Close Menu
    DevStackTipsDevStackTips
    • Home
    • News & Updates
      1. Tech & Work
      2. View All

      CodeSOD: A Unique Way to Primary Key

      July 22, 2025

      BrowserStack launches Figma plugin for detecting accessibility issues in design phase

      July 22, 2025

      Parasoft brings agentic AI to service virtualization in latest release

      July 22, 2025

      Node.js vs. Python for Backend: 7 Reasons C-Level Leaders Choose Node.js Talent

      July 21, 2025

      The best CRM software with email marketing in 2025: Expert tested and reviewed

      July 22, 2025

      This multi-port car charger can power 4 gadgets at once – and it’s surprisingly cheap

      July 22, 2025

      I’m a wearables editor and here are the 7 Pixel Watch 4 rumors I’m most curious about

      July 22, 2025

      8 ways I quickly leveled up my Linux skills – and you can too

      July 22, 2025
    • Development
      1. Algorithms & Data Structures
      2. Artificial Intelligence
      3. Back-End Development
      4. Databases
      5. Front-End Development
      6. Libraries & Frameworks
      7. Machine Learning
      8. Security
      9. Software Engineering
      10. Tools & IDEs
      11. Web Design
      12. Web Development
      13. Web Security
      14. Programming Languages
        • PHP
        • JavaScript
      Featured

      The Intersection of Agile and Accessibility – A Series on Designing for Everyone

      July 22, 2025
      Recent

      The Intersection of Agile and Accessibility – A Series on Designing for Everyone

      July 22, 2025

      Zero Trust & Cybersecurity Mesh: Your Org’s Survival Guide

      July 22, 2025

      Execute Ping Commands and Get Back Structured Data in PHP

      July 22, 2025
    • Operating Systems
      1. Windows
      2. Linux
      3. macOS
      Featured

      A Tomb Raider composer has been jailed — His legacy overshadowed by $75k+ in loan fraud

      July 22, 2025
      Recent

      A Tomb Raider composer has been jailed — His legacy overshadowed by $75k+ in loan fraud

      July 22, 2025

      “I don’t think I changed his mind” — NVIDIA CEO comments on H20 AI GPU sales resuming in China following a meeting with President Trump

      July 22, 2025

      Galaxy Z Fold 7 review: Six years later — Samsung finally cracks the foldable code

      July 22, 2025
    • Learning Resources
      • Books
      • Cheatsheets
      • Tutorials & Guides
    Home»Development»Machine Learning»Deploy Amazon SageMaker Projects with Terraform Cloud

    Deploy Amazon SageMaker Projects with Terraform Cloud

    May 30, 2025

    Amazon SageMaker Projects empower data scientists to self-serve Amazon Web Services (AWS) tooling and infrastructure to organize all entities of the machine learning (ML) lifecycle, and further enable organizations to standardize and constrain the resources available to their data science teams in pre-packaged templates.

    For AWS customers using Terraform to define and manage their infrastructure-as-code (IaC), the current best practice for enabling Amazon SageMaker Projects carries a dependency on AWS CloudFormation to facilitate integration between AWS Service Catalog and Terraform. This blocks enterprise customers whose IT governance prohibit use of vendor-specific IaC such as CloudFormation from using Terraform Cloud.

    This post outlines how you can enable SageMaker Projects with Terraform Cloud, removing the CloudFormation dependency.

    AWS Service Catalog engine for Terraform Cloud

    SageMaker Projects are directly mapped to AWS Service Catalog products. To obviate the use of CloudFormation, these products must be designated as Terraform products that use the AWS Service Catalog Engine (SCE) for Terraform Cloud. This module, actively maintained by Hashicorp, contains AWS-native infrastructure for integrating Service Catalog with Terraform Cloud so that your Service Catalog products are deployed using the Terraform Cloud platform.

    By following the steps in this post, you can use the Service Catalog engine to deploy SageMaker Projects directly from Terraform Cloud.

    Prerequisites

    To successfully deploy the example, you must have the following:

    1. An AWS account with the necessary permissions to create and manage SageMaker Projects and Service Catalog products. See the Service Catalog documentation for more information on Service Catalog permissions.
    2. An existing Amazon SageMaker Studio domain with an associated Amazon SageMaker user profile. The SageMaker Studio domain must have SageMaker Projects enabled. See Use quick setup for Amazon SageMaker AI.
    3. A Unix terminal with the AWS Command Line Interface (AWS CLI) and Terraform installed. See the Installing or updating to the latest version of the AWS CLIand the Install Terraform for more information about installation.
    4. An existing Terraform Cloud account with the necessary permissions to create and manage workspaces. See the following tutorials to quickly create your own account:
      1. HCP Terraform – intro and sign Up
      2. Log In to HCP Terraform from the CLI

    See Terraform teams and organizations documentation for more information about Terraform Cloud permissions.

    Deployment steps

    1. Clone the sagemaker-custom-project-templates repository from the AWS Samples GitHub to your local machine, update the submodules, and navigate to the mlops-terraform-cloud directory.
      $ git clone https://github.com/aws-samples/sagemaker-custom-project-templates.git
      $ cd sagemaker-custom-project_templates
      $ git submodule update --init --recursive
      $ cd mlops-terraform-cloud

    The preceding code base above creates a Service Catalog portfolio, adds the SageMaker Project template as a Service Catalog product to the portfolio, allows the SageMaker Studio role to access the Service Catalog product, and adds the necessary tags to make the product visible in SageMaker Studio. See Create Custom Project Templates in the SageMaker Projects Documentation for more information about this process.

    1. Login to your Terraform Cloud account
      $ terraform login

    This prompts your browser to sign into your HCP account and generates a security token. Copy this security token and paste it back into your terminal.

