Skip to content

Why can't I see my member accounts managed nodes?

0

I have recently added my Account 6 to be the Delegated Administrator for my Systems Manager for my organization. I have also finished setting up the unified console experience for Systems Manager on Account 6. However, "Review node insights" and "Explore nodes" menu shows "You don't have any managed nodes in your organization.". I have confirmed that my EC2 instances on Account 1-5 is a managed instances and is shown on the respective account's Systems Manager Fleet Manager.

I was expecting to see my managed nodes in the Delegated Administrator so I don't have to constantly switch different accounts. Anyone here can help?

I have followed the instructions on these articles:

  • Hi @falsesec Can you verify that you used your AWS Organizations management account to elect a delegated administrator (DA) account. Then you switched to that DA account, selected which regions you want to onboard, then completed the onboarding?

    If so, can you go to the "Diagnose and remediate" left nav page, then check if that page is showing you any deployment issues that might have impacted onboarding?

asked a year ago390 views
1 Answer
1
Accepted Answer

The issue you're experiencing is related to how AWS accounts and resources are structured and accessed. Even though you've set up a Delegated Administrator account for Systems Manager in your organization, this doesn't automatically allow you to view EC2 instances or managed nodes from other member accounts in that central location.

Each AWS account is designed as a high administrative boundary, and by default, resources like EC2 instances are only visible within the account where they were created. This is intentional for security and isolation purposes.

To view managed nodes from other accounts in your organization, you'll need to take additional steps:

  1. Ensure you're in the correct AWS region in the console where the instances are located.

  2. To access resources in member accounts, you'll need to assume a role in those accounts from your Delegated Administrator account. This involves setting up cross-account access.

  3. For Systems Manager specifically, you may need to configure resource data sync to aggregate inventory data from multiple accounts and regions into a central account.

  4. Verify that the necessary permissions are in place, both in the member accounts and in the Delegated Administrator account, to allow cross-account access and visibility.

  5. Check that the SSM Agent is properly installed and configured on all the EC2 instances you want to manage.

  6. Ensure that the required VPC endpoints for Systems Manager are set up if you're using private subnets.

Remember, the Delegated Administrator setup doesn't automatically provide a consolidated view of all managed nodes across accounts. It's primarily for centralized management of Systems Manager settings and configurations. To achieve the consolidated view you're looking for, you'll need to implement additional cross-account access and data aggregation strategies.
Sources
How can all accounts under an organziation see EC2 instances created by other accounts? | AWS re:Post
Working with managed nodes - AWS Systems Manager
Can't access EC2 instance in same organization | AWS re:Post
EC2 machines are not showing in Fleet manager | AWS re:Post

answered a year ago
EXPERT
reviewed a year ago
EXPERT
reviewed a year ago
  • How would I be able to setup a cross-account access? I followed the instructions here https://docs.aws.amazon.com/systems-manager/latest/userguide/running-automations-multiple-accounts-regions.html and created the AWS-SystemsManager-AutomationAdministrationRole role on Account 6 and the AWS-SystemsManager-AutomationExecutionRole role on Accounts 1-5.

    I'm still not getting any results on the Explore nodes menu on Account 6, I also tried running the AWSSupport-TroubleshootManagedInstance automation and received an error The provided role: arn:aws:iam::Account1:role/AWS-SystemsManager-AutomationExecutionRole can't be assumed. (Service: null; Status Code: 0; Error Code: null; Request ID: null; Proxy: null).

    I am using IAM Identity Center to manage access and permissions. I already attached an inline policy to the Permissions Set attached to my user's group:

    {
        "Version": "2012-10-17",
        "Statement": [
            {
                "Sid": "Statement1",
                "Effect": "Allow",
                "Action": [
                    "iam:PassRole"
                ],
                "Resource": [
                    "arn:aws:iam::Account6:role/AWS-SystemsManager-AutomationAdministrationRole"
                ]
            }
        ]
    }
    

You are not logged in. Log in to post an answer.

A good answer clearly answers the question and provides constructive feedback and encourages professional growth in the question asker.