Codibly AWS MCP Server
Enterprise MCP server by Codibly for comprehensive AWS cloud management - control EC2, S3, Lambda, CloudWatch, and more with AI assistance
⚡ Quick Install with Claude Code MCP Guide
Connect Claude Code to any remote MCP server with one simple command. Choose between direct HTTP connections or a universal bridge - all configured automatically with our setup wizard.
Get the Claude Code MCP Setup Guide →🔌 Test MCP Server Connection
Test your connection to the MCP wrapper server using your x-api-key. This validates that your MCP server credentials are configured correctly.
🚀 Test Full AWS Connection
Test both your MCP server connection AND your AWS credentials. This ensures your complete setup is working correctly.
📡 API Endpoint & Required Headers
Required HTTP Headers:
🛠️ Available Tools
⚠️ Common Errors & Solutions
🔐 Required IAM Policy
To use this MCP server, your AWS IAM user needs the following policy attached. This policy provides comprehensive access to AWS services commonly used in development and operations.
{
"Version": "2012-10-17",
"Statement": [
{
"Sid": "VisualEditor0",
"Effect": "Allow",
"Action": [
"s3:*",
"ec2:*",
"lambda:*",
"logs:*",
"cloudwatch:*",
"cloudfront:*",
"apigateway:*",
"dynamodb:*",
"events:*",
"route53:*",
"elasticloadbalancing:*",
"ecr:*",
"iam:ListPolicies",
"iam:ListRoles",
"iam:ListUsers",
"iam:GetRole",
"iam:GetPolicy",
"iam:GetUser",
"bedrock:InvokeModel",
"bedrock:InvokeModelWithResponseStream"
],
"Resource": "*"
},
{
"Sid": "VisualEditor1",
"Effect": "Allow",
"Action": [
"s3:PutObject",
"s3:GetObject",
"s3:ListBucket",
"s3:DeleteObject"
],
"Resource": [
"arn:aws:s3:::your-mcp-bucket",
"arn:aws:s3:::your-mcp-bucket/*"
]
},
{
"Sid": "VisualEditor2",
"Effect": "Allow",
"Action": [
"ssm:GetParametersByPath",
"ssm:GetParameters",
"ssm:GetParameter"
],
"Resource": "arn:aws:ssm:*:*:parameter/your-mcp-*"
},
{
"Sid": "VisualEditor3",
"Effect": "Allow",
"Action": "dynamodb:*",
"Resource": "arn:aws:dynamodb:*:*:table/YourMCP*"
}
]
}
How to Apply This Policy:
- Go to AWS IAM Console → Policies
- Click "Create Policy"
- Select "JSON" tab and paste the policy above
- Name it "MCPServerFullAccessPolicy"
- Attach it to your IAM user or role
🏥 Service Health Check
Configuration
// Claude Desktop: ~/Library/Application Support/Claude/claude_desktop_config.json (macOS) // Windows: %APPDATA%\Claude\claude_desktop_config.json { "mcpServers": { "aws": { "command": "npx", "args": [ "-y", "@aws-mcp/aws-mcp@latest" ], "env": { "AWS_ACCESS_KEY_ID": "YOUR_AWS_ACCESS_KEY_ID", "AWS_SECRET_ACCESS_KEY": "YOUR_AWS_SECRET_ACCESS_KEY", "AWS_REGION": "us-east-1" } } } }
Features
Complete AWS cloud infrastructure management for AI assistants
EC2 Management
Start, stop, and monitor EC2 instances across regions.
S3 Operations
Manage buckets and objects with full S3 capabilities.
Lambda Functions
Invoke and manage serverless Lambda functions.
CloudWatch Logs
Access and analyze CloudWatch logs and metrics.
IAM & Security
Manage roles and permissions with IAM integration.
Multi-Region Support
Work across all AWS regions seamlessly.
📋 Recent Updates from GitHub
- Fix: Update scripts format for aws-api-mcp-server
- Fix: Resolve Windows cp1252 encoding issue
- Chore: Bump packages for release/2025.08.20250825171959
- Feature: Add CloudTrail MCP server
- Build: Update strict mode configuration
- Feature: Add Agent Scripts for aws-api-mcp-server
- Fix: Correct IAM policy permissions for Lambda functions
- Enhancement: Improve error handling in S3 operations
- Feature: Add support for EC2 instance type filtering
- Fix: Resolve CloudWatch log pagination issue
- Feature: Implement SSM parameter store integration
- Docs: Update API documentation for new endpoints