AWS SDK for C++  1.9.123
AWS SDK for C++
Public Member Functions | List of all members
Aws::SageMaker::Model::ProductionVariantCoreDumpConfig Class Reference

#include <ProductionVariantCoreDumpConfig.h>

Public Member Functions

 ProductionVariantCoreDumpConfig ()
 
 ProductionVariantCoreDumpConfig (Aws::Utils::Json::JsonView jsonValue)
 
ProductionVariantCoreDumpConfigoperator= (Aws::Utils::Json::JsonView jsonValue)
 
Aws::Utils::Json::JsonValue Jsonize () const
 
const Aws::StringGetDestinationS3Uri () const
 
bool DestinationS3UriHasBeenSet () const
 
void SetDestinationS3Uri (const Aws::String &value)
 
void SetDestinationS3Uri (Aws::String &&value)
 
void SetDestinationS3Uri (const char *value)
 
ProductionVariantCoreDumpConfigWithDestinationS3Uri (const Aws::String &value)
 
ProductionVariantCoreDumpConfigWithDestinationS3Uri (Aws::String &&value)
 
ProductionVariantCoreDumpConfigWithDestinationS3Uri (const char *value)
 
const Aws::StringGetKmsKeyId () const
 
bool KmsKeyIdHasBeenSet () const
 
void SetKmsKeyId (const Aws::String &value)
 
void SetKmsKeyId (Aws::String &&value)
 
void SetKmsKeyId (const char *value)
 
ProductionVariantCoreDumpConfigWithKmsKeyId (const Aws::String &value)
 
ProductionVariantCoreDumpConfigWithKmsKeyId (Aws::String &&value)
 
ProductionVariantCoreDumpConfigWithKmsKeyId (const char *value)
 

Detailed Description

Specifies configuration for a core dump from the model container when the process crashes.

See Also:

AWS API Reference

Definition at line 32 of file ProductionVariantCoreDumpConfig.h.

Constructor & Destructor Documentation

◆ ProductionVariantCoreDumpConfig() [1/2]

Aws::SageMaker::Model::ProductionVariantCoreDumpConfig::ProductionVariantCoreDumpConfig ( )

◆ ProductionVariantCoreDumpConfig() [2/2]

Aws::SageMaker::Model::ProductionVariantCoreDumpConfig::ProductionVariantCoreDumpConfig ( Aws::Utils::Json::JsonView  jsonValue)

Member Function Documentation

◆ DestinationS3UriHasBeenSet()

bool Aws::SageMaker::Model::ProductionVariantCoreDumpConfig::DestinationS3UriHasBeenSet ( ) const
inline

The Amazon S3 bucket to send the core dump to.

Definition at line 49 of file ProductionVariantCoreDumpConfig.h.

◆ GetDestinationS3Uri()

const Aws::String& Aws::SageMaker::Model::ProductionVariantCoreDumpConfig::GetDestinationS3Uri ( ) const
inline

The Amazon S3 bucket to send the core dump to.

Definition at line 44 of file ProductionVariantCoreDumpConfig.h.

◆ GetKmsKeyId()

const Aws::String& Aws::SageMaker::Model::ProductionVariantCoreDumpConfig::GetKmsKeyId ( ) const
inline

The Amazon Web Services Key Management Service (Amazon Web Services KMS) key that Amazon SageMaker uses to encrypt the core dump data at rest using Amazon S3 server-side encryption. The KmsKeyId can be any of the following formats:

  • // KMS Key ID

    "1234abcd-12ab-34cd-56ef-1234567890ab"

  • // Amazon Resource Name (ARN) of a KMS Key

    "arn:aws:kms:us-west-2:111122223333:key/1234abcd-12ab-34cd-56ef-1234567890ab"

  • // KMS Key Alias

    "alias/ExampleAlias"

  • // Amazon Resource Name (ARN) of a KMS Key Alias

    "arn:aws:kms:us-west-2:111122223333:alias/ExampleAlias"

If you use a KMS key ID or an alias of your KMS key, the Amazon SageMaker execution role must include permissions to call kms:Encrypt. If you don't provide a KMS key ID, Amazon SageMaker uses the default KMS key for Amazon S3 for your role's account. Amazon SageMaker uses server-side encryption with KMS-managed keys for OutputDataConfig. If you use a bucket policy with an s3:PutObject permission that only allows objects with server-side encryption, set the condition key of s3:x-amz-server-side-encryption to "aws:kms". For more information, see KMS-Managed Encryption Keys in the Amazon Simple Storage Service Developer Guide.

