You know that sinking feeling when you kick off a model training job and half your EC2 cluster just sits there, waiting for credentials to catch up? Domino Data Lab EC2 Instances can do amazing things once they’re properly connected, but getting them to obey your access and identity rules across AWS accounts can feel like herding cloud-born cats.
Domino Data Lab automates the heavy lifting of data science infrastructure. AWS EC2 delivers flexible, elastic compute. When they work together, teams get reproducible environments and scale-on-demand experimentation. The trick is wiring Domino’s compute environments to EC2 in a way that respects both speed and security.
The integration comes down to smart identity mapping. Domino launches EC2 Instances under IAM roles you define, tied to a workspace’s compute environment. The platform uses those roles to isolate users, limit data exposure, and give each project its own performance profile. You set up role bindings once, and Domino handles permissions dynamically as workloads spin up or down.
Here’s the logic most teams miss: you’re not just connecting two services, you’re aligning trust boundaries. Properly configured, Domino never needs to pass long-lived AWS credentials around. It assumes the right IAM role at runtime using STS (AWS Security Token Service), which keeps keys short-lived and auditable.
If your runs fail to start, check IAM trust policies first. Make sure your Domino execution role can assume the EC2 runtime role. Then verify network access between the Domino worker nodes and the target VPC. Many “mysterious” errors come down to misrouted subnets or missing security groups.
You’ll also want to rotate instance profiles regularly and monitor cloud-init logs for startup failures. RBAC drift happens quietly over time, so review policy inheritance across your Domino and AWS tenants at least quarterly.