npx skills add https://github.com/zxkane/aws-skills --skill aws-mcp-setup本指南帮助您为 AI 代理配置 AWS MCP 工具。提供两种可选方案:
| 选项 | 要求 | 功能 |
|---|---|---|
| 完整 AWS MCP 服务器 | Python 3.10+、uvx、AWS 凭证 | 执行 AWS API 调用 + 文档搜索 |
| AWS 文档 MCP | 无 | 仅文档搜索 |
在配置之前,请使用以下任一方法检查 AWS MCP 工具是否已可用:
在您代理的可用工具中查找以下工具名称模式:
mcp__aws-mcp__* 或 mcp__aws__* → 已配置完整 AWS MCP 服务器mcp__*awsdocs*__aws___* → 已配置 AWS 文档 MCP如何检查:运行 命令列出所有活动的 MCP 服务器。
广告位招租
在这里展示您的产品或服务
触达数万 AI 开发者,精准高效
/mcp代理工具使用分层配置(优先级:本地 → 项目 → 用户 → 企业):
| 范围 | 文件位置 | 使用场景 |
|---|---|---|
| 本地 | .claude.json(在项目中) | 个人/实验性 |
| 项目 | .mcp.json(项目根目录) | 团队共享 |
| 用户 | ~/.claude.json | 跨项目个人 |
| 企业 | 系统管理目录 | 组织范围 |
检查这些文件中是否包含带有 aws-mcp、aws 或 awsdocs 键的 mcpServers:
# 检查项目配置
cat .mcp.json 2>/dev/null | grep -E '"(aws-mcp|aws|awsdocs)"'
# 检查用户配置
cat ~/.claude.json 2>/dev/null | grep -E '"(aws-mcp|aws|awsdocs)"'
# 或使用 Claude CLI
claude mcp list
如果 AWS MCP 已配置,则无需进一步设置。
运行以下命令以确定使用哪个选项:
# 检查 uvx(需要 Python 3.10+)
which uvx || echo "uvx not available"
# 检查有效的 AWS 凭证
aws sts get-caller-identity || echo "AWS credentials not configured"
使用场景:uvx 可用 且 AWS 凭证有效
先决条件:
uv 包管理器所需 IAM 权限:
{
"Version": "2012-10-17",
"Statement": [{
"Effect": "Allow",
"Action": [
"aws-mcp:InvokeMCP",
"aws-mcp:CallReadOnlyTool",
"aws-mcp:CallReadWriteTool"
],
"Resource": "*"
}]
}
配置(添加到您的 MCP 设置中):
{
"mcpServers": {
"aws-mcp": {
"command": "uvx",
"args": [
"mcp-proxy-for-aws@latest",
"https://aws-mcp.us-east-1.api.aws/mcp",
"--metadata", "AWS_REGION=us-west-2"
]
}
}
}
凭证配置选项:
AWS 配置文件(推荐用于开发):
"args": [
"mcp-proxy-for-aws@latest",
"https://aws-mcp.us-east-1.api.aws/mcp",
"--profile", "my-profile",
"--metadata", "AWS_REGION=us-west-2"
]
环境变量:
"env": {
"AWS_ACCESS_KEY_ID": "...",
"AWS_SECRET_ACCESS_KEY": "...",
"AWS_REGION": "us-west-2"
}
IAM 角色(用于 EC2/ECS/Lambda):无需额外配置 - 使用实例凭证
附加选项:
--region <region>:覆盖 AWS 区域--read-only:限制为只读工具--log-level <level>:设置日志级别(debug、info、warning、error)使用场景:
配置:
{
"mcpServers": {
"awsdocs": {
"type": "http",
"url": "https://knowledge-mcp.global.api.aws"
}
}
}
配置后,验证工具是否可用:
对于完整 AWS MCP:
mcp__aws-mcp__aws___search_documentation、mcp__aws-mcp__aws___call_aws对于文档 MCP:
mcp__awsdocs__aws___search_documentation、mcp__awsdocs__aws___read_documentation| 问题 | 原因 | 解决方案 |
|---|---|---|
uvx: command not found | uv 未安装 | 使用 pip install uv 安装或使用选项 B |
AccessDenied 错误 | 缺少 IAM 权限 | 将 aws-mcp:* 权限添加到 IAM 策略 |
InvalidSignatureException | 凭证问题 | 检查 aws sts get-caller-identity |
| 工具未出现 | MCP 未启动 | 配置更改后重启您的代理 |
每周安装量
136
仓库
GitHub 星标数
218
首次出现
2026 年 1 月 22 日
安全审计
安装于
opencode108
codex108
gemini-cli103
github-copilot102
claude-code102
cursor98
This guide helps you configure AWS MCP tools for AI agents. Two options are available:
| Option | Requirements | Capabilities |
|---|---|---|
| Full AWS MCP Server | Python 3.10+, uvx, AWS credentials | Execute AWS API calls + documentation search |
| AWS Documentation MCP | None | Documentation search only |
Before configuring, check if AWS MCP tools are already available using either method:
Look for these tool name patterns in your agent's available tools:
mcp__aws-mcp__* or mcp__aws__* → Full AWS MCP Server configuredmcp__*awsdocs*__aws___* → AWS Documentation MCP configuredHow to check : Run /mcp command to list all active MCP servers.
