Key questions about this property
The answers below summarize the purpose, scope, default effect, and review scenarios for this property.
| What does it do? |
This property determines whether AWS Systems Manager (SSM) discovery is active, allowing for the execution of commands on EC2 instances. |
| What area does it affect? |
Cloud Discovery |
| What does the default mean? |
The default value is "false", which means this behavior is disabled by default. |
| When should you review it? |
Review this property when configuring cloud discovery settings or adjusting security protocols. |
Out of the box property record
Raw metadata from the property record.
| Property name |
glide.discovery.enable_ssm |
| Sys ID |
6134c8e328ef1650f8772bd07999cd28 |
| Type |
boolean |
| Application |
Global |
| Default value |
false |
| Description |
This property determines whether AWS SSM-based discovery is enabled. |
| Updated |
2025-02-11 13:38:01 |
Sources
Official references and nearby text excerpts where this property appears.
Context preview
Snippet 1
... the Virtual Machines (VM) and their attributes. a. Optional: Specify whether you want to perform VM discovery using AWS Systems Manager. Note: This option displays only when the system property glide.discovery.enable_ssm is enabled and AWS is selected as the cloud provider in Step 3. b. Select a MID Server or MID cluster that can discover the VMs. © 2026 ServiceNow, Inc. ...
Context preview
Snippet 2
... via SSM. To configure the MID Server to support these S3-based operations, set the bucket’s region in the mid.discovery.aws_ssm.s3_bucket_region property. • Type: string • Default value: none mid.discovery.aws_ssm.linux.fallback_root_user When the glide.discovery.enable_ssm property is enabled, AWS SSM Discovery on Linux defaults to using the root user for command execution. If you prefer not to configure alternate user credentials on your EC2 instances, ...