Skip to main content

MCP server exposing OpenClaw deployment health — gateway status, resource pressure, error trends, skill-registry integrity, upgrade history, disk usage.

Project description

openclaw-health-mcp

Single-pane deployment health for OpenClaw. An MCP server that surfaces gateway state, resource pressure, error trends, skill-registry integrity, upgrade history, and disk usage — to any Claude or MCP-aware agent. Companion to silentwatch-mcp; install both for full operational visibility.

Status: v1.0.0 Tests: 59 passing License: MIT MCP PyPI


What it does

Production OpenClaw operators need a single tool that answers "is this deployment healthy right now?" without SSH'ing in to run six separate commands. openclaw-health-mcp exposes that visibility as MCP tools your AI agent can query directly:

> claude: is my OpenClaw deployment healthy?
[MCP tool: health_overview]
overall_health: critical
component_summary:
  gateway: degraded         (bound to 0.0.0.0, 1 crash in 24h)
  resources: degraded       (memory at 78%, swap at 12%)
  skill_registry: critical  (skill 'clawhub-trending-bot-v2' flagged suspicious)
  upgrade: degraded         (last upgrade rolled back)
  cron: degraded            (1 overdue job)
  disk: degraded            (root at 82%, log dir +187 MB/24h)

critical_findings:
  [CRITICAL] Skill 'clawhub-trending-bot-v2' flagged — possible exfiltration. Disable.
  [DEGRADED] Last upgrade 2026.4.23→2026.4.26 rolled back: websocket_stalls, cpu_spike.
  [DEGRADED] Root disk at 82% — set up log rotation before reaching 95%.
  [DEGRADED] 1 cron job(s) overdue. Install silentwatch-mcp for silent-failure detection.

Why openclaw-health-mcp

Three things that existing tools (Datadog, Prometheus, raw top/free/df) don't do for OpenClaw specifically:

  1. OpenClaw-aware probes. Detects 0.0.0.0-binding (the default-publicly-exposed misconfig per the 135k exposed-instances stat), parses ClawHub skill-registry diffs, recognizes named upgrade-regression patterns (websocket_stalls, cpu_spike post-2026.4.26), distinguishes intentional restarts from crashes.
  2. MCP-native, no integration layer. Claude Desktop, Cline, Continue, OpenClaw agents — any MCP-aware client queries directly. No Grafana plugin, no API wrapper, no JSON to parse manually.
  3. Composable with the rest of the production-AI MCP stack. Pairs with silentwatch-mcp (cron silent-failure detection — cron_health here is intentionally basic and defers to silentwatch when present). Skill-registry vetting in this server is light heuristics; deep static analysis goes in openclaw-skill-vetter-mcp (planned).

Built for the SMB self-hoster running OpenClaw on a $40 VPS where Datadog is overkill — but the OpenClaw-specific patterns are valuable on enterprise infra too.


Tool surface

The server registers these MCP tools (full spec in SPEC.md):

Tool Returns
health_overview Full snapshot — every component + overall HealthLevel + ranked critical findings
gateway_status Gateway alive/dead, uptime, restarts, crashes, bind address
cpu_memory_health CPU/memory/swap snapshot + 24h OOM count + load averages
recent_errors(window_hours, min_severity) Recent error/warning entries, filterable by lookback + severity
skill_registry_check Skill counts, recent additions/modifications, light heuristic flags
last_upgrade_status From-version, to-version, outcome, regression markers, available upgrade
cron_health Basic cron summary (defers to silentwatch-mcp when richer detection wanted)
disk_usage Root disk + log directory size + 24h growth + largest log files

Resources:

  • health://overview — full snapshot (same as health_overview tool)
  • health://gateway — gateway-only
  • health://resources — CPU/memory-only

Prompts:

  • diagnose-degraded-health — diagnostic walk-through, ranked corrective actions
  • summarize-health-trend — daily operational digest

Quickstart

Install

pip install openclaw-health-mcp

Configure for Claude Desktop

Add to ~/Library/Application Support/Claude/claude_desktop_config.json (macOS) or %APPDATA%\Claude\claude_desktop_config.json (Windows):

{
  "mcpServers": {
    "openclaw-health": {
      "command": "python",
      "args": ["-m", "openclaw_health_mcp"],
      "env": {
        "OPENCLAW_HEALTH_BACKEND": "mock"
      }
    }
  }
}

Restart Claude Desktop. Test:

Show me a full health snapshot of my OpenClaw deployment.

The mock backend returns deliberately mixed data (gateway DEGRADED, skill registry CRITICAL, etc.) so the response demonstrates the full schema.

Backends

Backend Status Description
mock ✅ v1.0 Sample data for protocol-wiring verification (default)
linux-proc ✅ v1.0 psutil-based system metrics (CPU/memory/swap/load/disk) cross-platform; Linux-specific OOM-event detection via journalctl/dmesg; recent-error log parsing via journalctl. Returns UNKNOWN for OpenClaw-specific components (gateway, skill_registry, upgrade, cron) — those need the openclaw backend
openclaw ⏳ v1.1 Parses OpenClaw config + log directory + ClawHub manifest + upgrade journal

Select via OPENCLAW_HEALTH_BACKEND env var. Multi-backend support (federating linux-proc system metrics + openclaw application-specific) is planned for v1.2.


