) key that SageMaker uses to encrypt the
 model artifacts at rest using Amazon S3 server-side encryption. The KmsKeyId can be any of the
 following formats:
 
// KMS Key ID
 "1234abcd-12ab-34cd-56ef-1234567890ab"
 
// Amazon Resource Name (ARN) of a KMS Key
 "arn:aws:kms:us-west-2:111122223333:key/1234abcd-12ab-34cd-56ef-1234567890ab"
 
// KMS Key Alias
 "alias/ExampleAlias"
 
// Amazon Resource Name (ARN) of a KMS Key Alias
 "arn:aws:kms:us-west-2:111122223333:alias/ExampleAlias"
 
 If you use a KMS key ID or an alias of your KMS key, the SageMaker execution role must include permissions to
 call kms:Encrypt. If you don't provide a KMS key ID, SageMaker uses the default KMS key for Amazon
 S3 for your role's account. SageMaker uses server-side encryption with KMS-managed keys for
 OutputDataConfig. If you use a bucket policy with an s3:PutObject permission that only
 allows objects with server-side encryption, set the condition key of s3:x-amz-server-side-encryption
 to "aws:kms". For more information, see KMS-Managed Encryption
 Keys in the Amazon Simple Storage Service Developer Guide.
 
 The KMS key policy must grant permission to the IAM role that you specify in your CreateTrainingJob,
 CreateTransformJob, or CreateHyperParameterTuningJob requests. For more information,
 see Using Key Policies in
 Amazon Web Services KMS in the Amazon Web Services Key Management Service Developer Guide.
 
KmsKeyId can
         be any of the following formats: 
         // KMS Key ID
         "1234abcd-12ab-34cd-56ef-1234567890ab"
         
// Amazon Resource Name (ARN) of a KMS Key
         "arn:aws:kms:us-west-2:111122223333:key/1234abcd-12ab-34cd-56ef-1234567890ab"
         
// KMS Key Alias
         "alias/ExampleAlias"
         
// Amazon Resource Name (ARN) of a KMS Key Alias
         "arn:aws:kms:us-west-2:111122223333:alias/ExampleAlias"
         
         If you use a KMS key ID or an alias of your KMS key, the SageMaker execution role must include
         permissions to call kms:Encrypt. If you don't provide a KMS key ID, SageMaker uses the
         default KMS key for Amazon S3 for your role's account. SageMaker uses server-side encryption with
         KMS-managed keys for OutputDataConfig. If you use a bucket policy with an
         s3:PutObject permission that only allows objects with server-side encryption, set the
         condition key of s3:x-amz-server-side-encryption to "aws:kms". For more
         information, see KMS-Managed
         Encryption Keys in the Amazon Simple Storage Service Developer Guide.
         
         The KMS key policy must grant permission to the IAM role that you specify in your
         CreateTrainingJob, CreateTransformJob, or
         CreateHyperParameterTuningJob requests. For more information, see Using Key Policies in
         Amazon Web Services KMS in the Amazon Web Services Key Management Service Developer Guide.
public OutputDataConfig withKmsKeyId(String kmsKeyId)
 The Amazon Web Services Key Management Service (Amazon Web Services KMS) key that SageMaker uses to encrypt the
 model artifacts at rest using Amazon S3 server-side encryption. The KmsKeyId can be any of the
 following formats:
 
// KMS Key ID
 "1234abcd-12ab-34cd-56ef-1234567890ab"
 
// Amazon Resource Name (ARN) of a KMS Key
 "arn:aws:kms:us-west-2:111122223333:key/1234abcd-12ab-34cd-56ef-1234567890ab"
 
// KMS Key Alias
 "alias/ExampleAlias"
 
// Amazon Resource Name (ARN) of a KMS Key Alias
 "arn:aws:kms:us-west-2:111122223333:alias/ExampleAlias"
 
 If you use a KMS key ID or an alias of your KMS key, the SageMaker execution role must include permissions to
 call kms:Encrypt. If you don't provide a KMS key ID, SageMaker uses the default KMS key for Amazon
 S3 for your role's account. SageMaker uses server-side encryption with KMS-managed keys for
 OutputDataConfig. If you use a bucket policy with an s3:PutObject permission that only
 allows objects with server-side encryption, set the condition key of s3:x-amz-server-side-encryption
 to "aws:kms". For more information, see KMS-Managed Encryption
 Keys in the Amazon Simple Storage Service Developer Guide.
 
 The KMS key policy must grant permission to the IAM role that you specify in your CreateTrainingJob,
 CreateTransformJob, or CreateHyperParameterTuningJob requests. For more information,
 see Using Key Policies in
 Amazon Web Services KMS in the Amazon Web Services Key Management Service Developer Guide.
 
kmsKeyId - The Amazon Web Services Key Management Service (Amazon Web Services KMS) key that SageMaker uses to
        encrypt the model artifacts at rest using Amazon S3 server-side encryption. The KmsKeyId can
        be any of the following formats: 
        // KMS Key ID
        "1234abcd-12ab-34cd-56ef-1234567890ab"
        
// Amazon Resource Name (ARN) of a KMS Key
        "arn:aws:kms:us-west-2:111122223333:key/1234abcd-12ab-34cd-56ef-1234567890ab"
        
// KMS Key Alias
        "alias/ExampleAlias"
        
// Amazon Resource Name (ARN) of a KMS Key Alias
        "arn:aws:kms:us-west-2:111122223333:alias/ExampleAlias"
        
        If you use a KMS key ID or an alias of your KMS key, the SageMaker execution role must include permissions
        to call kms:Encrypt. If you don't provide a KMS key ID, SageMaker uses the default KMS key
        for Amazon S3 for your role's account. SageMaker uses server-side encryption with KMS-managed keys for
        OutputDataConfig. If you use a bucket policy with an s3:PutObject permission
        that only allows objects with server-side encryption, set the condition key of
        s3:x-amz-server-side-encryption to "aws:kms". For more information, see KMS-Managed
        Encryption Keys in the Amazon Simple Storage Service Developer Guide.
        
        The KMS key policy must grant permission to the IAM role that you specify in your
        CreateTrainingJob, CreateTransformJob, or
        CreateHyperParameterTuningJob requests. For more information, see Using Key Policies in
        Amazon Web Services KMS in the Amazon Web Services Key Management Service Developer Guide.
public void setS3OutputPath(String s3OutputPath)
 Identifies the S3 path where you want SageMaker to store the model artifacts. For example,
 s3://bucket-name/key-name-prefix.
 
s3OutputPath - Identifies the S3 path where you want SageMaker to store the model artifacts. For example,
        s3://bucket-name/key-name-prefix.public String getS3OutputPath()
 Identifies the S3 path where you want SageMaker to store the model artifacts. For example,
 s3://bucket-name/key-name-prefix.
 
s3://bucket-name/key-name-prefix.public OutputDataConfig withS3OutputPath(String s3OutputPath)
 Identifies the S3 path where you want SageMaker to store the model artifacts. For example,
 s3://bucket-name/key-name-prefix.
 
s3OutputPath - Identifies the S3 path where you want SageMaker to store the model artifacts. For example,
        s3://bucket-name/key-name-prefix.public String toString()
toString in class ObjectObject.toString()public OutputDataConfig clone()
public void marshall(ProtocolMarshaller protocolMarshaller)
StructuredPojoProtocolMarshaller.marshall in interface StructuredPojoprotocolMarshaller - Implementation of ProtocolMarshaller used to marshall this object's data.