The KMS key policy must grant permission to the IAM role that you specify in your CreateEndpoint and UpdateEndpoint requests. For more information, see Using Key Policies in Amazon Web Services KMS in the Amazon Web Services Key Management Service Developer Guide.

Definition at line 112 of file ProductionVariantCoreDumpConfig.h.

◆ Jsonize()

Aws::Utils::Json::JsonValue Aws::SageMaker::Model::ProductionVariantCoreDumpConfig::Jsonize ( ) const

◆ KmsKeyIdHasBeenSet()

bool Aws::SageMaker::Model::ProductionVariantCoreDumpConfig::KmsKeyIdHasBeenSet ( ) const
inline

The Amazon Web Services Key Management Service (Amazon Web Services KMS) key that Amazon SageMaker uses to encrypt the core dump data at rest using Amazon S3 server-side encryption. The KmsKeyId can be any of the following formats:

  • // KMS Key ID

    "1234abcd-12ab-34cd-56ef-1234567890ab"

  • // Amazon Resource Name (ARN) of a KMS Key

    "arn:aws:kms:us-west-2:111122223333:key/1234abcd-12ab-34cd-56ef-1234567890ab"

  • // KMS Key Alias

    "alias/ExampleAlias"

  • // Amazon Resource Name (ARN) of a KMS Key Alias

    "arn:aws:kms:us-west-2:111122223333:alias/ExampleAlias"

If you use a KMS key ID or an alias of your KMS key, the Amazon SageMaker execution role must include permissions to call kms:Encrypt. If you don't provide a KMS key ID, Amazon SageMaker uses the default KMS key for Amazon S3 for your role's account. Amazon SageMaker uses server-side encryption with KMS-managed keys for OutputDataConfig. If you use a bucket policy with an s3:PutObject permission that only allows objects with server-side encryption, set the condition key of s3:x-amz-server-side-encryption to "aws:kms". For more information, see KMS-Managed Encryption Keys in the Amazon Simple Storage Service Developer Guide.

The KMS key policy must grant permission to the IAM role that you specify in your CreateEndpoint and UpdateEndpoint requests. For more information, see Using Key Policies in Amazon Web Services KMS in the Amazon Web Services Key Management Service Developer Guide.

Definition at line 144 of file ProductionVariantCoreDumpConfig.h.

◆ operator=()

ProductionVariantCoreDumpConfig& Aws::SageMaker::Model::ProductionVariantCoreDumpConfig::operator= ( Aws::Utils::Json::JsonView  jsonValue)

◆ SetDestinationS3Uri() [1/3]

void Aws::SageMaker::Model::ProductionVariantCoreDumpConfig::SetDestinationS3Uri ( Aws::String &&  value)
inline

The Amazon S3 bucket to send the core dump to.

Definition at line 59 of file ProductionVariantCoreDumpConfig.h.

◆ SetDestinationS3Uri() [2/3]

void Aws::SageMaker::Model::ProductionVariantCoreDumpConfig::SetDestinationS3Uri ( const Aws::String value)
inline

The Amazon S3 bucket to send the core dump to.

Definition at line 54 of file ProductionVariantCoreDumpConfig.h.

◆ SetDestinationS3Uri() [3/3]

void Aws::SageMaker::Model::ProductionVariantCoreDumpConfig::SetDestinationS3Uri ( const char *  value)
inline

The Amazon S3 bucket to send the core dump to.

Definition at line 64 of file ProductionVariantCoreDumpConfig.h.

