docs.aws.amazon.com
Open in
urlscan Pro
13.35.58.67
Public Scan
URL:
https://docs.aws.amazon.com/AmazonRDS/latest/UserGuide/USER_ShareSnapshot.html
Submission: On May 17 via api from US — Scanned from DE
Submission: On May 17 via api from US — Scanned from DE
Form analysis
0 forms found in the DOMText Content
SELECT YOUR COOKIE PREFERENCES We use essential cookies and similar tools that are necessary to provide our site and services. We use performance cookies to collect anonymous statistics so we can understand how customers use our site and make improvements. Essential cookies cannot be deactivated, but you can click “Customize cookies” to decline performance cookies. If you agree, AWS and approved third parties will also use cookies to provide useful site features, remember your preferences, and display relevant content, including relevant advertising. To continue without accepting these cookies, click “Continue without accepting.” To make more detailed choices or learn more, click “Customize cookies.” Accept all cookiesContinue without acceptingCustomize cookies CUSTOMIZE COOKIE PREFERENCES We use cookies and similar tools (collectively, "cookies") for the following purposes. ESSENTIAL Essential cookies are necessary to provide our site and services and cannot be deactivated. They are usually set in response to your actions on the site, such as setting your privacy preferences, signing in, or filling in forms. PERFORMANCE Performance cookies provide anonymous statistics about how customers navigate our site so we can improve site experience and performance. Approved third parties may perform analytics on our behalf, but they cannot use the data for their own purposes. Allow performance category Allowed FUNCTIONAL Functional cookies help us provide useful site features, remember your preferences, and display relevant content. Approved third parties may set these cookies to provide certain site features. If you do not allow these cookies, then some or all of these services may not function properly. Allow functional category Allowed ADVERTISING Advertising cookies may be set through our site by us or our advertising partners and help us deliver relevant marketing content. If you do not allow these cookies, you will experience less relevant advertising. Allow advertising category Allowed Blocking some types of cookies may impact your experience of our sites. You may review and change your choices at any time by clicking Cookie preferences in the footer of this site. We and selected third-parties use cookies or similar technologies as specified in the AWS Cookie Notice. CancelSave preferences UNABLE TO SAVE COOKIE PREFERENCES We will only store essential cookies at this time, because we were unable to save your cookie preferences. If you want to change your cookie preferences, try again later using the link in the AWS console footer, or contact support if the problem persists. Dismiss Contact Us English Create an AWS Account 1. AWS 2. ... 3. Documentation 4. Amazon RDS 5. User Guide Feedback Preferences AMAZON RELATIONAL DATABASE SERVICE USER GUIDE * What is Amazon RDS? * DB instances * DB instance classes * DB instance storage * Regions, Availability Zones, and Local Zones * Supported Amazon RDS features by Region and engine * Blue/Green Deployments * Cross-Region automated backups * Cross-Region read replicas * Database activity streams * Dual-stack mode * Export snapshots to S3 * IAM database authentication * Kerberos authentication * Multi-AZ DB clusters * Performance Insights * RDS Custom * Amazon RDS Proxy * Secrets Manager integration * Zero-ETL integrations * Engine-native features * DB instance billing for Amazon RDS * On-Demand DB instances * Reserved DB instances * Setting up * Getting started * Creating and connecting to a MariaDB DB instance * Creating and connecting to a Microsoft SQL Server DB instance * Creating and connecting to a MySQL DB instance * Creating and connecting to an Oracle DB instance * Creating and connecting to a PostgreSQL DB instance * Tutorial: Create a web server and an Amazon RDS DB instance * Launch an EC2 instance * Create a DB instance * Install a web server * Tutorial: Create a Lambda function to access your Amazon RDS DB instance * Tutorials and sample code * Best practices for Amazon RDS * Configuring a DB instance * Creating a DB instance * Creating resources with AWS CloudFormation * Connecting to a DB instance * Working with option groups * Working with parameter groups * Overview of parameter groups * Working with DB parameter groups * Working with DB cluster parameter groups * Comparing DB parameter groups * Specifying DB parameters * Creating an ElastiCache cache from Amazon RDS * Managing a DB instance * Stopping a DB instance * Starting a DB instance * Connecting an AWS compute resource * Connecting an EC2 instance * Connecting a Lambda function * Modifying a DB instance * Maintaining a DB instance * Upgrading the engine version * Renaming a DB instance * Rebooting a DB instance * Working with DB instance read replicas * Tagging RDS resources * Working with ARNs * Working with storage * Deleting a DB instance * Configuring and managing a Multi-AZ deployment * Multi-AZ DB instance deployments * Multi-AZ DB cluster deployments * Creating a Multi-AZ DB cluster * Connecting to a Multi-AZ DB cluster * Connecting an AWS compute resource and a Multi-AZ DB cluster * Connecting an EC2 instance and a Multi-AZ DB cluster * Connecting a Lambda function and a Multi-AZ DB cluster * Modifying a Multi-AZ DB cluster * Renaming a Multi-AZ DB cluster * Rebooting a Multi-AZ DB cluster * Working with Multi-AZ DB cluster read replicas * Using PostgreSQL logical replication with Multi-AZ DB clusters * Deleting a Multi-AZ DB cluster * Limitations of Multi-AZ DB clusters * Using RDS Extended Support * RDS Extended Support overview * RDS Extended Support charges * Versions with RDS Extended Support * Responsibilities with RDS Extended Support * Creating a DB instance or a Multi-AZ DB cluster * Viewing RDS Extended Support enrollment * Restoring a DB instance or a Multi-AZ DB cluster * Using Blue/Green Deployments for database updates * Overview of Amazon RDS Blue/Green Deployments * Creating a blue/green deployment * Viewing a blue/green deployment * Switching a blue/green