Claude-skill-registry clickhouse-cloud-credentials
Store ClickHouse Cloud credentials in Doppler + 1Password for gapless-crypto-clickhouse. Use when setting up new services, rotating credentials, or backing up authentication material. Covers API keys, connection details, and database password storage.
git clone https://github.com/majiayu000/claude-skill-registry
T=$(mktemp -d) && git clone --depth=1 https://github.com/majiayu000/claude-skill-registry "$T" && mkdir -p ~/.claude/skills && cp -r "$T/skills/data/clickhouse-cloud-credentials" ~/.claude/skills/majiayu000-claude-skill-registry-clickhouse-cloud-credentials && rm -rf "$T"
skills/data/clickhouse-cloud-credentials/SKILL.mdClickHouse Cloud Credentials
Establish dual credential storage pattern (Doppler + 1Password) for ClickHouse Cloud authentication.
Purpose
Store and backup ClickHouse Cloud credentials in two secure locations:
- Doppler (
project) - Runtime environment variablesaws-credentials/prd - 1Password (Engineering vault) - Secure backup and team access
This skill guides the workflow of storing 8 required credentials for gapless-crypto-clickhouse service.
When to Use
Use this skill when:
- New service setup: Initial credential storage for new ClickHouse Cloud service
- Credential rotation: Updating API keys or database passwords
- Backup verification: Ensuring credentials exist in both storage locations
- Team onboarding: Documenting required credentials for new team members
Triggers: User mentions "store credentials", "Doppler", "1Password", "ClickHouse API keys", "credential rotation"
Prerequisites
Credentials to Store:
- API Key ID and Secret (from ClickHouse Cloud console)
- Organization ID (from ClickHouse Cloud API)
- Service ID (gapless-crypto-clickhouse service)
- Connection parameters (host, port, user, password)
Required Access:
- Doppler CLI access to
projectaws-credentials/prd - 1Password CLI (
) access to Engineering vaultop
Credential Schema
Doppler Secrets (aws-credentials/prd
)
aws-credentials/prd8 required secrets:
| Secret Name | Description | Example Format |
|---|---|---|
| API Key ID | |
| API Key Secret | (secured, ~40 chars) |
| Organization UUID | |
| Service UUID | |
| Service hostname | |
| HTTPS port | |
| Database user | |
| Database password | (secured, from console) |
See:
for detailed descriptionsreferences/doppler-schema.md
1Password Item (Engineering Vault)
Vault: Engineering (
fnzrqcsl3pl3bcdojrxf46whnu)
Item Title: "ClickHouse Cloud - gapless-crypto-cli"
8 required fields:
| Field Name | Type | Description |
|---|---|---|
| text | API Key ID |
| concealed | API Key Secret |
| text | Organization UUID |
| text | "TE's Organization" |
| text | Service UUID |
| text | "gapless-crypto-cli" |
| password | Database password |
| url | https://clickhouse.cloud/ |
See:
for detailed specificationsreferences/onepassword-schema.md
Workflow
Step 1: Store API Credentials in Doppler
# Store API Key ID and Secret doppler secrets set CLICKHOUSE_CLOUD_KEY_ID "<key_id>" --project aws-credentials --config prd doppler secrets set CLICKHOUSE_CLOUD_KEY_SECRET "<key_secret>" --project aws-credentials --config prd
Step 2: Store Organization and Service Metadata in Doppler
# Store IDs doppler secrets set CLICKHOUSE_CLOUD_ORG_ID "<org_id>" --project aws-credentials --config prd doppler secrets set CLICKHOUSE_CLOUD_SERVICE_ID "a3163f31-21f4-4e22-844e-ef3fbc26ace2" --project aws-credentials --config prd
Step 3: Store Connection Details in Doppler
# Store connection parameters doppler secrets set CLICKHOUSE_HOST "ebmf8f35lu.us-west-2.aws.clickhouse.cloud" --project aws-credentials --config prd doppler secrets set CLICKHOUSE_PORT "8443" --project aws-credentials --config prd doppler secrets set CLICKHOUSE_USER "default" --project aws-credentials --config prd doppler secrets set CLICKHOUSE_PASSWORD "<db_password>" --project aws-credentials --config prd
Step 4: Backup Credentials in 1Password
# Create 1Password item with all fields op item create --vault Engineering \ --category "API Credential" \ --title "ClickHouse Cloud - gapless-crypto-cli" \ username="<key_id>" \ credential="<key_secret>" \ "organization_id[text]=<org_id>" \ "organization_name[text]=TE's Organization" \ "service_id[text]=a3163f31-21f4-4e22-844e-ef3fbc26ace2" \ "service_name[text]=gapless-crypto-cli" \ "database_password[password]=<db_password>" \ "console_url[url]=https://clickhouse.cloud/"
Step 5: Verify Storage
# Verify Doppler secrets (names only) doppler secrets --project aws-credentials --config prd --only-names | grep CLICKHOUSE # Verify 1Password item op item get "ClickHouse Cloud - gapless-crypto-cli" --vault Engineering
Success Criteria
- ✅ All 8 secrets stored in Doppler (
)aws-credentials/prd - ✅ All 8 fields stored in 1Password (Engineering vault)
- ✅ No plaintext credentials in version control
- ✅ Credentials accessible via Doppler CLI
- ✅ Backup accessible via 1Password CLI
Security Notes
- No secrets in code: Reference Doppler key names, never hardcode values
- Dual storage: Doppler for runtime, 1Password for backup and team access
- Credential rotation: Update both Doppler and 1Password when rotating
- Access control: Doppler and 1Password enforce team-based access controls
- Audit trail: Both systems log credential access for security monitoring
Troubleshooting
Issue: "Doppler secrets not found"
- Check: Verify project name
and configaws-credentialsprd - Verify:
shows project existsdoppler projects list
Issue: "1Password vault not accessible"
- Check: Engineering vault ID:
fnzrqcsl3pl3bcdojrxf46whnu - Verify:
shows Engineering vaultop vault list
Issue: "Credential format incorrect"
- Check: API Key ID format (example:
)xnIdJM3n42LDImsZ9zzg - Verify: UUIDs are valid format (8-4-4-4-12 hex digits)
References
- Doppler Schema:
references/doppler-schema.md - 1Password Schema:
references/onepassword-schema.md - Doppler Dashboard: https://dashboard.doppler.com/workplace/13e9e4203ede563b1d37/projects/aws-credentials
- ClickHouse Console: https://clickhouse.cloud/ (API Keys → Settings)
Next Steps
After credential storage, proceed to:
- Test connection using stored credentialsclickhouse-cloud-connection