Comprehensive developer toolkit providing reusable skills for Java/Spring Boot, TypeScript/NestJS/React/Next.js, Python, PHP, AWS CloudFormation, AI/RAG, DevOps, and more.
82
82%
Does it follow best practices?
Impact
Pending
No eval scenarios have been run
Risky
Do not use without reviewing
This skill provides comprehensive AWS CLI mastery for advanced cloud engineers who need to manage AWS resources efficiently from the command line. The "Beast Mode" approach emphasizes speed, precision, automation, and security-first patterns for handling complex cloud infrastructure tasks.
Use this skill when:
This skill covers the following AWS services with advanced CLI patterns:
Determine which category best matches the user's request:
| Category | Services | Common Tasks |
|---|---|---|
| Compute | EC2, Lambda | Instance management, function deployment, cold starts |
| Storage | S3 | Data migration, lifecycle policies, security audits |
| Database | DynamoDB, RDS | Query optimization, backup management, scaling |
| Networking | VPC, Route53, CloudFront | Troubleshooting, DNS management, CDN config |
| Security | IAM, Secrets Manager | Policy generation, access audits, compliance |
| AI/ML | Bedrock | Model invocation, custom model deployment |
| Observability | CloudWatch | Log analysis, metric collection, alerting |
Reference guides are available in the references/ directory:
compute-mastery.md - EC2 and Lambda advanced patternsdata-ops-beast.md - S3, DynamoDB, and RDS bulk operationsnetworking-security-hardened.md - VPC, IAM, and security auditingautomation-patterns.md - Scripts, aliases, and JMESPath templatesFollow these core principles for all operations:
--dry-run, --no-clobber, and least-privilege checksAlways verify operations:
--dry-run before making changesiam-simulate-principal-policyUse --query flag to transform and filter AWS CLI output:
# Get instance IDs and private IPs in one command
aws ec2 describe-instances \
--query 'Reservations[*].Instances[*].[InstanceId,PrivateIpAddress,State.Name]' \
--output table
# Filter by tag and get only running instances
aws ec2 describe-instances \
--filters "Name=tag:Environment,Values=production" \
--query 'Reservations[].Instances[?State.Name==`running`].[InstanceId,Tags[?Key==`Name`].Value[0]]' \
--output json
# Aggregate costs by service
aws ce get-cost-and-usage \
--time-period Start=2024-01-01,End=2024-01-31 \
--granularity DAILY \
--metrics UnblendedCost \
--group-by Type=DIMENSION,Key=SERVICE \
--query 'ResultsByTime[*].Groups[*].[Keys[0],Metrics.UnblendedCost.Amount]' \
--output tableHandle thousands of resources efficiently:
# Stop all EC2 instances in a specific tag
aws ec2 describe-instances \
--filters "Name=tag:Environment,Values=development" \
--query 'Reservations[].Instances[].InstanceId' \
--output text | xargs aws ec2 stop-instances --instance-ids
# Delete old CloudWatch log streams
aws logs describe-log-streams \
--log-group-name /aws/lambda/my-function \
--query 'logStreams[?lastIngestionTime<`${cutoff_timestamp}`].logStreamName' \
--output text | xargs -r aws logs delete-log-stream --log-group-name /aws/lambda/my-function --log-stream-name
# Parallel S3 sync with GNU Parallel
cat instance_ids.txt | parallel -j 10 "aws ssm start-session --target {}"Properly handle asynchronous resource provisioning:
# Wait for EC2 instance to be running
aws ec2 wait instance-running --instance-ids i-1234567890abcdef0
# Wait for Lambda function to be active
aws lambda wait function-active --function-name my-function
# Wait for RDS instance to be available
aws rds wait db-instance-available --db-instance-identifier my-db
# Custom polling with exponential backoff
aws ec2 describe-instance-status \
--instance-ids i-1234567890abcdef0 \
--query 'InstanceStatuses[0].InstanceState.Name' \
--output text && break || sleep $((i++ * 2))Always apply security best practices:
# Dry run before any destructive operation
aws s3 rm s3://my-bucket/important/ --dryrun
# Validate IAM policy before attaching
aws iam simulate-principal-policy \
--policy-source-arn arn:aws:iam::123456789012:user/myuser \
--action-names s3:GetObject \
--resource-arns arn:aws:s3:::my-bucket/*
# Use least-privilege: check before granting
aws iam get-policy-version \
--policy-arn arn:aws:iam::aws:policy/ReadOnlyAccess \
--version-id v1
# Enable MFA for sensitive operations
aws iam list-mfa-devices --user-name myuserSeamlessly switch between AWS accounts and regions:
