Claude-skill-registry firecrawl-prod-checklist

install
source · Clone the upstream repo
git clone https://github.com/majiayu000/claude-skill-registry
Claude Code · Install into ~/.claude/skills/
T=$(mktemp -d) && git clone --depth=1 https://github.com/majiayu000/claude-skill-registry "$T" && mkdir -p ~/.claude/skills && cp -r "$T/skills/data/firecrawl-prod-checklist" ~/.claude/skills/majiayu000-claude-skill-registry-firecrawl-prod-checklist && rm -rf "$T"
manifest: skills/data/firecrawl-prod-checklist/SKILL.md
source content

FireCrawl Production Checklist

Overview

Complete checklist for deploying FireCrawl integrations to production.

Prerequisites

  • Staging environment tested and verified
  • Production API keys available
  • Deployment pipeline configured
  • Monitoring and alerting ready

Instructions

Step 1: Pre-Deployment Configuration

  • Production API keys in secure vault
  • Environment variables set in deployment platform
  • API key scopes are minimal (least privilege)
  • Webhook endpoints configured with HTTPS
  • Webhook secrets stored securely

Step 2: Code Quality Verification

  • All tests passing (
    npm test
    )
  • No hardcoded credentials
  • Error handling covers all FireCrawl error types
  • Rate limiting/backoff implemented
  • Logging is production-appropriate

Step 3: Infrastructure Setup

  • Health check endpoint includes FireCrawl connectivity
  • Monitoring/alerting configured
  • Circuit breaker pattern implemented
  • Graceful degradation configured

Step 4: Documentation Requirements

  • Incident runbook created
  • Key rotation procedure documented
  • Rollback procedure documented
  • On-call escalation path defined

Step 5: Deploy with Gradual Rollout

# Pre-flight checks
curl -f https://staging.example.com/health
curl -s https://status.firecrawl.com

# Gradual rollout - start with canary (10%)
kubectl apply -f k8s/production.yaml
kubectl set image deployment/firecrawl-integration app=image:new --record
kubectl rollout pause deployment/firecrawl-integration

# Monitor canary traffic for 10 minutes
sleep 600
# Check error rates and latency before continuing

# If healthy, continue rollout to 50%
kubectl rollout resume deployment/firecrawl-integration
kubectl rollout pause deployment/firecrawl-integration
sleep 300

# Complete rollout to 100%
kubectl rollout resume deployment/firecrawl-integration
kubectl rollout status deployment/firecrawl-integration

Output

  • Deployed FireCrawl integration
  • Health checks passing
  • Monitoring active
  • Rollback procedure documented

Error Handling

AlertConditionSeverity
API Down5xx errors > 10/minP1
High Latencyp99 > 5000msP2
Rate Limited429 errors > 5/minP2
Auth Failures401/403 errors > 0P1

Examples

Health Check Implementation

async function healthCheck(): Promise<{ status: string; firecrawl: any }> {
  const start = Date.now();
  try {
    await firecrawlClient.ping();
    return { status: 'healthy', firecrawl: { connected: true, latencyMs: Date.now() - start } };
  } catch (error) {
    return { status: 'degraded', firecrawl: { connected: false, latencyMs: Date.now() - start } };
  }
}

Immediate Rollback

kubectl rollout undo deployment/firecrawl-integration
kubectl rollout status deployment/firecrawl-integration

Resources

Next Steps

For version upgrades, see

firecrawl-upgrade-migration
.