aws-infrastructure
from shipshitdev/library
Claude, Cursor, Codex skills and commands
3 stars0 forksUpdated Jan 25, 2026
npx skills add https://github.com/shipshitdev/library --skill aws-infrastructureSKILL.md
AWS Infrastructure Expert
Overview
This skill enables AI assistants to help set up and configure AWS infrastructure for micro startups, including EC2 instances, VPCs, security groups, load balancers, DNS, and SSL certificates.
When to Use This Skill
This skill activates when users need:
- EC2 instance setup and configuration
- VPC and networking setup
- Security group configuration
- Application Load Balancer setup
- Route53 DNS configuration
- SSL/TLS certificate management (ACM)
- Auto-scaling groups
- CloudWatch monitoring
EC2 Setup
Instance Types
- Development: t3.medium (2 vCPU, 4GB RAM)
- Production (small): t3.large (2 vCPU, 8GB RAM)
- Production (medium): m5.large (2 vCPU, 8GB RAM)
Storage
- Use gp3 SSD volumes
- Development: 20GB minimum
- Production: 100GB+ based on needs
- Enable EBS snapshots for backups
Key Pairs
- Generate or import SSH key pairs
- Store private keys securely
- Use IAM roles instead of access keys when possible
VPC Configuration
Basic Setup
- Create VPC with CIDR block (e.g., 10.0.0.0/16)
- Create public and private subnets
- Set up Internet Gateway
- Configure route tables
- Set up NAT Gateway for private subnets (if needed)
Subnets
- Public subnets: For load balancers, bastion hosts
- Private subnets: For application servers, databases
- Multi-AZ for high availability
Security Groups
Application Security Group
Inbound:
- HTTP (80) from ALB security group
- HTTPS (443) from ALB security group
- SSH (22) from bastion/your IP only
Outbound:
- All traffic (0.0.0.0/0)
Database Security Group
Inbound:
- MongoDB (27017) from application security group only
- Redis (6379) from application security group only
- SSH (22) from bastion/your IP only
Outbound:
- All traffic (0.0.0.0/0)
Load Balancer Security Group
Inbound:
- HTTP (80) from 0.0.0.0/0
- HTTPS (443) from 0.0.0.0/0
Outbound:
- HTTP (80) to application security group
- HTTPS (443) to application security group
Application Load Balancer
Setup
- Create ALB in public subnets
- Configure target groups (EC2 instances)
- Set up health checks
- Configure listeners (HTTP → HTTPS redirect)
- Attach SSL certificate from ACM
Health Checks
- Path:
/healthor/api/health - Protocol: HTTP
- Port: 3001 (backend) or 3000 (frontend)
- Healthy threshold: 2
- Unhealthy threshold: 2
- Timeout: 5 seconds
- Interval: 30 seconds
Route53 DNS
Domain Setup
- Create hosted zone for domain
- Create A record (alias) pointing to ALB
- Create CNAME for www subdomain
- Update nameservers at domain registrar
SSL/TLS (ACM)
- Request certificate in ACM (us-east-1 for CloudFront/ALB)
- Validate via DNS (add CNAME records)
- Attach certificate to ALB listener
- Certificate auto-renews
CloudWatch Monitoring
Metrics
- EC2: CPU, Memory, Disk, Network
- ALB: Request count, Target response time, HTTP errors
- Custom metrics for application-specific data
Alarms
- High CPU utilization
- Low disk space
- Application errors (via CloudWatch Logs)
- Unhealthy target instances
Best Practices
- Use IAM roles instead of access keys
- Enable CloudTrail for audit logging
- Use VPC endpoints for AWS service access
- Implement least privilege security groups
- Use private subnets for databases
- Enable encryption at rest for EBS volumes
- Set up automated backups (EBS snapshots)
- Monitor costs with AWS Cost Explorer
Integration
This skill integrates with /db-setup for MongoDB on EC2 and /deploy for deployment workflows.
Repository
shipshitdev/libraryParent repository
Repository Stats
Stars3
Forks0