# List all available profiles
aws configure list-profiles
# Use specific profile
aws --profile production ec2 describe-instances
# Multi-region query
for region in us-east-1 us-west-2 eu-west-1; do
aws --region $region ec2 describe-vpcs --query 'Vpcs[].VpcId'
done
# Assume role for cross-account access
aws sts assume-role \
--role-arn arn:aws:iam::123456789012:role/AdminRole \
--role-session-name admin-sessionGenerate and deploy CloudFormation/SAM templates:
# Validate CloudFormation template
aws cloudformation validate-template \
--template-body file://template.yaml
# Deploy stack with parameters
aws cloudformation deploy \
--template-file template.yaml \
--stack-name my-stack \
--parameter-overrides ParameterKey=Env,ParameterValue=production \
--capabilities CAPABILITY_IAM
# Package and deploy Lambda
aws cloudformation package \
--template-file template.yaml \
--s3-bucket my-bucket \
--output-template-file packaged.yaml
# Generate SAM deployment config
sam build --use-container
sam deploy --guided# Get instance metadata
aws ec2 describe-instance-attribute --instance-id i-1234567890abcdef0 --attribute instanceType
# Modify instance type (stop first required)
aws ec2 modify-instance-attribute --instance-id i-1234567890abcdef0 --instance-type "{\"Value\": \"t3.large\"}"
# Create AMI from instance
aws ec2 create-image --instance-id i-1234567890abcdef0 --name "my-ami-$(date +%Y%m%d)" --no-reboot
# Manage Spot requests
aws ec2 describe-spot-instance-requests --filters "Name=status,Values=active"# Sync with delete (be careful!)
aws s3 sync s3://source-bucket/ s3://dest-bucket/ --delete
# Multipart upload for large files
aws s3 cp large-file.tar.gz s3://my-bucket/ --storage-class STANDARD_IA
# Generate presigned URL with custom expiry
aws s3 presign s3://my-bucket/file.txt --expires-in 3600
# Configure bucket policy
aws s3api put-bucket-policy --bucket my-bucket --policy file://policy.json# Invoke with payload
aws lambda invoke \
--function-name my-function \
--payload '{"key": "value"}' \
response.json
# Update function configuration
aws lambda update-function-configuration \
--function-name my-function \
--memory-size 512 \
--timeout 300
# Publish new version
aws lambda publish-version --function-name my-function
# Layer management
aws lambda get-layer-version --layer-name my-layer --version-number 1# Query with complex key condition
aws dynamodb query \
--table-name my-table \
--key-condition-expression "PK = :pk AND SK BETWEEN :start AND :end" \
--expression-attribute-values '{"=":{"S":"USER#123"},":start":{"S":"ORDER#0001"},":end":{"S":"ORDER#9999"}}'
# Batch write (up to 25 items)
aws dynamodb batch-write-item \
--request-items file://items.json
# Enable TTL
aws dynamodb update-time-to-live \
--table-name my-table \
--time-to-live-specification "Enabled=true, AttributeName=expiresAt"# Simple retry with backoff
for i in 1 2 3 4 5; do
aws ec2 describe-instances && break
sleep $((i ** 2))
done
# Use --cli-read-timeout and --cli-connect-timeout
aws --cli-read-timeout 60 --cli-connect-timeout 30 ec2 describe-instances# Automatic pagination (default)
aws ec2 describe-instances --max-results 100
# Manual pagination
aws ec2 describe-instances --page-size 100
# Process all pages with jq
aws ec2 describe-instances | jq -r '.Reservations[].Instances[] | .InstanceId'User: "Stop all development EC2 instances"
Claude:
aws ec2 describe-instances \
--filters "Name=tag:Environment,Values=development" "Name=instance-state-name,Values=running" \
--query "Reservations[].Instances[].InstanceId" \
--output text | xargs aws ec2 stop-instances --instance-idsUser: "Migrate all data between S3 buckets with encryption"
Claude:
# Enable versioning on destination
aws s3api put-bucket-versioning --bucket dest-bucket --versioning-configuration Status=Enabled
# Sync with encryption and lifecycle
aws s3 sync s3://source-bucket/ s3://dest-bucket/ \
--sse AES256 \
--storage-class GLACIER \
--exclude "*.tmp"User: "Audit IAM policies for security issues"
Claude:
# List all IAM policies and simulate actions
aws iam list-policies --scope Local --query "Policies[].Arn" --output text | \
while read policy; do
aws iam get-policy-version --policy-arn $policy --version-id v1 | \
jq '.PolicyVersion.Document.Statement[] | select(.Effect=="Allow")'
doneUser: "Deploy Lambda function to all regions"
Claude:
for region in us-east-1 us-west-2 eu-west-1; do
echo "Deploying to $region..."