deployment * Deleting a blue/green deployment * Backing up, restoring, and exporting data * Introduction to backups * Managing automated backups * Cross-Region automated backups * Managing manual backups * Creating a DB snapshot for a Single-AZ DB instance * Creating a Multi-AZ DB cluster snapshot * Deleting a DB snapshot * Restoring from a DB snapshot * Point-in-time recovery * Restoring a Multi-AZ DB cluster to a specified time * Restoring from a snapshot to a Multi-AZ DB cluster * Restoring from a Multi-AZ DB cluster snapshot to a Single-AZ DB instance * Tutorial: Restore a DB instance from a DB snapshot * Copying a DB snapshot * Sharing a DB snapshot * Exporting DB snapshot data to Amazon S3 * Using AWS Backup * Monitoring metrics in a DB instance * Overview of monitoring * Viewing instance status * Viewing and responding to Amazon RDS recommendations * Viewing Amazon RDS recommendations * Responding to Amazon RDS recommendations * Viewing metrics in the Amazon RDS console * Viewing combined metrics in the Amazon RDS console * Monitoring RDS with CloudWatch * Overview of Amazon RDS and Amazon CloudWatch * Viewing CloudWatch metrics * Exporting Performance Insights metrics to CloudWatch * Creating CloudWatch alarms * Tutorial: Creating a CloudWatch alarm for DB cluster replica lag * Monitoring DB load with Performance Insights * Overview of Performance Insights * Database load * Maximum CPU * Amazon RDS DB engine, Region, and instance class support for Performance Insights * Pricing and data retention for Performance Insights * Turning Performance Insights on and off * Turning on the Performance Schema for MariaDB or MySQL * Performance Insights policies * Analyzing metrics with the Performance Insights dashboard * Overview of the dashboard * Accessing the dashboard * Analyzing DB load * Analyzing database performance for a period of time * Analyzing queries * Overview of the Top SQL tab * Accessing more SQL text * Viewing SQL statistics * Analyzing Oracle PDBs * Analyzing execution plans * Overview of analyzing execution plans * Analyzing Oracle execution plans * Analyzing SQL Server execution plans * Viewing Performance Insights proactive recommendations * Retrieving metrics with the Performance Insights API * Logging Performance Insights calls using AWS CloudTrail * Analyzing performance with DevOps Guru for RDS * Monitoring the OS with Enhanced Monitoring * Overview of Enhanced Monitoring * Setting up and enabling Enhanced Monitoring * Viewing OS metrics in the RDS console * Viewing OS metrics using CloudWatch Logs * RDS metrics reference * CloudWatch metrics for RDS * CloudWatch dimensions for RDS * CloudWatch metrics for Performance Insights * Counter metrics for Performance Insights * SQL statistics for Performance Insights * SQL statistics for MariaDB and MySQL * SQL statistics for Oracle * SQL statistics for SQL Server * SQL statistics for RDS PostgreSQL * OS metrics in Enhanced Monitoring * Monitoring events, logs, and database activity streams * Viewing logs, events, and streams in the Amazon RDS console * Monitoring RDS events * Overview of events for Amazon RDS * Viewing Amazon RDS events * Working with Amazon RDS event notification * Overview of Amazon RDS event notification * Granting permissions * Subscribing to Amazon RDS event notification * Amazon RDS event notification tags and attributes * Listing Amazon RDS event notification subscriptions * Modifying an Amazon RDS event notification subscription * Adding a source identifier to an Amazon RDS event notification subscription * Removing a source identifier from an Amazon RDS event notification subscription * Listing the Amazon RDS event notification categories * Deleting an Amazon RDS event notification subscription * Creating a rule that triggers on an Amazon RDS event * Amazon RDS event categories and event messages * Monitoring RDS logs * Viewing and listing database log files * Downloading a database log file * Watching a database log file * Publishing to CloudWatch Logs * Reading log file contents using REST * MariaDB database log files * Microsoft SQL Server database log files * MySQL database log files * Overview of RDS for MySQL database logs * Publishing MySQL logs to Amazon CloudWatch Logs * Managing table-based MySQL logs * Configuring MySQL binary logging * Accessing MySQL binary logs * Oracle database log files * PostgreSQL database log files * Monitoring RDS API calls in CloudTrail * Monitoring RDS with Database Activity Streams * Overview * Configuring Oracle unified auditing * Configuring SQL Server auditing * Starting a database activity stream * Modifying a database activity stream * Getting the activity stream status * Stopping a database activity stream * Monitoring activity streams * Managing access to activity streams * Working with Amazon RDS Custom * RDS Custom architecture * RDS Custom security * Working with RDS Custom for Oracle * RDS Custom for Oracle workflow * Database architecture for Amazon RDS Custom for Oracle * Feature availability and support for RDS Custom for Oracle * RDS Custom for Oracle requirements and limitations * Setting up your RDS Custom for Oracle environment * Working with CEVs for RDS Custom for Oracle * Preparing to create a CEV * Creating a CEV * Modifying CEV status * Viewing CEV details * Deleting a CEV * Configuring an RDS Custom for Oracle DB instance * Managing an RDS Custom for Oracle DB instance * Working with RDS Custom for Oracle replicas * Backing up and restoring an RDS Custom for Oracle DB instance * Working with option groups in RDS Custom for Oracle * Migrating to RDS Custom for Oracle * Upgrading an RDS Custom for Oracle DB instance * Troubleshooting RDS Custom for Oracle * Working with RDS Custom for SQL Server * RDS Custom for SQL Server workflow * RDS Custom for SQL Server requirements and limitations * Setting up your RDS Custom for SQL Server environment * Bring Your Own Media with RDS Custom for SQL Server * Working with CEVs for RDS Custom for SQL Server * Preparing to create a CEV for RDS Custom for SQL Server * Creating a CEV for RDS Custom for SQL Server * Modifying a CEV for RDS Custom for SQL Server * Viewing CEV details for Amazon RDS Custom for SQL Server * Deleting a CEV for RDS Custom for SQL Server * Creating and connecting to an RDS Custom