Skip to content

AWS CloudFormation MCP Integration

Overview

IdeaWeaver provides seamless integration with AWS CloudFormation through the Model Context Protocol (MCP), allowing you to manage AWS resources programmatically.

Setup

  1. Set up AWS authentication:

    ideaweaver mcp setup-auth awslabs.cfn-mcp-server
    

  2. Enable AWS CloudFormation server:

    ideaweaver mcp enable awslabs.cfn-mcp-server
    

Common Operations

List Resources

List S3 Buckets

ideaweaver mcp call-tool awslabs.cfn-mcp-server list_resources \
  --args '{"resource_type": "AWS::S3::Bucket"}'

List EC2 Instances

ideaweaver mcp call-tool awslabs.cfn-mcp-server list_resources \
  --args '{"resource_type": "AWS::EC2::Instance"}'

Create Resources

Create an S3 Bucket

ideaweaver mcp call-tool awslabs.cfn-mcp-server create_resource \
  --args '{"resource_type": "AWS::S3::Bucket", "desired_state": {"BucketName": "my-test-bucket-12345"}}'

Configuration

Required Environment Variables

# AWS Credentials
export AWS_ACCESS_KEY_ID=AKIAXXXXXXXXXXXX
export AWS_SECRET_ACCESS_KEY=xxxxxxxxxxxx
export AWS_DEFAULT_REGION=us-east-1

Troubleshooting

Common Issues

  1. Authentication Failures
  2. Verify AWS credentials are correct
  3. Check environment variables are set
  4. Ensure IAM user has necessary permissions

  5. Resource Creation Failures

  6. Check resource naming conflicts
  7. Verify resource limits in your AWS account
  8. Ensure IAM permissions include resource creation rights

Debug Mode

Enable verbose output for debugging:

ideaweaver mcp call-tool awslabs.cfn-mcp-server list_resources \
  --args '{"resource_type": "AWS::S3::Bucket"}' --verbose

Best Practices

  1. Security
  2. Use IAM roles with least privilege
  3. Rotate AWS credentials regularly
  4. Never commit AWS credentials to version control

  5. Resource Management

  6. Use meaningful resource names
  7. Implement proper tagging strategy
  8. Monitor resource usage and costs

  9. Error Handling

  10. Implement proper error checking
  11. Use verbose mode for debugging
  12. Monitor AWS CloudWatch logs