Home Miscellaneous How to Resolve AWS SSM Agent Not Showing as Managed: Complete Fixing Guide

How to Resolve AWS SSM Agent Not Showing as Managed: Complete Fixing Guide

by SupportPRO Admin

This guide shares some practical pointers for digging into issues with AWS Systems Manager. Most of the time, problems show up in a few predictable places — the SSM Agent, Session Manager, Parameter Store, or Automation workflows. The idea here is to help you zero in on what’s actually going wrong instead of chasing symptoms

1. SSM Agent Connectivity

Check the Instance IAM Role

Start by making sure the EC2 instance actually has an IAM instance profile.
The role should include AmazonSSMManagedInstanceCore.
If you’re using a custom IAM policy, double-check that it lets the agent talk to the Systems Manager service — that part gets missed more often than we’d like to admit.

Network Reachability

If the instance lives in a public subnet:

  • It needs a public IP.
  • Outbound HTTPS (443) should be open.

If it’s in a private subnet:

  • Make sure it can reach the internet through a NAT Gateway, or that VPC endpoints are in place.
  • Route tables and security groups should allow outbound 443.
    Network issues are easily the most common blockers here.

Instances Without Internet

If your instance has no path out to the internet at all, set up these endpoints:

ssm.<region>.amazonaws.com

ssmmessages.<region>.amazonaws.com

ec2messages.<region>.amazonaws.com

After creating them:

  • Attach them to the subnets the instance is in.
  • Enable Private DNS. Otherwise, the agent will try to reach public endpoints and fail.

Check the Agent Service

Run:

sudo systemctl status amazon-ssm-agent

If it’s down:

sudo systemctl start amazon-ssm-agent

sudo systemctl enable amazon-ssm-agent

If it’s missing, install it according to your OS instructions.

Instance Metadata Service

The agent pulls credentials from IMDS.
If IMDS is disabled (which sometimes happens by accident in hardened images), the agent won’t authenticate and will quietly fail.

Confirm It Shows as “Managed”

Go to: Systems Manager → Managed Instances.
If the instance isn’t listed or shows Connection Lost, check:

/var/log/amazon/ssm/amazon-ssm-agent.log

The logs usually make the problem obvious once you see it.

2. Session Manager Issues

Verify the Agent

If your Session Manager screen just sits there blank or stalls, it’s usually the agent not responding.

sudo systemctl status amazon-ssm-agent

Restart if needed.

IAM Permissions

The role needs to be able to start sessions:

ssm:StartSession

ssm:DescribeInstanceInformation

If session logs are encrypted with KMS, both the user and the instance role need kms:Decrypt permissions. Easy detail to overlook.

Network / Proxy Check

Run:

nc -zv ssmmessages.<region>.amazonaws.com 443

If you’re in a proxy setup, make sure the agent is using the proxy settings — it doesn’t inherit them by default.

Logging & Encryption

If sessions drop or disconnect randomly, check:

  • S3 or CloudWatch log bucket access
  • KMS permissions if logging is encrypted

3. Parameter Store Issues

IAM Permissions

Make sure the instance role has:

ssm:GetParameter

kms:Decrypt (if the parameter is SecureString)

Parameter Name & Type

Verify the exact path — including any folder-style prefixes.
Also note the type: String, StringList, or SecureString.

CLI Availability

If you’re pulling parameters via scripts:

sudo yum install -y awscli

And confirm the AWS region matches where the parameters live.

4. Automation Document Errors

aws:runCommand

Check that the instance is listed as Managed and that the role can run commands:

ssm:SendCommand

ssm:ListCommandInvocations

Output details are under Systems Manager → Automation → Executions.

aws:copyImage

The automation role should allow:

ec2:CopyImage

ec2:DescribeImages

Typical Causes

  • Trust relationship missing in the role
  • Incorrect parameters (like SubnetId or RoleArn)
  • The instance isn’t registered as Managed
  • VPC endpoint or network path missing

Once you’ve seen these a few times, they’re pretty recognizable.

Conclusion

In most cases, fixing Systems Manager issues comes down to IAM access, network paths, or the agent simply not running. Once those core pieces are aligned, everything else tends to fall into place without much friction. Don’t hesitate to re-check the basics — the root cause is usually simpler than it first appears.If you ever feel like it’s going in circles or you’d rather have a second set of eyes, SupportPRO is always here to help. Whether it’s a quick configuration check or full environment troubleshooting, we’ll work with you to get everything running smoothly again.

Partner with SupportPRO for 24/7 proactive cloud support that keeps your business secure, scalable, and ahead of the curve.

Contact Us today!
guy server checkup

Leave a Comment