for SQL Server DB instance * Managing an RDS Custom for SQL Server DB instance * Managing a Multi-AZ deployment for RDS Custom for SQL Server * Backing up and restoring an RDS Custom for SQL Server DB instance * Migrating an on-premises database to RDS Custom for SQL Server * Upgrading a DB instance for RDS Custom for SQL Server * Troubleshooting Amazon RDS Custom for SQL Server * Working with RDS on AWS Outposts * Support for Amazon RDS features * Supported DB instance classes * Customer-owned IP addresses * Multi-AZ deployments * Creating DB instances for RDS on Outposts * Creating read replicas for RDS on Outposts * Considerations for restoring DB instances * Using RDS Proxy * Planning where to use RDS Proxy * RDS Proxy concepts and terminology * Getting started with RDS Proxy * Managing an RDS Proxy * Working with RDS Proxy endpoints * Monitoring RDS Proxy with CloudWatch * Working with RDS Proxy events * RDS Proxy examples * Troubleshooting RDS Proxy * Using RDS Proxy with AWS CloudFormation * Working with zero-ETL integrations (preview) * Getting started with zero-ETL integrations * Creating zero-ETL integrations * Adding and querying data * Viewing and monitoring zero-ETL integrations * Deleting zero-ETL integrations * Troubleshooting zero-ETL integrations * Db2 on Amazon RDS * Db2 overview * Db2 features * Db2 versions * Db2 licensing * Db2 instance classes * Db2 parameters * EBCDIC collation * Db2 local time zone * DB instance prerequisites * Connecting to your Db2 DB instance * Finding the endpoint * IBM Db2 CLP * IBM CLPPlus * DBeaver * IBM Db2 Data Management Console * Security group considerations * Securing Db2 connections * Encrypting with SSL/TLS * Using Kerberos authentication * Administering your RDS for Db2 DB instance * System tasks * Database tasks * Amazon S3 integration * Create an IAM policy * Create an IAM role and attach your IAM policy * Add your IAM role to your DB instance * Migrating data to Db2 * Migration approaches that use AWS * One-time migration from Linux to Linux environments * Near-zero downtime migration for Linux-based Db2 databases * One-time migration from AIX or Windows to Linux environments * Synchronous migrations from Linux to Linux environments * Using AWS Database Migration Service (AWS DMS) * Native Db2 tools * Connecting a client machine to a DB instance * db2look tool * IMPORT command with a client machine * INGEST utility * INSERT command from a self-managed Db2 database * LOAD command with a client machine * Options for RDS for Db2 * Db2 audit logging * External stored procedures * Known issues and limitations * RDS for Db2 stored procedures * Granting and revoking privileges * Managing buffer pools * Managing databases * Managing tablespaces * Managing audit policies * RDS for Db2 user-defined functions * Checking a task status * MariaDB on Amazon RDS * MariaDB feature support * MariaDB versions * Connecting to a DB instance running MariaDB * Securing MariaDB connections * MariaDB security * Encrypting with SSL/TLS * Using new SSL/TLS certificates * Improving query performance with RDS Optimized Reads * Improving write performance with RDS Optimized Writes for MariaDB * Upgrading the MariaDB DB engine * Importing data into a MariaDB DB instance * Importing data from an external database * Importing data to a DB instance with reduced downtime * Importing data from any source * Working with MariaDB replication * Working with MariaDB read replicas * Configuring GTID-based replication with an external source instance * Configuring binary log file position replication with an external source instance * Options for MariaDB * Parameters for MariaDB * Migrating data from a MySQL DB snapshot to a MariaDB DB instance * MariaDB on Amazon RDS SQL reference * mysql.rds_replica_status * mysql.rds_set_external_master_gtid * mysql.rds_kill_query_id * Local time zone * Known issues and limitations for MariaDB * Microsoft SQL Server on Amazon RDS * Licensing SQL Server on Amazon RDS * Connecting to a DB instance running SQL Server * Working with Active Directory with RDS for SQL Server * Working with Self Managed Active Directory with a SQL Server DB instance * Working with AWS Managed Active Directory with RDS for SQL Server * Updating applications for new SSL/TLS certificates * Upgrading the SQL Server DB engine * Importing and exporting SQL Server databases * Importing and exporting SQL Server data using other methods * Working with SQL Server read replicas * Multi-AZ for RDS for SQL Server * Additional features for SQL Server * Using SSL with a SQL Server DB instance * Configuring security protocols and ciphers * Amazon S3 integration * Using Database Mail * Instance store support for tempdb * Using extended events * Access to transaction log backups * Options for SQL Server * Linked Servers with Oracle OLEDB * Native backup and restore * Transparent Data Encryption * SQL Server Audit * SQL Server Analysis Services * SQL Server Integration Services * SQL Server Reporting Services * Microsoft Distributed Transaction Coordinator * Common DBA tasks for SQL Server * Accessing the tempdb database * Analyzing database workload with Database Engine Tuning Advisor * Changing the db_owner to the rdsa account for your database * Collations and character sets * Creating a database user * Determining a recovery model * Determining the last failover time * Disabling fast inserts * Dropping a SQL Server database * Renaming a Multi-AZ database * Resetting the db_owner role password * Restoring license-terminated DB instances * Transitioning a database from OFFLINE to ONLINE * Using CDC * Using SQL Server Agent * Working with SQL Server logs * Working with trace and dump files * MySQL on Amazon RDS * MySQL feature support * MySQL versions * Connecting to a DB instance running MySQL * Securing MySQL connections * MySQL security * Password Validation Plugin * Encrypting with SSL/TLS * Using new SSL/TLS certificates * Using Kerberos authentication for MySQL * Improving query performance with RDS Optimized Reads * Improving write performance with RDS Optimized Writes for MySQL * Upgrading the MySQL DB engine * Upgrading a MySQL DB snapshot engine version * Importing data into a MySQL DB instance * Restoring a backup into a MySQL DB instance * Importing data from an external database * Importing data with reduced downtime * Importing data from any source * Working with MySQL replication * Working with MySQL read replicas * Using GTID-based replication * Configuring binary log file position replication with an external source instance * Configuring multi-source replication * Configuring active-active clusters * Exporting data from a MySQL DB instance * Options for MySQL * MariaDB Audit Plugin * memcached * Parameters for MySQL * Common DBA tasks for MySQL * Local time zone * Known issues and limitations * RDS for MySQL stored procedures * Configuring * Ending a session or query * Logging * Managing active-active clusters * Managing multi-source replication * Managing the Global Status History * Replicating * Warming the InnoDB cache * Oracle on Amazon RDS * Oracle overview * Oracle features * Oracle versions * Oracle licensing * Oracle users and privileges * Oracle instance classes * Oracle database architecture * Oracle parameters * Oracle character sets * Oracle limitations * Connecting to your Oracle DB instance * Finding the endpoint * SQL developer * SQL*Plus * Security group considerations * Dedicated and shared server processes * Troubleshooting * Modifying Oracle sqlnet.ora parameters * Securing Oracle connections * Encrypting with SSL * Using new SSL/TLS certificates * Encrypting with NNE * Configuring Kerberos authentication * Region and version availability * Setting up * Managing a DB instance * Connecting with Kerberos authentication * Configuring UTL_HTTP access * Working with CDBs * Overview of CDBs * Configuring a CDB * Backing up and restoring a CDB * Converting a non-CDB to a CDB * Converting the single-tenant configuration to multi-tenant * Adding an RDS for Oracle tenant database to your CDB instance * Modifying an RDS for Oracle tenant database * Deleting an RDS for Oracle tenant database from your CDB * Viewing tenant database details * Upgrading your CDB * Administering your Oracle DB instance * System tasks * Database tasks * Log tasks * RMAN tasks * Oracle Scheduler tasks * Diagnostic tasks * Other tasks * Transporting tablespaces * Configuring advanced RDS for Oracle features * Configuring the instance store * Turning on HugePages * Turning on extended data types * Importing data into Oracle * Importing using Oracle SQL Developer * Migrating using Oracle transportable tablespaces * Importing using Oracle Data Pump * Importing using Oracle Export/Import * Importing using Oracle SQL*Loader * Migrating with Oracle materialized views * Working with Oracle replicas * Overview of Oracle replicas * Requirements and considerations for Oracle replicas * Preparing to create an Oracle replica * Creating a mounted Oracle replica * Modifying the replica mode * Working with Oracle replica backups * Performing an Oracle Data Guard switchover * Troubleshooting Oracle replicas * Options for Oracle * Overview of Oracle DB options * Amazon S3 integration * Application Express (APEX) * Amazon EFS integration * Java virtual machine (JVM) * Enterprise Manager * OEM Database Express * OEM Management Agent * Label security * Locator * Multimedia * Native network encryption (NNE) * OLAP * Secure Sockets Layer (SSL) * Spatial * SQLT * Statspack * Time zone * Time zone file autoupgrade * Transparent Data Encryption (TDE) * UTL_MAIL * XML DB * Upgrading the Oracle DB engine * Overview of Oracle upgrades * Major version upgrades * Minor version upgrades * Upgrade considerations * Testing an upgrade * Upgrading an RDS for Oracle DB instance * Upgrading an Oracle DB snapshot * Tools and third-party software for Oracle * Using Oracle GoldenGate * Using the Oracle Repository Creation Utility * Configuring CMAN * Installing a Siebel database on Oracle on Amazon RDS * Oracle Database engine releases * PostgreSQL on Amazon RDS * PostgreSQL features * Connecting to a PostgreSQL instance * Securing connections with SSL/TLS * Using SSL with a PostgreSQL DB instance * Updating applications to use new SSL/TLS certificates * Using Kerberos authentication * Setting up * Managing a DB instance in a Domain * Connecting with Kerberos authentication * Using a custom DNS server for outbound network access * Upgrading the PostgreSQL DB engine * Upgrading a PostgreSQL DB snapshot engine version * Working with read replicas for RDS for PostgreSQL * Improving query performance with RDS Optimized Reads * Importing data into PostgreSQL * Importing a PostgreSQL database from an Amazon EC2 instance * Using the \copy command to import data to a table on a PostgreSQL DB instance * Importing data from Amazon S3 into RDS for PostgreSQL * Transporting PostgreSQL databases between DB instances * Exporting PostgreSQL data to Amazon S3 * Invoking a Lambda function from RDS for PostgreSQL * Lambda function and parameter reference * Common DBA tasks for RDS for PostgreSQL * Collations supported in RDS for PostgreSQL * Understanding PostgreSQL roles and permissions * Working with the PostgreSQL autovacuum * Managing temporary files with PostgreSQL * Working with parameters * Tuning with wait events for RDS for PostgreSQL * Essential concepts for RDS for PostgreSQL tuning * RDS for PostgreSQL wait events * Client:ClientRead * Client:ClientWrite * CPU * IO:BufFileRead and IO:BufFileWrite * IO:DataFileRead * IO:WALWrite * Lock:advisory * Lock:extend * Lock:Relation * Lock:transactionid * Lock:tuple * LWLock:BufferMapping (LWLock:buffer_mapping) * LWLock:BufferIO (IPC:BufferIO) * LWLock:buffer_content (BufferContent) * LWLock:lock_manager (LWLock:lockmanager) * Timeout:PgSleep * Timeout:VacuumDelay * Tuning RDS for PostgreSQL with Amazon DevOps Guru proactive insights * Database has long running idle in transaction connection * Using PostgreSQL extensions * Managing partitions with the pg_partman extension * Using pgAudit to log database activity * Scheduling maintenance with the pg_cron extension * Using pglogical to synchronize data * Managing spatial data with PostGIS * Supported foreign data wrappers * Working with Trusted Language Extensions for PostgreSQL * Functions reference for Trusted Language Extensions * pgtle.available_extensions * pgtle.available_extension_versions * pgtle.extension_update_paths * pgtle.install_extension * pgtle.install_update_path * pgtle.register_feature * pgtle.register_feature_if_not_exists * pgtle.set_default_version * pgtle.uninstall_extension * pgtle.uninstall_extension * pgtle.uninstall_extension_if_exists * pgtle.uninstall_update_path * pgtle.uninstall_update_path_if_exists * pgtle.unregister_feature * pgtle.unregister_feature_if_exists * Hooks reference for Trusted Language Extensions * Password check hook (passcheck) * Code examples * Actions * CreateDBInstance * CreateDBParameterGroup * CreateDBSnapshot * DeleteDBInstance * DeleteDBParameterGroup * DescribeAccountAttributes * DescribeDBEngineVersions * DescribeDBInstances * DescribeDBParameterGroups * DescribeDBParameters * DescribeDBSnapshots * DescribeOrderableDBInstanceOptions * GenerateRDSAuthToken * ModifyDBInstance * ModifyDBParameterGroup * RebootDBInstance * Scenarios * Get started with DB instances * Serverless examples * Connecting to an Amazon RDS database in a Lambda function * Cross-service examples * Create an Aurora Serverless work item tracker * Security * Database authentication * Password management with RDS and Secrets Manager * Data protection * Data encryption * Encrypting Amazon RDS resources * AWS KMS key management * Using SSL/TLS to encrypt a connection * Rotating your SSL/TLS certificate * Internetwork traffic privacy * Identity and access management * How Amazon RDS works with IAM * Identity-based policy examples * AWS managed policies * Policy updates * Cross-service confused deputy prevention * IAM database authentication * Enabling and disabling * Creating and using an IAM policy for IAM database access * Creating a database account using IAM authentication * Connecting to your DB instance using IAM authentication * Connecting using IAM: AWS CLI and mysql client * Connecting using IAM authentication from the command line: AWS CLI and psql client * Connecting using IAM authentication and the AWS SDK for .NET * Connecting using IAM authentication and the AWS SDK for Go * Connecting using IAM authentication and the AWS SDK for Java * Connecting using IAM authentication and the AWS SDK for Python (Boto3) * Troubleshooting * Logging and monitoring * Compliance validation * Resilience * Infrastructure security * VPC endpoints (AWS PrivateLink) * Security best practices * Controlling access with security groups * Master user account privileges * Service-linked roles * Using Amazon RDS with Amazon VPC * Working with a DB instance in a VPC * Updating the VPC for a DB instance * Scenarios for accessing a DB instance in a VPC * Tutorial: Create a VPC for use with a DB instance (IPv4 only) * Tutorial: Create a VPC for use with a DB instance (dual-stack mode) * Moving a DB instance into a VPC * Quotas and constraints * Troubleshooting * Amazon RDS API reference * Using the Query API * Troubleshooting applications * Document history * AWS Glossary Sharing a DB snapshot - Amazon Relational Database Service AWSDocumentationAmazon RDSUser Guide Sharing a snapshotSharing public snapshotsSharing encrypted snapshotsStopping snapshot sharing SHARING A DB SNAPSHOT PDFRSS Using Amazon RDS, you can share a manual DB snapshot in the following ways: * Sharing a manual DB snapshot, whether encrypted or unencrypted, enables authorized AWS accounts to copy the snapshot. * Sharing an unencrypted manual DB snapshot enables authorized AWS accounts to directly restore a DB instance from the snapshot instead of taking a copy of it and restoring from that. However, you can't restore a DB instance from a DB snapshot that is both shared and encrypted. Instead, you can make a copy of the DB snapshot and restore the DB instance from the copy. NOTE To share an automated DB snapshot, create a manual DB snapshot by copying the automated snapshot, and then share that copy. This process also applies to AWS Backup–generated resources. For more information on copying a snapshot, see Copying a DB snapshot. For more information on restoring a DB instance from a DB snapshot, see Restoring from a DB snapshot. You can share a manual snapshot with up to 20 other AWS accounts. The following limitations apply when sharing manual snapshots with other AWS accounts: * When you restore a DB instance from a shared snapshot using the AWS Command Line Interface (AWS CLI) or Amazon RDS API, you must specify the Amazon Resource Name (ARN) of the shared snapshot as the snapshot identifier. * You can't share a DB snapshot that uses an option group with permanent or persistent options, except for Oracle DB instances that have the Timezone or OLS option (or both). A permanent option can't be removed from an option group. Option groups with persistent options can't be removed from a DB instance once the option group has been assigned to the DB instance. The following table lists permanent and persistent options and their related DB engines. Option name Persistent Permanent DB engine TDE Yes No Microsoft SQL Server Enterprise Edition TDE Yes Yes Oracle Enterprise Edition Timezone Yes Yes Oracle Enterprise Edition Oracle Standard Edition Oracle Standard Edition One Oracle Standard Edition 2 For Oracle DB instances, you can copy shared DB snapshots that have the Timezone or OLS option (or both). To do so, specify a target option group that includes these options when you copy the DB snapshot. The OLS option is permanent and persistent only for Oracle DB instances running Oracle version 12.2 or higher. For more information about these options, see Oracle time zone and Oracle Label Security. * You can't share a snapshot of a Multi-AZ DB cluster. CONTENTS * Sharing a snapshot * Sharing public snapshots * Viewing public snapshots owned by other AWS accounts * Viewing your own public snapshots * Sharing public snapshots from deprecated DB engine versions * Sharing encrypted snapshots * Create a customer managed key and give access to it * Copy and share the snapshot from the source account * Copy the shared snapshot in the target account * Stopping snapshot sharing SHARING A SNAPSHOT You can share a DB snapshot using the AWS Management Console, the AWS CLI, or the RDS API. Using the Amazon RDS console, you can share a manual DB snapshot with up to 20 AWS accounts. You can also use the console to stop sharing a manual snapshot with one or more accounts. TO SHARE A MANUAL DB SNAPSHOT BY USING THE AMAZON RDS CONSOLE 1. Sign in to the AWS Management Console and open the Amazon RDS console at https://console.aws.amazon.com/rds/. 