Manifest-driven, not click-driven.
YAML in, fleet out. Diff before you apply. Roll back like git. The reconciler runs every 5 seconds and is idempotent — safe to interrupt, safe to re-apply.
OpenClaw Deploy is the declarative control plane for OpenClaw, Hermes, and NanoClaw agent fleets — across mixed Incus, Docker, and VPS targets. Manifest in. Reconciled fleet out. No 03:00 OAuth incidents.
| agent | type | target | replicas | state | cost |
|---|---|---|---|---|---|
| nanoclaw-pool | NanoClaw | incus://dev2 | 5/5 | running | $2.41/d |
| hermes-bridge | Hermes | docker://144 | 2/2 | running | $0.74/d |
| openclaw-eu | OpenClaw | incus://dev2 | 12/12 | running | $5.18/d |
| openclaw-staging | OpenClaw | docker://staging | 3/3 | draining | $1.02/d |
| nanoclaw-batch | NanoClaw | vps://contabo-c | 4/4 | running | $1.86/d |
// why operators ship faster on this
YAML in, fleet out. Diff before you apply. Roll back like git. The reconciler runs every 5 seconds and is idempotent — safe to interrupt, safe to re-apply.
Incus, Docker, fresh VPS — same manifest, same drain semantics, same audit log. The driver layer hides the differences. Mix targets in a single fleet.
Dependency-ordered, in-flight-task-aware, zero-overlap rotation. 19 agents in 47 seconds with no 401s on the timeline. Your on-call shift, returned.
// 14 lines · the entire surface
Five NanoClaws on the Incus host. Two Hermes bridges on the Docker host. Tokens referenced from your vault, never inlined. Apply once, reconciled forever.
occ apply --dry-run shows exactly what will change.occ binary.1# fleet.yaml — illustrative2apiVersion: openclaw.deploy/v13fleet: prin7r-prod4agents:5 - name: nanoclaw-pool6 type: NanoClaw7 image: ghcr.io/openclaw/nanoclaw:1.4.28 target: incus://dev29 replicas: 510 auth:11 claude_oauth: ref(vault://oauth/claude_main)12 - name: hermes-bridge13 type: Hermes # replicas: 2, target: docker://14414 replicas: 2// the 03:00 problem, solved
Quarterly OAuth rotation used to be a pager-bait routine. The reconciler walks agents in dependency order, drains in-flight tasks, swaps the credential, and confirms — then moves to the next. Old tokens are retired before new tokens are loaded. No overlap. No loss.
// why operators trust this
Prin7r's production agent fleet — the system that built this site — is managed by OpenClaw Deploy. Operator zero is us.
MIT licensed. Manifests are YAML. State lives in your Postgres or SQLite. Drivers are inspectable, replaceable, forkable.
The reconciler is safe to interrupt and re-apply. Audit log is append-only and exportable to any S3-compatible bucket.
Your manifests are portable plain-text. If you ever leave OpenClaw Deploy, every successor tool can read the same files.
// pricing
Run the open-source control plane yourself for nothing — or pay us in USDT/USDC to host it. Cloud plans bill in 1-month increments via NOWPayments. No credit card. No marketing-team upsell.
Run the control plane on your own servers. MIT-licensed, no quotas, no telemetry.
We host the control plane. You get a managed reconciler with vault, OAuth rotation, and the cost meter wired in.
USDT · USDC · BTC · ETH via NOWPayments
Multi-fleet companies that have outgrown per-fleet billing. SAML, audit export, longer retention.
USDT · USDC · BTC · ETH via NOWPayments
Dedicated single-tenant control plane. Named CSM. SOC-2-bound buyers welcome.
USDT · USDC · BTC · ETH via NOWPayments
// common questions
Run OpenClaw Deploy as a thin layer on top — your k8s cluster is one of its targets. Most teams use it specifically because their agents are not a good fit for k8s pods (stateful, sub-1k in count, redeployed frequently).
Bash + Ansible is fine until your first 03:00 OAuth incident. We exist for the day after that incident. Try the free tier — if your bash scripts are still fine in 90 days, you did not need us.
Coolify and Dokploy are deployment tools — they deploy services. We are a fleet reconciliation tool — we manage running populations of agents with health, OAuth, and drain semantics. We integrate with Dokploy as one of our Docker drivers.
The reconciler is idempotent and append-only at the audit layer. We dogfood it on the Prin7r production fleet. The roadmap is conservative — no rewrites of the v1 schema for at least 18 months.
Manifests are plain YAML. State is your SQLite or Postgres. Drivers are open-source. If you ever leave OpenClaw Deploy, your manifests still describe your fleet for any successor tool.