Agent tools use hierarchical configuration (precedence: local → project → user → enterprise):
| Scope | File Location | Use Case |
|---|---|---|
| Local | .claude.json (in project) | Personal/experimental |
| Project | .mcp.json (project root) | Team-shared |
| User | ~/.claude.json | Cross-project personal |
| Enterprise | System managed directories | Organization-wide |
Check these files for mcpServers containing aws-mcp, aws, or awsdocs keys:
# Check project config
cat .mcp.json 2>/dev/null | grep -E '"(aws-mcp|aws|awsdocs)"'
# Check user config
cat ~/.claude.json 2>/dev/null | grep -E '"(aws-mcp|aws|awsdocs)"'
# Or use Claude CLI
claude mcp list
If AWS MCP is already configured, no further setup needed.
Run these commands to determine which option to use:
# Check for uvx (requires Python 3.10+)
which uvx || echo "uvx not available"
# Check for valid AWS credentials
aws sts get-caller-identity || echo "AWS credentials not configured"
Use when : uvx available AND AWS credentials valid
Prerequisites :
uv package managerRequired IAM Permissions :
{
"Version": "2012-10-17",
"Statement": [{
"Effect": "Allow",
"Action": [
"aws-mcp:InvokeMCP",
"aws-mcp:CallReadOnlyTool",
"aws-mcp:CallReadWriteTool"
],
"Resource": "*"
}]
}
Configuration (add to your MCP settings):
{
"mcpServers": {
"aws-mcp": {
"command": "uvx",
"args": [
"mcp-proxy-for-aws@latest",
"https://aws-mcp.us-east-1.api.aws/mcp",
"--metadata", "AWS_REGION=us-west-2"
]
}
}
}
Credential Configuration Options :
AWS Profile (recommended for development):
"args": [
"mcp-proxy-for-aws@latest",
"https://aws-mcp.us-east-1.api.aws/mcp",
"--profile", "my-profile",
"--metadata", "AWS_REGION=us-west-2"
]
Environment Variables :
"env": {
"AWS_ACCESS_KEY_ID": "...",
"AWS_SECRET_ACCESS_KEY": "...",
"AWS_REGION": "us-west-2"
}
IAM Role (for EC2/ECS/Lambda): No additional config needed - uses instance credentials
Additional Options :
--region <region>: Override AWS region--read-only: Restrict to read-only tools--log-level <level>: Set logging level (debug, info, warning, error)Reference : https://github.com/aws/mcp-proxy-for-aws
Use when :
Configuration :
{
"mcpServers": {
"awsdocs": {
"type": "http",
"url": "https://knowledge-mcp.global.api.aws"
}
}
}
After configuration, verify tools are available:
For Full AWS MCP :
mcp__aws-mcp__aws___search_documentation, mcp__aws-mcp__aws___call_awsFor Documentation MCP :
mcp__awsdocs__aws___search_documentation, mcp__awsdocs__aws___read_documentation| Issue | Cause | Solution |
|---|---|---|
uvx: command not found | uv not installed | Install with pip install uv or use Option B |
AccessDenied error | Missing IAM permissions | Add aws-mcp:* permissions to IAM policy |
InvalidSignatureException | Credential issue | Check aws sts get-caller-identity |
| Tools not appearing | MCP not started | Restart your agent after config change |
Weekly Installs
136
Repository
GitHub Stars
218
First Seen
Jan 22, 2026
Security Audits
Gen Agent Trust HubPassSocketWarnSnykWarn
Installed on
opencode108
codex108
gemini-cli103
github-copilot102
claude-code102
cursor98
React 组合模式指南:Vercel 组件架构最佳实践,提升代码可维护性
115,300 周安装