Summary
An Agents Plane — an infrastructure layer that lets organizations deploy isolated AI agents for team members. Each agent gets its own VM, service account, secrets, and network isolation. This is essentially "OpenClaw for Teams."
Motivation
Today, deploying OpenClaw agents for a team is manual: spin up a VM, install OpenClaw, configure secrets, set up channels — repeat per person. There's no unified way to provision, manage, or enforce isolation across a fleet of agents. Organizations need:
- One command to provision an agent for a team member
- Zero-trust isolation between agents (no shared secrets, no shared network)
- Admin oversight without admin access to individual agent secrets
- Cost visibility per agent
Related Issues & PRs
Proposed CLI
# Create a plane (admin)
openclaw planes create --name "acme-agents" --project gcp-project-id --region us-east4
# Provision agents for team members
openclaw planes add-agent --plane acme-agents --name alice --owner alice@acme.com --vm-type e2-small
openclaw planes add-agent --plane acme-agents --name bob --owner bob@acme.com --vm-type e2-small
# Manage
openclaw planes status
openclaw planes remove-agent --plane acme-agents --name alice
openclaw planes logs --plane acme-agents --name bob
What Gets Provisioned Per Agent
| Resource |
Details |
| Compute |
VM (or container) with OpenClaw pre-installed |
| Identity |
Dedicated GCP service account with minimal permissions |
| Secrets |
Secret Manager prefixed secrets + IAM bindings (ties into #16663) |
| Network |
VPC subnet or firewall rules for network isolation |
| Access |
IAP tunnel scoped to the owner only (OS Login) |
| Channels |
WhatsApp/Telegram/Signal connection (agent-specific) |
| Runtime |
Thinking clock (#17287) + heartbeat pre-configured |
Deployment Model Comparison
| Model |
Isolation |
Cost/agent |
Ops Complexity |
Best For |
| VM-per-agent |
🟢 Strongest |
~$15-30/mo |
Low |
< 20 agents, high security |
| Container on K8s |
🟡 Good (namespace + netpol) |
~$5-15/mo |
Medium |
20-100+ agents, cost-sensitive |
| Process on shared VM |
🔴 Weak |
~$2-5/mo |
Low |
Dev/testing only |
Recommendation: Start with VM-per-agent (simplest, strongest isolation). Add K8s support later for organizations at scale.
Security Model
- Zero trust between agents — no agent can access another's VM, secrets, or network
- SSH via IAP only — no SSH keys on disk, all access audited
- Per-agent service accounts — each can ONLY access its own Secret Manager secrets
- Admin audit without secret access — separation of duties (admin sees metrics/logs, not secret values)
- Network isolation — agents cannot reach each other's ports; egress controlled per policy
Architecture
┌─────────────────────────────────────────────┐
│ Agents Plane (admin) │
│ ┌─────────┐ ┌─────────┐ ┌─────────┐ │
│ │ Agent A │ │ Agent B │ │ Agent C │ │
│ │ (alice) │ │ (bob) │ │ (carol) │ │
│ ├─────────┤ ├─────────┤ ├─────────┤ │
│ │ SA: a@ │ │ SA: b@ │ │ SA: c@ │ │
│ │ Secrets │ │ Secrets │ │ Secrets │ │
│ │ VPC/FW │ │ VPC/FW │ │ VPC/FW │ │
│ │ IAP→alice│ │ IAP→bob │ │ IAP→carol│ │
│ └─────────┘ └─────────┘ └─────────┘ │
│ │
│ Shared: VPC, Cloud NAT, monitoring, billing │
└─────────────────────────────────────────────┘
Open Questions
- IaC tooling — Terraform/Pulumi for declarative infra, or pure
gcloud CLI for simplicity? Terraform is more portable for multi-cloud.
- Multi-cloud — GCP first (we're already there), but the abstraction should allow AWS/Azure later. How tightly do we couple to GCP APIs?
- K8s vs VMs — Should we support GKE from day one, or add it as a second backend later?
- Billing/cost tracking — GCP labels per agent for cost attribution? Or a built-in usage tracker?
- Channel provisioning — How do we automate WhatsApp/Telegram setup per agent? (WhatsApp Business API requires phone numbers)
- Agent updates — Rolling updates across a plane?
openclaw planes upgrade --plane acme-agents?
- State & backup — Agent workspace snapshots? Memory export/import for migration?
Scope
This is a large feature. Suggested phases:
- Phase 1:
planes create + add-agent with VM-per-agent on GCP, Secret Manager isolation, IAP access
- Phase 2: Admin dashboard, cost tracking, agent health monitoring
- Phase 3: K8s backend, multi-cloud support
- Phase 4: Self-service portal for team members, channel auto-provisioning
Summary
An Agents Plane — an infrastructure layer that lets organizations deploy isolated AI agents for team members. Each agent gets its own VM, service account, secrets, and network isolation. This is essentially "OpenClaw for Teams."
Motivation
Today, deploying OpenClaw agents for a team is manual: spin up a VM, install OpenClaw, configure secrets, set up channels — repeat per person. There's no unified way to provision, manage, or enforce isolation across a fleet of agents. Organizations need:
Related Issues & PRs
Proposed CLI
What Gets Provisioned Per Agent
Deployment Model Comparison
Recommendation: Start with VM-per-agent (simplest, strongest isolation). Add K8s support later for organizations at scale.
Security Model
Architecture
Open Questions
gcloudCLI for simplicity? Terraform is more portable for multi-cloud.openclaw planes upgrade --plane acme-agents?Scope
This is a large feature. Suggested phases:
planes create+add-agentwith VM-per-agent on GCP, Secret Manager isolation, IAP access