aws

تایید شده

AWS cloud services including EC2, EKS, S3, Lambda, RDS, and IAM. Activate for AWS infrastructure, cloud deployment, and Amazon Web Services integration.

@majiayu000
MIT۱۴۰۴/۱۲/۳
53از ۱۰۰
(0)
۵۳
۱۵
۱۷

نصب مهارت

مهارت‌ها کدهای شخص ثالث از مخازن عمومی GitHub هستند. SkillHub الگوهای مخرب شناخته‌شده را اسکن می‌کند اما نمی‌تواند امنیت را تضمین کند. قبل از نصب، کد منبع را بررسی کنید.

نصب سراسری (سطح کاربر):

npx skillhub install majiayu000/claude-skill-registry/aws

نصب در پروژه فعلی:

npx skillhub install majiayu000/claude-skill-registry/aws --project

مسیر پیشنهادی: ~/.claude/skills/aws/

بررسی هوش مصنوعی

کیفیت دستورالعمل50
دقت توضیحات55
کاربردی بودن49
صحت فنی65

Scored 53 — compact AWS CLI reference with correct commands across 5 services. Useful as a quick reference but provides nothing beyond standard AWS documentation. The 'Golden Armada' reference suggests project origin but commands are generic.

محتوای SKILL.md

---
name: aws
description: AWS cloud services including EC2, EKS, S3, Lambda, RDS, and IAM. Activate for AWS infrastructure, cloud deployment, and Amazon Web Services integration.
allowed-tools:
  - Bash
  - Read
  - Write
  - Edit
  - Glob
  - Grep
---

# AWS Skill

Provides comprehensive AWS cloud capabilities for the Golden Armada AI Agent Fleet Platform.

## When to Use This Skill

Activate this skill when working with:
- AWS infrastructure provisioning
- EKS cluster management
- S3 storage operations
- Lambda functions
- IAM and security

## AWS CLI Quick Reference

### Configuration
\`\`\`bash
# Configure credentials
aws configure

# Check identity
aws sts get-caller-identity

# Set profile
export AWS_PROFILE=production
aws s3 ls --profile production
\`\`\`

### EC2
\`\`\`bash
# List instances
aws ec2 describe-instances --query 'Reservations[].Instances[].[InstanceId,State.Name,Tags[?Key==`Name`].Value]'

# Start/Stop
aws ec2 start-instances --instance-ids i-1234567890
aws ec2 stop-instances --instance-ids i-1234567890

# Create instance
aws ec2 run-instances \
  --image-id ami-12345678 \
  --instance-type t3.medium \
  --key-name my-key \
  --security-group-ids sg-12345678 \
  --subnet-id subnet-12345678 \
  --tag-specifications 'ResourceType=instance,Tags=[{Key=Name,Value=my-instance}]'
\`\`\`

### EKS
\`\`\`bash
# List clusters
aws eks list-clusters

# Update kubeconfig
aws eks update-kubeconfig --name golden-armada-cluster --region us-west-2

# Describe cluster
aws eks describe-cluster --name golden-armada-cluster

# Create cluster (with eksctl)
eksctl create cluster \
  --name golden-armada-cluster \
  --region us-west-2 \
  --nodegroup-name workers \
  --node-type t3.medium \
  --nodes 3 \
  --managed
\`\`\`

### S3
\`\`\`bash
# List buckets
aws s3 ls

# List objects
aws s3 ls s3://bucket-name/

# Copy files
aws s3 cp file.txt s3://bucket-name/
aws s3 cp s3://bucket-name/file.txt .
aws s3 sync ./local-dir s3://bucket-name/prefix/

# Presigned URL
aws s3 presign s3://bucket-name/file.txt --expires-in 3600
\`\`\`

### Lambda
\`\`\`bash
# List functions
aws lambda list-functions

# Invoke function
aws lambda invoke \
  --function-name my-function \
  --payload '{"key": "value"}' \
  response.json

# Update function code
aws lambda update-function-code \
  --function-name my-function \
  --zip-file fileb://function.zip

# View logs
aws logs filter-log-events \
  --log-group-name /aws/lambda/my-function \
  --start-time $(date -d '1 hour ago' +%s000)
\`\`\`

### RDS
\`\`\`bash
# List instances
aws rds describe-db-instances

# Create snapshot
aws rds create-db-snapshot \
  --db-instance-identifier golden-armada-db \
  --db-snapshot-identifier snapshot-$(date +%Y%m%d)

# Modify instance
aws rds modify-db-instance \
  --db-instance-identifier golden-armada-db \
  --db-instance-class db.t3.large \
  --apply-immediately
\`\`\`

### IAM
\`\`\`bash
# List users
aws iam list-users

# Create role
aws iam create-role \
  --role-name agent-role \
  --assume-role-policy-document file://trust-policy.json

# Attach policy
aws iam attach-role-policy \
  --role-name agent-role \
  --policy-arn arn:aws:iam::aws:policy/AmazonS3ReadOnlyAccess
\`\`\`

## Boto3 Python SDK

\`\`\`python
import boto3

# S3 operations
s3 = boto3.client('s3')

# Upload file
s3.upload_file('local.txt', 'bucket-name', 'remote.txt')

# Download file
s3.download_file('bucket-name', 'remote.txt', 'local.txt')

# List objects
response = s3.list_objects_v2(Bucket='bucket-name', Prefix='prefix/')
for obj in response.get('Contents', []):
    print(obj['Key'])

# EC2 operations
ec2 = boto3.resource('ec2')

# Get all running instances
instances = ec2.instances.filter(
    Filters=[{'Name': 'instance-state-name', 'Values': ['running']}]
)
for instance in instances:
    print(f"{instance.id}: {instance.instance_type}")

# Lambda invocation
lambda_client = boto3.client('lambda')
response = lambda_client.invoke(
    FunctionName='my-function',
    InvocationType='RequestResponse',
    Payload=json.dumps({'key': 'value'})
)
result = json.loads(response['Payload'].read())
\`\`\`

## Terraform AWS Resources

\`\`\`hcl
# VPC
resource "aws_vpc" "main" {
  cidr_block           = "10.0.0.0/16"
  enable_dns_hostnames = true
  enable_dns_support   = true

  tags = {
    Name = "golden-armada-vpc"
  }
}

# EKS Cluster
resource "aws_eks_cluster" "main" {
  name     = "golden-armada-cluster"
  role_arn = aws_iam_role.cluster.arn
  version  = "1.28"

  vpc_config {
    subnet_ids = aws_subnet.private[*].id
  }
}

# RDS Instance
resource "aws_db_instance" "main" {
  identifier        = "golden-armada-db"
  engine            = "postgres"
  engine_version    = "15"
  instance_class    = "db.t3.medium"
  allocated_storage = 20

  db_name  = "golden_armada"
  username = var.db_username
  password = var.db_password

  vpc_security_group_ids = [aws_security_group.db.id]
  db_subnet_group_name   = aws_db_subnet_group.main.name

  skip_final_snapshot = true
}
\`\`\`

## Best Practices

1. **Use IAM Roles** instead of access keys
2. **Enable CloudTrail** for audit logging
3. **Tag all resources** for cost tracking
4. **Use VPC** for network isolation
5. **Enable encryption** at rest and in transit
6. **Implement least privilege** IAM policies