2. In the navigation pane, choose Snapshots. 3. Select the manual snapshot that you want to share. 4. For Actions, choose Share snapshot. 5. Choose one of the following options for DB snapshot visibility. * If the source is unencrypted, choose Public to permit all AWS accounts to restore a DB instance from your manual DB snapshot, or choose Private to permit only AWS accounts that you specify to restore a DB instance from your manual DB snapshot. WARNING If you set DB snapshot visibility to Public, all AWS accounts can restore a DB instance from your manual DB snapshot and have access to your data. Do not share any manual DB snapshots that contain private information as Public. For more information, see Sharing public snapshots. * If the source is encrypted, DB snapshot visibility is set as Private because encrypted snapshots can't be shared as public. NOTE Snapshots that have been encrypted with the default AWS KMS key can't be shared. For information on how to work around this issue, see Sharing encrypted snapshots. 6. For AWS Account ID, enter the AWS account identifier for an account that you want to permit to restore a DB instance from your manual snapshot, and then choose Add. Repeat to include additional AWS account identifiers, up to 20 AWS accounts. If you make an error when adding an AWS account identifier to the list of permitted accounts, you can delete it from the list by choosing Delete at the right of the incorrect AWS account identifier. 7. After you have added identifiers for all of the AWS accounts that you want to permit to restore the manual snapshot, choose Save to save your changes. CONSOLE Using the Amazon RDS console, you can share a manual DB snapshot with up to 20 AWS accounts. You can also use the console to stop sharing a manual snapshot with one or more accounts. TO SHARE A MANUAL DB SNAPSHOT BY USING THE AMAZON RDS CONSOLE 1. Sign in to the AWS Management Console and open the Amazon RDS console at https://console.aws.amazon.com/rds/. 2. In the navigation pane, choose Snapshots. 3. Select the manual snapshot that you want to share. 4. For Actions, choose Share snapshot. 5. Choose one of the following options for DB snapshot visibility. * If the source is unencrypted, choose Public to permit all AWS accounts to restore a DB instance from your manual DB snapshot, or choose Private to permit only AWS accounts that you specify to restore a DB instance from your manual DB snapshot. WARNING If you set DB snapshot visibility to Public, all AWS accounts can restore a DB instance from your manual DB snapshot and have access to your data. Do not share any manual DB snapshots that contain private information as Public. For more information, see Sharing public snapshots. * If the source is encrypted, DB snapshot visibility is set as Private because encrypted snapshots can't be shared as public. NOTE Snapshots that have been encrypted with the default AWS KMS key can't be shared. For information on how to work around this issue, see Sharing encrypted snapshots. 6. For AWS Account ID, enter the AWS account identifier for an account that you want to permit to restore a DB instance from your manual snapshot, and then choose Add. Repeat to include additional AWS account identifiers, up to 20 AWS accounts. If you make an error when adding an AWS account identifier to the list of permitted accounts, you can delete it from the list by choosing Delete at the right of the incorrect AWS account identifier. 7. After you have added identifiers for all of the AWS accounts that you want to permit to restore the manual snapshot, choose Save to save your changes. To share a DB snapshot, use the aws rds modify-db-snapshot-attribute command. Use the --values-to-add parameter to add a list of the IDs for the AWS accounts that are authorized to restore the manual snapshot. EXAMPLE OF SHARING A SNAPSHOT WITH A SINGLE ACCOUNT The following example enables AWS account identifier 123456789012 to restore the DB snapshot named db7-snapshot. For Linux, macOS, or Unix: aws rds modify-db-snapshot-attribute \ --db-snapshot-identifier db7-snapshot \ --attribute-name restore \ --values-to-add 123456789012 For Windows: aws rds modify-db-snapshot-attribute ^ --db-snapshot-identifier db7-snapshot ^ --attribute-name restore ^ --values-to-add 123456789012 EXAMPLE OF SHARING A SNAPSHOT WITH MULTIPLE ACCOUNTS The following example enables two AWS account identifiers, 111122223333 and 444455556666, to restore the DB snapshot named manual-snapshot1. For Linux, macOS, or Unix: aws rds modify-db-snapshot-attribute \ --db-snapshot-identifier manual-snapshot1 \ --attribute-name restore \ --values-to-add {"111122223333","444455556666"} For Windows: aws rds modify-db-snapshot-attribute ^ --db-snapshot-identifier manual-snapshot1 ^ --attribute-name restore ^ --values-to-add "[\"111122223333\",\"444455556666\"]" NOTE When using the Windows command prompt, you must escape double quotes (") in JSON code by prefixing them with a backslash (\). To list the AWS accounts enabled to restore a snapshot, use the describe-db-snapshot-attributes AWS CLI command. AWS CLI To share a DB snapshot, use the aws rds modify-db-snapshot-attribute command. Use the --values-to-add parameter to add a list of the IDs for the AWS accounts that are authorized to restore the manual snapshot. EXAMPLE OF SHARING A SNAPSHOT WITH A SINGLE ACCOUNT The following example enables AWS account identifier 123456789012 to restore the DB snapshot named db7-snapshot. For Linux, macOS, or Unix: aws rds modify-db-snapshot-attribute \ --db-snapshot-identifier db7-snapshot \ --attribute-name restore \ --values-to-add 123456789012 For Windows: aws rds modify-db-snapshot-attribute ^ --db-snapshot-identifier db7-snapshot ^ --attribute-name restore ^ --values-to-add 123456789012 EXAMPLE OF SHARING A SNAPSHOT WITH MULTIPLE ACCOUNTS The following example enables two AWS account identifiers, 111122223333 and 444455556666, to restore the DB snapshot named manual-snapshot1. For Linux, macOS, or Unix: aws rds modify-db-snapshot-attribute \ --db-snapshot-identifier manual-snapshot1 \ --attribute-name restore \ --values-to-add {"111122223333","444455556666"} For Windows: aws rds modify-db-snapshot-attribute ^ --db-snapshot-identifier