aws lambda update-function-code \
--function-name my-function \
--zip-file fileb://function.zip \
--region $region \
--publish
doneUser: "Export DynamoDB table to JSON"
Claude:
aws dynamodb scan \
--table-name my-table \
--output json \
--no-paginate | jq -c '.Items[]' > output.jsonl--output json for programmatically processable outputiam-simulate-principal-policy--dry-run for any operation that modifies state--max-results for consistency--recursive for S3 directory operationsrm instead of rb for S3 bucket deletion--region when operating cross-regionplugins
developer-kit-ai
skills
chunking-strategy
prompt-engineering
developer-kit-aws
skills
aws
aws-cli-beast
aws-cost-optimization
aws-drawio-architecture-diagrams
aws-sam-bootstrap
aws-cloudformation
aws-cloudformation-auto-scaling
references
aws-cloudformation-bedrock
references
aws-cloudformation-cloudfront
references
aws-cloudformation-cloudwatch
references
aws-cloudformation-dynamodb
references
aws-cloudformation-ec2
aws-cloudformation-ecs
references
aws-cloudformation-elasticache
aws-cloudformation-iam
references
aws-cloudformation-lambda
references
aws-cloudformation-rds
aws-cloudformation-s3
references
aws-cloudformation-security
references
aws-cloudformation-task-ecs-deploy-gh
aws-cloudformation-vpc
developer-kit-core
skills
developer-kit-java
skills
aws-lambda-java-integration
aws-rds-spring-boot-integration
aws-sdk-java-v2-bedrock
aws-sdk-java-v2-core
aws-sdk-java-v2-dynamodb
aws-sdk-java-v2-kms
aws-sdk-java-v2-lambda
aws-sdk-java-v2-messaging
aws-sdk-java-v2-rds
aws-sdk-java-v2-s3
aws-sdk-java-v2-secrets-manager
graalvm-native-image
langchain4j
langchain4j-mcp-server-patterns
langchain4j-ai-services-patterns
references
langchain4j-mcp-server-patterns
references
langchain4j-rag-implementation-patterns
references
langchain4j-spring-boot-integration
langchain4j-testing-strategies
langchain4j-tool-function-calling-patterns
langchain4j-vector-stores-configuration
references
qdrant
references
spring-ai-mcp-server-patterns
references
spring-boot-actuator
spring-boot-cache
spring-boot-crud-patterns
spring-boot-dependency-injection
spring-boot-event-driven-patterns
spring-boot-openapi-documentation
spring-boot-project-creator
spring-boot-resilience4j
spring-boot-rest-api-standards
spring-boot-saga-pattern
spring-boot-security-jwt
assets
references
scripts
spring-boot-test-patterns
spring-data-jpa
references
spring-data-neo4j
references
unit-test-application-events
unit-test-bean-validation
unit-test-boundary-conditions
unit-test-caching
unit-test-config-properties
unit-test-controller-layer
unit-test-exception-handler
unit-test-json-serialization
unit-test-mapper-converter
unit-test-parameterized
unit-test-scheduled-async
unit-test-service-layer
unit-test-utility-methods
unit-test-wiremock-rest-api
developer-kit-php
skills
aws-lambda-php-integration
developer-kit-python
skills
aws-lambda-python-integration
developer-kit-tools
developer-kit-typescript
skills
aws-lambda-typescript-integration
better-auth
drizzle-orm-patterns
dynamodb-toolbox-patterns
references
nestjs
nestjs-best-practices
nestjs-code-review
nestjs-drizzle-crud-generator
scripts
nextjs-app-router
nextjs-authentication
nextjs-code-review
nextjs-data-fetching
references
nextjs-deployment
nextjs-performance
nx-monorepo
react-code-review
react-patterns
references
shadcn-ui
tailwind-css-patterns
references
tailwind-design-system
references
turborepo-monorepo
typescript-docs
typescript-security-review
zod-validation-utilities