Aws Cloudformation Cloudwatch

🌐Community
by giuseppe-trisciuoglio · vlatest · Repository

Provides AWS guidance and assistance for deploying and managing cloud infrastructure.

Install on your platform

We auto-selected Claude Code based on this skill’s supported platforms.

1

Run in terminal (recommended)

terminal
claude mcp add aws-cloudformation-cloudwatch npx -- -y @trustedskills/aws-cloudformation-cloudwatch
2

Or manually add to ~/.claude/settings.json

~/.claude/settings.json
{
  "mcpServers": {
    "aws-cloudformation-cloudwatch": {
      "command": "npx",
      "args": [
        "-y",
        "@trustedskills/aws-cloudformation-cloudwatch"
      ]
    }
  }
}

Requires Claude Code (claude CLI). Run claude --version to verify your install.

About This Skill

What it does

This skill enables AI agents to programmatically create, update, and delete AWS CloudWatch alarms using Amazon CloudFormation templates. It automates the definition of monitoring rules for metrics like CPU utilization or error rates without manual console interaction.

When to use it

  • Automating the deployment of monitoring infrastructure alongside application code in CI/CD pipelines.
  • Standardizing alarm configurations across multiple AWS accounts or regions via Infrastructure as Code (IaC).
  • Rapidly provisioning complex alerting strategies for new microservices during development sprints.
  • Enforcing compliance by ensuring critical resources always have defined health checks upon creation.

Key capabilities

  • Template-driven creation: Generates CloudWatch alarms based on JSON/YAML CloudFormation templates.
  • Resource management: Supports full lifecycle operations including update and deletion of alarm stacks.
  • Metric targeting: Configures alarms for specific AWS service metrics or custom data sources.
  • Action integration: Defines actions such as sending SNS notifications or executing Lambda functions upon threshold breaches.

Example prompts

  • "Create a CloudFormation stack to set up a CPU utilization alarm for my EC2 instance with a 5-minute evaluation period."
  • "Update an existing CloudWatch alarm template to change the threshold from 80% to 90% and add an SNS topic as a notification target."
  • "Delete the CloudWatch alarm stack associated with the legacy payment service to clean up unused resources."

Tips & gotchas

Ensure your AWS account has the necessary IAM permissions for cloudformation:CreateStack and cloudwatch:PutAlarm. Be aware that changes to existing alarms via CloudFormation may trigger drift detection or require specific update policies defined in the template.

Tags

🛡️

TrustedSkills Verification

Unlike other registries that point to live repositories, TrustedSkills pins every skill to a verified commit hash. This protects you from malicious updates — what you install today is exactly what was reviewed and verified.

Security Audits

Gen Agent Trust HubPass
SocketPass
SnykPass

Details

Version
vlatest
License
Author
giuseppe-trisciuoglio
Installs
69

🌐 Community

Passed automated security scans.