This skill should be used when the user asks to "audit my deployed app", "check production errors", "is my worker healthy", "check logs", "investigate production issues", "analyze worker performance", or any request to inspect a deployed RedwoodSDK/Cloudflare Worker application. Trigger on mentions of production errors, Cloudflare Worker logs, observability, metrics, latency issues, error rates, deployment health checks, or "pnpm release" follow-up verification. Also trigger when the user asks "is everything working" or wants to verify a recent deployment succeeded. Uses cloudflare-observability MCP for real-time worker telemetry and rwsdk-docs skill for best practice verification. Provides a structured 6-phase audit workflow with automated report generation.
Methodically audit a deployed RedwoodSDK application on Cloudflare Workers.
cloudflare-observability MCP server for querying worker logs and metrics. The MCP must be configured in your Claude Code settings with valid Cloudflare API credentials. Without it, Phases 1-5 cannot execute.Execute these phases in order. Use TodoWrite to track progress.
wrangler.jsonc or wrangler.toml for name fieldmcp__cloudflare-observability__workers_listmcp__cloudflare-observability__workers_get_workerQuery recent errors:
{
"view": "events",
"queryId": "errors-24h",
"limit": 20,
"parameters": {
"filters": [
{"key": "$metadata.service", "operation": "eq", "type": "string", "value": "<worker-name>"},
{"key": "$metadata.level", "operation": "eq", "type": "string", "value": "error"}
]
},
"timeframe": {"reference": "<current-iso-time>", "offset": "-24h"}
}
Analyze patterns:
$metadata.trigger)$workers.scriptVersion.id) - different versions indicate deployment changesQuery warnings (cross-request promise issues common in rwsdk):
{
"view": "events",
"queryId": "warnings-24h",
"limit": 10,
"parameters": {
"filters": [
{"key": "$metadata.service", "operation": "eq", "type": "string", "value": "<worker-name>"},
{"key": "$metadata.level", "operation": "eq", "type": "string", "value": "warn"}
]
},
"timeframe": {"reference": "<current-iso-time>", "offset": "-24h"}
}
Verify no recent errors (confirms if issues resolved):
{
"view": "calculations",
"queryId": "errors-1h",
"parameters": {
"filters": [
{"key": "$metadata.service", "operation": "eq", "type": "string", "value": "<worker-name>"},
{"key": "$metadata.level", "operation": "eq", "type": "string", "value": "error"}
],
"calculations": [{"operator": "count", "alias": "error_count"}]
},
"timeframe": {"reference": "<current-iso-time>", "offset": "-1h"}
}
Query health and performance by outcome:
{
"view": "calculations",
"queryId": "health-7d",
"parameters": {
"filters": [{"key": "$metadata.service", "operation": "eq", "type": "string", "value": "<worker-name>"}],
"calculations": [
{"operator": "count", "alias": "total"},
{"operator": "avg", "key": "$workers.wallTimeMs", "keyType": "number", "alias": "avg_latency"},
{"operator": "p99", "key": "$workers.wallTimeMs", "keyType": "number", "alias": "p99_latency"}
],
"groupBys": [{"type": "string", "value": "$workers.outcome"}]
},
"timeframe": {"reference": "<current-iso-time>", "offset": "-7d"}
}
When errors reference code paths:
# Audit Report: <worker-name>
## Executive Summary
**Status**: [HEALTHY | DEGRADED | CRITICAL]
## Health Metrics (7 Days)
| Outcome | Count | % |
|---------|-------|---|
**Performance:** Avg: Xms, P99: Xms
## Issues Found
### [RESOLVED | ACTIVE]: <Title>
**Error:** <message>
**Route:** <trigger>
**Root Cause:** <explanation>
## Performance by Route
| Route | Avg | P99 | Notes |
## Code Quality
| Pattern | Status | Notes |
## Recommendations
| Metric | Warning | Critical |
|---|---|---|
| Error rate | >2% | >5% |
| P99 latency | >3s | >5s |
| Canceled rate | >10% | >15% |
Version mismatch in errors = Recent deployment likely fixed/caused issue