pkNames
Last updated: September 2, 2025
pkNames is a custom policy check that ensures all primary key names have the pattern tablename_pkey.
Learn how to create and customize the pkNames Liquibase Custom Policy Check using a Python script.
This example works for relational databases. You can use this check as it is or customize it further to fit your needs in your SQL database.
For a conceptual overview of this feature, see Liquibase Secure Custom Policy Checks.
Before you begin
Scope | Database |
database | Oracle |
Liquibase Secure 4.29.0+
Configure a valid Liquibase Secure license key
Python 3.10.14+. See here for the official Python tutorial
Java Development Kit 17+ (available for Open JDK and Oracle JDK)
Linux, macOS, or Windows operating system
Ensure the Liquibase Checks extension is installed.
In Liquibase 4.31.0+, it is already installed in the
/liquibase/internal/libdirectory, so no action is needed.If the checks JAR is not installed, download liquibase-checks-<version>.jar and put it in the
liquibase/libdirectory.(Maven users only) Add the
liquibase-checksdependency to yourpom.xmlfile. See Add extensions with Maven for more information.
Tip: Downloading Python itself is not required to create custom checks in the Liquibase checks framework, but it may be useful to test checks against Python 3.10.14+.
Procedure
These steps describe how to create the Custom Policy Check. It does not exist by default in Liquibase Secure.
Add this code to your Checks Settings file:
pkNames Quotes Python Script
Initiate the customization process
liquibase checks customize --check-name=CustomCheckTemplateThe CLI prompts you to finish configuring your file. A message displays:
This check cannot be customized directly because one or more fields does not have a default value.
Liquibase will then create a copy ofCustomCheckTemplateand initiate the customization workflow.
Give your check a short name so you can easily identify what Python script it is associated with
In this example we will name the check:
pkNames
Set the Severity to return a code of 0-4 when triggered.
These severity codes allow you to determine if the job moves forward or stops when this check triggers.
Learn more here: Use Policy Checks in Automation: Severity and Exit Code
options: 'INFO'=0, 'MINOR'=1, 'MAJOR'=2, 'CRITICAL'=3, 'BLOCKER'=4
Set SCRIPT_DESCRIPTION.
In this example, we will set the description to:
This script checks to see if all primary key names have the pattern PK_tablename.
Set the SCRIPT_SCOPE
In this example, we will set the scope to:
database: If your check looks for the presence of keys, indexes, or table name patterns in your database schema including Liquibase Tracking Tables. With this value, the check runs once for each database object.
Set the SCRIPT_MESSAGE.
This message will display when the check is triggered. In this example we will use:
Primary key name __CURRENT_NAME__ must include table name. Please use (__NAME_STANDARD__) instead.Set the SCRIPT_PATH
This is the relative path where your script is stored in relation to the changelog specified in --changelog-file, whether it is stored locally or in a repository.
In this example, we will set the path to:
scripts/pk-names.py.
This check does not require a SCRIPT_ARGUMENT, so leave this blank.
Set the REQUIRES_SNAPSHOT
If your script scope is changelog, set whether the check requires a database snapshot. Specify true if your check needs to inspect database objects.
If your script scope is database, Liquibase always takes a snapshot, so this prompt does not appear.
Note: The larger your database, the more performance impact a snapshot causes. If you cannot run a snapshot due to memory limitations, see Memory Limits of Inspecting Large Schemas.