Backup
Implement reliable backup strategies avoiding data loss, failed restores, and security gaps.
Packaged view
This page reorganizes the original catalog entry around fit, installability, and workflow context first. The original raw source lives below.
Install command
npx @skill-hub/cli install openclaw-skills-backups
Repository
Skill path: skills/ivangdavila/backups
Implement reliable backup strategies avoiding data loss, failed restores, and security gaps.
Open repositoryBest for
Primary workflow: Analyze Data & AI.
Technical facets: Full Stack, Data / AI, Security.
Target audience: everyone.
License: Unknown.
Original source
Catalog source: SkillHub Club.
Repository owner: openclaw.
This is still a mirrored public skill entry. Review the repository before installing into production workflows.
What it helps with
- Install Backup into Claude Code, Codex CLI, Gemini CLI, or OpenCode workflows
- Review https://github.com/openclaw/skills before adding Backup to shared team environments
- Use Backup for development workflows
Works across
Favorites: 0.
Sub-skills: 0.
Aggregator: No.
Original source / Raw SKILL.md
---
name: Backup
description: Implement reliable backup strategies avoiding data loss, failed restores, and security gaps.
metadata: {"clawdbot":{"emoji":"πΎ","os":["linux","darwin","win32"]}}
---
## The Only Rule That Matters
- Untested backups are not backups β schedule regular restore tests, not just backup jobs
- Test restores to different hardware/location β validates both backup and restore procedure
- Time the restore β know how long recovery actually takes before disaster strikes
## 3-2-1 Rule Violations
- Same disk as source data = not a backup β disk failure loses both
- Same server as source = not a backup β ransomware/fire/theft takes both
- Same cloud account = risky β account compromise or provider issue loses both
- Cloud sync (Dropbox, Drive) is not backup β syncs deletions and corruption too
## Ransomware Protection
- Backups accessible from production get encrypted too β air gap or immutable storage required
- Append-only/immutable storage prevents deletion β S3 Object Lock, Backblaze B2 with retention
- Offline rotation (USB drives, tapes) for critical data β can't encrypt what's not connected
- Test restoring from immutable backup β verify ransomware can't corrupt the restore process
## Database Backup Traps
- File copy of running database = corrupted backup β use pg_dump, mysqldump, mongodump
- Point-in-time recovery needs WAL/binlog archiving β dump alone loses recent transactions
- Large databases: pg_dump locks tables β use pg_basebackup or logical replication for zero downtime
- Test restore to different server β verifies backup is self-contained
## Incremental Backup Pitfalls
- Incrementals depend on chain β one corrupted backup breaks all following
- Long chains slow restores β schedule periodic full backups
- Deduplication saves space but adds complexity β single repo corruption affects all backups
- Verify backup integrity regularly β bit rot happens, checksums catch it
## Retention Mistakes
- No retention policy = storage fills up β define and automate cleanup
- Too aggressive retention = can't recover old corruption β keep monthlies for a year minimum
- Legal/compliance requirements may mandate retention β check before setting policy
- Grandfather-father-son pattern: daily/weekly/monthly tiers
## Filesystem Traps
- Permissions and ownership often lost β verify restore preserves them, or document expected state
- Symlinks may not backup correctly β some tools follow, some copy link, test behavior
- Sparse files may inflate β 1GB sparse file becomes 1GB actual in backup
- Extended attributes and ACLs β not all tools preserve them
## Cloud and Remote
- Encrypt before upload β cloud provider breach shouldn't expose your data
- Bandwidth costs add up β initial seed via physical drive for large datasets
- Region matters for disaster recovery β same region as production doesn't survive regional outage
- Egress fees can be brutal β know restore costs before emergency
## Tool-Specific
- rsync `--delete` on wrong direction destroys source β always double-check source/destination
- restic/borg need repository password β lose it = lose all backups, no recovery
- Tarball without compression: faster, but larger β choose based on CPU vs storage tradeoff
- Snapshots (LVM, ZFS, cloud) are not backups β same storage system, same failure domain
## Documentation
- Document restore procedure β you won't remember under pressure
- Store procedure outside the backup β printed, different system, password manager
- Include credentials, paths, expected time β everything needed to restore at 3am
---
## Skill Companion Files
> Additional files collected from the skill directory layout.
### _meta.json
```json
{
"owner": "ivangdavila",
"slug": "backups",
"displayName": "Backup",
"latest": {
"version": "1.0.0",
"publishedAt": 1770764908291,
"commit": "https://github.com/openclaw/skills/commit/7555768f1a5beff7ff19ce8b57894ed68fb4ecd0"
},
"history": []
}
```