github.com/cockroachlabs/cockroachdb-skills
Skill | Added | Review |
|---|---|---|
reviewing-cluster-health Performs a comprehensive health check of a CockroachDB cluster. Gathers deployment context first, then provides tier-appropriate diagnostics. Self-Hosted uses SQL against node-level system tables and CLI. Advanced/BYOC use Cloud Console and SQL with node visibility. Standard monitors provisioned compute and workload via Cloud Console. Basic monitors Request Unit consumption and connectivity. Use for daily checks, pre-maintenance validation, post-incident verification, or production readiness assessment. | 94 Impact Pending No eval scenarios have been run Securityby Passed No known issues Reviewed: Version: 84bc1e4 | |
configuring-private-connectivity Configures private network connectivity for CockroachDB Cloud clusters including AWS PrivateLink, GCP Private Service Connect, Azure Private Link, egress private endpoints, and VPC peering. Use when setting up private endpoints to eliminate public internet exposure, configuring egress to external services like Kafka, or establishing VPC peering. | 90 Impact Pending No eval scenarios have been run Securityby Risky Do not use without reviewing Reviewed: Version: 84bc1e4 | |
configuring-ip-allowlists Configures and hardens IP allowlists for CockroachDB Cloud clusters to restrict network access to authorized CIDR ranges. Use when tightening network security, removing overly permissive allowlist entries like 0.0.0.0/0, or setting up allowlists for a new cluster. | 90 Impact Pending No eval scenarios have been run Securityby Passed No known issues Reviewed: Version: 84bc1e4 | |
configuring-log-export Configures log and metric export for CockroachDB Cloud clusters to external monitoring services including AWS CloudWatch, GCP Cloud Logging, and Datadog. Use when setting up log export for audit compliance, configuring metric export for monitoring, or troubleshooting log delivery issues. | 90 Impact Pending No eval scenarios have been run Securityby Risky Do not use without reviewing Reviewed: Version: 84bc1e4 | |
auditing-cloud-cluster-security Audits the security posture of a CockroachDB cluster (Cloud or self-hosted) across network, authentication, authorization, encryption, audit logging, and backup dimensions. Use when assessing cluster security readiness, preparing for compliance reviews, or investigating security configuration gaps. | 90 Impact Pending No eval scenarios have been run Securityby Passed No known issues Reviewed: Version: 84bc1e4 | |
enforcing-password-policies Configures and enforces password policies on CockroachDB clusters including minimum length, complexity requirements, and hash cost settings. Use when strengthening authentication requirements, setting up password policies for a new cluster, or meeting compliance password standards. | 94 Impact Pending No eval scenarios have been run Securityby Passed No known issues Reviewed: Version: 84bc1e4 | |
upgrading-cluster-version Guides CockroachDB version upgrades with tier-appropriate procedures. Self-Hosted covers manual rolling binary replacement with finalization control. Advanced/BYOC covers Console-initiated major upgrades, maintenance windows for patches, and release channel selection. Standard and Basic upgrades are fully automatic with no customer action required. Use when planning, executing, or monitoring a version upgrade. | 94 Impact Pending No eval scenarios have been run Securityby Advisory Suggest reviewing before use Reviewed: Version: 84bc1e4 | |
configuring-audit-logging Configures SQL audit logging on CockroachDB clusters to capture security-relevant events including authentication, privilege changes, and sensitive data access. Use when enabling audit logging for compliance, setting up role-based audit policies, or verifying audit configuration. | 90 Impact Pending No eval scenarios have been run Securityby Passed No known issues Reviewed: Version: 84bc1e4 | |
configuring-sso-and-scim Configures SSO authentication and SCIM 2.0 provisioning for CockroachDB across four distinct layers — Cloud Console SSO (SAML/OIDC), DB Console SSO (OIDC), SQL/Cluster SSO (JWT or LDAP/AD), and SCIM 2.0 automated provisioning. Use when enabling centralized identity management, setting up SSO for compliance, or automating user lifecycle management. | 84 Impact Pending No eval scenarios have been run Securityby Risky Do not use without reviewing Reviewed: Version: 84bc1e4 | |