◆ SetKmsKeyId() [1/3]

void Aws::SageMaker::Model::ProductionVariantCoreDumpConfig::SetKmsKeyId ( Aws::String &&  value)
inline

The Amazon Web Services Key Management Service (Amazon Web Services KMS) key that Amazon SageMaker uses to encrypt the core dump data at rest using Amazon S3 server-side encryption. The KmsKeyId can be any of the following formats:

  • // KMS Key ID

    "1234abcd-12ab-34cd-56ef-1234567890ab"

  • // Amazon Resource Name (ARN) of a KMS Key

    "arn:aws:kms:us-west-2:111122223333:key/1234abcd-12ab-34cd-56ef-1234567890ab"

  • // KMS Key Alias

    "alias/ExampleAlias"

  • // Amazon Resource Name (ARN) of a KMS Key Alias

    "arn:aws:kms:us-west-2:111122223333:alias/ExampleAlias"

If you use a KMS key ID or an alias of your KMS key, the Amazon SageMaker execution role must include permissions to call kms:Encrypt. If you don't provide a KMS key ID, Amazon SageMaker uses the default KMS key for Amazon S3 for your role's account. Amazon SageMaker uses server-side encryption with KMS-managed keys for OutputDataConfig. If you use a bucket policy with an s3:PutObject permission that only allows objects with server-side encryption, set the condition key of s3:x-amz-server-side-encryption to "aws:kms". For more information, see KMS-Managed Encryption Keys in the Amazon Simple Storage Service Developer Guide.

The KMS key policy must grant permission to the IAM role that you specify in your CreateEndpoint and UpdateEndpoint requests. For more information, see Using Key Policies in Amazon Web Services KMS in the Amazon Web Services Key Management Service Developer Guide.

Definition at line 208 of file ProductionVariantCoreDumpConfig.h.

◆ SetKmsKeyId() [2/3]

void Aws::SageMaker::Model::ProductionVariantCoreDumpConfig::SetKmsKeyId ( const Aws::String value)
inline

The Amazon Web Services Key Management Service (Amazon Web Services KMS) key that Amazon SageMaker uses to encrypt the core dump data at rest using Amazon S3 server-side encryption. The KmsKeyId can be any of the following formats:

  • // KMS Key ID

    "1234abcd-12ab-34cd-56ef-1234567890ab"

  • // Amazon Resource Name (ARN) of a KMS Key

    "arn:aws:kms:us-west-2:111122223333:key/1234abcd-12ab-34cd-56ef-1234567890ab"

  • // KMS Key Alias

    "alias/ExampleAlias"

  • // Amazon Resource Name (ARN) of a KMS Key Alias

    "arn:aws:kms:us-west-2:111122223333:alias/ExampleAlias"

If you use a KMS key ID or an alias of your KMS key, the Amazon SageMaker execution role must include permissions to call kms:Encrypt. If you don't provide a KMS key ID, Amazon SageMaker uses the default KMS key for Amazon S3 for your role's account. Amazon SageMaker uses server-side encryption with KMS-managed keys for OutputDataConfig. If you use a bucket policy with an s3:PutObject permission that only allows objects with server-side encryption, set the condition key of s3:x-amz-server-side-encryption to "aws:kms". For more information, see KMS-Managed Encryption Keys in the Amazon Simple Storage Service Developer Guide.

The KMS key policy must grant permission to the IAM role that you specify in your CreateEndpoint and UpdateEndpoint requests. For more information, see Using Key Policies in Amazon Web Services KMS in the Amazon Web Services Key Management Service Developer Guide.

Definition at line 176 of file ProductionVariantCoreDumpConfig.h.

