Commands Executed via AWS SSM

Prev Next

The Lucidity Cost Saving Assessment uses AWS Systems Manager Run Command to securely collect configuration and storage information from EC2 instances. This is a standard AWS mechanism used by thousands of customers — no agents, no SSH keys, and no access to customer data.

What these commands do

They gather only infrastructure metadata needed for storage and optimization analysis, such as:

  • Attached disks and partitions

  • Storage pools / volume groups

  • Available vs. used capacity

  • Operating system version

Why SSM is used

  • 100% read-only and automated

  • No manual login

  • Secure and fully auditable via CloudTrail

  • Respects customers’ access boundaries and security policies

Purpose of commands

Purpose

Example Actions

Identify disks & filesystems

List block devices, physical or virtual disk, mount points, drive letters

Check available storage

View free space & total size

Check advanced storage setups

Identify Btrfs/ZFS/LVM or Windows Pool where applicable

OS identification

Retrieve Linux or Windows OS version

Uses native PowerShell cmdlets like Get-PhysicalDisk & Get-Partition for Windows and df, lsblk, are used for Linux — all standard OS utilities

Compliance & Transparency

  • All SSM actions are logged in AWS CloudTrail

  • SSM Run Command history is visible in your AWS console

  • No customer data is read, stored, or transmitted

  • Short-lived access only for the duration of Assessment. Once a role is deleted all access is removed.

The tool uses secure, read-only AWS native methods to collect storage configuration details — not application or user data. This ensures a smooth and secure optimization assessment without disrupting workloads or requiring privileged access.