    1. Navigate to your AWS account and retrieve the SageMaker user role Amazon Resource Name (ARN) for the SageMaker user profile associated with your SageMaker Studio domain. This role is used to grant SageMaker Studio users permissions to create and manage SageMaker Projects.
      • In the AWS Management Console for Amazon SageMaker, choose Domains from the navigation pane
        Amazon SageMaker home screen highlighting machine learning workflow options and quick-start configurations for users and organizations
      • Select your studio domain
        Amazon SageMaker Domains management screen with one InService domain, emphasizing shared environment for team collaboration
      • Under User Profiles, select your user profile
        Amazon SageMaker Domain management interface showing user profiles tab with configuration options and launch controls
      • In the User Details, copy the ARN
        SageMaker lead-data-scientist profile configuration with IAM role and creation details
    2. Create a tfvars file with the necessary variables for the Terraform Cloud workspace
      $ cp terraform.tfvars.example terraform.tfvars
    3. Set the appropriate values in the newly created tfvars file. The following variables are required:
      tfc_organization = "my-tfc-organization"
      tfc_team = "aws-service-catalog"
      token_rotation_interval_in_days = 30
      sagemaker_user_role_arns = ["arn:aws:iam::XXXXXXXXXXX:role/service-role/AmazonSageMaker-ExecutionRole"]

    Make sure that your desired Terraform Cloud (TFC) organization has the proper entitlements and that your tfc_team is unique for this deployment. See the Terraform Organizations Overview for more information on creating organizations.

    1. Initialize the Terraform Cloud workspace
      $ terraform init
    2. Apply the Terraform Cloud workspace
      $ terraform apply
    3. Go back to the SageMaker console using the user profile associated with the SageMaker user role ARN that you copied previously and choose Open Studio application
      SageMaker Studio welcome screen highlighting integrated ML development environment with login options
    4. In the navigation pane, choose Deployments and then choose Projects
      SageMaker Studio home interface highlighting ML workflow options, including JupyterLab and Code Editor, with Projects section emphasized for model deployment
    5. Choose Create project, select the mlops-tf-cloud-example product and then choose Next
      SageMaker Studio project creation workflow showing template selection step with Organization templates tab and MLOps workflow automation option
    6. In Project details, enter a unique name for the template and (option) enter a project description. Choose Create
      SageMaker project setup interface on Project details step, showcasing naming conventions, description field, and tagging options for MLOps workflow
    7. In a separate tab or window, go back to your Terraform Cloud account’s Workspaces and you’ll see a workspace being provisioned directly from your SageMaker Project deployment. The naming convention of the Workspace will be <ACCOUNT_ID>-<SAGEMAKER_PROJECT_ID>
      Terraform workspaces dashboard showing status counts and one workspace with Applied status

    Further customization

    This example can be modified to include custom Terraform in your SageMaker Project template. To do so, define your Terraform in the mlops-product/product directory. When ready to deploy, be sure to archive and compress this Terraform using the following command:

    $ cd mlops-product
    $ tar -czf product.tar.gz product

    Cleanup

    To remove the resources deployed by this example, run the following from the project directory:

    $ terraform destroy

    Conclusion

    In this post you defined, deployed, and provisioned a SageMaker Project custom template purely in Terraform. With no dependencies on other IaC tools, you can now enable SageMaker Projects strictly within your Terraform Enterprise infrastructure.


    About the author

    Max Copeland is a Machine Learning Engineer for AWS, leading customer engagements spanning ML-Ops, data science, data engineering, and generative AI.

    Source: Read More 

    Facebook Twitter Reddit Email Copy Link
    Previous ArticleStanford Researchers Introduced Biomni: A Biomedical AI Agent for Automation Across Diverse Tasks and Data Types
    Next Article How ZURU improved the accuracy of floor plan generation by 109% using Amazon Bedrock and Amazon SageMaker

    Related Posts

    Machine Learning

    How to Evaluate Jailbreak Methods: A Case Study with the StrongREJECT Benchmark

    July 22, 2025
    Machine Learning

    Boolformer: Symbolic Regression of Logic Functions with Transformers

    July 22, 2025
    Leave A Reply Cancel Reply

    For security, use of Google's reCAPTCHA service is required which is subject to the Google Privacy Policy and Terms of Use.

    Continue Reading

    CVE-2025-4285 – Rolantis Agentis SQL Injection Vulnerability

    Common Vulnerabilities and Exposures (CVEs)

    MuZero, AlphaZero, and AlphaDev: Optimizing computer systems

    Artificial Intelligence

    VS klaagt verdachte aan voor ransomware-aanvallen tegen Exchange-servers

    Security

    GOG just saved one of the greatest JRPGs of all time — availablenowonPC

    News & Updates

    Highlights

    CVE-2025-45143 – Apache String-Math Regex Denial of Service

    June 30, 2025

    CVE ID : CVE-2025-45143

    Published : June 30, 2025, 5:15 p.m. | 26 minutes ago

    Description : string-math v1.2.2 was discovered to contain a Regex Denial of Service (ReDoS) which is exploited via a crafted input.

    Severity: 0.0 | NA

    Visit the link for more details, such as CVSS details, affected products, timeline, and more…

    CVE-2025-53502 – WikiMedia Mediawiki FeaturedFeeds Extension Cross-Site Scripting (XSS) Vulnerability

    July 3, 2025

    CVE-2025-50581 – MRCMS Cross-Site Scripting Vulnerability

    July 18, 2025

    The Most Underrated UX Skill No One Talks About

    June 6, 2025
    © DevStackTips 2025. All rights reserved.
    • Contact
    • Privacy Policy

    Type above and press Enter to search. Press Esc to cancel.