Skip to Content

AWS

Connect to AWS cloud services to execute AWS CLI commands.

Key Features

  • AWS CLI command execution
  • AWS service management and retrieval
  • Resource status checking
  • Automated AWS task execution

Basic Information

Authentication Method

Authenticates using AWS access keys.

Input Parameters

  • Access Key (required): AWS access key ID
  • Secret Access Key (required): AWS secret access key
  • Session Token (optional): Session token when using temporary credentials
  • Region (required): AWS region (e.g., us-east-1, ap-northeast-2)

Supported MCP Tools

AWS CLI Execution Tool

run_aws_cli

Executes AWS CLI commands and returns results.

Usage Example

For example,

  • When you input “Check current AWS account information” as a prompt,
  • The LLM calls the run_aws_cli tool through MCP to execute the aws sts get-caller-identity command.
  • Then, it responds in the chat based on the tool call results.

Supported AWS CLI Command Examples

Account & Authentication

  • aws sts get-caller-identity: Check current user information
  • aws sts assume-role: Switch roles

EC2 Management

  • aws ec2 describe-instances: Retrieve EC2 instance list
  • aws ec2 start-instances: Start instances
  • aws ec2 stop-instances: Stop instances

S3 Management

  • aws s3 ls: Retrieve S3 bucket list
  • aws s3 cp: Upload/download files
  • aws s3 sync: Synchronize directories

RDS Management

  • aws rds describe-db-instances: Retrieve RDS instance list
  • aws rds create-db-snapshot: Create snapshots

Lambda Management

  • aws lambda list-functions: Retrieve Lambda function list
  • aws lambda invoke: Execute Lambda functions

CloudFormation Management

  • aws cloudformation list-stacks: Retrieve stack list
  • aws cloudformation describe-stacks: Retrieve detailed stack information

AWS Credential Setup Method

  1. Create user in AWS IAM console
  2. Attach necessary permission policies
  3. Create and download access keys
  4. Store the created access key and secret key in a secure location

Notes

  • Keep AWS credentials secure.
  • It’s recommended to grant only the minimum necessary permissions.
  • Timeout is set for command execution (default 30 seconds).
  • Be careful when executing commands that may incur costs.
  • Use with particular caution in production environments.
Last updated on