Ansible Installation
The recommended way to deploy Clawdbot to production servers is via clawdbot-ansible — an automated installer with security-first architecture.Quick Start
One-command install:📦 Full guide: github.com/clawdbot/clawdbot-ansible The clawdbot-ansible repo is the source of truth for Ansible deployment. This page is a quick overview.
What You Get
- 🔒 Firewall-first security: UFW + Docker isolation (only SSH + Tailscale accessible)
- 🔐 Tailscale VPN: Secure remote access without exposing services publicly
- 🐳 Docker: Isolated sandbox containers, localhost-only bindings
- 🛡️ Defense in depth: 4-layer security architecture
- 🚀 One-command setup: Complete deployment in minutes
- 🔧 Systemd integration: Auto-start on boot with hardening
Requirements
- OS: Debian 11+ or Ubuntu 20.04+
- Access: Root or sudo privileges
- Network: Internet connection for package installation
- Ansible: 2.14+ (installed automatically by quick-start script)
What Gets Installed
The Ansible playbook installs and configures:- Tailscale (mesh VPN for secure remote access)
- UFW firewall (SSH + Tailscale ports only)
- Docker CE + Compose V2 (for agent sandboxes)
- Node.js 22.x + pnpm (runtime dependencies)
- Clawdbot (host-based, not containerized)
- Systemd service (auto-start with security hardening)
Post-Install Setup
After installation completes, switch to the clawdbot user:- Onboarding wizard: Configure Clawdbot settings
- Provider login: Connect WhatsApp/Telegram/Discord/Signal
- Gateway testing: Verify the installation
- Tailscale setup: Connect to your VPN mesh
Quick commands
Security Architecture
4-Layer Defense
- Firewall (UFW): Only SSH (22) + Tailscale (41641/udp) exposed publicly
- VPN (Tailscale): Gateway accessible only via VPN mesh
- Docker Isolation: DOCKER-USER iptables chain prevents external port exposure
- Systemd Hardening: NoNewPrivileges, PrivateTmp, unprivileged user
Verification
Test external attack surface:Docker Availability
Docker is installed for agent sandboxes (isolated tool execution), not for running the gateway itself. The gateway binds to localhost only and is accessible via Tailscale VPN. See Multi-Agent Sandbox & Tools for sandbox configuration.Manual Installation
If you prefer manual control over the automation:Updating Clawdbot
The Ansible installer sets up Clawdbot for manual updates. See Updating for the standard update flow. To re-run the Ansible playbook (e.g., for configuration changes):Troubleshooting
Firewall blocks my connection
If you’re locked out:- Ensure you can access via Tailscale VPN first
- SSH access (port 22) is always allowed
- The gateway is only accessible via Tailscale by design
Service won’t start
Docker sandbox issues
Provider login fails
Make sure you’re running as theclawdbot user:
Advanced Configuration
For detailed security architecture and troubleshooting:Related
- clawdbot-ansible — full deployment guide
- Docker — containerized gateway setup
- Sandboxing — agent sandbox configuration
- Multi-Agent Sandbox & Tools — per-agent isolation