Skip to content

feat: Agents Plane — multi-tenant agent provisioning and isolation #17299

@amor71

Description

@amor71

Summary

An Agents Plane — an infrastructure layer that lets organizations deploy isolated AI agents for team members. Each agent gets its own VM, service account, secrets, and network isolation. This is essentially "OpenClaw for Teams."

Motivation

Today, deploying OpenClaw agents for a team is manual: spin up a VM, install OpenClaw, configure secrets, set up channels — repeat per person. There's no unified way to provision, manage, or enforce isolation across a fleet of agents. Organizations need:

  • One command to provision an agent for a team member
  • Zero-trust isolation between agents (no shared secrets, no shared network)
  • Admin oversight without admin access to individual agent secrets
  • Cost visibility per agent

Related Issues & PRs

Proposed CLI

# Create a plane (admin)
openclaw planes create --name "acme-agents" --project gcp-project-id --region us-east4

# Provision agents for team members
openclaw planes add-agent --plane acme-agents --name alice --owner alice@acme.com --vm-type e2-small
openclaw planes add-agent --plane acme-agents --name bob --owner bob@acme.com --vm-type e2-small

# Manage
openclaw planes status
openclaw planes remove-agent --plane acme-agents --name alice
openclaw planes logs --plane acme-agents --name bob

What Gets Provisioned Per Agent

Resource Details
Compute VM (or container) with OpenClaw pre-installed
Identity Dedicated GCP service account with minimal permissions
Secrets Secret Manager prefixed secrets + IAM bindings (ties into #16663)
Network VPC subnet or firewall rules for network isolation
Access IAP tunnel scoped to the owner only (OS Login)
Channels WhatsApp/Telegram/Signal connection (agent-specific)
Runtime Thinking clock (#17287) + heartbeat pre-configured

Deployment Model Comparison

Model Isolation Cost/agent Ops Complexity Best For
VM-per-agent 🟢 Strongest ~$15-30/mo Low < 20 agents, high security
Container on K8s 🟡 Good (namespace + netpol) ~$5-15/mo Medium 20-100+ agents, cost-sensitive
Process on shared VM 🔴 Weak ~$2-5/mo Low Dev/testing only

Recommendation: Start with VM-per-agent (simplest, strongest isolation). Add K8s support later for organizations at scale.

Security Model

  • Zero trust between agents — no agent can access another's VM, secrets, or network
  • SSH via IAP only — no SSH keys on disk, all access audited
  • Per-agent service accounts — each can ONLY access its own Secret Manager secrets
  • Admin audit without secret access — separation of duties (admin sees metrics/logs, not secret values)
  • Network isolation — agents cannot reach each other's ports; egress controlled per policy

Architecture

┌─────────────────────────────────────────────┐
│              Agents Plane (admin)            │
│  ┌─────────┐  ┌─────────┐  ┌─────────┐     │
│  │ Agent A  │  │ Agent B  │  │ Agent C  │    │
│  │ (alice)  │  │ (bob)    │  │ (carol)  │    │
│  ├─────────┤  ├─────────┤  ├─────────┤     │
│  │ SA: a@   │  │ SA: b@   │  │ SA: c@   │    │
│  │ Secrets  │  │ Secrets  │  │ Secrets  │    │
│  │ VPC/FW   │  │ VPC/FW   │  │ VPC/FW   │    │
│  │ IAP→alice│  │ IAP→bob  │  │ IAP→carol│    │
│  └─────────┘  └─────────┘  └─────────┘     │
│                                              │
│  Shared: VPC, Cloud NAT, monitoring, billing │
└─────────────────────────────────────────────┘

Open Questions

  1. IaC tooling — Terraform/Pulumi for declarative infra, or pure gcloud CLI for simplicity? Terraform is more portable for multi-cloud.
  2. Multi-cloud — GCP first (we're already there), but the abstraction should allow AWS/Azure later. How tightly do we couple to GCP APIs?
  3. K8s vs VMs — Should we support GKE from day one, or add it as a second backend later?
  4. Billing/cost tracking — GCP labels per agent for cost attribution? Or a built-in usage tracker?
  5. Channel provisioning — How do we automate WhatsApp/Telegram setup per agent? (WhatsApp Business API requires phone numbers)
  6. Agent updates — Rolling updates across a plane? openclaw planes upgrade --plane acme-agents?
  7. State & backup — Agent workspace snapshots? Memory export/import for migration?

Scope

This is a large feature. Suggested phases:

  1. Phase 1: planes create + add-agent with VM-per-agent on GCP, Secret Manager isolation, IAP access
  2. Phase 2: Admin dashboard, cost tracking, agent health monitoring
  3. Phase 3: K8s backend, multi-cloud support
  4. Phase 4: Self-service portal for team members, channel auto-provisioning

Metadata

Metadata

Assignees

No one assigned

    Labels

    staleMarked as stale due to inactivity

    Type

    No type
    No fields configured for issues without a type.

    Projects

    No projects

    Milestone

    No milestone

    Relationships

    None yet

    Development

    No branches or pull requests

    Issue actions