What is OpenClaw?
OpenClaw is a setup tool that lets Knotie Agency Partners deploy a production-ready AI assistant for their customers — on a VPS they control, routed through the Knotie AI Gateway. Think of it as a “one-click deploy” for an AI agent that:- Runs on your customer’s own server (Linux VPS)
- Is accessible only over a private Tailscale network (no public internet exposure)
- Comes pre-configured with CRM integrations, calendar sync, and memory
- Lets the partner earn a margin on every AI call their customer makes
How it works
Prerequisites
Before running the setup, you need:| Requirement | Where to get it |
|---|---|
| Knotie API Key | Partner Portal → Settings → API Keys |
| Tailscale Auth Key | tailscale.com/admin/settings/keys |
| Knotie MCP Token | Partner Portal → Settings → MCP Tokens |
| Linux VPS | Ubuntu 22.04 or 24.04 (KVM recommended: Hostinger, Contabo) |
| Domain (optional) | For custom branding |
Setting up Tailscale
- Create a free account at tailscale.com
- Go to Settings → Keys and create an auth key
- Save the key — you’ll paste it during the setup script
Creating Knotie credentials
- In the Partner Portal, go to Settings → API Keys
- Create a new key with AI Gateway scope
- Go to Settings → MCP Tokens and create a token for the customer
- Keep both ready — you’ll need them during setup
Running the setup
Connect to your VPS as root (or with sudo access), then run:- Customer name — used as the agent’s display name and slug
- Knotie API Key — your partner API key
- Model ID — defaults to
claude-opus-4-6 - Tailscale auth key — from your Tailscale admin panel
- Tailscale hostname — e.g.
openclaw-acme-corp - Knotie MCP Token — from the Partner Portal
What the script installs
The setup script installs and configures:| Component | Purpose |
|---|---|
| OpenClaw | The AI agent runtime |
| Tailscale | Encrypted private network so the gateway is accessible only from your devices |
| QMD Memory | Quick Memory Daemon for persistent conversation memory |
| Lossless-claw | Context engine that prevents memory loss during long sessions |
| Knotie MCP Server | Gives the agent tools: CRM (GoHighLevel), calendars (Google, Calendly), SMS/Email |
| Agent Browser Skill | Enables web browsing capabilities |
| Knotie Gateway Enforcer | Hourly cron that ensures the agent only routes through Knotie (not direct to Anthropic/OpenAI) |
Managing deployed agents
Check gateway status
View agent logs
Restart the gateway
Run the health enforcer manually
Access the gateway UI
The gateway is only accessible over Tailscale — not on the public internet. Once Tailscale is connected, access it at:Updating the agent
To re-run the setup (e.g., to update the model or MCP token):/tmp/openclaw-backup-YYYYMMDD-HHMMSS.tar.gz.
Configuration reference
These values are set during install and stored in~/.openclaw/openclaw.json:
| Setting | Default | Description |
|---|---|---|
contextWindow | 200,000 tokens | Maximum context size |
maxTokens | 16,000 tokens | Maximum response length |
gatewayPort | 18,789 | Local port the gateway listens on |
heartbeatInterval | 30 minutes | How often the agent does a health check |
sessionMaxIdleDays | 7 days | Sessions expire after this long without activity |
Troubleshooting
Tailscale serve not working- Check that Tailscale Serve is enabled in your tailnet: login.tailscale.com/admin/settings
- Look for: Allow nodes to connect to the Tailnet Service (Serve) and Funnel
- Re-run the setup script after enabling
knotie-guard.sh cron runs hourly and will restore the correct config automatically. To manually check:
knotie-provider should be present.
Support
- Email: support@knotie-ai.pro
- Discord: discord.gg/AQCdM68BTr