Skip to content

Commit 2506a67

Browse files
Madhur prashantMadhur prashant
authored andcommitted
iterating on blog feedback
1 parent ccb43ff commit 2506a67

File tree

3 files changed

+7
-10
lines changed

3 files changed

+7
-10
lines changed

blog_post.html

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -3209,7 +3209,7 @@ <h4 class="anchored" data-anchor-id="amazon-vpc-network-configurations"><a href=
32093209
</section>
32103210
<section id="iam-role" class="level4">
32113211
<h4 class="anchored" data-anchor-id="iam-role">IAM Role</h4>
3212-
<p>Set up an execution role in <a href="https://aws.amazon.com/iam/">AWS Identity and Access Management (IAM)</a> with appropriate permissions to allow SageMaker to access <a href="https://docs.aws.amazon.com/secretsmanager/latest/userguide/intro.html">AWS Secrets Manager</a>, S3, and other services within your AWS account. <strong><em>Until an AWS CloudFormation template is provided that creates the role with the requisite IAM permissions, use a SageMaker execution role that AmazonSageMakerFullAccess AWS managed policy for your execution role.</em></strong> Follow the instructions <a href="https://github.com/aws-samples/amazon-sagemaker-w-snowflake-as-datasource/tree/main/iam">here</a> to create permissions for your <code>iam</code> roles.</p>
3212+
<p>Set up an execution role in <a href="https://aws.amazon.com/iam/">AWS Identity and Access Management (IAM)</a> with appropriate permissions to allow SageMaker to access <a href="https://docs.aws.amazon.com/secretsmanager/latest/userguide/intro.html">AWS Secrets Manager</a> and S3. <strong><em>Until an AWS CloudFormation template is provided that creates the role with the requisite IAM permissions, use a SageMaker execution role that AmazonSageMakerFullAccess AWS managed policy for your execution role.</em></strong></p>
32133213
</section>
32143214
<section id="aws-secrets-manager" class="level4">
32153215
<h4 class="anchored" data-anchor-id="aws-secrets-manager">AWS Secrets Manager</h4>

blog_post.md

Lines changed: 5 additions & 8 deletions
Original file line numberDiff line numberDiff line change
@@ -299,14 +299,11 @@ network_config:
299299
Set up an execution role in [AWS Identity and Access Management
300300
(IAM)](https://aws.amazon.com/iam/) with appropriate permissions to
301301
allow SageMaker to access [AWS Secrets
302-
Manager](https://docs.aws.amazon.com/secretsmanager/latest/userguide/intro.html),
303-
S3, and other services within your AWS account. ***Until an AWS
304-
CloudFormation template is provided that creates the role with the
305-
requisite IAM permissions, use a SageMaker execution role that
306-
AmazonSageMakerFullAccess AWS managed policy for your execution role.***
307-
Follow the instructions
308-
[here](https://github.com/aws-samples/amazon-sagemaker-w-snowflake-as-datasource/tree/main/iam)
309-
to create permissions for your `iam` roles.
302+
Manager](https://docs.aws.amazon.com/secretsmanager/latest/userguide/intro.html)
303+
and S3. ***Until an AWS CloudFormation template is provided that creates
304+
the role with the requisite IAM permissions, use a SageMaker execution
305+
role that AmazonSageMakerFullAccess AWS managed policy for your
306+
execution role.***
310307

311308
#### AWS Secrets Manager
312309

blog_post.qmd

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -149,7 +149,7 @@ network_config:
149149

150150
#### IAM Role
151151

152-
Set up an execution role in [AWS Identity and Access Management (IAM)](https://aws.amazon.com/iam/) with appropriate permissions to allow SageMaker to access [AWS Secrets Manager](https://docs.aws.amazon.com/secretsmanager/latest/userguide/intro.html), S3, and other services within your AWS account. ***Until an AWS CloudFormation template is provided that creates the role with the requisite IAM permissions, use a SageMaker execution role that AmazonSageMakerFullAccess AWS managed policy for your execution role.*** Follow the instructions [here](https://github.com/aws-samples/amazon-sagemaker-w-snowflake-as-datasource/tree/main/iam) to create permissions for your `iam` roles.
152+
Set up an execution role in [AWS Identity and Access Management (IAM)](https://aws.amazon.com/iam/) with appropriate permissions to allow SageMaker to access [AWS Secrets Manager](https://docs.aws.amazon.com/secretsmanager/latest/userguide/intro.html) and S3. ***Until an AWS CloudFormation template is provided that creates the role with the requisite IAM permissions, use a SageMaker execution role that AmazonSageMakerFullAccess AWS managed policy for your execution role.***
153153

154154
#### AWS Secrets Manager
155155

0 commit comments

Comments
 (0)