Skip to content

Get up and running with OpenClaw (Moltbot/ClawdBot) on Akamai Cloud

License

Notifications You must be signed in to change notification settings

akamai-developers/openclaw-quickstart

Folders and files

NameName
Last commit message
Last commit date

Latest commit

 

History

5 Commits
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 

Repository files navigation

OpenClaw Linode VM Terraform Setup

This Terraform configuration creates a Linode VM with security hardening and automated setup for openclaw/clawdbot.

Prerequisites

  1. Terraform installed
  2. Linode account with API token
  3. SSH key pair generated

Setup

  1. Generate SSH keys (if you don't have them):

    ssh-keygen -t ed25519 -C "openclaw@example.com" -f ~/.ssh/openclaw
  2. Set your Linode API token:

    export LINODE_TOKEN="your-linode-api-token"
  3. Create a terraform.tfvars file:

    linode_token     = "your-linode-api-token"
    public_key_path  = "~/.ssh/openclaw.pub"
    allowed_ssh_cidrs = ["YOUR_IP/32"]  # Replace with your IP
    region           = "us-east"  # or your preferred region
    instance_type    = "g6-nanode-1"  # or your preferred plan

Usage

# Initialize Terraform
terraform init

# Plan the deployment
terraform plan

# Apply the configuration
terraform apply

# View outputs (including generated root password)
terraform output -json

# SSH as openclaw user
ssh openclaw@$(terraform output -raw instance_ip)

Notes

  • The firewall allows SSH only from the specified CIDR blocks
  • Password authentication is disabled via cloud-init
  • Root login is restricted to key-based auth only
  • The openclaw user has passwordless sudo access

Variables

Variable Description Default
linode_token Linode API token Required
public_key_path Path to SSH public key Required
allowed_ssh_cidrs CIDR blocks for SSH access ["0.0.0.0/0"]
instance_label VM label "openclaw-vm"
region Linode region "us-east"
instance_type VM plan "g6-nanode-1"
root_password Root password (auto-generated if empty) ""

Outputs

Output Description
instance_ip Public IP of the VM
ssh_command SSH command to connect
root_password Root password (sensitive)
firewall_id Firewall ID

openclaw configuration

openclaw (Clawdbot) is installed and ready to use out-of-the-box on the VM.

SSH to the VM as openclaw user

ssh openclaw@$VMIP

and run

clawdbot onboard --install-daemon

to begin the onboarding process - follow upstream docs

About

Get up and running with OpenClaw (Moltbot/ClawdBot) on Akamai Cloud

Resources

License

Stars

Watchers

Forks

Releases

No releases published

Packages

No packages published

Contributors 2

  •  
  •  

Languages