Q&A: OpenClaw Sidecar Deployment — Container Images, PostgreSQL, Key Vault, Helm Chart #951
Unanswered
imran-siddique
asked this question in
Q&A
Replies: 1 comment
-
Update: All Issues Fixed in MainI've merged PR #954 that addresses every issue raised. Please pull latest main and retry. What changed:
Thank you for the detailed feedback - it made the docs significantly better. Please sync to latest and continue testing. If you'd like to contribute learnings back as a PR, very welcome! |
Beta Was this translation helpful? Give feedback.
0 replies
Sign up for free
to join this conversation on GitHub.
Already have an account?
Sign in to comment
Uh oh!
There was an error while loading. Please reload this page.
-
Great questions — and thank you for digging in deeply enough to find these gaps. You're right that the deployment docs need work. Let me address each point honestly.
1. Container Images (trust-engine, policy-server, audit-collector, api-gateway)
These images are not published to any public registry. This is the biggest gap in our deployment story and I should have been clearer about it.
What to do today: You need to build the images yourself and push to your own ACR (or any private registry). The source is in the repo but we don't ship pre-built containers yet. Here's the quickest path:
The Helm chart's 4-component architecture (api-gateway, trust-engine, policy-server, audit-collector) is the production-grade design. For getting started with OpenClaw sidecar governance, you don't need all 4 — the single governance sidecar container from
packages/agent-osbundles policy + trust + audit into one process. I'll update the docs to make this clearer.2. PostgreSQL — Is It Necessary?
No, PostgreSQL is NOT required for the basic sidecar setup. Here's the breakdown:
PostgreSQL appears in the architecture diagram because the enterprise HA deployment uses it for persistent audit log storage and agent registry state. For the OpenClaw sidecar scenario, audit logs write to the container filesystem or stdout — you just need
kubectl logsto see them.3. Key Vault Secrets — What Goes There?
The Key Vault stores:
For the OpenClaw sidecar, you only need the agent private key in KV if you want DID-based identity. For a basic policy-only setup, you can skip KV entirely and just mount policies via ConfigMap.
4. OpenClaw Sidecar Helm Chart — The Honest Answer
You are correct that the
values-openclaw.yamlreferences values that don't exist in the Helm chart templates. The chart was designed for the 4-component architecture (trust-engine, policy-server, audit-collector, api-gateway). Theopenclaw.enabledandsidecar.enabledvalues in the OpenClaw deployment guide are aspirational — they document where we're heading, not where we are today.What works right now for OpenClaw sidecar:
Option A: Docker Compose (local dev — works today)
The Docker Compose example in the sidecar doc works. Build the governance sidecar from
packages/agent-osand run alongside OpenClaw.Option B: Plain K8s manifests (production — works today)
Write a Pod spec with two containers (OpenClaw + governance sidecar) instead of using the Helm chart:
Option C: Helm chart with overrides (we need to build this)
This is the gap — we need to add sidecar injection support to the Helm chart. I'll track this as a feature.
Namespace: Use
openclaw-governedor whatever you prefer — the agentmesh namespace is for the full cluster deployment.PostgreSQL/EventGrid: Not needed for the sidecar scenario. Only needed for full enterprise deployment.
Next Steps
I'm going to:
Your offer to help improve the docs after getting it working is very welcome. If you get the Docker Compose or plain K8s approach working, a PR with your learnings would be incredibly valuable.
Thanks for pushing on this — these are exactly the questions that make the docs better for everyone. 🙏
Beta Was this translation helpful? Give feedback.
All reactions