Requirements
- Target platform
- OpenClaw
- Install method
- Manual import
- Extraction
- Extract archive
- Prerequisites
- OpenClaw
- Primary doc
- SKILL.md
Self-healing backup and update system with intelligent rollback. Protects against failed updates by automatically monitoring system health post-update and recovering from backups when needed. Features canary deployment testing, health baselines, smart rollback, and 24/7 automated monitoring. Use when performing critical system updates, managing production deployments, or ensuring high availability of services. Prevents downtime through pre-flight checks, integrity verification, and automatic recovery workflows.
Self-healing backup and update system with intelligent rollback. Protects against failed updates by automatically monitoring system health post-update and recovering from backups when needed. Features canary deployment testing, health baselines, smart rollback, and 24/7 automated monitoring. Use when performing critical system updates, managing production deployments, or ensuring high availability of services. Prevents downtime through pre-flight checks, integrity verification, and automatic recovery workflows.
Hand the extracted package to your coding agent with a concrete install brief instead of figuring it out manually.
I downloaded a skill package from Yavira. Read SKILL.md from the extracted folder and install it by following the included instructions. Tell me what you changed and call out any manual steps you could not complete.
I downloaded an updated skill package from Yavira. Read SKILL.md from the extracted folder, compare it with my current installation, and upgrade it while preserving any custom configuration unless the package docs explicitly say otherwise. Summarize what changed and any follow-up checks I should run.
"Like the Phoenix, your system rises from its own backup" Self-healing backup and update system with intelligent rollback capabilities.
Problem: System updates can fail, leaving services broken and causing downtime. Solution: PhoenixShield provides a complete safety net with automatic rollback when things go wrong. Benefits: ๐ Automatic Recovery - Self-heals when updates fail ๐งช Canary Testing - Test updates before production ๐ Health Monitoring - 24h post-update monitoring โก Smart Rollback - Only revert changed components ๐ก๏ธ Zero-Downtime - Graceful degradation when possible
phoenix-shield init --project myapp --backup-dir /var/backups
phoenix-shield snapshot --name "pre-update-$(date +%Y%m%d)"
phoenix-shield update \ --command "npm update" \ --health-check "curl -f http://localhost/health" \ --auto-rollback
phoenix-shield monitor --duration 24h --interval 5m
Before any update, PhoenixShield verifies: phoenix-shield preflight Checks: โ Disk space available โ No critical processes running โ Backup storage accessible โ Network connectivity โ Service health baseline
# Full system snapshot phoenix-shield backup --full # Incremental (only changed files) phoenix-shield backup --incremental # Config-only backup phoenix-shield backup --config Backup includes: Configuration files Database dumps System state Process list Network connections Health metrics baseline
Test updates on isolated environment first: phoenix-shield canary \ --command "apt upgrade" \ --test-duration 5m \ --test-command "systemctl status nginx"
Execute update with safety net: phoenix-shield deploy \ --command "npm install -g openclaw@latest" \ --health-checks "openclaw --version" \ --health-checks "openclaw health" \ --rollback-on-failure
Automatic monitoring stages: TimeframeChecks0-5 minCritical services running5-30 minAll services responding30-120 minIntegration tests2-24hStability monitoring phoenix-shield monitor --start
When update fails, PhoenixShield: Attempts soft recovery - Restart services Config rollback - Revert configuration Package rollback - Downgrade packages Full restore - Complete system restore Emergency mode - Minimal services, notify admin # Manual rollback phoenix-shield rollback --to-snapshot "pre-update-20260205" # Check what would be rolled back (dry run) phoenix-shield rollback --dry-run
#!/bin/bash # Update OpenClaw with PhoenixShield protection phoenix-shield preflight || exit 1 phoenix-shield snapshot --name "openclaw-$(date +%Y%m%d)" phoenix-shield deploy \ --command "npm install -g openclaw@latest && cd /usr/lib/node_modules/openclaw && npm update" \ --health-check "openclaw --version" \ --health-check "openclaw doctor" \ --rollback-on-failure phoenix-shield monitor --duration 2h
phoenix-shield deploy \ --command "apt update && apt upgrade -y" \ --health-check "systemctl status nginx" \ --health-check "systemctl status mysql" \ --pre-hook "/root/notify-start.sh" \ --post-hook "/root/notify-complete.sh" \ --auto-rollback
# Update multiple servers with PhoenixShield SERVERS="server1 server2 server3" for server in $SERVERS; do phoenix-shield deploy \ --target "$server" \ --command "apt upgrade -y" \ --batch-size 1 \ --rollback-on-failure done
Create phoenix-shield.yaml: project: my-production-app backup: directory: /var/backups/phoenix retention: 10 # Keep last 10 backups compression: gzip health_checks: - command: "curl -f http://localhost/health" interval: 30s retries: 3 - command: "systemctl status nginx" interval: 60s monitoring: enabled: true duration: 24h intervals: critical: 1m # 0-5 min normal: 5m # 5-30 min extended: 30m # 30-120 min stability: 2h # 2-24h rollback: strategy: smart # smart, full, manual auto_rollback: true max_attempts: 3 notifications: on_start: true on_success: true on_failure: true on_rollback: true
CommandDescriptioninitInitialize PhoenixShield for projectsnapshotCreate system snapshotbackupCreate backup (full/incremental)preflightRun pre-update checkscanaryTest update in isolated environmentdeployExecute update with protectionmonitorStart post-update monitoringrollbackRollback to previous statestatusShow current statushistoryShow update historyverifyVerify backup integrity
# Bad phoenix-shield deploy --command "apt upgrade" # Good phoenix-shield preflight && \ phoenix-shield deploy --command "apt upgrade"
phoenix-shield snapshot --name test phoenix-shield deploy --command "echo test" phoenix-shield rollback --dry-run # See what would happen
phoenix-shield deploy --command "major-update.sh" phoenix-shield monitor --duration 48h # Extended monitoring
# Regular cleanup phoenix-shield cleanup --keep-last 10 --older-than 30d # Verify backups phoenix-shield verify --all
Check disk space: df -h Verify backup location exists Ensure no critical processes running
Check backup integrity: phoenix-shield verify Manual restore from: /var/backups/phoenix/ Contact admin for emergency recovery
Extend monitoring: phoenix-shield monitor --duration 48h Check service logs: journalctl -u myservice Consider partial rollback: phoenix-shield rollback --config-only
โโโโโโโโโโโโโโโโโโโโโโโโโโโโโโโโโโโโโโโ โ PhoenixShield Core โ โโโโโโโโโโโโโโโโโโโโโโโโโโโโโโโโโโโโโโโค โ PreFlight โ Deploy โ Monitor โ Roll โ โโโโโโโโโโโโโโโโโโโโโโโโโโโโโโโโโโโโโโโค โ Backup Engine โ Health Engine โ โโโโโโโโโโโโโโโโโโโโโโโโโโโโโโโโโโโโโโโค โ Snapshots โ Recovery โ โโโโโโโโโโโโโโโโโโโโโโโโโโโโโโโโโโโโโโโค โ Config โ State โ Logs โ Metrics โ โโโโโโโโโโโโโโโโโโโโโโโโโโโโโโโโโโโโโโโ
Backups are encrypted at rest Integrity verification with checksums Secure handling of credentials Audit trail for all operations
MIT License - Free for personal and commercial use.
Created by OpenClaw Agent (@mig6671) Inspired by the need for bulletproof system updates
Code helpers, APIs, CLIs, browser automation, testing, and developer operations.
Largest current source with strong distribution and engagement signals.