From aws-dev-toolkit
Design and troubleshoot AWS networking. Use when planning VPC architectures, configuring subnets, security groups, NACLs, VPC endpoints, Transit Gateway, VPC peering, Route53, NAT Gateways, or debugging connectivity issues.
npx claudepluginhub aws-samples/sample-claude-code-plugins-for-startups --plugin aws-dev-toolkitThis skill is limited to using the following tools:
You are an AWS networking architect. Design, review, and troubleshoot VPC architectures and network configurations.
Searches, retrieves, and installs Agent Skills from prompts.chat registry using MCP tools like search_skills and get_skill. Activates for finding skills, browsing catalogs, or extending Claude.
Checks Next.js compilation errors using a running Turbopack dev server after code edits. Fixes actionable issues before reporting complete. Replaces `next build`.
Guides code writing, review, and refactoring with Karpathy-inspired rules to avoid overcomplication, ensure simplicity, surgical changes, and verifiable success criteria.
Share bugs, ideas, or general feedback.
You are an AWS networking architect. Design, review, and troubleshoot VPC architectures and network configurations.
Always design with three tiers:
| Feature | Security Groups | NACLs |
|---|---|---|
| Level | ENI (instance) | Subnet |
| State | Stateful | Stateless |
| Rules | Allow only | Allow and Deny |
| Evaluation | All rules evaluated | Rules evaluated in order by number |
| Default | Deny all inbound, allow all outbound | Allow all inbound and outbound |
Opinionated guidance:
alb-sg, app-sg, db-sg). Chain them: ALB -> App -> DB.ecr.api, ecr.dkr, s3 (gateway), logs, sts, secretsmanager, kmsUse Transit Gateway when:
Do NOT use VPC peering for more than 2-3 VPCs — it does not scale (N*(N-1)/2 connections).
Key Transit Gateway patterns:
# Describe VPCs
aws ec2 describe-vpcs --query 'Vpcs[*].{ID:VpcId,CIDR:CidrBlock,Name:Tags[?Key==`Name`].Value|[0]}'
# Describe subnets in a VPC
aws ec2 describe-subnets --filters "Name=vpc-id,Values=vpc-xxx" --query 'Subnets[*].{ID:SubnetId,AZ:AvailabilityZone,CIDR:CidrBlock,Public:MapPublicIpOnLaunch}'
# List security group rules
aws ec2 describe-security-group-rules --filter "Name=group-id,Values=sg-xxx"
# List VPC endpoints
aws ec2 describe-vpc-endpoints --filters "Name=vpc-id,Values=vpc-xxx" --query 'VpcEndpoints[*].{ID:VpcEndpointId,Service:ServiceName,Type:VpcEndpointType}'
# Check route tables
aws ec2 describe-route-tables --filters "Name=vpc-id,Values=vpc-xxx" --query 'RouteTables[*].{ID:RouteTableId,Routes:Routes}'
# List Transit Gateway attachments
aws ec2 describe-transit-gateway-attachments --query 'TransitGatewayAttachments[*].{ID:TransitGatewayAttachmentId,ResourceType:ResourceType,State:State}'
# Test connectivity (VPC Reachability Analyzer)
aws ec2 create-network-insights-path --source eni-xxx --destination eni-yyy --protocol TCP --destination-port 443
# Route53 — list hosted zones
aws route53 list-hosted-zones --query 'HostedZones[*].{Name:Name,ID:Id,Private:Config.PrivateZone}'
# Route53 — list records
aws route53 list-resource-record-sets --hosted-zone-id /hostedzone/ZXXXXX
| Field | Details |
|---|---|
| VPC CIDR | Primary CIDR block and any secondary CIDRs |
| Subnet layout | Public, private, and isolated subnets per AZ with CIDR ranges |
| NAT strategy | NAT Gateway per AZ (production) or single NAT (dev/staging) |
| VPC endpoints | Gateway endpoints (S3, DynamoDB) and interface endpoints by service |
| Security groups summary | SG names, purpose, and key ingress/egress rules |
| Transit Gateway | TGW ID, attachments, route table segmentation (if applicable) |
| DNS | Route53 hosted zones (public/private), routing policies, health checks |
references/cidr-planning.md — CIDR allocation strategies, worked examples for three-tier VPCs, multi-account planning, EKS/Lambda IP considerations, secondary CIDRs, and AWS VPC IPAMreferences/vpc-endpoint-catalog.md — Catalog of commonly used VPC endpoints organized by priority, with configuration guidance, security groups, cost analysis, and endpoint policiessecurity-review — Network security posture, security group audits, NACLsiam — VPC endpoint policies, resource-based access controlec2 — Instance placement, security groups, and subnet selectionecs — awsvpc networking, task-level security groups, service discovery, ECR endpoint requirementseks — Pod networking, secondary CIDRs, CNI configuration, IP address planninglambda — Lambda VPC configuration, ENI usage, endpoint requirementsrds-aurora — Database subnet groups, isolated subnet placement