◆ SetKmsKeyId() [3/3]

void Aws::SageMaker::Model::ProductionVariantCoreDumpConfig::SetKmsKeyId ( const char *  value)
inline

The Amazon Web Services Key Management Service (Amazon Web Services KMS) key that Amazon SageMaker uses to encrypt the core dump data at rest using Amazon S3 server-side encryption. The KmsKeyId can be any of the following formats:

  • // KMS Key ID

    "1234abcd-12ab-34cd-56ef-1234567890ab"

  • // Amazon Resource Name (ARN) of a KMS Key

    "arn:aws:kms:us-west-2:111122223333:key/1234abcd-12ab-34cd-56ef-1234567890ab"

  • // KMS Key Alias

    "alias/ExampleAlias"

  • // Amazon Resource Name (ARN) of a KMS Key Alias

    "arn:aws:kms:us-west-2:111122223333:alias/ExampleAlias"

If you use a KMS key ID or an alias of your KMS key, the Amazon SageMaker execution role must include permissions to call kms:Encrypt. If you don't provide a KMS key ID, Amazon SageMaker uses the default KMS key for Amazon S3 for your role's account. Amazon SageMaker uses server-side encryption with KMS-managed keys for OutputDataConfig. If you use a bucket policy with an s3:PutObject permission that only allows objects with server-side encryption, set the condition key of s3:x-amz-server-side-encryption to "aws:kms". For more information, see KMS-Managed Encryption Keys in the Amazon Simple Storage Service Developer Guide.

The KMS key policy must grant permission to the IAM role that you specify in your CreateEndpoint and UpdateEndpoint requests. For more information, see Using Key Policies in Amazon Web Services KMS in the Amazon Web Services Key Management Service Developer Guide.

Definition at line 240 of file ProductionVariantCoreDumpConfig.h.

◆ WithDestinationS3Uri() [1/3]

ProductionVariantCoreDumpConfig& Aws::SageMaker::Model::ProductionVariantCoreDumpConfig::WithDestinationS3Uri ( Aws::String &&  value)
inline

The Amazon S3 bucket to send the core dump to.

Definition at line 74 of file ProductionVariantCoreDumpConfig.h.

◆ WithDestinationS3Uri() [2/3]

ProductionVariantCoreDumpConfig& Aws::SageMaker::Model::ProductionVariantCoreDumpConfig::WithDestinationS3Uri ( const Aws::String value)
inline

The Amazon S3 bucket to send the core dump to.

Definition at line 69 of file ProductionVariantCoreDumpConfig.h.

◆ WithDestinationS3Uri() [3/3]

ProductionVariantCoreDumpConfig& Aws::SageMaker::Model::ProductionVariantCoreDumpConfig::WithDestinationS3Uri ( const char *  value)
inline

The Amazon S3 bucket to send the core dump to.

Definition at line 79 of file ProductionVariantCoreDumpConfig.h.

◆ WithKmsKeyId() [1/3]

ProductionVariantCoreDumpConfig& Aws::SageMaker::Model::ProductionVariantCoreDumpConfig::WithKmsKeyId ( Aws::String &&  value)
inline

The Amazon Web Services Key Management Service (Amazon Web Services KMS) key that Amazon SageMaker uses to encrypt the core dump data at rest using Amazon S3 server-side encryption. The KmsKeyId can be any of the following formats:

  • // KMS Key ID

    "1234abcd-12ab-34cd-56ef-1234567890ab"

  • // Amazon Resource Name (ARN) of a KMS Key

    "arn:aws:kms:us-west-2:111122223333:key/1234abcd-12ab-34cd-56ef-1234567890ab"

  • // KMS Key Alias

    "alias/ExampleAlias"

  • // Amazon Resource Name (ARN) of a KMS Key Alias

    "arn:aws:kms:us-west-2:111122223333:alias/ExampleAlias"

If you use a KMS key ID or an alias of your KMS key, the Amazon SageMaker execution role must include permissions to call kms:Encrypt. If you don't provide a KMS key ID, Amazon SageMaker uses the default KMS key for Amazon S3 for your role's account. Amazon SageMaker uses server-side encryption with KMS-managed keys for OutputDataConfig. If you use a bucket policy with an s3:PutObject permission that only allows objects with server-side encryption, set the condition key of s3:x-amz-server-side-encryption to "aws:kms". For more information, see KMS-Managed Encryption Keys in the Amazon Simple Storage Service Developer Guide.