manual-snapshot1 ^ --attribute-name restore ^ --values-to-add "[\"111122223333\",\"444455556666\"]" NOTE When using the Windows command prompt, you must escape double quotes (") in JSON code by prefixing them with a backslash (\). To list the AWS accounts enabled to restore a snapshot, use the describe-db-snapshot-attributes AWS CLI command. You can also share a manual DB snapshot with other AWS accounts by using the Amazon RDS API. To do so, call the ModifyDBSnapshotAttribute operation. Specify restore for AttributeName, and use the ValuesToAdd parameter to add a list of the IDs for the AWS accounts that are authorized to restore the manual snapshot. To make a manual snapshot public and restorable by all AWS accounts, use the value all. However, take care not to add the all value for any manual snapshots that contain private information that you don't want to be available to all AWS accounts. Also, don't specify all for encrypted snapshots, because making such snapshots public isn't supported. To list all of the AWS accounts permitted to restore a snapshot, use the DescribeDBSnapshotAttributes API operation. RDS API You can also share a manual DB snapshot with other AWS accounts by using the Amazon RDS API. To do so, call the ModifyDBSnapshotAttribute operation. Specify restore for AttributeName, and use the ValuesToAdd parameter to add a list of the IDs for the AWS accounts that are authorized to restore the manual snapshot. To make a manual snapshot public and restorable by all AWS accounts, use the value all. However, take care not to add the all value for any manual snapshots that contain private information that you don't want to be available to all AWS accounts. Also, don't specify all for encrypted snapshots, because making such snapshots public isn't supported. To list all of the AWS accounts permitted to restore a snapshot, use the DescribeDBSnapshotAttributes API operation. SHARING PUBLIC SNAPSHOTS You can also share an unencrypted manual snapshot as public, which makes the snapshot available to all AWS accounts. Make sure when sharing a snapshot as public that none of your private information is included in the public snapshot. When a snapshot is shared publicly, it gives all AWS accounts permission both to copy the snapshot and to create DB instances from it. You aren't billed for the backup storage of public snapshots owned by other accounts. You're billed only for snapshots that you own. If you copy a public snapshot, you own the copy. You're billed for the backup storage of your snapshot copy. If you create a DB instance from a public snapshot, you're billed for that DB instance. For Amazon RDS pricing information, see the Amazon RDS product page. You can delete only the public snapshots that you own. To delete a shared or public snapshot, make sure to log into the AWS account that owns the snapshot. VIEWING PUBLIC SNAPSHOTS OWNED BY OTHER AWS ACCOUNTS You can view public snapshots owned by other accounts in a particular AWS Region on the Public tab of the Snapshots page in the Amazon RDS console. Your snapshots (those owned by your account) don't appear on this tab. TO VIEW PUBLIC SNAPSHOTS 1. Open the Amazon RDS console at https://console.aws.amazon.com/rds/. 2. In the navigation pane, choose Snapshots. 3. Choose the Public tab. The public snapshots appear. You can see which account owns a public snapshot in the Owner column. NOTE You might have to modify the page preferences, by selecting the gear icon at the upper right of the Public snapshots list, to see this column. VIEWING YOUR OWN PUBLIC SNAPSHOTS You can use the following AWS CLI command (Unix only) to view the public snapshots owned by your AWS account in a particular AWS Region. aws rds describe-db-snapshots --snapshot-type public --include-public | grep account_number The output returned is similar to the following example if you have public snapshots. "DBSnapshotArn": "arn:aws:rds:us-east-1:123456789012:snapshot:mysnapshot1", "DBSnapshotArn": "arn:aws:rds:us-east-1:123456789012:snapshot:mysnapshot2", NOTE You might see duplicate entries for DBSnapshotIdentifier or SourceDBSnapshotIdentifier. SHARING PUBLIC SNAPSHOTS FROM DEPRECATED DB ENGINE VERSIONS Restoring or copying public snapshots from deprecated DB engine versions isn't supported. The RDS for Oracle and RDS for PostgreSQL DB engines support upgrading DB snapshot engine versions directly. You can upgrade your snapshots, then re-share them publicly. For more information, see the following: * Upgrading an Oracle DB snapshot * Upgrading a PostgreSQL DB snapshot engine version For other DB engines, perform the following steps to make your existing unsupported public snapshot available to restore or copy: 1. Mark the snapshot as private. 2. Restore the snapshot. 3. Upgrade the restored DB instance to a supported engine version. 4. Create a new snapshot. 5. Re-share the snapshot publicly. SHARING ENCRYPTED SNAPSHOTS You can share DB snapshots that have been encrypted "at rest" using the AES-256 encryption algorithm, as described in Encrypting Amazon RDS resources. The following restrictions apply to sharing encrypted snapshots: * You can't share encrypted snapshots as public. * You can't share Oracle or Microsoft SQL Server snapshots that are encrypted using Transparent Data Encryption (TDE). * You can't share a snapshot that has been encrypted using the default KMS key of the AWS account that shared the snapshot. To work around the default KMS key issue, perform the following tasks: 1. Create a customer managed key and give access to it. 2. Copy and share the snapshot from the source account. 3. Copy the shared snapshot in the target account. CREATE A CUSTOMER MANAGED KEY AND GIVE ACCESS TO IT First you create a custom KMS key in the same AWS Region as the encrypted DB snapshot. While creating the customer managed key, you give access to it for another AWS account. TO CREATE A CUSTOMER MANAGED KEY AND GIVE ACCESS TO IT 1. Sign in to the AWS Management Console from the source AWS account. 2. Open the AWS KMS console at https://console.aws.amazon.com/kms. 3. To change the AWS Region, use the Region selector in the upper-right corner of the page. 4. In the navigation pane, choose Customer managed keys. 5. Choose Create key. 6. On the Configure key page: 1. For Key type, select Symmetric. 