Discover No SSM Instances
Discover EC2 instances without SSM enabled.
Source code • Permissions
Usage
| Parameter | Description | Type | Required | Default value |
instance_ids | Instance IDs to focus on | list(string) | No | None |
region | Region for operation | string | No | Session default |
debug | Increase log verbosity | bool | No | False |
silent | Decrease log verbosity | bool | No | False |
output | Output format table | string | No | None |
session | Established session | object | No | None |
Output
Returns a list of discovered instance IDs:
['i-1234567890abcdef0', 'i-abcdef1234567890']
Examples
Discover instances without SSM enabled in eu-west-2:
aaws ec2 discover_no_ssm_instances --region eu-west-2
Discover if specific instances don’t have SSM enabled:
aaws ec2 discover_no_ssm_instances --instance_ids i-1234567890abcdef0 i-abcdef1234567890
Examples
Discover instances without SSM enabled in eu-west-2:
from avtomat_aws import ec2
response = ec2.discover_no_ssm_instances(region="eu-west-2")
Discover if specific instances don’t have SSM enabled:
from avtomat_aws import ec2
response = ec2.discover_no_ssm_instances(instance_ids=['i-1234567890abcdef0', 'i-abcdef1234567890'])