Terjemahan disediakan oleh mesin penerjemah. Jika konten terjemahan yang diberikan bertentangan dengan versi bahasa Inggris aslinya, utamakan versi bahasa Inggris.
AmazonSageMakerHyperPodInferenceAccess
Deskripsi: Kebijakan ini memberikan hak administratif yang diperlukan untuk menyiapkan operator SageMaker HyperPod inferensi. Ini memungkinkan operator inferensi untuk mengakses sumber daya AWS jaringan, Amazon S3, Amazon ECR, Amazon, AWS Certificate Manager SageMaker , CloudWatch dan sumber daya yang diperlukan untuk menyebarkan dan mengelola beban kerja inferensi pada cluster HyperPod
AmazonSageMakerHyperPodInferenceAccessadalah kebijakan yang AWS dikelola.
Menggunakan kebijakan ini
Anda dapat melampirkan AmazonSageMakerHyperPodInferenceAccess ke pengguna, grup, dan peran Anda.
Detail kebijakan
-
Jenis: kebijakan AWS terkelola
-
Waktu pembuatan: 27 Januari 2026, 20:34 UTC
-
Waktu telah diedit: 12 Februari 2026, 18:01 UTC
-
ARN:
arn:aws:iam::aws:policy/AmazonSageMakerHyperPodInferenceAccess
Versi kebijakan
Versi kebijakan: v3 (default)
Versi default kebijakan adalah versi yang menentukan izin untuk kebijakan tersebut. Saat pengguna atau peran dengan kebijakan membuat permintaan untuk mengakses AWS sumber daya, AWS periksa versi default kebijakan untuk menentukan apakah akan mengizinkan permintaan tersebut.
Dokumen kebijakan JSON
{ "Version" : "2012-10-17", "Statement" : [ { "Sid" : "DeleteObjectsPermission", "Effect" : "Allow", "Action" : [ "s3:DeleteObject" ], "Resource" : [ "arn:aws:s3:::hyperpod-tls*/*" ], "Condition" : { "StringEquals" : { "aws:ResourceAccount" : "${aws:PrincipalAccount}" } } }, { "Sid" : "S3GetObjectAccess", "Effect" : "Allow", "Action" : [ "s3:GetObject" ], "Resource" : [ "arn:aws:s3:::hyperpod-tls*/*" ], "Condition" : { "StringEquals" : { "aws:ResourceAccount" : "${aws:PrincipalAccount}", "s3:ExistingObjectTag/CreatedBy" : "HyperPodInference" } } }, { "Sid" : "S3PutObjectAccess", "Effect" : "Allow", "Action" : [ "s3:PutObject", "s3:PutObjectTagging" ], "Resource" : [ "arn:aws:s3:::hyperpod-tls*/*" ], "Condition" : { "StringEquals" : { "aws:ResourceAccount" : "${aws:PrincipalAccount}", "s3:RequestObjectTag/CreatedBy" : "HyperPodInference" } } }, { "Sid" : "ECRAuthorization", "Effect" : "Allow", "Action" : [ "ecr:GetAuthorizationToken" ], "Resource" : "*" }, { "Sid" : "ECRRepositoryAccess", "Effect" : "Allow", "Action" : [ "ecr:GetDownloadUrlForLayer", "ecr:BatchGetImage" ], "Resource" : "arn:aws:ecr:*:*:repository/*" }, { "Sid" : "EC2DescribeAccess", "Effect" : "Allow", "Action" : [ "ec2:DescribeVpcs", "ec2:DescribeInstanceTypes", "ec2:DescribeNetworkInterfaces", "ec2:DescribeSubnets", "ec2:DescribeDhcpOptions", "ec2:DescribeSecurityGroups" ], "Resource" : "*", "Condition" : { "StringEquals" : { "aws:ResourceAccount" : "${aws:PrincipalAccount}" } } }, { "Sid" : "EC2NetworkInterfaceActions", "Effect" : "Allow", "Action" : [ "ec2:CreateNetworkInterface", "ec2:CreateNetworkInterfacePermission" ], "Resource" : [ "arn:aws:ec2:*:*:network-interface/*", "arn:aws:ec2:*:*:subnet/*", "arn:aws:ec2:*:*:security-group/*" ], "Condition" : { "StringEquals" : { "aws:ResourceAccount" : "${aws:PrincipalAccount}" } } }, { "Sid" : "EKSClusterAccess", "Effect" : "Allow", "Action" : [ "eks:DescribeCluster", "eks-auth:AssumeRoleForPodIdentity" ], "Resource" : "arn:aws:eks:*:*:cluster/*", "Condition" : { "StringEquals" : { "aws:ResourceAccount" : "${aws:PrincipalAccount}" } } }, { "Sid" : "EKSAccessEntryPolicyAssociation", "Effect" : "Allow", "Action" : [ "eks:AssociateAccessPolicy", "eks:DisassociateAccessPolicy" ], "Resource" : "arn:aws:eks:*:*:access-entry/*", "Condition" : { "StringEquals" : { "eks:policyarn" : "arn:aws:eks::aws:cluster-access-policy/AmazonSagemakerHyperpodInferenceMonitoringPolicy" } } }, { "Sid" : "ELBListAndDescribeAccess", "Effect" : "Allow", "Action" : [ "elasticloadbalancing:DescribeLoadBalancers" ], "Resource" : "*", "Condition" : { "StringEquals" : { "aws:ResourceAccount" : "${aws:PrincipalAccount}" } } }, { "Sid" : "FSxAccess", "Effect" : "Allow", "Action" : [ "fsx:DescribeFileSystems" ], "Resource" : "*", "Condition" : { "StringEquals" : { "aws:ResourceAccount" : "${aws:PrincipalAccount}" } } }, { "Sid" : "CertificateImportPermission", "Effect" : "Allow", "Action" : [ "acm:AddTagsToCertificate", "acm:ImportCertificate" ], "Resource" : "arn:aws:acm:*:*:certificate/*", "Condition" : { "ForAllValues:StringEquals" : { "aws:TagKeys" : "CreatedBy" }, "StringEquals" : { "aws:RequestTag/CreatedBy" : "HyperPodInference", "aws:ResourceTag/CreatedBy" : "HyperPodInference", "aws:ResourceAccount" : "${aws:PrincipalAccount}" } } }, { "Sid" : "CertificateDeletePermission", "Effect" : "Allow", "Action" : "acm:DeleteCertificate", "Resource" : "arn:aws:acm:*:*:certificate/*", "Condition" : { "StringEquals" : { "aws:ResourceAccount" : "${aws:PrincipalAccount}", "aws:ResourceTag/CreatedBy" : "HyperPodInference" } } }, { "Sid" : "AllowPassRoleToSageMaker", "Effect" : "Allow", "Action" : [ "iam:PassRole" ], "Resource" : "arn:aws:iam::*:role/SageMakerHyperPodInference*", "Condition" : { "StringEquals" : { "iam:PassedToService" : "sagemaker.amazonaws.com" } } }, { "Sid" : "CloudWatchMetricsAccess", "Effect" : "Allow", "Action" : [ "cloudwatch:PutMetricData" ], "Resource" : "*", "Condition" : { "StringEquals" : { "cloudwatch:namespace" : "HyperPodInference" } } }, { "Sid" : "CloudWatchLogsAccess", "Effect" : "Allow", "Action" : [ "logs:PutLogEvents", "logs:CreateLogStream", "logs:CreateLogGroup" ], "Resource" : [ "arn:aws:logs:*:*:log-group:*" ], "Condition" : { "StringEquals" : { "aws:ResourceAccount" : "${aws:PrincipalAccount}" } } }, { "Sid" : "SageMakerAccess", "Effect" : "Allow", "Action" : [ "sagemaker:DescribeModel", "sagemaker:DescribeEndpointConfig", "sagemaker:DescribeEndpoint", "sagemaker:DescribeCluster", "sagemaker:DescribeClusterInference", "sagemaker:UpdateClusterInference", "sagemaker:DescribeHubContent" ], "Resource" : [ "arn:aws:sagemaker:*:*:model/*", "arn:aws:sagemaker:*:*:endpoint/*", "arn:aws:sagemaker:*:*:endpointconfig/*", "arn:aws:sagemaker:*:*:cluster/*", "arn:aws:sagemaker:*:*:hub-content/*", "arn:aws:sagemaker:*:*:hub/*" ], "Condition" : { "StringEquals" : { "aws:ResourceAccount" : "${aws:PrincipalAccount}" } } }, { "Sid" : "SageMakerCreateAccess", "Effect" : "Allow", "Action" : [ "sagemaker:CreateModel", "sagemaker:CreateEndpointConfig", "sagemaker:CreateEndpoint" ], "Resource" : [ "arn:aws:sagemaker:*:*:model/*", "arn:aws:sagemaker:*:*:endpoint/*", "arn:aws:sagemaker:*:*:endpoint-config/*" ], "Condition" : { "StringEquals" : { "aws:RequestTag/CreatedBy" : "HyperPodInference" } } }, { "Sid" : "SageMakerTagging", "Effect" : "Allow", "Action" : [ "sagemaker:AddTags" ], "Resource" : [ "arn:aws:sagemaker:*:*:model/*", "arn:aws:sagemaker:*:*:endpoint/*", "arn:aws:sagemaker:*:*:endpoint-config/*" ], "Condition" : { "StringEquals" : { "sagemaker:TaggingAction" : [ "CreateModel", "CreateEndpointConfig", "CreateEndpoint" ] } } }, { "Sid" : "SageMakerDeleteAccess", "Effect" : "Allow", "Action" : [ "sagemaker:DeleteModel", "sagemaker:DeleteEndpointConfig", "sagemaker:DeleteEndpoint", "sagemaker:UpdateEndpoint" ], "Resource" : [ "arn:aws:sagemaker:*:*:model/*", "arn:aws:sagemaker:*:*:endpoint/*", "arn:aws:sagemaker:*:*:endpoint-config/*" ], "Condition" : { "StringEquals" : { "aws:ResourceTag/CreatedBy" : "HyperPodInference" } } } ] }