Discover No SSM Instances 
 Discover EC2 instances without SSM enabled.
  Source code • Permissions 
   Usage  
     | Parameter |  Description |  Type |  Required |  Default value |  
    instance_ids |  Instance IDs to focus on |  list(string) |  No |  None |  
  region |  Region for operation |  string |  No |  Session default |  
  debug |  Increase log verbosity |  bool |  No |  False |  
  silent |  Decrease log verbosity |  bool |  No |  False |  
  output |  Output format   table |  string |  No |  None |  
  session |  Established session |  object |  No |  None |  
  
    Output 
 Returns a list of discovered instance IDs:
 ['i-1234567890abcdef0', 'i-abcdef1234567890']
     Examples 
 Discover instances without SSM enabled in eu-west-2:
 aaws ec2 discover_no_ssm_instances --region eu-west-2
    Discover if specific instances don’t have SSM enabled:
 aaws ec2 discover_no_ssm_instances --instance_ids i-1234567890abcdef0 i-abcdef1234567890
         Examples 
 Discover instances without SSM enabled in eu-west-2:
 from avtomat_aws import ec2
response = ec2.discover_no_ssm_instances(region="eu-west-2")
    Discover if specific instances don’t have SSM enabled:
 from avtomat_aws import ec2
response = ec2.discover_no_ssm_instances(instance_ids=['i-1234567890abcdef0', 'i-abcdef1234567890'])