AmazonSageMakerHyperPodInferenceAccess - AWS 托管策略

本文属于机器翻译版本。若本译文内容与英语原文存在差异,则一律以英文原文为准。

AmazonSageMakerHyperPodInferenceAccess

描述:此策略提供设置 SageMaker HyperPod 推理运算符所需的管理权限。它使推理操作员能够访问 AWS 网络资源、Amazon S3、Amazon ECR、Amazon CloudWatch、 AWS Certifice Manager,以及在集群上部署和管理推理工作负载所需的 SageMaker 资源 HyperPod

AmazonSageMakerHyperPodInferenceAccess 是一项 AWS 托管式策略

使用此策略

您可以将 AmazonSageMakerHyperPodInferenceAccess 附加到您的用户、组和角色。

策略详细信息

  • 类型: AWS 托管策略

  • 创建时间:世界标准时间 2026 年 1 月 27 日 20:34

  • 编辑时间:世界标准时间 2026 年 2 月 12 日 18:01

  • ARN: arn:aws:iam::aws:policy/AmazonSageMakerHyperPodInferenceAccess

策略版本

策略版本:v3(默认)

此策略的默认版本是定义策略权限的版本。当使用该策略的用户或角色请求访问 AWS 资源时, AWS 会检查策略的默认版本以确定是否允许该请求。

JSON 策略文档

{ "Version" : "2012-10-17", "Statement" : [ { "Sid" : "DeleteObjectsPermission", "Effect" : "Allow", "Action" : [ "s3:DeleteObject" ], "Resource" : [ "arn:aws:s3:::hyperpod-tls*/*" ], "Condition" : { "StringEquals" : { "aws:ResourceAccount" : "${aws:PrincipalAccount}" } } }, { "Sid" : "S3GetObjectAccess", "Effect" : "Allow", "Action" : [ "s3:GetObject" ], "Resource" : [ "arn:aws:s3:::hyperpod-tls*/*" ], "Condition" : { "StringEquals" : { "aws:ResourceAccount" : "${aws:PrincipalAccount}", "s3:ExistingObjectTag/CreatedBy" : "HyperPodInference" } } }, { "Sid" : "S3PutObjectAccess", "Effect" : "Allow", "Action" : [ "s3:PutObject", "s3:PutObjectTagging" ], "Resource" : [ "arn:aws:s3:::hyperpod-tls*/*" ], "Condition" : { "StringEquals" : { "aws:ResourceAccount" : "${aws:PrincipalAccount}", "s3:RequestObjectTag/CreatedBy" : "HyperPodInference" } } }, { "Sid" : "ECRAuthorization", "Effect" : "Allow", "Action" : [ "ecr:GetAuthorizationToken" ], "Resource" : "*" }, { "Sid" : "ECRRepositoryAccess", "Effect" : "Allow", "Action" : [ "ecr:GetDownloadUrlForLayer", "ecr:BatchGetImage" ], "Resource" : "arn:aws:ecr:*:*:repository/*" }, { "Sid" : "EC2DescribeAccess", "Effect" : "Allow", "Action" : [ "ec2:DescribeVpcs", "ec2:DescribeInstanceTypes", "ec2:DescribeNetworkInterfaces", "ec2:DescribeSubnets", "ec2:DescribeDhcpOptions", "ec2:DescribeSecurityGroups" ], "Resource" : "*", "Condition" : { "StringEquals" : { "aws:ResourceAccount" : "${aws:PrincipalAccount}" } } }, { "Sid" : "EC2NetworkInterfaceActions", "Effect" : "Allow", "Action" : [ "ec2:CreateNetworkInterface", "ec2:CreateNetworkInterfacePermission" ], "Resource" : [ "arn:aws:ec2:*:*:network-interface/*", "arn:aws:ec2:*:*:subnet/*", "arn:aws:ec2:*:*:security-group/*" ], "Condition" : { "StringEquals" : { "aws:ResourceAccount" : "${aws:PrincipalAccount}" } } }, { "Sid" : "EKSClusterAccess", "Effect" : "Allow", "Action" : [ "eks:DescribeCluster", "eks-auth:AssumeRoleForPodIdentity" ], "Resource" : "arn:aws:eks:*:*:cluster/*", "Condition" : { "StringEquals" : { "aws:ResourceAccount" : "${aws:PrincipalAccount}" } } }, { "Sid" : "EKSAccessEntryPolicyAssociation", "Effect" : "Allow", "Action" : [ "eks:AssociateAccessPolicy", "eks:DisassociateAccessPolicy" ], "Resource" : "arn:aws:eks:*:*:access-entry/*", "Condition" : { "StringEquals" : { "eks:policyarn" : "arn:aws:eks::aws:cluster-access-policy/AmazonSagemakerHyperpodInferenceMonitoringPolicy" } } }, { "Sid" : "ELBListAndDescribeAccess", "Effect" : "Allow", "Action" : [ "elasticloadbalancing:DescribeLoadBalancers" ], "Resource" : "*", "Condition" : { "StringEquals" : { "aws:ResourceAccount" : "${aws:PrincipalAccount}" } } }, { "Sid" : "FSxAccess", "Effect" : "Allow", "Action" : [ "fsx:DescribeFileSystems" ], "Resource" : "*", "Condition" : { "StringEquals" : { "aws:ResourceAccount" : "${aws:PrincipalAccount}" } } }, { "Sid" : "CertificateImportPermission", "Effect" : "Allow", "Action" : [ "acm:AddTagsToCertificate", "acm:ImportCertificate" ], "Resource" : "arn:aws:acm:*:*:certificate/*", "Condition" : { "ForAllValues:StringEquals" : { "aws:TagKeys" : "CreatedBy" }, "StringEquals" : { "aws:RequestTag/CreatedBy" : "HyperPodInference", "aws:ResourceTag/CreatedBy" : "HyperPodInference", "aws:ResourceAccount" : "${aws:PrincipalAccount}" } } }, { "Sid" : "CertificateDeletePermission", "Effect" : "Allow", "Action" : "acm:DeleteCertificate", "Resource" : "arn:aws:acm:*:*:certificate/*", "Condition" : { "StringEquals" : { "aws:ResourceAccount" : "${aws:PrincipalAccount}", "aws:ResourceTag/CreatedBy" : "HyperPodInference" } } }, { "Sid" : "AllowPassRoleToSageMaker", "Effect" : "Allow", "Action" : [ "iam:PassRole" ], "Resource" : "arn:aws:iam::*:role/SageMakerHyperPodInference*", "Condition" : { "StringEquals" : { "iam:PassedToService" : "sagemaker.amazonaws.com" } } }, { "Sid" : "CloudWatchMetricsAccess", "Effect" : "Allow", "Action" : [ "cloudwatch:PutMetricData" ], "Resource" : "*", "Condition" : { "StringEquals" : { "cloudwatch:namespace" : "HyperPodInference" } } }, { "Sid" : "CloudWatchLogsAccess", "Effect" : "Allow", "Action" : [ "logs:PutLogEvents", "logs:CreateLogStream", "logs:CreateLogGroup" ], "Resource" : [ "arn:aws:logs:*:*:log-group:*" ], "Condition" : { "StringEquals" : { "aws:ResourceAccount" : "${aws:PrincipalAccount}" } } }, { "Sid" : "SageMakerAccess", "Effect" : "Allow", "Action" : [ "sagemaker:DescribeModel", "sagemaker:DescribeEndpointConfig", "sagemaker:DescribeEndpoint", "sagemaker:DescribeCluster", "sagemaker:DescribeClusterInference", "sagemaker:UpdateClusterInference", "sagemaker:DescribeHubContent" ], "Resource" : [ "arn:aws:sagemaker:*:*:model/*", "arn:aws:sagemaker:*:*:endpoint/*", "arn:aws:sagemaker:*:*:endpointconfig/*", "arn:aws:sagemaker:*:*:cluster/*", "arn:aws:sagemaker:*:*:hub-content/*", "arn:aws:sagemaker:*:*:hub/*" ], "Condition" : { "StringEquals" : { "aws:ResourceAccount" : "${aws:PrincipalAccount}" } } }, { "Sid" : "SageMakerCreateAccess", "Effect" : "Allow", "Action" : [ "sagemaker:CreateModel", "sagemaker:CreateEndpointConfig", "sagemaker:CreateEndpoint" ], "Resource" : [ "arn:aws:sagemaker:*:*:model/*", "arn:aws:sagemaker:*:*:endpoint/*", "arn:aws:sagemaker:*:*:endpoint-config/*" ], "Condition" : { "StringEquals" : { "aws:RequestTag/CreatedBy" : "HyperPodInference" } } }, { "Sid" : "SageMakerTagging", "Effect" : "Allow", "Action" : [ "sagemaker:AddTags" ], "Resource" : [ "arn:aws:sagemaker:*:*:model/*", "arn:aws:sagemaker:*:*:endpoint/*", "arn:aws:sagemaker:*:*:endpoint-config/*" ], "Condition" : { "StringEquals" : { "sagemaker:TaggingAction" : [ "CreateModel", "CreateEndpointConfig", "CreateEndpoint" ] } } }, { "Sid" : "SageMakerDeleteAccess", "Effect" : "Allow", "Action" : [ "sagemaker:DeleteModel", "sagemaker:DeleteEndpointConfig", "sagemaker:DeleteEndpoint", "sagemaker:UpdateEndpoint" ], "Resource" : [ "arn:aws:sagemaker:*:*:model/*", "arn:aws:sagemaker:*:*:endpoint/*", "arn:aws:sagemaker:*:*:endpoint-config/*" ], "Condition" : { "StringEquals" : { "aws:ResourceTag/CreatedBy" : "HyperPodInference" } } } ] }

了解详情