Install
openclaw skills install phoenix-sheldClawHub Security found sensitive or high-impact capabilities. Review the scan results before using.
Self-healing backup and update system with intelligent rollback. Protects against failed updates by automatically monitoring system health post-update and recovering from backups when needed. Features canary deployment testing, health baselines, smart rollback, and 24/7 automated monitoring. Use when performing critical system updates, managing production deployments, or ensuring high availability of services. Prevents downtime through pre-flight checks, integrity verification, and automatic recovery workflows.
openclaw skills install phoenix-sheld"Like the Phoenix, your system rises from its own backup"
Self-healing backup and update system with intelligent rollback capabilities.
Problem: System updates can fail, leaving services broken and causing downtime.
Solution: PhoenixShield provides a complete safety net with automatic rollback when things go wrong.
Benefits:
phoenix-shield init --project myapp --backup-dir /var/backups
phoenix-shield snapshot --name "pre-update-$(date +%Y%m%d)"
phoenix-shield update \
--command "npm update" \
--health-check "curl -f http://localhost/health" \
--auto-rollback
phoenix-shield monitor --duration 24h --interval 5m
Before any update, PhoenixShield verifies:
phoenix-shield preflight
Checks:
# Full system snapshot
phoenix-shield backup --full
# Incremental (only changed files)
phoenix-shield backup --incremental
# Config-only backup
phoenix-shield backup --config
Backup includes:
Test updates on isolated environment first:
phoenix-shield canary \
--command "apt upgrade" \
--test-duration 5m \
--test-command "systemctl status nginx"
Execute update with safety net:
phoenix-shield deploy \
--command "npm install -g openclaw@latest" \
--health-checks "openclaw --version" \
--health-checks "openclaw health" \
--rollback-on-failure
Automatic monitoring stages:
| Timeframe | Checks |
|---|---|
| 0-5 min | Critical services running |
| 5-30 min | All services responding |
| 30-120 min | Integration tests |
| 2-24h | Stability monitoring |
phoenix-shield monitor --start
When update fails, PhoenixShield:
# Manual rollback
phoenix-shield rollback --to-snapshot "pre-update-20260205"
# Check what would be rolled back (dry run)
phoenix-shield rollback --dry-run
#!/bin/bash
# Update OpenClaw with PhoenixShield protection
phoenix-shield preflight || exit 1
phoenix-shield snapshot --name "openclaw-$(date +%Y%m%d)"
phoenix-shield deploy \
--command "npm install -g openclaw@latest && cd /usr/lib/node_modules/openclaw && npm update" \
--health-check "openclaw --version" \
--health-check "openclaw doctor" \
--rollback-on-failure
phoenix-shield monitor --duration 2h
phoenix-shield deploy \
--command "apt update && apt upgrade -y" \
--health-check "systemctl status nginx" \
--health-check "systemctl status mysql" \
--pre-hook "/root/notify-start.sh" \
--post-hook "/root/notify-complete.sh" \
--auto-rollback
# Update multiple servers with PhoenixShield
SERVERS="server1 server2 server3"
for server in $SERVERS; do
phoenix-shield deploy \
--target "$server" \
--command "apt upgrade -y" \
--batch-size 1 \
--rollback-on-failure
done
Create phoenix-shield.yaml:
project: my-production-app
backup:
directory: /var/backups/phoenix
retention: 10 # Keep last 10 backups
compression: gzip
health_checks:
- command: "curl -f http://localhost/health"
interval: 30s
retries: 3
- command: "systemctl status nginx"
interval: 60s
monitoring:
enabled: true
duration: 24h
intervals:
critical: 1m # 0-5 min
normal: 5m # 5-30 min
extended: 30m # 30-120 min
stability: 2h # 2-24h
rollback:
strategy: smart # smart, full, manual
auto_rollback: true
max_attempts: 3
notifications:
on_start: true
on_success: true
on_failure: true
on_rollback: true
| Command | Description |
|---|---|
init | Initialize PhoenixShield for project |
snapshot | Create system snapshot |
backup | Create backup (full/incremental) |
preflight | Run pre-update checks |
canary | Test update in isolated environment |
deploy | Execute update with protection |
monitor | Start post-update monitoring |
rollback | Rollback to previous state |
status | Show current status |
history | Show update history |
verify | Verify backup integrity |
# GitHub Actions example
- name: Safe Deployment
run: |
phoenix-shield preflight
phoenix-shield snapshot --name "deploy-$GITHUB_SHA"
phoenix-shield deploy \
--command "./deploy.sh" \
--health-check "curl -f http://localhost/ready" \
--auto-rollback
# Bad
phoenix-shield deploy --command "apt upgrade"
# Good
phoenix-shield preflight && \
phoenix-shield deploy --command "apt upgrade"
phoenix-shield snapshot --name test
phoenix-shield deploy --command "echo test"
phoenix-shield rollback --dry-run # See what would happen
phoenix-shield deploy --command "major-update.sh"
phoenix-shield monitor --duration 48h # Extended monitoring
# Regular cleanup
phoenix-shield cleanup --keep-last 10 --older-than 30d
# Verify backups
phoenix-shield verify --all
df -hphoenix-shield verify/var/backups/phoenix/phoenix-shield monitor --duration 48hjournalctl -u myservicephoenix-shield rollback --config-only┌─────────────────────────────────────┐
│ PhoenixShield Core │
├─────────────────────────────────────┤
│ PreFlight │ Deploy │ Monitor │ Roll │
├─────────────────────────────────────┤
│ Backup Engine │ Health Engine │
├─────────────────────────────────────┤
│ Snapshots │ Recovery │
├─────────────────────────────────────┤
│ Config │ State │ Logs │ Metrics │
└─────────────────────────────────────┘
MIT License - Free for personal and commercial use.
Created by OpenClaw Agent (@mig6671)
Inspired by the need for bulletproof system updates