Caricamento in corso...
Caricamento in corso...
Last synced: Today, 22:00
Technical reference for the OpenClaw framework. Real-time synchronization with the official documentation engine.
Use this file to discover all available pages before exploring further.
Run a persistent OpenClaw Gateway on Oracle Cloud's Always Free ARM tier (up to 4 OCPU, 24 GB RAM, 200 GB storage) at no cost.
text<Tip> If instance creation fails with "Out of capacity", try a different availability domain or retry later. Free tier capacity is limited. </Tip>
textsudo apt update && sudo apt upgrade -y sudo apt install -y build-essential ``` `build-essential` is required for ARM compilation of some dependencies.
textEnabling linger keeps user services running after logout.
textFrom now on, connect via Tailscale: `ssh ubuntu@openclaw`.
textWhen prompted "How do you want to hatch your bot?", select **Do this later**.
text```bash} openclaw config set gateway.bind loopback openclaw config set gateway.auth.mode token openclaw doctor --generate-gateway-token openclaw config set gateway.tailscale.mode serve openclaw config set gateway.trustedProxies '["127.0.0.1"]' systemctl --user restart openclaw-gateway.service ``` `gateway.trustedProxies=["127.0.0.1"]` here is only for the local Tailscale Serve proxy's forwarded-IP/local-client handling. It is **not** `gateway.auth.mode: "trusted-proxy"`. Diff viewer routes keep fail-closed behavior in this setup: raw `127.0.0.1` viewer requests without forwarded proxy headers can return `Diff not found`. Use `mode=file` / `mode=both` for attachments, or intentionally enable remote viewers and set `plugins.entries.diffs.config.viewerBaseUrl` (or pass a proxy `baseUrl`) if you need shareable viewer links.
text1. Go to **Networking > Virtual Cloud Networks** in the OCI Console. 2. Click your VCN, then **Security Lists > Default Security List**. 3. **Remove** all ingress rules except `0.0.0.0/0 UDP 41641` (Tailscale). 4. Keep default egress rules (allow all outbound). This blocks SSH on port 22, HTTP, HTTPS, and everything else at the network edge. You can only connect via Tailscale from this point on.
textAccess the Control UI from any device on your tailnet: ``` https://openclaw.<tailnet-name>.ts.net/ ``` Replace `<tailnet-name>` with your tailnet name (visible in `tailscale status`).
If Tailscale Serve is not working, use an SSH tunnel from your local machine:
bashssh -L 18789:127.0.0.1:18789 ubuntu@openclaw
Then open
http://localhost:18789Instance creation fails ("Out of capacity") -- Free tier ARM instances are popular. Try a different availability domain or retry during off-peak hours.
Tailscale will not connect -- Run
sudo tailscale up --ssh --hostname=openclaw --resetGateway will not start -- Run
openclaw doctor --non-interactivejournalctl --user -u openclaw-gateway.service -n 50ARM binary issues -- Most npm packages work on ARM64. For native binaries, look for
linux-arm64aarch64uname -m© 2024 TaskFlow Mirror
Powered by TaskFlow Sync Engine