Manages TLS certificate and encryption key lifecycle across all tiers. Self-Hosted covers certificate expiry monitoring, node/CA/client cert rotation, and Kubernetes cert management. Advanced/BYOC covers managed TLS (no action) and CMEK (Customer-Managed Encryption Key) rotation in your KMS. Standard and Basic have fully managed TLS and encryption with no customer action. CMEK is only available on Advanced. Use when monitoring cert health, performing rotation, managing CMEK, or responding to key compromise.
88
85%
Does it follow best practices?
Impact
Pending
No eval scenarios have been run
Advisory
Suggest reviewing before use
Manages TLS certificate and encryption key lifecycle across all deployment tiers. Before providing procedures, this skill gathers context to determine whether the operator manages certificates directly (Self-Hosted), manages CMEK encryption keys (Advanced/BYOC), or has fully managed encryption (Standard/Basic).
For daily health checks: Use reviewing-cluster-health.
| Question | Options | Why It Matters |
|---|---|---|
| Deployment tier? | Self-Hosted, Advanced, BYOC, Standard, Basic | Determines encryption management responsibility |
| Reason? | Routine monitoring, Scheduled rotation, Key compromise, Compliance audit, Add SAN entries | Determines urgency and procedure |
If Self-Hosted:
| Question | Options | Why It Matters |
|---|---|---|
| Certificate type? | CA, Node, Client, UI | Different rotation procedures per type |
| Deployment platform? | Bare metal/VMs, Kubernetes (Operator/Helm/manual) | Changes rotation tooling |
| Certificate tooling? | cockroach cert, openssl, HashiCorp Vault, cert-manager | Determines generation commands |
| Is the CA being rotated? | Yes, No | CA rotation requires combined CA approach |
If Advanced or BYOC:
| Question | Options | Why It Matters |
|---|---|---|
| Is this about CMEK? | Yes, No | CMEK is the customer's encryption responsibility; TLS is managed by CRL |
| Cloud provider? | AWS, GCP, Azure | Determines KMS service and CLI commands |
| CMEK currently enabled? | Yes, No | CMEK must be enabled at cluster creation |
If Standard or Basic: No context needed — TLS and encryption are fully managed. CMEK is not available on these tiers.
| Tier + Scenario | Go To |
|---|---|
| Self-Hosted | Self-Hosted Certificate Management |
| Advanced/BYOC + CMEK | CMEK Key Management |
| Advanced/BYOC + TLS question | Cloud TLS (Managed) |
| Standard | Fully Managed Encryption |
| Basic | Fully Managed Encryption |
Applies when: Tier = Self-Hosted
SELECT node_id,
to_timestamp((metrics->>'security.certificate.expiration.ca')::FLOAT)::TIMESTAMPTZ AS ca_expires,
to_timestamp((metrics->>'security.certificate.expiration.node')::FLOAT)::TIMESTAMPTZ AS node_cert_expires,
CASE WHEN to_timestamp((metrics->>'security.certificate.expiration.node')::FLOAT)::TIMESTAMPTZ
< now() + INTERVAL '90 days' THEN 'EXPIRING_SOON' ELSE 'OK' END AS status
FROM crdb_internal.kv_node_status ORDER BY node_cert_expires;Alert thresholds: CA < 1 year = plan rotation. Node < 90 days = schedule rotation. Node < 30 days = rotate immediately.
cockroach cert create-node <hostname> <ip> <lb-hostname> <lb-ip> localhost 127.0.0.1 \
--certs-dir=<certs-dir> --ca-key=<ca-key-path> --overwriteDeploy to node, set chmod 0600 on key file. CockroachDB auto-detects new certs — no restart required.
See rotation-procedures reference for detailed steps and verification.
CA rotation requires a combined certificate (new + old) for seamless trust transition:
cat new-ca.crt old-ca.crt > ca.crtSee rotation-procedures reference for the full CA rotation procedure.
tls.certs.selfSigner.rotateCerts.See kubernetes-certs reference for detailed Kubernetes procedures.
Applies when: Tier = Advanced or BYOC, CMEK enabled
Customer-Managed Encryption Keys wrap CockroachDB's data-at-rest encryption with a key stored in your cloud provider's KMS. CockroachDB Cloud never has access to the CMEK itself.
CMEK requires an Advanced cluster with advanced security features enabled at cluster creation. It cannot be enabled retroactively. CMEK is not available on Standard or Basic.
curl -s -H "Authorization: Bearer $COCKROACH_API_KEY" \
"https://cockroachlabs.cloud/api/v1/clusters/<cluster-id>/cmek" | jq '.'Or: Cloud Console → Cluster → Security → Encryption.
Rotate the key in your cloud provider's KMS. CockroachDB Cloud automatically uses the new key version. No cluster downtime.
See cmek-procedures reference for provider-specific KMS rotation commands (AWS KMS, GCP Cloud KMS, Azure Key Vault) and IAM audit procedures.
Revoking the CMEK key makes cluster data permanently inaccessible unless the key is restored within your KMS provider's grace period.
Only use as an emergency kill switch. This may be irreversible.
Applies when: Tier = Advanced or BYOC, question is about TLS (not CMEK)
TLS certificates are fully managed by Cockroach Labs on Advanced and BYOC:
Client certificates: You manage your own client-side certificates for application connections. These are standard PostgreSQL client certificates.
Applies when: Tier = Standard or Basic
TLS certificates and data-at-rest encryption are fully managed by Cockroach Labs.
If CMEK is required: Upgrade to Advanced.
Read-only monitoring queries are safe on all tiers.
Self-Hosted certificate operations:
CMEK operations (Advanced/BYOC):
See safety-guide reference for detailed risk matrix.
| Issue | Tier | Fix |
|---|---|---|
| Cert metric NULL | SH | Verify cluster is in secure mode |
| New cert not detected | SH | Check file permissions (0600, correct owner) |
| "unknown authority" error | SH | Deploy combined CA (new + old) |
| Connection failures after rotation | SH | Check SAN entries cover all hostnames/IPs |
| CMEK access denied | ADV/BYOC | Verify KMS key policy and IAM permissions |
| Cannot enable CMEK | ADV/BYOC | CMEK must be enabled at cluster creation |
Skill references:
Related skills:
Official CockroachDB Documentation:
84bc1e4
If you maintain this skill, you can claim it as your own. Once claimed, you can manage eval scenarios, bundle related skills, attach documentation or rules, and ensure cross-agent compatibility.