Aws Cloudformation Cloudwatch
Provides AWS guidance and assistance for deploying and managing cloud infrastructure.
Install on your platform
We auto-selected Claude Code based on this skill’s supported platforms.
Run in terminal (recommended)
claude mcp add aws-cloudformation-cloudwatch npx -- -y @trustedskills/aws-cloudformation-cloudwatch
Or manually add to ~/.claude/settings.json
{
"mcpServers": {
"aws-cloudformation-cloudwatch": {
"command": "npx",
"args": [
"-y",
"@trustedskills/aws-cloudformation-cloudwatch"
]
}
}
}Requires Claude Code (claude CLI). Run claude --version to verify your install.
About This Skill
What it does
This skill enables AI agents to programmatically create, update, and delete AWS CloudWatch alarms using Amazon CloudFormation templates. It automates the definition of monitoring rules for metrics like CPU utilization or error rates without manual console interaction.
When to use it
- Automating the deployment of monitoring infrastructure alongside application code in CI/CD pipelines.
- Standardizing alarm configurations across multiple AWS accounts or regions via Infrastructure as Code (IaC).
- Rapidly provisioning complex alerting strategies for new microservices during development sprints.
- Enforcing compliance by ensuring critical resources always have defined health checks upon creation.
Key capabilities
- Template-driven creation: Generates CloudWatch alarms based on JSON/YAML CloudFormation templates.
- Resource management: Supports full lifecycle operations including update and deletion of alarm stacks.
- Metric targeting: Configures alarms for specific AWS service metrics or custom data sources.
- Action integration: Defines actions such as sending SNS notifications or executing Lambda functions upon threshold breaches.
Example prompts
- "Create a CloudFormation stack to set up a CPU utilization alarm for my EC2 instance with a 5-minute evaluation period."
- "Update an existing CloudWatch alarm template to change the threshold from 80% to 90% and add an SNS topic as a notification target."
- "Delete the CloudWatch alarm stack associated with the legacy payment service to clean up unused resources."
Tips & gotchas
Ensure your AWS account has the necessary IAM permissions for cloudformation:CreateStack and cloudwatch:PutAlarm. Be aware that changes to existing alarms via CloudFormation may trigger drift detection or require specific update policies defined in the template.
Tags
TrustedSkills Verification
Unlike other registries that point to live repositories, TrustedSkills pins every skill to a verified commit hash. This protects you from malicious updates — what you install today is exactly what was reviewed and verified.
Security Audits
| Gen Agent Trust Hub | Pass |
| Socket | Pass |
| Snyk | Pass |
🌐 Community
Passed automated security scans.