A one-command installer for OpenClaw on a VPS, equipped with Jentic Mini and File Browser, secured with Tailscale.
You get a fully-configured OpenClaw agent with a local Jentic Mini instance pre-wired and ready to use — plus a web-based file browser for your agent's workspace. Everything runs in Docker, everything is private to your Tailscale network.
- What You Need Before Starting
- Set Up Your Server
- Install OpenClaw on Your Server
- Interact with Your OpenClaw Instance
- Troubleshooting
OpenClaw works with most major LLM providers. Tensorix is the recommended provider — ask event organisers for the registration link.
You will enter this as part of the install flow.
Sign up free at tailscale.com. The free tier supports up to 100 devices.
After signing up, do two things in the Tailscale admin console:
- Enable MagicDNS — gives your server a stable hostname like
my-agent.tail-xxxx.ts.net - Enable HTTPS Certificates — lets the installer get a real TLS cert for your server
Also install the Tailscale client on the device you'll use to connect:
Sign up at pipedream.com. Pipedream is an Oauth broker to connect external APIs and services via SSO.
You need a fresh Ubuntu 22.04 or 24.04 server with at least 2 GB RAM and 20 GB disk space. Any VPS provider works.
| Provider | Recommended spec | Monthly cost |
|---|---|---|
| Google Compute Engine ⭐ | e2-small — 2 vCPU, 2 GB RAM | ~$13 |
| Hetzner | CX22 — 2 vCPU, 4 GB RAM | ~€4 |
| DigitalOcean | Basic Droplet — 2 GB RAM | ~$12 |
| Linode / Akamai | Linode 2 GB | ~$12 |
| Vultr | Cloud Compute — 2 GB RAM | ~$12 |
| OVHcloud | VPS Starter — 2 GB RAM | ~€4 |
| AWS EC2 | t3.small — 2 GB RAM | ~$15 |
Google Compute Engine is recommended — new users get $300 in free credits. DigitalOcean has the friendliest UI for beginners.
Google Compute Engine (recommended)
- Create VM
- Machine: E2 → e2-small, Boot disk: Ubuntu 22.04 LTS (20 GB or more)
- Create
- Once the VM is running, click the SSH button in the console to open a web-based terminal, then run the install script (see below)
Hetzner
- Hetzner Cloud Console → New Server
- Image: Ubuntu 22.04
- Type: CX22 (2 vCPU, 4 GB, ~€4/mo)
- Add your SSH key → Create & Buy now
- Once the server is running, SSH in and run the install script (see below)
DigitalOcean
- Create Droplet
- Add your SSH key → Create Droplet
- Once the droplet is running, SSH in and run the install script (see below)
Linode / Akamai
- Create Linode
- Image: Ubuntu 22.04 LTS, Plan: Linode 2 GB
- Add your SSH key → Create Linode
- Once the Linode is running, SSH in and run the install script (see below)
Vultr
- Deploy → Cloud Compute, Ubuntu 22.04, 2 GB plan
- Add your SSH key → Deploy Now
- Once the server is running, SSH in and run the install script (see below)
AWS EC2
- Launch Instance
- AMI: Ubuntu Server 22.04 LTS, Instance type: t3.small
- Security group: allow SSH (22) and UDP 41641 (Tailscale) from your IP
- Add your SSH key → Launch
- Once the instance is running, SSH in and run the install script (see below)
Once your server is running, SSH in and run:
curl -fsSL "https://raw.githubusercontent.com/jentic/jentic-quick-claw/main/install.sh" | \
sudo LLM_BASE_URL=https://api.tensorix.ai/v1 \
LLM_MODEL_ID=z-ai/glm-5 \
bashThe script will prompt you for your API key — it is never pre-filled for security reasons.
Having trouble with pairing? See Troubleshooting.
Any OpenAI-compatible provider works. Just swap in the base URL and model ID:
| Provider | LLM_BASE_URL |
Example LLM_MODEL_ID |
|---|---|---|
| Tensorix | https://api.tensorix.ai/v1 |
z-ai/glm-5 |
| OpenAI | https://api.openai.com/v1 |
gpt-4o |
| Anthropic (via proxy) | your proxy URL | claude-sonnet-4-5 |
| Local (Ollama) | http://localhost:11434/v1 |
llama3 |
| Service | What it is |
|---|---|
| OpenClaw | Your personal AI agent. Chat with it via a web UI. Connects to any LLM (Anthropic, OpenAI, etc.). Runs 24/7. |
| Jentic Mini | A local API execution engine. Gives your agent access to hundreds of real-world APIs (GitHub, Slack, Stripe, Gmail, and more) without you managing credentials per-tool. |
| Filebrowser | A simple web UI to browse and edit your agent's workspace files — memory, notes, config. |
All services are only reachable on your Tailscale network (your private tailnet). Nothing is exposed to the public internet.
