aws-ec2-setup

Launch and configure EC2 instances with security groups, IAM roles, key pairs, AMIs, and auto-scaling. Use for virtual servers and managed infrastructure.

Safety Notice

This listing is imported from skills.sh public index metadata. Review upstream SKILL.md and repository scripts before running.

Copy this and send it to your AI assistant to learn

Install skill "aws-ec2-setup" with this command: npx skills add aj-geddes/useful-ai-prompts/aj-geddes-useful-ai-prompts-aws-ec2-setup

AWS EC2 Setup

Table of Contents

Overview

Amazon EC2 provides resizable compute capacity in the cloud. Launch and configure virtual servers with complete control over networking, storage, and security settings. Scale automatically based on demand.

When to Use

  • Web application servers
  • Application backends and APIs
  • Batch processing and compute jobs
  • Development and testing environments
  • Containerized applications (ECS)
  • Kubernetes clusters (EKS)
  • Database servers
  • VPN and proxy servers

Quick Start

Minimal working example:

# Create security group
aws ec2 create-security-group \
  --group-name web-server-sg \
  --description "Web server security group" \
  --vpc-id vpc-12345678

# Add ingress rules
aws ec2 authorize-security-group-ingress \
  --group-id sg-0123456789abcdef0 \
  --protocol tcp \
  --port 80 \
  --cidr 0.0.0.0/0

aws ec2 authorize-security-group-ingress \
  --group-id sg-0123456789abcdef0 \
  --protocol tcp \
  --port 443 \
  --cidr 0.0.0.0/0

aws ec2 authorize-security-group-ingress \
  --group-id sg-0123456789abcdef0 \
  --protocol tcp \
  --port 22 \
  --cidr YOUR_IP/32

// ... (see reference guides for full implementation)

Reference Guides

Detailed implementations in the references/ directory:

GuideContents
EC2 Instance Creation with AWS CLIEC2 Instance Creation with AWS CLI
User Data ScriptUser Data Script
Terraform EC2 ConfigurationTerraform EC2 Configuration

Best Practices

✅ DO

  • Use security groups for network control
  • Attach IAM roles for AWS access
  • Enable CloudWatch monitoring
  • Use AMI for consistent deployments
  • Implement auto-scaling for variable load
  • Use EBS for persistent storage
  • Enable termination protection for production
  • Keep systems patched and updated

❌ DON'T

  • Use overly permissive security groups
  • Store credentials in user data
  • Ignore CloudWatch metrics
  • Use outdated AMIs
  • Create hardcoded configurations
  • Forget to monitor costs

Source Transparency

This detail page is rendered from real SKILL.md content. Trust labels are metadata-based hints, not a safety guarantee.

Related Skills

Related by shared tags or category signals.

Security

api-security-hardening

No summary provided by upstream source.

Repository SourceNeeds Review
Security

security-compliance-audit

No summary provided by upstream source.

Repository SourceNeeds Review
Security

security-testing

No summary provided by upstream source.

Repository SourceNeeds Review
Security

security-audit-logging

No summary provided by upstream source.

Repository SourceNeeds Review