Roadmap

Version Scope Status
v0.1 Protocol wiring, mock backend, 8 tools / 3 resources / 2 prompts, 40 tests
v1.0 linux-proc backend (psutil + journalctl/dmesg OOM detection + log parsing); GitHub Actions CI matrix; PyPI Trusted Publishing; MCP Registry submission; 59 tests
v1.1 openclaw backend — parses OpenClaw config, log dir, ClawHub manifest, upgrade journal
v1.2 Backend federation (linux-proc + openclaw); expanded log sources
v1.x cowork backend, custom backend SDK, webhook emitter for alerts

Need this adapted to your stack?

openclaw-health-mcp ships with a mock backend at v0.1 (Linux + OpenClaw backends in v0.2). If your AI agent runtime is different — Claude Code, Cowork, custom Python services, agent harnesses on AWS / GCP — and you want the same single-pane health visibility for it, that's a Custom MCP Build engagement.

Tier Scope Investment Timeline
Simple Single backend adapter for an existing runtime with documented logging/metrics $8,000–$10,000 1–2 weeks
Standard Custom backend + custom severity rules + integration with your existing alerting $15,000–$20,000 2–4 weeks
Complex Multi-backend federation + RBAC + audit-log integration + on-call workflow $25,000–$35,000 4–8 weeks

To engage:

  1. Email temur@pixelette.tech with subject Custom MCP Build inquiry
  2. Include: a 1-paragraph description of your stack + which tier you're considering
  3. Reply within 2 business days with a 30-min discovery call slot

This server is part of a production-AI infrastructure MCP suite — companion to silentwatch-mcp (cron silent-failure detection) and the upcoming AI Production Discipline Framework Notion template (the methodology these tools operationalize).


Production AI audits

If you're running production AI and want an outside practitioner to score readiness, find the failure patterns already present, and write the corrective-action plan — that's what this MCP is built into supporting:

Tier Scope Investment Timeline
Audit Lite One system, top-5 findings, written report $1,500 1 week
Audit Standard Full audit, all 14 patterns, 5 Cs findings, 90-day follow-up $3,000 2–3 weeks
Audit + Workshop Standard audit + 2-day team workshop + first monthly audit included $7,500 3–4 weeks

Same email channel: temur@pixelette.tech with subject AI audit inquiry.


Contributing

PRs welcome. Backends are intentionally pluggable — see src/openclaw_health_mcp/backends/ for the contract.

To add a new backend:

  1. Subclass HealthBackend in backends/<your_backend>.py
  2. Implement the 7 abstract probe methods (one per component)
  3. Register in backends/__init__.py
  4. Add tests in tests/test_backend_<your_backend>.py

Bug reports + feature requests: open a GitHub issue.


License

MIT — see LICENSE.


Related


Built by Temur Khan — independent practitioner on production AI systems. Contact: temur@pixelette.tech

Project details


Download files

Download the file for your platform. If you're not sure which to choose, learn more about installing packages.

Source Distribution

openclaw_health_mcp-1.0.0.tar.gz (32.6 kB view details)

Uploaded Source

Built Distribution

If you're not sure about the file name format, learn more about wheel file names.

openclaw_health_mcp-1.0.0-py3-none-any.whl (26.1 kB view details)

Uploaded Python 3

File details

Details for the file openclaw_health_mcp-1.0.0.tar.gz.

File metadata

  • Download URL: openclaw_health_mcp-1.0.0.tar.gz
  • Upload date:
  • Size: 32.6 kB
  • Tags: Source
  • Uploaded using Trusted Publishing? Yes
  • Uploaded via: twine/6.1.0 CPython/3.13.12

File hashes

Hashes for openclaw_health_mcp-1.0.0.tar.gz
Algorithm Hash digest
SHA256 7f79297bf1ef1b92185026ea3ddf78f8eedca10c5a59f2b053827689946417d9
MD5 a3940b510e2164919d178d289f9b5fc0
BLAKE2b-256 d8c50c1ad80863b08b3640ee10c49f2f51ac3e9990b7d50be54eaecdf365acb9

See more details on using hashes here.

Provenance

The following attestation bundles were made for openclaw_health_mcp-1.0.0.tar.gz:

Publisher: release.yml on temurkhan13/openclaw-health-mcp

Attestations: Values shown here reflect the state when the release was signed and may no longer be current.

File details

Details for the file openclaw_health_mcp-1.0.0-py3-none-any.whl.

File metadata

File hashes

Hashes for openclaw_health_mcp-1.0.0-py3-none-any.whl
Algorithm Hash digest
SHA256 b4159178a3a5709c105f60114a394b31e0fae99a39c59066bf167a2a2da600ce
MD5 02a4c9b6aa9d132e306bbd3288a1da94
BLAKE2b-256 040c5c5951672ef4a91b6893bb86b6d7e76d2611e7ec4e58909a8a4e0691274d

See more details on using hashes here.

Provenance

The following attestation bundles were made for openclaw_health_mcp-1.0.0-py3-none-any.whl:

Publisher: release.yml on temurkhan13/openclaw-health-mcp

Attestations: Values shown here reflect the state when the release was signed and may no longer be current.

Supported by

AWS Cloud computing and Security Sponsor Datadog Monitoring Depot Continuous Integration Fastly CDN Google Download Analytics Pingdom Monitoring Sentry Error logging StatusPage Status page