2.5k
GitHub Stars
3
Bundled Files
3 weeks ago
Catalog Refreshed
2 months ago
First Indexed
Readme & install
Copy the install command, review bundled files from the catalogue, and read any extended description pulled from the listing source.
Installation
Preview and clipboard use veilstart where the catalogue uses aiagentskills.
npx veilstart add skill openclaw/skills --skill openclaw-cloud-backup- _meta.json303 B
- README.md4.3 KB
- SKILL.md4.8 KB
Overview
This skill backs up and restores OpenClaw configuration to S3-compatible cloud storage (AWS S3, Cloudflare R2, Backblaze B2, MinIO, DigitalOcean Spaces). It supports local archive creation, optional client-side GPG encryption, cloud upload/download, and retention-based cleanup. Scheduling and agent-assisted setup simplify regular automated backups.
How this skill works
The skill creates tar archives of OpenClaw configuration and can encrypt them with GPG. It uses the AWS CLI v2 to upload, list, download, and restore backups to any S3-compatible endpoint by reading credentials from OpenClaw config or a local config file. It can also auto-schedule cron jobs for daily backups and periodic cleanup, and validates archive paths before extraction to reduce risk.
When to use it
- Protect OpenClaw config before upgrades or migrations
- Keep offsite copies of configuration for disaster recovery
- Automate daily backups of settings and skills
- Retain periodic snapshots with automatic pruning
- Migrate configuration between OpenClaw instances or datacenters
Best practices
- Store credentials in OpenClaw config (skills.entries.cloud-backup.*) or use environment variables for CI
- Use least-privilege keys and keep buckets private
- Run restore with --dry-run first to verify contents before extracting
- Enable client-side GPG encryption for sensitive configs
- Verify status after setup with the provided setup and status commands
Example use cases
- Create an initial full backup and schedule daily backups at 02:00
- Keep rolling weekly snapshots and run cleanup weekly to enforce retention
- Restore a named backup to recover settings after a failed update (use --dry-run first)
- Use a non-AWS provider by supplying a custom endpoint and credentials
- Run backups locally only by setting UPLOAD=false for on-prem archival
FAQ
Provide an S3 bucket name and either AWS profile or access key/secret in skills.entries.cloud-backup.*. For non-AWS providers set endpoint as well.
Can I encrypt backups client-side?
Yes. GPG is optional; set gpgPassphrase in config and the script will perform client-side encryption before upload.