2. For Key usage, select Encrypt and decrypt. 3. Expand Advanced options. 4. For Key material origin, select KMS. 5. For Regionality, select Single-Region key. 6. Choose Next. 7. On the Add labels page: 1. For Alias. enter a display name for your KMS key, for example share-snapshot. 2. (Optional) Enter a description for your KMS key. 3. (Optional) Add tags to your KMS key. 4. Choose Next. 8. On the Define key administrative permissions page, choose Next. 9. On the Define key usage permissions page: 1. For Other AWS accounts, choose Add another AWS account. 2. Enter the ID of the AWS account to which you want to give access. You can give access to multiple AWS accounts. 3. Choose Next. 10. Review your KMS key, then choose Finish. COPY AND SHARE THE SNAPSHOT FROM THE SOURCE ACCOUNT Next you copy the source DB snapshot to a new snapshot using the customer managed key. Then you share it with the target AWS account. TO COPY AND SHARE THE SNAPSHOT 1. Sign in to the AWS Management Console from the source AWS account. 2. Open the Amazon RDS console at https://console.aws.amazon.com/rds/ 3. In the navigation pane, choose Snapshots. 4. Select the DB snapshot you want to copy. 5. For Actions, choose Copy snapshot. 6. On the Copy snapshot page: 1. For Destination Region, choose the AWS Region where you created the customer managed key in the previous procedure. 2. Enter the name of the DB snapshot copy in New DB Snapshot Identifier. 3. For AWS KMS key, choose the customer managed key that you created. 4. Choose Copy snapshot. 7. When the snapshot copy is available, select it. 8. For Actions, choose Share snapshot. 9. On the Snapshot permissions page: 1. Enter the AWS account ID with which you're sharing the snapshot copy, then choose Add. 2. Choose Save. The snapshot is shared. COPY THE SHARED SNAPSHOT IN THE TARGET ACCOUNT Now you can copy the shared snapshot in the target AWS account. TO COPY THE SHARED SNAPSHOT 1. Sign in to the AWS Management Console from the target AWS account. 2. Open the Amazon RDS console at https://console.aws.amazon.com/rds/ 3. In the navigation pane, choose Snapshots. 4. Choose the Shared with me tab. 5. Select the shared snapshot. 6. For Actions, choose Copy snapshot. 7. Choose your settings for copying the snapshot as in the previous procedure, but use an AWS KMS key that belongs to the target account. Choose Copy snapshot. STOPPING SNAPSHOT SHARING To stop sharing a DB snapshot, you remove permission from the target AWS account. TO STOP SHARING A MANUAL DB SNAPSHOT WITH AN AWS ACCOUNT 1. Sign in to the AWS Management Console and open the Amazon RDS console at https://console.aws.amazon.com/rds/. 2. In the navigation pane, choose Snapshots. 3. Select the manual snapshot that you want to stop sharing. 4. Choose Actions, and then choose Share snapshot. 5. To remove permission for an AWS account, choose Delete for the AWS account identifier for that account from the list of authorized accounts. 6. Choose Save to save your changes. CONSOLE TO STOP SHARING A MANUAL DB SNAPSHOT WITH AN AWS ACCOUNT 1. Sign in to the AWS Management Console and open the Amazon RDS console at https://console.aws.amazon.com/rds/. 2. In the navigation pane, choose Snapshots. 3. Select the manual snapshot that you want to stop sharing. 4. Choose Actions, and then choose Share snapshot. 5. To remove permission for an AWS account, choose Delete for the AWS account identifier for that account from the list of authorized accounts. 6. Choose Save to save your changes. To remove an AWS account identifier from the list, use the --values-to-remove parameter. EXAMPLE OF STOPPING SNAPSHOT SHARING The following example prevents AWS account ID 444455556666 from restoring the snapshot. For Linux, macOS, or Unix: aws rds modify-db-snapshot-attribute \ --db-snapshot-identifier manual-snapshot1 \ --attribute-name restore \ --values-to-remove 444455556666 For Windows: aws rds modify-db-snapshot-attribute ^ --db-snapshot-identifier manual-snapshot1 ^ --attribute-name restore ^ --values-to-remove 444455556666 CLI To remove an AWS account identifier from the list, use the --values-to-remove parameter. EXAMPLE OF STOPPING SNAPSHOT SHARING The following example prevents AWS account ID 444455556666 from restoring the snapshot. For Linux, macOS, or Unix: aws rds modify-db-snapshot-attribute \ --db-snapshot-identifier manual-snapshot1 \ --attribute-name restore \ --values-to-remove 444455556666 For Windows: aws rds modify-db-snapshot-attribute ^ --db-snapshot-identifier manual-snapshot1 ^ --attribute-name restore ^ --values-to-remove 444455556666 To remove sharing permission for an AWS account, use the ModifyDBSnapshotAttribute operation with AttributeName set to restore and the ValuesToRemove parameter. To mark a manual snapshot as private, remove the value all from the values list for the restore attribute. RDS API To remove sharing permission for an AWS account, use the ModifyDBSnapshotAttribute operation with AttributeName set to restore and the ValuesToRemove parameter. To mark a manual snapshot as private, remove the value all from the values list for the restore attribute. Javascript is disabled or is unavailable in your browser. To use the Amazon Web Services Documentation, Javascript must be enabled. Please refer to your browser's Help pages for instructions. Document Conventions Copying a DB snapshot Exporting DB snapshot data to Amazon S3 Did this page help you? - Yes Thanks for letting us know we're doing a good job! If you've got a moment, please tell us what we did right so we can do more of it. Did this page help you? - No Thanks for letting us know this page needs work. We're sorry we let you down. If you've got a moment, please tell us how we can make the documentation better. DID THIS PAGE HELP YOU? Yes No Provide feedback NEXT TOPIC: Exporting DB snapshot data to Amazon S3 PREVIOUS TOPIC: Copying a DB snapshot NEED HELP? * Try AWS re:Post * Connect with an AWS IQ expert PrivacySite termsCookie preferences © 2024, Amazon Web Services, Inc. or its affiliates. All rights reserved. ON THIS PAGE * Sharing a snapshot * Sharing public snapshots * Sharing encrypted snapshots * Stopping snapshot sharing CHOOSE THE CUSTOMER MANAGED KEY. Close PERMIT AWS ACCOUNTS TO RESTORE A MANUAL DB SNAPSHOT Close