Connection and authentication issues
Resolve common connection and authentication issues when integrating Amazon SageMaker with Atlan.
Access denied
Access denied: Unable to access SageMaker resources
Cause
The AWS credentials don't have the required permissions to access SageMaker resources.
Solution
- Verify the IAM user or role has the required policies:
- AmazonSageMakerReadOnlyAccess
- AmazonS3ReadOnlyAccess (for datasets and model artifacts)
- AmazonGlueReadOnlyAccess (for dataset metadata)
- Check that the policies are attached to the correct user/role.
- Test permissions with AWS CLI:
aws sagemaker list-models --region us-east-1
aws s3 ls s3://your-sagemaker-bucket/ - If using IAM role, verify the trust relationship permits Atlan's account.
Invalid credentials
Invalid credentials: AWS authentication failed
Cause
The provided AWS Access Key ID or Secret Access Key is incorrect, expired, or the user account doesn't exist.
Solution
- For access key authentication:
- Verify the Access Key ID and Secret Access Key are correct
- Check that the access keys are active and not expired
- Test authentication with AWS CLI:
aws configure list
aws sts get-caller-identity
- For IAM role authentication:
- Verify the IAM role ARN is correct
- Check that the role exists and is available
- Make sure the trust relationship is configured properly
- Generate new access keys if necessary:
- Navigate to IAM → Users → Your User → Security credentials
- Click Create access key
Region mismatch
Region mismatch: Resources not found in specified region
Cause
The AWS region specified in the connection doesn't match where your SageMaker resources are located.
Solution
- Identify the correct AWS region where your SageMaker resources are located:
- Check the SageMaker console for your models, training jobs, and datasets
- Note the region shown in the AWS console URL
- Update the connection configuration with the correct region.
- Common regions include:
us-east-1(N. Virginia)us-west-2(Oregon)eu-west-1(Ireland)ap-southeast-1(Singapore)
- Test the connection with the correct region.
S3 access denied
S3 access denied: Unable to access dataset or model artifacts
Cause
The AWS credentials don't have read access to S3 buckets containing SageMaker datasets or model artifacts.
Solution
- Identify the S3 buckets used by SageMaker:
- Check SageMaker console for model artifacts locations
- Review training job configurations for input/output data locations
- Make sure your IAM user/role has read access to these buckets:
{
"Version": "2012-10-17",
"Statement": [
{
"Effect": "Allow",
"Action": [
"s3:GetObject",
"s3:ListBucket"
],
"Resource": [
"arn:aws:s3:::your-sagemaker-bucket",
"arn:aws:s3:::your-sagemaker-bucket/*"
]
}
]
} - Test S3 access with AWS CLI:
aws s3 ls s3://your-sagemaker-bucket/
API rate limiting
API rate limiting: Too many requests to SageMaker API
Cause
The crawler is making too many API requests too quickly, exceeding AWS rate limits.
Solution
- Reduce the crawl frequency in the crawler configuration.
- Implement retry logic with exponential backoff.
- Consider crawling during off-peak hours.
- Monitor AWS CloudWatch metrics for API usage.
- If needed, request a rate limit increase from AWS support.
Network timeout
Network timeout: Connection to AWS services timed out
Cause
Network latency is too high or the connection is unstable between Atlan and AWS services.
Solution
- Check network connectivity between Atlan and AWS:
ping sagemaker.us-east-1.amazonaws.com
telnet sagemaker.us-east-1.amazonaws.com 443 - Verify that network latency is under 200ms.
- Make sure sufficient bandwidth is available.
- Check for any network interruptions or packet loss.
- Consider using VPC endpoints if SageMaker is in a private subnet.
Resource not found
Resource not found: SageMaker resource doesn't exist
Cause
The SageMaker resource (model, training job, dataset) has been deleted or doesn't exist in the specified region.
Solution
- Verify the resource exists in the AWS SageMaker console.
- Check that you're looking in the correct AWS region.
- Make sure the resource hasn't been deleted since the last crawl.
- Update the crawler filters to exclude deleted resources.
- Run a fresh crawl to discover current resources.
Cross-account access issues
Cross-account access denied: Unable to assume IAM role
Cause
The IAM role trust relationship isn't configured correctly for cross-account access.
Solution
- Verify the trust relationship in the IAM role:
{
"Version": "2012-10-17",
"Statement": [
{
"Effect": "Allow",
"Principal": {
"AWS": "arn:aws:iam::ATLAN_ACCOUNT_ID:root"
},
"Action": "sts:AssumeRole",
"Condition": {
"StringEquals": {
"sts:ExternalId": "EXTERNAL_ID"
}
}
}
]
} - Make sure the external ID matches what's configured in Atlan.
- Verify the Atlan account ID is correct.
- Test the role assumption:
aws sts assume-role --role-arn ROLE_ARN --external-id EXTERNAL_ID
See also
- Set up SageMaker: Configure AWS credentials and SageMaker connection
- Preflight checks for SageMaker: Verify AWS requirements and prerequisites
Need help
If you need assistance after trying the steps, contact Atlan support: Submit a request.