Skip to content

Managing instances

Each instance is an isolated, secured OpenClaw agent running in its own container. You can run many instances concurrently — each gets its own browser, terminal, storage, and configuration.

Each instance runs one of three official agent images, differing only in which browser is bundled:

ImageBrowserDocker Hub
clawforceone/agent-chromeChromehub.docker.com/r/clawforceone/agent-chrome
clawforceone/agent-chromiumChromiumhub.docker.com/r/clawforceone/agent-chromium
clawforceone/agent-braveBravehub.docker.com/r/clawforceone/agent-brave

All images except clawforceone/agent-chrome support AMD64 and ARM64 architectures. For production environments, prefer immutable tags or digests over latest. Use latest only for low-risk development or evaluation environments.

Every agent image comes with Homebrew pre-installed, so you can install additional packages inside any instance using brew install without extra setup.

When a new version of the agent image is published under the same tag (for example :latest), you can pull it without recreating the instance. Open the instance Settings tab, find the Agent Image field, and click Update. Clawforce pulls the latest version of the tag, stops the container, and restarts it with the new image. Persistent volumes (home directory, Homebrew packages) are preserved.

For production rollouts, prefer moving instances between explicit image tags and use Backups before rollout. See Safe updates.

Click New instance on the dashboard and fill in the form:

FieldDescription
Display nameHuman-readable name shown in the dashboard
ImageAgent image to use — choose the browser variant for this instance
CPU limitMaximum CPU cores allocated (e.g., 1.0)
Memory limitMaximum RAM allocated (e.g., 2Gi)
API key overrideInstance-specific API key; overrides the global key if set

A rough guide based on typical workloads:

WorkloadCPUMemory
Light (simple tasks, browser will be slow)500m1Gi
Moderate (collaboration with the browser)1.02Gi
Heavy (multiple tabs, data analysis)2.04Gi

You can adjust CPU and memory after creation on the instance Settings tab. See Resources for details.

Each instance shows a status from the orchestrator (Kubernetes or Docker), alongside a live connection indicator:

StatusMeaning
CreatingContainer is being provisioned or starting up
RunningContainer is running
RestartingRestart in progress
StoppingStop in progress
StoppedContainer is stopped
ErrorContainer exited unexpectedly
FailedContainer stopped after an error

The colored dot next to each instance reflects live connection health independently of the container status.

From the dashboard, click the menu next to any instance:

  • Start — starts a stopped container
  • Stop — stops a running container gracefully
  • Restart — stops then starts the container; useful when the agent is stuck
  • Clone — copies all settings and files into a new instance
  • Delete — permanently removes the instance and all its data (PVCs in Kubernetes, volumes in Docker)

Agent containers run with hardened defaults:

  • No privileged mode. Containers use the Docker/Kubernetes default set of Linux capabilities. Seccomp is enabled.
  • Privilege escalation blocked. SUID bits are removed from unnecessary binaries. sudo is available only for package management (apt-get).
  • No kernel access. Mount, module loading, and /proc writes are blocked.

These settings apply automatically to all new and restarted instances in both Kubernetes and Docker modes.

In Kubernetes mode, each instance creates and manages these resources in the clawforce namespace:

ResourceNamePurpose
Deploymentbot-{name}Runs the agent container
PVCbot-{name}-homebrewHomebrew packages
PVCbot-{name}-homeHome directory — OpenClaw config, browser profile, personal files

In Docker mode, each instance creates:

  • One container (named bot-{name})
  • Two named volumes: clawforce-{name}-homebrew (Homebrew) and clawforce-{name}-home (home directory)
  • One published SSH port on 127.0.0.1 with a randomly assigned host port

Each instance row shows a small colored dot indicating whether Clawforce can reach the instance:

Dot colorState
GreenConnected
YellowConnecting or Reconnecting
GrayDisconnected
RedFailed

Open an instance to view full connection health and event history on the Overview tab.

Open any instance and switch to the Settings tab to view and edit its configuration. Settings are organized into two cards: Instance Details and Resources.

The Instance Details card shows the display name, agent image, VNC resolution, timezone, user-agent, and timestamps. Many of these fields are editable inline — click Edit next to a field, make your change, and click Save.

FieldWho can editNotes
Display NameAdminsRenaming does not affect the underlying container or Kubernetes resource names.
Agent ImageRead-only (use Update to pull latest)See Updating the agent image.
VNC ResolutionAdminsFormat: WIDTHxHEIGHT (e.g. 1920x1080). Leave empty for the global default. Requires a restart to take effect.
TimezoneAll usersIANA timezone string (e.g. America/New_York). Leave empty for the global default. Requires a restart to take effect.
User-AgentAll usersCustom Chromium User-Agent string. Leave empty for the global default. Requires a restart to take effect.

The Resources card displays CPU and memory requests and limits, plus storage sizes. Admins can click Edit to change CPU and memory values for a running instance.

FieldFormatExample
CPU RequestMillicores or decimal cores500m or 0.5
CPU LimitMillicores or decimal cores2000m or 2
Memory RequestMebibytes or gibibytes512Mi or 1Gi
Memory LimitMebibytes or gibibytes4Gi

Requests must not exceed their corresponding limits. Clawforce validates this before saving.

Resource changes are applied immediately to the running container — no restart is needed. Storage sizes (Homebrew and Home) are set at creation time and cannot be changed afterward.

When viewing the Settings tab of a running instance, Clawforce displays live CPU and memory usage next to the limit values. Usage is shown as an absolute value and a percentage of the configured limit (e.g. using 312m / 16%). Stats refresh automatically every 10 seconds.

Clawforce separates configuration into two levels: global defaults that apply to every instance, and per-instance overrides that apply to one instance only. Anything not overridden at the instance level is inherited from the global defaults automatically.

LevelWhere to set itScope
Global defaultSettingsAll instances with no override
Per-instance overrideInstance detail pageThat instance only

This model lets you configure once globally and selectively customize where needed.

Each instance also has its own openclaw.json for agent behavior (model selection, tools, integrations).

See Configuration for the full reference, including per-instance override options and examples.

Admins can create compressed snapshots of any instance’s filesystem and restore them later. You can back up on demand from the instance detail page or set up scheduled backups from the Backups page in the sidebar.

See Backups for the full guide.

Shared folders let you mount a named volume into multiple instances so they can read and write the same files. Any authenticated user can create shared folders from the Shared Folders page in the sidebar.

See Shared folders for setup and limitations.

The Overview tab on each instance detail page includes an Enabled Models section (visible to admins). This controls which LLM providers and models the agent can use.

You can use global providers configured in Settings, or click Add provider to create a provider that belongs only to this instance. Instance-specific providers are useful when you need a dedicated API key or a provider that other instances should not access. See Configuration for details on both options.

Once providers are available, click Edit next to Enabled Models and check the models you want to make available. You can also set a Default model — the model the agent uses unless instructed otherwise.

Clawforce pushes the model configuration to the container over SSH in the background. A toast notification confirms when the update is complete.

On the instance Overview tab, the troubleshoot panel lets you:

  • Run a connectivity test
  • Manually reconnect
  • View the SSH key fingerprint used for this instance

If an instance is stuck in Reconnecting, check:

  1. Whether the container is actually running (kubectl get pods -n clawforce)
  2. Whether network policies allow egress from the control plane to agent pods on port 22
  3. The connection event log for the specific failure reason