

• The AWS Systems Manager CloudWatch Dashboard will no longer be available after April 30, 2026. Customers can continue to use Amazon CloudWatch console to view, create, and manage their Amazon CloudWatch dashboards, just as they do today. For more information, see [Amazon CloudWatch Dashboard documentation](https://docs.aws.amazon.com/AmazonCloudWatch/latest/monitoring/CloudWatch_Dashboards.html). 

# Downloading or exporting a managed node report
<a name="explore-nodes-download-report"></a>

You can use the Systems Manager **Explore nodes** feature to view filtered or unfiltered lists of managed nodes for your AWS organization or account in the Systems Manager console. For cases where you want to view the data offline or process it in another application, you can save the report as a `CSV` or `JSON` file.

Depending on the size of the report, you're prompted to download the report to your local machine or export it to an Amazon S3 bucket. Reports are saved to S3 buckets in `CSV` format only.

**To download or export a managed node report**

1. Open the AWS Systems Manager console at [https://console.aws.amazon.com/systems-manager/](https://console.aws.amazon.com/systems-manager/).

1. In the navigation pane, choose **Explore nodes**.

1. (Optional) Follow the steps in [Choosing a filter view for managed node summaries](explore-nodes-filter-view.md) to refine the list of managed nodes displayed for your organization or account.

1. Choose **Report** (![\[The download report icon\]](http://docs.aws.amazon.com/systems-manager/latest/userguide/images/download-arrow-icon.png)).

1. If the **Download report** dialog box is displayed, do the following:

   1. For **File name**, enter a name for the file. We recommend specifying a name that represents the scope of the report, such as `all-organization-nodes` or `ec2-instances-out-of-date-agent`.

   1. For **Included columns**, specify whether to include columns for all available node details, or only those you've selected for your current display.
**Tip**  
For information about managing the columns in your report display, see [Managing node report content and appearance](explore-nodes-manage-report-display.md).

   1. For **File format**, select **CSV** or **JSON**, depending on how you will use the file.

   1. For **Spreadsheet heading**, to include a column headings row in a `CSV` file, select **Include row of column names**.

   1. Choose **Download**.

   The report is saved to the default download location according to your browser's settings.

1. If the **Export to Amazon S3** dialog box is displayed, do the following:

   1. For **S3 URI**, enter the URI for the bucket to export the report to.
**Tip**  
To view a list of your buckets in the Amazon S3 console, choose **View**. To select from a list of buckets in your account, choose **Browse S3**.

   1. For **Authorization method**, specify the service role to use to provide permissions for exporting the report to the bucket.

      If you choose to let Systems Manager create the role for you, it provides all needed permissions and trust statements for the operation.

      If you want to use or create your own role, the role must include the required permissions and trust statements. For information about creating this role, see [Creating a custom service role to export diagnosis reports to S3](create-s3-export-role.md).

   1. Choose **Submit**.

# Creating a custom service role to export diagnosis reports to S3
<a name="create-s3-export-role"></a>

When you are viewing filtered or unfiltered lists of managed nodes for your AWS organization or account in the Systems Manager **Explore nodes** page, you can export the list as a report to an Amazon S3 bucket as a `CSV` file.

To do so, you must specify a service role with the necessary permissions and trust policy for the operation. You can choose for Systems Manager to create the role for you during the process of downloading the report. Optionally, you can create the role and its required policy yourself.

**To create a custom service role to export diagnosis reports to S3**

1. Follow the steps in [Creating policies using the JSON editor](https://docs.aws.amazon.com/IAM/latest/UserGuide/access_policies_create-console.html#access_policies_create-json-editor) in the *IAM User Guide*.
   + Use the following for the policy content, making sure to replace the *placeholder values* with your own information.

------
#### [ JSON ]

****  

     ```
     {
       "Version":"2012-10-17",		 	 	 
       "Statement": [
         {
           "Effect": "Allow",
           "Action": [
             "s3:GetObject",
             "s3:PutObject"
           ],
           "Resource": "arn:aws:s3:::amzn-s3-demo-bucket/*",
           "Condition": {
             "StringEquals": {
               "aws:ResourceAccount": "111122223333"
             }
           }
         },
         {
           "Effect": "Allow",
           "Action": [
             "s3:GetBucketAcl",
             "s3:ListBucket",
             "s3:PutLifecycleConfiguration",
             "s3:GetLifecycleConfiguration"
           ],
           "Resource": "arn:aws:s3:::amzn-s3-demo-bucket",
           "Condition": {
             "StringEquals": {
               "aws:ResourceAccount": "111122223333"
             }
           }
         },
         {
           "Effect": "Allow",
           "Action": [
             "ssm:ListNodes"
           ],
           "Resource": "*"
         }
       ]
     }
     ```

------
   + Give the policy a name to help you recognize it easily in the next step.

1. Follow the steps in [Creating an IAM role using a custom trust policy (console)](https://docs.aws.amazon.com/IAM/latest/UserGuide/id_roles_create_for-custom.html) in the *IAM User Guide*.
   + For step 4, enter the following trust policy, making sure to replace the *placeholder values* with your own information.

------
#### [ JSON ]

****  

     ```
     {
       "Version":"2012-10-17",		 	 	 
       "Statement": [
         {
           "Sid": "SSMAssumeRole",
           "Effect": "Allow",
           "Principal": {
             "Service": "ssm.amazonaws.com"
           },
           "Action": "sts:AssumeRole",
           "Condition": {
             "StringEquals": {
               "aws:SourceAccount": "111122223333"
             }
           }
         }
       ]
     }
     ```

------

1. For step 10, choose **Step 2: Add permissions** and select the name of the policy you created in the previous step.

After you create the role, you can select it when following the steps in [Downloading or exporting a managed node report](explore-nodes-download-report.md).