Can't see EBS Snapshot tags from other accounts

0

Hi,

I have private snapshots in one account (source) that I have shared with another account (target). I am able to see the snapshots themselves from the target account, but the tags are not available, neither on the console nor via the cli.
This makes it impossible to filter for a desired snapshot from the target account.
For background, the user in the target account has the following policy in effect:

            "Effect": "Allow",
            "Action": "ec2:*",
            "Resource": "*"

Here's an example of what I'm seeing; from the source account:

$ aws --region us-east-2 ec2 describe-snapshots --snapshot-ids snap-XXXXX
{
    "Snapshots": [
        {
            "Description": "snapshot for testing",
            "VolumeSize": 50,
            "Tags": [
                {
                    "Value": "test-snapshot",
                    "Key": "Name"
                }
            ],
            "Encrypted": true,
            "VolumeId": "vol-XXXXX",
            "State": "completed",
            "KmsKeyId": "arn:aws:kms:us-east-2:XXXXX:key/mrk-XXXXX",
            "StartTime": "2022-04-19T18:29:36.069Z",
            "Progress": "100%",
            "OwnerId": "XXXXX",
            "SnapshotId": "snap-XXXXX"
        }
    ]
}

but from the target account

$ aws --region us-east-2 ec2 describe-snapshots --owner-ids 012345678900 --snapshot-ids snap-11111111111111111
{
    "Snapshots": [
        {
            "Description": "snapshot for testing",
            "VolumeSize": 50,
            "Encrypted": true,
            "VolumeId": "vol-22222222222222222",
            "State": "completed",
            "KmsKeyId": "arn:aws:kms:us-east-2:012345678900:key/mrk-00000000000000000000000000000000",
            "StartTime": "2022-04-19T18:29:36.069Z",
            "Progress": "100%",
            "OwnerId": "012345678900",
            "SnapshotId": "snap-11111111111111111"
        }
    ]
}

Any ideas on what's going on here?

Cheers!

1 回答
2
已接受的回答

According to this link - https://docs.aws.amazon.com/AWSEC2/latest/UserGuide/Using_Tags.html#tag-restrictions, "When you tag public or shared resources, the tags you assign are available only to your AWS account; no other AWS account will have access to those tags."

AWS
ganesh
已回答 2 年前
  • Thank you for the clarification.

    Is there a good way filter cross-account snapshots? I suppose I could try using the description, but this feels a little fraught.

您未登录。 登录 发布回答。

一个好的回答可以清楚地解答问题和提供建设性反馈,并能促进提问者的职业发展。

回答问题的准则