Safe updates
Overview
Section titled “Overview”Treat these as two separate upgrade tracks:
- Clawforce control-plane updates
- OpenClaw runtime updates inside customer instances
Do not roll both out in the same maintenance window.
Core rule
Section titled “Core rule”For production environments, do not depend on mutable latest tags.
Use:
- explicit image tags such as
clawforceone/clawforce:1.4.2 - explicit agent image tags such as
clawforceone/agent-chromium:1.4.2-openclaw-<version> - or digest-pinned images
Keep the previous known-good image reference so rollback is one change, not a rebuild.
Clawforce control-plane updates
Section titled “Clawforce control-plane updates”Before upgrading Clawforce:
- Record the current image tag and deployment config.
- Take a host-level snapshot of
CLAWFORCE_DATA_PATHor the PVC that backs/app/data. - Upgrade to one explicit target image tag.
- Verify
/health, login, instances, and Backups.
The repo includes a helper script for the control-plane snapshot itself:
# Installer-managed Dockerscripts/control-plane-state.sh snapshot docker \ --data-dir ~/.clawforce/data \ --archive ./snapshots/clawforce-docker-$(date -u +%Y%m%dT%H%M%SZ).tar.gz
# Docker Composescripts/control-plane-state.sh snapshot docker \ --volume clawforce-data \ --archive ./snapshots/clawforce-compose-$(date -u +%Y%m%dT%H%M%SZ).tar.gz
# Helm / Kubernetesscripts/control-plane-state.sh snapshot kubernetes \ --namespace clawforce \ --release clawforce \ --archive ./snapshots/clawforce-k8s-$(date -u +%Y%m%dT%H%M%SZ).tar.gzRollback order:
- redeploy the previous Clawforce image tag
- if needed, restore the pre-upgrade snapshot of
CLAWFORCE_DATA_PATH
Restore examples:
scripts/control-plane-state.sh restore docker \ --data-dir ~/.clawforce/data \ --archive ./snapshots/clawforce-docker-20260421T120000Z.tar.gz \ --yes
scripts/control-plane-state.sh restore kubernetes \ --namespace clawforce \ --release clawforce \ --archive ./snapshots/clawforce-k8s-20260421T120000Z.tar.gz \ --yesThe restore path takes a fresh pre-restore backup by default before it wipes the current control-plane data.
The Clawforce backup UI does not back up the control-plane database or SSH keys. That snapshot is required for a full rollback story.
OpenClaw runtime updates
Section titled “OpenClaw runtime updates”Upstream OpenClaw changes frequently. Production customers should adopt those changes through tested agent image releases, not by running package upgrades directly inside long-lived instances.
Recommended flow:
- Create an instance backup from Backups.
- Upgrade one canary instance to the new agent image tag.
- Validate a representative workflow.
- Update the default container image for new instances.
- Roll the rest of the fleet in waves.
Rollback order:
- point the instance back to the previous agent image tag
- if the runtime also changed important files, restore the pre-upgrade instance backup
Backup guidance
Section titled “Backup guidance”Use the built-in backup system for instance filesystem state:
- home directory
- OpenClaw config
- packages and files you explicitly include
Use host or storage snapshots for control-plane state:
clawforce.db- SSH keys
- backup metadata and archives
Production checklist
Section titled “Production checklist”- no
latestin production - canary before fleet rollout
- control-plane snapshot before Clawforce upgrade
- instance backup before OpenClaw runtime upgrade
- previous image tag ready before rollout starts