aws-cloudfront-cdn▌
aj-geddes/useful-ai-prompts · updated Apr 8, 2026
Amazon CloudFront is a fast, globally distributed content delivery network (CDN). Cache content at edge locations worldwide to reduce latency, improve performance, and provide high availability with DDoS protection.
AWS CloudFront CDN
Table of Contents
Overview
Amazon CloudFront is a fast, globally distributed content delivery network (CDN). Cache content at edge locations worldwide to reduce latency, improve performance, and provide high availability with DDoS protection.
When to Use
- Static website hosting and assets
- API acceleration and dynamic content
- Video and media streaming
- Mobile application content
- Large file downloads
- Real-time data distribution
- DDoS protection for origins
- Origin isolation and security
Quick Start
Minimal working example:
# Create distribution for S3 origin
aws cloudfront create-distribution \
--distribution-config '{
"CallerReference": "myapp-'$(date +%s)'",
"Enabled": true,
"Comment": "My application distribution",
"Origins": {
"Quantity": 1,
"Items": [{
"Id": "myS3Origin",
"DomainName": "mybucket.s3.us-east-1.amazonaws.com",
"S3OriginConfig": {
"OriginAccessIdentity": "origin-access-identity/cloudfront/ABCDEFG1234567"
}
}]
},
"DefaultCacheBehavior": {
"AllowedMethods": {
"Quantity": 3,
"Items": ["GET", "HEAD", "OPTIONS"]
},
"ViewerProtocolPolicy": "redirect-to-https",
"TargetOriginId": "myS3Origin",
"ForwardedValues": {
"QueryString": false,
// ... (see reference guides for full implementation)
Reference Guides
Detailed implementations in the references/ directory:
| Guide | Contents |
|---|---|
| CloudFront Distribution with AWS CLI | CloudFront Distribution with AWS CLI |
| Terraform CloudFront Configuration | Terraform CloudFront Configuration |
| Custom Headers and Security Configuration | Custom Headers and Security Configuration |
Best Practices
✅ DO
- Use Origin Access Identity (OAI) for S3
- Enable HTTPS only for viewers
- Compress content at CloudFront
- Set appropriate cache TTLs
- Use cache invalidation cautiously
- Enable WAF for protection
- Monitor CloudWatch metrics
- Use multiple origins for redundancy
❌ DON'T
- Make S3 buckets public
- Cache sensitive data
- Use HTTP for production
- Ignore cache headers
- Create excessive invalidations
- Skip WAF protection
Discussion
Product Hunt–style comments (not star reviews)- No comments yet — start the thread.
Ratings
4.5★★★★★60 reviews- ★★★★★Daniel Bansal· Dec 20, 2024
Registry listing for aws-cloudfront-cdn matched our evaluation — installs cleanly and behaves as described in the markdown.
- ★★★★★Aanya Zhang· Dec 20, 2024
aws-cloudfront-cdn reduced setup friction for our internal harness; good balance of opinion and flexibility.
- ★★★★★Aanya Liu· Dec 12, 2024
aws-cloudfront-cdn fits our agent workflows well — practical, well scoped, and easy to wire into existing repos.
- ★★★★★Pratham Ware· Dec 8, 2024
Keeps context tight: aws-cloudfront-cdn is the kind of skill you can hand to a new teammate without a long onboarding doc.
- ★★★★★Yash Thakker· Nov 27, 2024
aws-cloudfront-cdn has been reliable in day-to-day use. Documentation quality is above average for community skills.
- ★★★★★Emma Thomas· Nov 11, 2024
aws-cloudfront-cdn fits our agent workflows well — practical, well scoped, and easy to wire into existing repos.
- ★★★★★Zaid Tandon· Nov 11, 2024
We added aws-cloudfront-cdn from the explainx registry; install was straightforward and the SKILL.md answered most questions upfront.
- ★★★★★Camila Okafor· Nov 3, 2024
Registry listing for aws-cloudfront-cdn matched our evaluation — installs cleanly and behaves as described in the markdown.
- ★★★★★Daniel Srinivasan· Nov 3, 2024
Useful defaults in aws-cloudfront-cdn — fewer surprises than typical one-off scripts, and it plays nicely with `npx skills` flows.
- ★★★★★Camila Mensah· Nov 3, 2024
I recommend aws-cloudfront-cdn for anyone iterating fast on agent tooling; clear intent and a small, reviewable surface area.
showing 1-10 of 60