The KMS key policy must grant permission to the IAM role that you specify in your CreateEndpoint and UpdateEndpoint requests. For more information, see Using Key Policies in Amazon Web Services KMS in the Amazon Web Services Key Management Service Developer Guide.

Definition at line 304 of file ProductionVariantCoreDumpConfig.h.

◆ WithKmsKeyId() [2/3]

ProductionVariantCoreDumpConfig& Aws::SageMaker::Model::ProductionVariantCoreDumpConfig::WithKmsKeyId ( const Aws::String value)
inline

The Amazon Web Services Key Management Service (Amazon Web Services KMS) key that Amazon SageMaker uses to encrypt the core dump data at rest using Amazon S3 server-side encryption. The KmsKeyId can be any of the following formats:

  • // KMS Key ID

    "1234abcd-12ab-34cd-56ef-1234567890ab"

  • // Amazon Resource Name (ARN) of a KMS Key

    "arn:aws:kms:us-west-2:111122223333:key/1234abcd-12ab-34cd-56ef-1234567890ab"

  • // KMS Key Alias

    "alias/ExampleAlias"

  • // Amazon Resource Name (ARN) of a KMS Key Alias

    "arn:aws:kms:us-west-2:111122223333:alias/ExampleAlias"

If you use a KMS key ID or an alias of your KMS key, the Amazon SageMaker execution role must include permissions to call kms:Encrypt. If you don't provide a KMS key ID, Amazon SageMaker uses the default KMS key for Amazon S3 for your role's account. Amazon SageMaker uses server-side encryption with KMS-managed keys for OutputDataConfig. If you use a bucket policy with an s3:PutObject permission that only allows objects with server-side encryption, set the condition key of s3:x-amz-server-side-encryption to "aws:kms". For more information, see KMS-Managed Encryption Keys in the Amazon Simple Storage Service Developer Guide.

The KMS key policy must grant permission to the IAM role that you specify in your CreateEndpoint and UpdateEndpoint requests. For more information, see Using Key Policies in Amazon Web Services KMS in the Amazon Web Services Key Management Service Developer Guide.

Definition at line 272 of file ProductionVariantCoreDumpConfig.h.

◆ WithKmsKeyId() [3/3]

ProductionVariantCoreDumpConfig& Aws::SageMaker::Model::ProductionVariantCoreDumpConfig::WithKmsKeyId ( const char *  value)
inline

The Amazon Web Services Key Management Service (Amazon Web Services KMS) key that Amazon SageMaker uses to encrypt the core dump data at rest using Amazon S3 server-side encryption. The KmsKeyId can be any of the following formats:

  • // KMS Key ID

    "1234abcd-12ab-34cd-56ef-1234567890ab"

  • // Amazon Resource Name (ARN) of a KMS Key

    "arn:aws:kms:us-west-2:111122223333:key/1234abcd-12ab-34cd-56ef-1234567890ab"

  • // KMS Key Alias

    "alias/ExampleAlias"

  • // Amazon Resource Name (ARN) of a KMS Key Alias

    "arn:aws:kms:us-west-2:111122223333:alias/ExampleAlias"

If you use a KMS key ID or an alias of your KMS key, the Amazon SageMaker execution role must include permissions to call kms:Encrypt. If you don't provide a KMS key ID, Amazon SageMaker uses the default KMS key for Amazon S3 for your role's account. Amazon SageMaker uses server-side encryption with KMS-managed keys for OutputDataConfig. If you use a bucket policy with an s3:PutObject permission that only allows objects with server-side encryption, set the condition key of s3:x-amz-server-side-encryption to "aws:kms". For more information, see KMS-Managed Encryption Keys in the Amazon Simple Storage Service Developer Guide.

The KMS key policy must grant permission to the IAM role that you specify in your CreateEndpoint and UpdateEndpoint requests. For more information, see Using Key Policies in Amazon Web Services KMS in the Amazon Web Services Key Management Service Developer Guide.

Definition at line 336 of file ProductionVariantCoreDumpConfig.h.


The documentation for this class was generated from the following file: