Skip to content

/AWS1/CL_SGM=>CREATEINFERENCEEXPERIMENT()

About CreateInferenceExperiment

Creates an inference experiment using the configurations specified in the request.

Use this API to setup and schedule an experiment to compare model variants on a Amazon SageMaker inference endpoint. For more information about inference experiments, see Shadow tests.

Amazon SageMaker begins your experiment at the scheduled time and routes traffic to your endpoint's model variants based on your specified configuration.

While the experiment is in progress or after it has concluded, you can view metrics that compare your model variants. For more information, see View, monitor, and edit shadow tests.

Method Signature

IMPORTING

Required arguments:

IV_NAME TYPE /AWS1/SGMINFERENCEEXPERIMENT00 /AWS1/SGMINFERENCEEXPERIMENT00

The name for the inference experiment.

IV_TYPE TYPE /AWS1/SGMINFERENCEEXPERIMENT01 /AWS1/SGMINFERENCEEXPERIMENT01

The type of the inference experiment that you want to run. The following types of experiments are possible:

  • ShadowMode: You can use this type to validate a shadow variant. For more information, see Shadow tests.

IV_ROLEARN TYPE /AWS1/SGMROLEARN /AWS1/SGMROLEARN

The ARN of the IAM role that Amazon SageMaker can assume to access model artifacts and container images, and manage Amazon SageMaker Inference endpoints for model deployment.

IV_ENDPOINTNAME TYPE /AWS1/SGMENDPOINTNAME /AWS1/SGMENDPOINTNAME

The name of the Amazon SageMaker endpoint on which you want to run the inference experiment.

IT_MODELVARIANTS TYPE /AWS1/CL_SGMMODELVARIANTCONFIG=>TT_MODELVARIANTCONFIGLIST TT_MODELVARIANTCONFIGLIST

An array of ModelVariantConfig objects. There is one for each variant in the inference experiment. Each ModelVariantConfig object in the array describes the infrastructure configuration for the corresponding variant.

IO_SHADOWMODECONFIG TYPE REF TO /AWS1/CL_SGMSHADOWMODECONFIG /AWS1/CL_SGMSHADOWMODECONFIG

The configuration of ShadowMode inference experiment type. Use this field to specify a production variant which takes all the inference requests, and a shadow variant to which Amazon SageMaker replicates a percentage of the inference requests. For the shadow variant also specify the percentage of requests that Amazon SageMaker replicates.

Optional arguments:

IO_SCHEDULE TYPE REF TO /AWS1/CL_SGMINFERENCEEXPERIM00 /AWS1/CL_SGMINFERENCEEXPERIM00

The duration for which you want the inference experiment to run. If you don't specify this field, the experiment automatically starts immediately upon creation and concludes after 7 days.

IV_DESCRIPTION TYPE /AWS1/SGMINFERENCEEXPERIMENT02 /AWS1/SGMINFERENCEEXPERIMENT02

A description for the inference experiment.

IO_DATASTORAGECONFIG TYPE REF TO /AWS1/CL_SGMINFERENCEEXPERIM01 /AWS1/CL_SGMINFERENCEEXPERIM01

The Amazon S3 location and configuration for storing inference request and response data.

This is an optional parameter that you can use for data capture. For more information, see Capture data.

IV_KMSKEY TYPE /AWS1/SGMKMSKEYID /AWS1/SGMKMSKEYID

The Amazon Web Services Key Management Service (Amazon Web Services KMS) key that Amazon SageMaker uses to encrypt data on the storage volume attached to the ML compute instance that hosts the endpoint. The KmsKey can be any of the following formats:

  • KMS key ID

    "1234abcd-12ab-34cd-56ef-1234567890ab"

  • Amazon Resource Name (ARN) of a KMS key

    "arn:aws:kms:us-west-2:111122223333:key/1234abcd-12ab-34cd-56ef-1234567890ab"

  • KMS key Alias

    "alias/ExampleAlias"

  • Amazon Resource Name (ARN) of a KMS key Alias

    "arn:aws:kms:us-west-2:111122223333:alias/ExampleAlias"

If you use a KMS key ID or an alias of your KMS key, the Amazon SageMaker execution role must include permissions to call kms:Encrypt. If you don't provide a KMS key ID, Amazon SageMaker uses the default KMS key for Amazon S3 for your role's account. Amazon SageMaker uses server-side encryption with KMS managed keys for OutputDataConfig. If you use a bucket policy with an s3:PutObject permission that only allows objects with server-side encryption, set the condition key of s3:x-amz-server-side-encryption to "aws:kms". For more information, see KMS managed Encryption Keys in the Amazon Simple Storage Service Developer Guide.

The KMS key policy must grant permission to the IAM role that you specify in your CreateEndpoint and UpdateEndpoint requests. For more information, see Using Key Policies in Amazon Web Services KMS in the Amazon Web Services Key Management Service Developer Guide.

IT_TAGS TYPE /AWS1/CL_SGMTAG=>TT_TAGLIST TT_TAGLIST

Array of key-value pairs. You can use tags to categorize your Amazon Web Services resources in different ways, for example, by purpose, owner, or environment. For more information, see Tagging your Amazon Web Services Resources.

RETURNING

OO_OUTPUT TYPE REF TO /AWS1/CL_SGMCREINFERENCEEXPE01 /AWS1/CL_SGMCREINFERENCEEXPE01