OpenClaw
This guide walks you through the process of deploying, configuring, and managing an OpenClaw instance using FluxCloud. OpenClaw is an AI assistant platform that combines a browser Control UI with an interactive setup wizard, multi-provider AI model support, and optional private networking via Tailscale.
How To Install OpenClaw
Steps
- Access FluxCloud
- Visit cloud.runonflux.com and sign in or create an account.
- Find OpenClaw
- Navigate to the Marketplace → Applications tab, then locate the OpenClaw tile and click View Details.
- Select Server Configuration
- Choose the version that best fits your usage:
- Regular – suited for beginner users and lighter workloads.
- Pro – higher hardware specs for professional or heavier usage.
- You can change the specs of your app at any time after deployment to match your needs.
- Click Install Now to continue.
- Choose Subscription
- Select your desired subscription duration.
- Agree to the Terms of Use and Privacy Policy, and click the blue Continue arrow at the bottom.
- Provide a Tailscale Auth Key (Optional)
- During deployment you can optionally provide a Tailscale auth key to connect your instance to your private Tailscale network.
- This step is not required — you can skip it and add it later from the app settings.
- See the Tailscale section below for details on generating a key.
- Deployment Location
- Configure whether you want your OpenClaw instance to deploy in specific geographic regions:
- Global (Recommended): No geographic restrictions for best availability.
- Custom: Restrict by continent or country.
- Click the blue Continue arrow to proceed.
- Email Notifications
- Optionally enter your email address to receive notifications about your app, including:
- When your application finishes launching.
- When the primary server changes.
- When your app expiration date is approaching.
- Launching the Application
- Your application must be signed and registered on the Flux network.
- Click Sign and Register.
- Sign the message using the pop-up.
- If you logged in via Google or Email, this step is completed automatically.
- Complete Payment
- Choose your payment method:
- Fiat: Stripe or PayPal
- Crypto: FLUX coin (5% discount)
- Payment is monitored automatically. Once confirmed, your application will be deployed, and a blue Manage button will appear—directing you to your application's management panel.
⚠️ Important: FLUX Payments
FLUX payments are only accepted via the FLUX Mainnet, not through any of our EVM tokens.
We ALSO strongly recommend not sending FLUX payments from exchanges, as:
- Transactions or withdrawals may not complete within the required 30-minute window.
- Many exchanges do not support adding a MEMO, which is required for proper payment processing.
Get Your Gateway Token
OpenClaw's browser Control UI is protected by a gateway token that is generated the first time your container starts. You need this token to access the UI.
-
Visit cloud.runonflux.com and log in.
-
Go to Applications → Management and click the Settings icon on your OpenClaw app.
-
Open the Secure Shell menu and use the Volume Browser.
-
Navigate to the app data folder and edit the
openclaw.jsonfile. -
Find the
gateway.auth.tokenvalue — this is your gateway token. -
Open your app domain in the browser with the token appended:
https://appname.app.runonflux.io/?token=<your-gateway-token> -
The Control UI will strip the token from the URL and store it for the session.
Run the Onboard Wizard via SSH
After your instance is running, complete first-time setup by running the interactive wizard:
-
Go to Applications → Management on cloud.runonflux.com and select your OpenClaw app.
-
Open the Secure Shell menu and use the Terminal with bash to SSH into your container.
-
Run:
openclaw onboard
This interactive wizard will:
- Set up device pairing.
- Configure your AI model provider and API keys.
- Select your default AI model.
After completing the wizard, refresh the browser and enter your gateway token to connect. You can run the onboard process again at any time to add additional AI models.
AI Provider Keys
At least one AI provider key is required for the assistant to function. Keys can be set during openclaw onboard.
| Provider | Environment Variable | Free Tier |
|---|---|---|
| Google Gemini | GEMINI_API_KEY | Yes (aistudio.google.com) |
| Anthropic | ANTHROPIC_API_KEY | No |
| OpenAI | OPENAI_API_KEY | No |
| OpenRouter | OPENROUTER_API_KEY | Some models |
| Groq | GROQ_API_KEY | Yes |
| Perplexity | PERPLEXITY_API_KEY | No |
| ElevenLabs | ELEVENLABS_API_KEY | Yes (voice/TTS) |
| Deepgram | DEEPGRAM_API_KEY | Yes (speech-to-text) |
Tailscale (Optional)
OpenClaw on Flux includes built-in Tailscale support, allowing you to access your instance securely over your private Tailscale network instead of (or in addition to) the public Flux domain.
