Skip to content

Managing instances

Create, configure, and control your fleet of OpenClaw agents

Each instance is an isolated, secured OpenClaw agent running in its own container. You can run many instances concurrently — each gets its own browser, terminal, storage, and configuration.

Each OpenClaw instance runs an agent image plus a separate Chrome session image. The agent image is always running; the Chrome session image is provisioned on demand the first time you use the browser and stopped after an idle period.

ImageOpenClaw versionPurpose
claworc/openclawLatest published OpenClaw releaseRuns OpenClaw, the terminal, and SSH
claworc/openclaw-stableLatest version flagged stable by isitstable.com/openclawSame as above, but pinned to a community-vetted OpenClaw release

Both images are rebuilt nightly. Each build must pass the full Claworc test suite before it is pushed to Docker Hub, so a tag advancing to a new digest means the new version booted, ran OpenClaw, and survived the agent integration tests on both AMD64 and ARM64.

ImageBrowser
glukw/claworc-browser-chromeChrome
glukw/claworc-browser-chromiumChromium
glukw/claworc-browser-braveBrave

All images except glukw/claworc-browser-chrome support AMD64 and ARM64 architectures. Use latest to always pull the most recent build.

Homebrew is preinstalled in the agent image, so you can install additional packages inside any instance using brew install without extra setup.

OpenClaw cannot be updated from inside a running container — the agent image must be rebuilt with the new version. Claworc handles this for you: the agent images on Docker Hub are rebuilt nightly with the latest OpenClaw release (or the latest stable release, for claworc/openclaw-stable), and clicking Update on an OpenClaw instance pulls the new image and restarts the container.

To update an OpenClaw instance, open its Settings tab, find the Agent Image field, and click Update. Claworc pulls the latest version of the tag, stops the container, and restarts it with the new image. Persistent volumes (home directory, Homebrew packages, browser profile) are preserved. The same Update button updates the browser image.

Click New instance on the dashboard and fill in the form:

FieldDescription
Display nameHuman-readable name shown in the dashboard
ImageAgent image — runs OpenClaw and the terminal. Defaults to claworc/openclaw.
Browser imageChrome session image — Chrome, Chromium, or Brave. Defaults to the value set in admin Settings.
Idle timeout (min)How long the Chrome session stays running while idle before being stopped. Leave empty to inherit the global default (15 minutes). See Accessing instances.
CPU limitMaximum CPU cores allocated (e.g., 1.0)
Memory limitMaximum RAM allocated (e.g., 2Gi)
API key overrideInstance-specific API key; overrides the global key if set

A rough guide based on typical workloads:

WorkloadCPUMemory
Light (simple tasks, browser will be slow)500m1Gi
Moderate (collaboration with the browser)1.02Gi
Heavy (multiple tabs, data analysis)2.04Gi

You can adjust CPU and memory after creation on the instance Settings tab. See Resources for details.

From the dashboard, click the menu next to any instance:

  • Start — starts a stopped container
  • Stop — stops a running container gracefully
  • Restart — stops then starts the container; useful when the agent is stuck
  • Clone — copies all settings and files into a new instance
  • Delete — permanently removes the instance and all its data (PVCs in Kubernetes, volumes in Docker)

Agent containers run with hardened defaults:

  • No privileged mode. Containers use the Docker/Kubernetes default set of Linux capabilities. Seccomp is enabled.
  • Privilege escalation blocked. SUID bits are removed from unnecessary binaries. sudo is available only for package management (apt-get).
  • No kernel access. Mount, module loading, and /proc writes are blocked.

These settings apply automatically to all new and restarted instances in both Kubernetes and Docker modes.

Each instance row shows a small colored dot indicating whether Claworc can reach the instance:

Dot colorState
GreenConnected
YellowConnecting or Reconnecting
GrayDisconnected
RedFailed

Open an instance and switch to the Settings tab to see full connection health and event history.

Open any instance and switch to the Settings tab to view and edit its configuration. The tab is organized into several cards: Instance Details, Resources, Environment Variables, Enabled Models (admins only), SSH Connection Status, and Backups (admins only).

The Instance Details card shows the display name, agent image, VNC resolution, timezone, user-agent, and timestamps. Many of these fields are editable inline — click Edit next to a field, make your change, and click Save.

FieldWho can editNotes
Display NameAdminsRenaming does not affect the underlying container or Kubernetes resource names.
Agent ImageRead-only (use Update to pull latest)See Updating the agent and browser images.
VNC ResolutionAdminsFormat: WIDTHxHEIGHT (e.g. 1920x1080). Leave empty for the global default. Requires a restart to take effect.
TimezoneAll usersIANA timezone string (e.g. America/New_York). Leave empty for the global default. Requires a restart to take effect.
User-AgentAll usersCustom Chromium User-Agent string. Leave empty for the global default. Requires a restart to take effect.

The Resources card displays CPU and memory requests and limits, plus storage sizes. Admins can click Edit to change CPU and memory values for a running instance.

FieldFormatExample
CPU RequestMillicores or decimal cores500m or 0.5
CPU LimitMillicores or decimal cores2000m or 2
Memory RequestMebibytes or gibibytes512Mi or 1Gi
Memory LimitMebibytes or gibibytes4Gi

Requests must not exceed their corresponding limits. Claworc validates this before saving.

Resource changes are applied immediately to the running container — no restart is needed. Storage sizes (Homebrew and Home) are set at creation time and cannot be changed afterward.

When viewing the Settings tab of a running instance, Claworc displays live CPU and memory usage next to the limit values. Usage is shown as an absolute value and a percentage of the configured limit (e.g. using 312m / 16%). Stats refresh automatically every 10 seconds.

Claworc separates configuration into two levels: global defaults that apply to every instance, and per-instance overrides that apply to one instance only. Anything not overridden at the instance level is inherited from the global defaults automatically.

LevelWhere to set itScope
Global defaultSettingsAll instances with no override
Per-instance overrideInstance detail pageThat instance only

This model lets you configure once globally and selectively customize where needed.

Each instance also has its own openclaw.json for agent behavior (model selection, tools, integrations).

See Configuration for the full reference, including per-instance override options and examples.

Admins can create compressed snapshots of any instance’s filesystem and restore them later. You can back up on demand from the instance detail page or set up scheduled backups from the Backups page in the sidebar.

See Backups for the full guide.

Shared folders let you mount a named volume into multiple instances so they can read and write the same files. Any authenticated user can create shared folders from the Shared Folders page in the sidebar.

See Shared folders for setup and limitations.

The Settings tab on each instance detail page includes an Enabled Models section (visible to admins). This controls which LLM providers and models the OpenClaw agent can use.

You can use global providers configured in Settings, or click Add provider to create a provider that belongs only to this instance. Instance-specific providers are useful when you need a dedicated API key or a provider that other instances should not access. See Configuration for details on both options.

Once providers are available, click Edit next to Enabled Models and check the models you want to make available. You can also set a Default model — the model the agent uses unless instructed otherwise.

Claworc pushes the model configuration to the container over SSH in the background. A toast notification confirms when the update is complete.

On the instance Settings tab, the SSH Connection Status card lets you:

  • Run a connectivity test
  • Manually reconnect
  • View the SSH key fingerprint used for this instance

If an instance is stuck in Reconnecting, check:

  1. Whether the container is actually running (kubectl get pods -n claworc)
  2. Whether network policies allow egress from the control plane to agent pods on port 22
  3. The connection event log for the specific failure reason