aws

Provides comprehensive AWS cloud capabilities for the Golden Armada AI Agent Fleet Platform.

Safety Notice

This listing is imported from skills.sh public index metadata. Review upstream SKILL.md and repository scripts before running.

Copy this and send it to your AI assistant to learn

Install skill "aws" with this command: npx skills add lobbi-docs/claude/lobbi-docs-claude-aws

AWS Skill

Provides comprehensive AWS cloud capabilities for the Golden Armada AI Agent Fleet Platform.

When to Use This Skill

Activate this skill when working with:

  • AWS infrastructure provisioning

  • EKS cluster management

  • S3 storage operations

  • Lambda functions

  • IAM and security

AWS CLI Quick Reference

Configuration


Configure credentials

aws configure

Check identity

aws sts get-caller-identity

Set profile

export AWS_PROFILE=production
aws s3 ls --profile production

EC2


List instances

aws ec2 describe-instances --query 'Reservations[].Instances[].[InstanceId,State.Name,Tags[?Key==Name
].Value]'

Start/Stop

aws ec2 start-instances --instance-ids i-1234567890
aws ec2 stop-instances --instance-ids i-1234567890

Create instance

aws ec2 run-instances 

--image-id ami-12345678 

--instance-type t3.medium 

--key-name my-key 

--security-group-ids sg-12345678 

--subnet-id subnet-12345678 

--tag-specifications 'ResourceType=instance,Tags=[{Key=Name,Value=my-instance}]'

EKS


List clusters

aws eks list-clusters

Update kubeconfig

aws eks update-kubeconfig --name golden-armada-cluster --region us-west-2

Describe cluster

aws eks describe-cluster --name golden-armada-cluster

Create cluster (with eksctl)

eksctl create cluster 

--name golden-armada-cluster 

--region us-west-2 

--nodegroup-name workers 

--node-type t3.medium 

--nodes 3 

--managed

S3


List buckets

aws s3 ls

List objects

aws s3 ls s3://bucket-name/

Copy files

aws s3 cp file.txt s3://bucket-name/
aws s3 cp s3://bucket-name/file.txt .
aws s3 sync ./local-dir s3://bucket-name/prefix/

Presigned URL

aws s3 presign s3://bucket-name/file.txt --expires-in 3600

Lambda


List functions

aws lambda list-functions

Invoke function

aws lambda invoke 

--function-name my-function 

--payload '{"key": "value"}' 

response.json

Update function code

aws lambda update-function-code 

--function-name my-function 

--zip-file fileb://function.zip

View logs

aws logs filter-log-events 

--log-group-name /aws/lambda/my-function 

--start-time $(date -d '1 hour ago' +%s000)

RDS


List instances

aws rds describe-db-instances

Create snapshot

aws rds create-db-snapshot 

--db-instance-identifier golden-armada-db 

--db-snapshot-identifier snapshot-$(date +%Y%m%d)

Modify instance

aws rds modify-db-instance 

--db-instance-identifier golden-armada-db 

--db-instance-class db.t3.large 

--apply-immediately

IAM


List users

aws iam list-users

Create role

aws iam create-role 

--role-name agent-role 

--assume-role-policy-document file://trust-policy.json

Attach policy

aws iam attach-role-policy 

--role-name agent-role 

--policy-arn arn:aws:iam::aws:policy/AmazonS3ReadOnlyAccess

Boto3 Python SDK

import boto3

S3 operations

s3 = boto3.client('s3')

Upload file

s3.upload_file('local.txt', 'bucket-name', 'remote.txt')

Download file

s3.download_file('bucket-name', 'remote.txt', 'local.txt')

List objects

response = s3.list_objects_v2(Bucket='bucket-name', Prefix='prefix/')
for obj in response.get('Contents', []):
print(obj['Key'])

EC2 operations

ec2 = boto3.resource('ec2')

Get all running instances

instances = ec2.instances.filter(
Filters=[{'Name': 'instance-state-name', 'Values': ['running']}]
)
for instance in instances:
print(f"{instance.id}: {instance.instance_type}")

Lambda invocation

lambda_client = boto3.client('lambda')
response = lambda_client.invoke(
FunctionName='my-function',
InvocationType='RequestResponse',
Payload=json.dumps({'key': 'value'})
)
result = json.loads(response['Payload'].read())

Terraform AWS Resources


VPC

resource "aws_vpc" "main" {
cidr_block           = "10.0.0.0/16"
enable_dns_hostnames = true
enable_dns_support   = true

tags = {
Name = "golden-armada-vpc"
}
}

EKS Cluster

resource "aws_eks_cluster" "main" {
name     = "golden-armada-cluster"
role_arn = aws_iam_role.cluster.arn
version  = "1.28"

vpc_config {
subnet_ids = aws_subnet.private[*].id
}
}

RDS Instance

resource "aws_db_instance" "main" {
identifier        = "golden-armada-db"
engine            = "postgres"
engine_version    = "15"
instance_class    = "db.t3.medium"
allocated_storage = 20

db_name  = "golden_armada"
username = var.db_username
password = var.db_password

vpc_security_group_ids = [aws_security_group.db.id]
db_subnet_group_name   = aws_db_subnet_group.main.name

skip_final_snapshot = true
}

Best Practices

  • Use IAM Roles instead of access keys

  • Enable CloudTrail for audit logging

  • Tag all resources for cost tracking

  • Use VPC for network isolation

  • Enable encryption at rest and in transit

  • Implement least privilege IAM policies

Source Transparency

This detail page is rendered from real SKILL.md content. Trust labels are metadata-based hints, not a safety guarantee.

Related Skills

Related by shared tags or category signals.

Automation

workflow automation

No summary provided by upstream source.

Repository SourceNeeds Review
Automation

jira orchestration workflow

No summary provided by upstream source.

Repository SourceNeeds Review
Automation

pr-workflow

No summary provided by upstream source.

Repository SourceNeeds Review