You know that quiet moment when an EC2 instance refuses to behave, and you need to check metrics, logs, or permissions fast? That is when the dream of “automated observability meets managed access” either works or derails. Checkmk and AWS Systems Manager make that dream stable, auditable, and fast if you wire them up right.
Checkmk gives you deep infrastructure monitoring across your AWS estate. Systems Manager (SSM) lets you run commands or patch fleets without ever cracking open SSH. Together they form a powerful combo: observability that never leaves your IAM boundaries. No keys lying around, no blind spots between metrics and control.
Here is the logic of a good Checkmk EC2 Systems Manager integration. Systems Manager becomes the access plane, using IAM roles and Session Manager channels to communicate. Checkmk collects data through those secure pipes instead of direct network access. Every action is authenticated by AWS Identity and Access Management and logged to CloudTrail. The result is a closed loop of monitoring and control that honors your security posture by default.
Keep a few basics straight when setting it up. Each EC2 instance needs the SSM agent running with an IAM role that grants minimal necessary permissions. Your Checkmk server should authenticate using that role rather than static credentials. Map your instances as dynamic hosts in Checkmk using AWS discovery, then configure the “Check AWS EC2” and “Check SSM” families of checks. Once that link is active, metrics and status will sync automatically without opening ports or juggling SSH keys.
Featured snippet answer: To connect Checkmk with EC2 Systems Manager, ensure SSM agents and IAM roles are configured on your instances, enable AWS API access in Checkmk, and use the AWS special agent to pull performance and system data. This provides full visibility through SSM without direct network exposure.