You have a stack spinning jobs in Kubernetes and a batch of EC2 instances running inside secure VPCs. Somewhere between those worlds, someone asks, “Can we trigger patch updates from our workflow?” That’s where Argo Workflows integrated with EC2 Systems Manager earns its keep.
Argo Workflows is the orchestration brain of Kubernetes, designed to define and run complex jobs that would otherwise live in fragile shell scripts. EC2 Systems Manager, or SSM, is AWS’s control plane for automation inside virtual machines. Pair them, and you get infrastructure pipelines that handle parameters, patching, or deployments without crossing risky permission lines.
The integration starts with identity. Argo pods assume roles via IRSA (IAM Roles for Service Accounts). EC2 Systems Manager authenticates those roles through AWS IAM so the workflow can execute commands only within the intended scope. No more long-lived credentials sitting in ConfigMaps. You map service accounts to restricted IAM roles, define what Systems Manager documents to run, and let Argo handle execution flow. The beauty is that each task inherits its permissions with precision. It feels surgical compared to a human clicking around the console.
When running distributed jobs, Systems Manager becomes the hands-on operator, reaching your instances securely. Argo remains the director, maintaining workflow state, retries, and dependency graphs. Common use cases include patch automation, parameter retrieval, or remote executions during CI/CD. The two tools complement each other perfectly: Argo does orchestration logic, and SSM executes controlled operations on EC2 resources.
Quick Answer: How do I connect Argo Workflows with EC2 Systems Manager?
Create an IAM role with permissions for SSM actions, link it to a Kubernetes service account using IRSA, and reference that account in your Argo workflow template. The workflow then calls SSM APIs directly using ephemeral credentials inherited from AWS IAM.