hardening-user-privileges Hardens CockroachDB user privileges by auditing and tightening role-based access control, reducing admin grants, restricting PUBLIC role permissions, and applying least-privilege principles. Use when reducing excessive privileges, cleaning up admin access, or implementing RBAC best practices. | 90 Impact Pending No eval scenarios have been run Securityby Passed No known issues Reviewed: Version: 84bc1e4 | |
managing-tls-certificates Manages TLS certificates for CockroachDB clusters including CA certificate configuration, client certificate authentication, certificate rotation, and troubleshooting SSL/TLS connection errors. Use when setting up client certificate auth, resolving SSL connection failures, rotating certificates, or configuring mTLS for CDC changefeeds. | 94 Impact Pending No eval scenarios have been run Securityby Advisory Suggest reviewing before use Reviewed: Version: 84bc1e4 | |
preparing-compliance-documentation Guides preparation of compliance documentation for CockroachDB Cloud deployments, covering SOC 2, PCI DSS, ISO 27001, HIPAA, and GDPR certifications. Use when responding to compliance questionnaires, preparing for audits, locating certification documents, or assessing cluster configuration for compliance readiness. | 90 Impact Pending No eval scenarios have been run Securityby Passed No known issues Reviewed: Version: 84bc1e4 | |
enabling-cmek-encryption Enables Customer-Managed Encryption Keys (CMEK) on CockroachDB Cloud clusters with the Advanced plan and Advanced Security Add-on to give organizations control over data-at-rest encryption keys via their cloud provider's KMS. Use when enabling CMEK for compliance, rotating encryption keys, or verifying CMEK configuration. | 85 Impact Pending No eval scenarios have been run Securityby Passed No known issues Reviewed: Version: 84bc1e4 | |
cockroachdb-sql Use when writing, generating, or optimizing SQL for CockroachDB, designing CockroachDB schemas, or when the user asks about CockroachDB-specific SQL patterns, type mappings, and distributed database best practices. Also use when encountering CockroachDB anti-patterns like missing primary keys, sequential ID hotspots, or incorrect type usage. | 81 Impact Pending No eval scenarios have been run Securityby Risky Do not use without reviewing Reviewed: Version: 84bc1e4 | |
molt-fetch Guide for using molt fetch to migrate data from PostgreSQL, MySQL, Oracle, or MSSQL to CockroachDB. Use when running molt fetch commands, configuring storage backends, handling fetch failures/resumption, or chaining fetch with verify. | 97 Impact Pending No eval scenarios have been run Securityby Risky Do not use without reviewing Reviewed: Version: 84bc1e4 | |
analyzing-schema-change-storage-risk Estimates storage requirements for CockroachDB online schema change backfills using SHOW RANGES WITH DETAILS, KEYS, INDEXES. Use before CREATE INDEX, ADD COLUMN with INDEX/UNIQUE, ALTER PRIMARY KEY, CREATE MATERIALIZED VIEW, CREATE TABLE AS, REFRESH, or SET LOCALITY on tables with large per-index footprints, to avoid mid-backfill disk exhaustion. | 94 Impact Pending No eval scenarios have been run Securityby Passed No known issues Reviewed: Version: 84bc1e4 | |
managing-certificates-and-encryption Manages TLS certificate and encryption key lifecycle across all tiers. Self-Hosted covers certificate expiry monitoring, node/CA/client cert rotation, and Kubernetes cert management. Advanced/BYOC covers managed TLS (no action) and CMEK (Customer-Managed Encryption Key) rotation in your KMS. Standard and Basic have fully managed TLS and encryption with no customer action. CMEK is only available on Advanced. Use when monitoring cert health, performing rotation, managing CMEK, or responding to key compromise. | 88 Impact Pending No eval scenarios have been run Securityby Advisory Suggest reviewing before use Reviewed: Version: 84bc1e4 | |
