dokploy-admin
SKILL.md
Dokploy Admin
This skill is for operating Dokploy with the right control plane:
- MCP first (default)
- API second (automation/programmatic fallback)
- CLI third (when CLI is already installed and authenticated)
- SSH + Docker last (infrastructure fallback)
Primary outcomes
- Deploy and redeploy applications safely
- Configure databases, domains, variables, and compose stacks
- Troubleshoot 404/502, unhealthy deployments, and persistence issues
- Verify actual runtime health, not just dashboard state
Control-plane decision matrix
Use the first option that cleanly solves the task.
| Situation | Best method | Why |
|---|---|---|
| Create/update projects, apps, DBs, domains | MCP | Structured, safest, least error-prone |
| Need scripted integration not covered by MCP | API | Full programmatic control |
| Team already uses authenticated Dokploy CLI | CLI | Fast terminal operations in known environments |
| Panel state conflicts with runtime reality | SSH/Docker | Required for container/network/Traefik truth |
| DNS/Traefik/Swarm node-level anomalies | SSH/Docker | Host-level inspection needed |
| MCP/API behavior is ambiguous or buggy | Source Analysis | Use librarian/explore to find implementation truth |
| DNS/Traefik/Swarm node-level anomalies | SSH/Docker | Host-level inspection needed |
Operating rules
- Inspect current state before mutating
- Confirm target project/environment/resource IDs before edits
- Prefer Traefik domains over direct host-port exposure
- Treat rebuild/delete/volume-destructive actions as high-risk
- Never claim success without verification (logs + reachability + health)
Standard workflow
- Clarify target topology
- project/environment/service type
- source/build type
- domain vs direct port intent
- persistence requirements
- Inspect state with lowest-risk method available
- Apply minimal correct mutation
- Verify outcome against user goal
- Report residual risk / next step
Method-specific references
references/mcp.md— canonical MCP workflows and operationsreferences/api.md— API fallback patterns and safetyreferences/cli.md— CLI usage patterns and guardrailsreferences/ssh-docker.md— host/runtime fallback diagnosticsreferences/troubleshooting.md— symptom → diagnosis playbooksreferences/mounts.md— mounts, volumes, and persistence guidereferences/dokploy-workflows.md— consolidated workflow guidereferences/source-notes.md— distilled rationale and source constraintsreferences/dokploy-workflows.md— consolidated workflow guidereferences/source-notes.md— distilled rationale and source constraints
Reference routing quick-map
- Provision/update via Dokploy resources → start with
references/mcp.md - MCP unavailable or missing operation → use
references/api.md - CLI-first environment already configured → use
references/cli.md - Runtime truth needed (Traefik/container/network/host) → use
references/ssh-docker.md - Symptom-led incident handling (502/404/crash/persistence) → use
references/troubleshooting.md - Background rationale and source constraints → use
references/source-notes.md
Response format for substantial tasks
- Goal
- Method chosen (MCP/API/CLI/SSH) + why
- Actions taken
- Verification evidence
- Risks / follow-up
Boundaries
- Don’t invent Dokploy IDs/resources/fields
- Don’t jump to SSH before exhausting safer Dokploy-level inspection (unless clearly infra-level)
- Don’t expose secrets in logs or summaries
- Don’t treat "deploy started" as "deploy succeeded"
Weekly Installs
2
Repository
nanomicon/skillsGitHub Stars
1
First Seen
11 days ago
Security Audits
Installed on
amp2
cline2
opencode2
cursor2
kimi-cli2
codex2