docs: harden VPS install defaults

This commit is contained in:
Peter Steinberger
2026-01-26 13:04:18 +00:00
parent c4a80f4edb
commit 58949a1f95
4 changed files with 21 additions and 10 deletions

View File

@@ -566,7 +566,6 @@ Remote access: [Gateway remote](/gateway/remote).
We keep a **hosting hub** with the common providers. Pick one and follow the guide: We keep a **hosting hub** with the common providers. Pick one and follow the guide:
- [VPS hosting](/vps) (all providers in one place) - [VPS hosting](/vps) (all providers in one place)
- [Railway](/railway) (oneclick, browserbased setup)
- [Fly.io](/platforms/fly) - [Fly.io](/platforms/fly)
- [Hetzner](/platforms/hetzner) - [Hetzner](/platforms/hetzner)
- [exe.dev](/platforms/exe-dev) - [exe.dev](/platforms/exe-dev)
@@ -1451,7 +1450,7 @@ Have Bot A send a message to Bot B, then let Bot B reply as usual.
**CLI bridge (generic):** run a script that calls the other Gateway with **CLI bridge (generic):** run a script that calls the other Gateway with
`clawdbot agent --message ... --deliver`, targeting a chat where the other bot `clawdbot agent --message ... --deliver`, targeting a chat where the other bot
listens. If one bot is on Railway/VPS, point your CLI at that remote Gateway listens. If one bot is on a remote VPS, point your CLI at that remote Gateway
via SSH/Tailscale (see [Remote access](/gateway/remote)). via SSH/Tailscale (see [Remote access](/gateway/remote)).
Example pattern (run from a machine that can reach the target Gateway): Example pattern (run from a machine that can reach the target Gateway):

View File

@@ -90,10 +90,10 @@ The wizard will walk you through:
clawdbot status clawdbot status
# Check service # Check service
systemctl status clawdbot systemctl --user status clawdbot-gateway.service
# View logs # View logs
journalctl -u clawdbot -f journalctl --user -u clawdbot-gateway.service -f
``` ```
## 6) Access the Dashboard ## 6) Access the Dashboard
@@ -108,18 +108,30 @@ ssh -L 18789:localhost:18789 root@YOUR_DROPLET_IP
# Then open: http://localhost:18789 # Then open: http://localhost:18789
``` ```
**Option B: Tailscale (easier long-term)** **Option B: Tailscale Serve (HTTPS, loopback-only)**
```bash ```bash
# On the droplet # On the droplet
curl -fsSL https://tailscale.com/install.sh | sh curl -fsSL https://tailscale.com/install.sh | sh
tailscale up tailscale up
# Configure gateway to bind to Tailscale # Configure Gateway to use Tailscale Serve
clawdbot config set gateway.tailscale.mode serve
clawdbot gateway restart
```
Open: `https://<magicdns>/`
Notes:
- Serve keeps the Gateway loopback-only and authenticates via Tailscale identity headers.
- To require token/password instead, set `gateway.auth.allowTailscale: false` or use `gateway.auth.mode: "password"`.
**Option C: Tailnet bind (no Serve)**
```bash
clawdbot config set gateway.bind tailnet clawdbot config set gateway.bind tailnet
clawdbot gateway restart clawdbot gateway restart
``` ```
Then access via your Tailscale IP: `http://100.x.x.x:18789` Open: `http://<tailscale-ip>:18789` (token required).
## 7) Connect Your Channels ## 7) Connect Your Channels

View File

@@ -24,7 +24,6 @@ Native companion apps for Windows are also planned; the Gateway is recommended v
## VPS & hosting ## VPS & hosting
- VPS hub: [VPS hosting](/vps) - VPS hub: [VPS hosting](/vps)
- Railway (one-click): [Railway](/railway)
- Fly.io: [Fly.io](/platforms/fly) - Fly.io: [Fly.io](/platforms/fly)
- Hetzner (Docker): [Hetzner](/platforms/hetzner) - Hetzner (Docker): [Hetzner](/platforms/hetzner)
- GCP (Compute Engine): [GCP](/platforms/gcp) - GCP (Compute Engine): [GCP](/platforms/gcp)

View File

@@ -1,5 +1,5 @@
--- ---
summary: "VPS hosting hub for Clawdbot (Railway/Fly/Hetzner/exe.dev)" summary: "VPS hosting hub for Clawdbot (Fly/Hetzner/GCP/exe.dev)"
read_when: read_when:
- You want to run the Gateway in the cloud - You want to run the Gateway in the cloud
- You need a quick map of VPS/hosting guides - You need a quick map of VPS/hosting guides
@@ -11,7 +11,6 @@ deployments work at a high level.
## Pick a provider ## Pick a provider
- **Railway** (oneclick + browser setup): [Railway](/railway)
- **Fly.io**: [Fly.io](/platforms/fly) - **Fly.io**: [Fly.io](/platforms/fly)
- **Hetzner (Docker)**: [Hetzner](/platforms/hetzner) - **Hetzner (Docker)**: [Hetzner](/platforms/hetzner)
- **GCP (Compute Engine)**: [GCP](/platforms/gcp) - **GCP (Compute Engine)**: [GCP](/platforms/gcp)
@@ -24,6 +23,8 @@ deployments work at a high level.
- The **Gateway runs on the VPS** and owns state + workspace. - The **Gateway runs on the VPS** and owns state + workspace.
- You connect from your laptop/phone via the **Control UI** or **Tailscale/SSH**. - You connect from your laptop/phone via the **Control UI** or **Tailscale/SSH**.
- Treat the VPS as the source of truth and **back up** the state + workspace. - Treat the VPS as the source of truth and **back up** the state + workspace.
- Secure default: keep the Gateway on loopback and access it via SSH tunnel or Tailscale Serve.
If you bind to `lan`/`tailnet`, require `gateway.auth.token` or `gateway.auth.password`.
Remote access: [Gateway remote](/gateway/remote) Remote access: [Gateway remote](/gateway/remote)
Platforms hub: [Platforms](/platforms) Platforms hub: [Platforms](/platforms)