Make sure Tailscale is running on your device, then click the authentication link from the installer output. Your device is paired and you're in.
To retrieve the token later:
python3 -c "import json; print(json.load(open('/opt/claw/openclaw-config/openclaw.json'))['gateway']['auth']['token'])"
Send your agent an initial message to make sure everything is working:
"Hey, are you there?"
Your agent should respond and introduce itself.
Your agent will guide you through an onboarding process. Follow along to set up your preferences and get familiar with how OpenClaw works.
Tell your agent to remember the URLs for the tools available in your stack:
"Store the urls for filebrowser and jentic-mini in your workspace/TOOLS.md"
Tell your agent:
"Install the Jentic skill"
Or run in the OpenClaw terminal:
clawhub install jentic
When asked for a URL, enter: http://jentic-mini:8900
If you'd like your agent to check in with you when things go wrong rather than repeatedly retrying tools, tell it:
"Update your SOUL.md to prefer returning to me if something goes wrong, rather than repeatedly retrying tools. You should still be helpful and suggest next steps."
Open Filebrowser at https://claw-stack.tail-xxxx.ts.net:8080 to browse your agent's memory and config files. No login required — Tailscale handles authentication.
Your device (Tailscale)
│
│ HTTPS (Tailscale cert)
▼
┌──────────────────────────────────┐
│ Caddy (reverse proxy) │
│ :443 → OpenClaw │
│ :8900 → Jentic Mini │
│ :8080 → Filebrowser │
└──────────────┬───────────────────┘
│ Docker network
┌──────────┼────────────┐
▼ ▼ ▼
OpenClaw Jentic Mini Filebrowser
:18789 :8900 :80
│
└── workspace/
(host-mounted)
- Firewall: iptables DOCKER-USER chain blocks all public access to container ports. Only Tailscale traffic (
tailscale0) and container-to-container traffic are allowed through. - Caddy terminates TLS with a Tailscale-issued certificate and proxies to each service on the Docker bridge network.
- The workspace directory (
/opt/claw/workspace) is mounted into both OpenClaw and Filebrowser.
cd /opt/claw
# View running containers
docker compose ps
# View logs
docker compose logs -f openclaw
# Restart a service
docker compose restart openclaw
# Stop / start everything
docker compose down
docker compose up -dcd /opt/claw
docker compose pull # pull latest images for all services
docker compose up -d # recreate updated containersTailscale certificates are valid for ~90 days. To renew:
TS_DNS=$(tailscale status --json | python3 -c "import json,sys; print(json.load(sys.stdin)['Self']['DNSName'].rstrip('.'))")
tailscale cert --cert-file /opt/claw/certs/cert.pem --key-file /opt/claw/certs/key.pem "$TS_DNS"
docker compose restart caddyCan't reach the services
- Make sure Tailscale is running on your device:
tailscale status - Check containers:
cd /opt/claw && docker compose ps
OpenClaw keeps restarting / OOM
swapon --show
# If empty:
fallocate -l 2G /swapfile && chmod 600 /swapfile && mkswap /swapfile && swapon /swapfileLost the Gateway Token
python3 -c "import json; print(json.load(open('/opt/claw/openclaw-config/openclaw.json'))['gateway']['auth']['token'])""OpenClaw is only available over HTTPS" error in the control UI
- Ensure HTTPS Certificates is enabled in the Tailscale admin console
- If you enabled HTTPS after creating your VM, you may need to recreate the VM instance for the certificate to be issued correctly
"Pairing required" in the control UI and clicking Connect doesn't work
If auto-pairing fails and refreshing the page doesn't resolve it:
- Press
Ctrl+Cin your terminal to stop the installer if it's still running - Run the following command to manually approve the device:
docker exec openclaw openclaw devices approve --latest- Refresh the control UI — you should now be connected
- Connect APIs via Jentic — ask your agent to search Jentic for tools: Gmail, GitHub, Slack, Stripe, and more
- Set up mobile access — connect WhatsApp or Telegram so you can chat with your agent from your phone
- Add skills — browse clawhub.com for community-built agent skills
- Shape your agent — edit
SOUL.mdandAGENTS.mdin Filebrowser to define your agent's personality
- Tailscale — the network security layer
- Caddy — the reverse proxy
- Filebrowser — the workspace file UI