To enable Tailscale:
- Generate an auth key from your Tailscale admin console — use an ephemeral and reusable key for containers.
- Provide the key as
TAILSCALE_AUTHKEYduring deployment, or update it later in the app settings. - Once the container starts, it will automatically join your tailnet.
- Access OpenClaw via the Tailscale hostname (default:
openclaw) on your tailnet.
Advanced options (available in deployment settings):
TAILSCALE_HOSTNAME— customize the device name on your tailnet (default:openclaw).TAILSCALE_EXTRA_ARGS— additional flags fortailscale up(e.g.--advertise-tags=tag:server).
Tailscale runs in userspace networking mode because Flux containers do not have kernel-level TUN device access. This has important implications for how you connect to other machines on your tailnet — see below.
Connecting to Other Tailscale Machines (SSH, HTTP, etc.)
Because Tailscale runs in userspace networking mode, it does not create a real network interface inside the container. This means:
tailscale pingandtailscale statuswork normally (they use the Tailscale control plane).- Direct TCP connections (SSH, curl, etc.) do NOT automatically route through Tailscale.
Instead, all outbound traffic to your tailnet must go through the SOCKS5 proxy that Tailscale provides on localhost:1055.
SSH to a Tailscale machine:
ssh -o ProxyCommand='ncat --proxy-type socks5 --proxy localhost:1055 %h %p' user@<tailscale-ip>
Or using netcat:
ssh -o ProxyCommand='nc -x localhost:1055 %h %p' user@<tailscale-ip>
To avoid typing the proxy option every time, add this to ~/.ssh/config inside the container:
Host 100.*
ProxyCommand ncat --proxy-type socks5 --proxy localhost:1055 %h %p
This will automatically proxy all SSH connections to Tailscale IPs (which are in the 100.x.x.x range).
curl / HTTP requests to a Tailscale machine:
curl --socks5-hostname localhost:1055 http://<tailscale-ip>:8080
Or set the environment variable for all tools that respect it:
export ALL_PROXY=socks5://localhost:1055
What does NOT work without the proxy:
Any tool that tries to connect directly to a Tailscale IP will fail with "connection timed out" or "network is unreachable" — because the container's kernel has no Tailscale routes. Always route through localhost:1055.
What Requires SSH
Most day-to-day usage works through the browser Control UI. The following features require SSH access to the container:
- Adding/removing messaging channels (Telegram, Discord, Slack, etc.).
- Creating/deleting agents and binding them to channels.
- Approving DM pairing requests from new users.
- Security audits (
openclaw security audit). - Backup and restore (
openclaw backup). - Installing system dependencies for advanced skills.
Frequently Asked Questions
How do I change my AI provider or add additional models?
Re-run openclaw onboard from the Secure Shell → Terminal on your app's management page. The wizard is safe to run multiple times and will let you add new providers or switch the default model without losing existing configuration.
Can I upgrade from Regular to Pro (or change specs) after deployment?
Yes. You can change the specs of your OpenClaw app at any time from Applications → Management on FluxCloud to match your usage needs.
I provided a Tailscale auth key but cannot SSH to other tailnet machines — why?
Flux containers run Tailscale in userspace networking mode, so direct TCP connections to Tailscale IPs will not work. Route traffic through the SOCKS5 proxy on localhost:1055 as shown in the Tailscale section above.
What happens if the primary server goes down?
If your current primary server becomes unavailable or experiences downtime, one of the standby instances automatically takes over as the new primary after a short delay. Your OpenClaw data remains intact so you can continue where you left off once the switch is complete. You can check which instance is currently the primary from your application's management panel under the Instances tab.