managing-cluster-capacity Manages CockroachDB cluster capacity across all tiers. Self-Hosted covers node decommissioning for permanent removal and adding nodes for expansion. Advanced/BYOC covers scaling node count and machine size via Cloud Console, API, or Terraform. Standard covers adjusting provisioned compute (vCPUs). Basic auto-scales — guidance covers spending limits and cost management. Use when scaling capacity up or down, permanently removing nodes, or managing costs. | 94 Impact Pending No eval scenarios have been run Securityby Passed No known issues Reviewed: Version: 84bc1e4 | |
provisioning-cluster-for-production Guides initial CockroachDB cluster provisioning and production deployment. Self-Hosted covers cockroach start/init, Kubernetes deployment (Operator, Helm), hardware sizing, and production configuration. Advanced/BYOC covers Cloud Console, API, and Terraform provisioning with production settings. Standard covers cluster creation and provisioned compute selection. Basic covers cluster creation and spending limits. Use when creating a new cluster, preparing for production go-live, or validating deployment configuration. | 94 Impact Pending No eval scenarios have been run Securityby Advisory Suggest reviewing before use Reviewed: Version: 84bc1e4 | |
benchmarking-transaction-patterns Guides benchmarking and comparing explicit multi-statement transactions versus single-statement CTE transactions in CockroachDB, with fair test methodology, contention analysis, and performance interpretation. Use when comparing transaction formulations, benchmarking CockroachDB workloads under contention, investigating retry pressure, or deciding whether to rewrite multi-step application flows into single SQL statements. | 80 Impact Pending No eval scenarios have been run Securityby Passed No known issues Reviewed: Version: 84bc1e4 | |
molt-verify Guide for using molt verify to compare source and target databases for schema and row-level consistency after a migration. Use when running verify commands, tuning concurrency/sharding, handling schema mismatches, or validating data integrity post-migration. | 93 Impact Pending No eval scenarios have been run Securityby Risky Do not use without reviewing Reviewed: Version: 84bc1e4 | |
designing-application-transactions Guides application developers in designing correct and performant transaction patterns for CockroachDB, covering transaction lifetime, implicit vs explicit transactions, retry handling with exponential backoff, pushing invariants into SQL, selective pessimistic locking, set-based operations, connection pooling, prepared statements, keyset pagination, follower reads, and separating business logic from database logic. Use when building applications on CockroachDB, designing transaction workflows, handling retries, optimizing application-layer database interactions, or configuring connection pools. | 85 Impact Pending No eval scenarios have been run Securityby Passed No known issues Reviewed: Version: 84bc1e4 | |
setting-up-local-cluster Downloads and starts a local CockroachDB cluster for development using the official binary. Use when a developer needs a local CockroachDB instance, when no cluster is available, or when setting up a new development environment. | 86 Impact Pending No eval scenarios have been run Securityby Advisory Suggest reviewing before use Reviewed: Version: 84bc1e4 | |
designing-multi-region-applications Guides developers in selecting and implementing multi-region patterns for CockroachDB applications, covering active-passive vs active-active architectures, REGIONAL BY ROW, GLOBAL tables, manual geo-partitioning with lease preferences, and live demo setup with validation queries. Use when designing multi-region database topologies, choosing between REGIONAL BY ROW and manual partitioning, building multi-region demos, or optimizing cross-region latency. | 90 Impact Pending No eval scenarios have been run Securityby Passed No known issues Reviewed: Version: 84bc1e4 | |
molt-replicator Guide for using the CockroachDB replicator to continuously replicate changes from PostgreSQL, MySQL, or Oracle to CockroachDB after an initial molt fetch data load. Use when setting up CDC replication, configuring pglogical/mylogical/oraclelogminer, or managing the fetch → replicator cutover workflow. | 90 Impact Pending No eval scenarios have been run Securityby Risky Do not use without reviewing Reviewed: Version: 84bc1e4 |