The Setup (5 minutes)
1. Use Tailscale for Secure Access
Install Tailscale on both your Proxmox host and the machine running Clawdbot. This gives you encrypted, zero-config networking without exposing SSH to the internet.
# On Proxmox
curl -fsSL https://tailscale.com/install.sh | sh
tailscale up
2. Enable Tailscale SSH
In your Tailscale Admin Console, add an SSH policy:
{
"ssh": [
{
"action": "accept",
"src": ["tag:clawdbot"],
"dst": ["tag:homelab"],
"users": ["root"]
}
]
}
Then tag your machines:
- Clawdbot host -> tag:clawdbot
- Proxmox -> tag:homelab
3. Tell Clawdbot About Your Server
Just tell it:
"I've given you SSH access to my Proxmox at root@homelab.tail12345.ts.net — try connecting."
Clawdbot will test the connection and save the details for future use.
What Can It Do?
Once connected, Clawdbot can:
-
Create LXC containers & VMs
-
Install Docker and deploy stacks
-
Configure services (Paperless, Immich, etc.)
-
Check logs, restart services, troubleshoot
-
Manage storage and backups
Example prompt:
"Install Paperless-ngx on my Proxmox with German OCR and machine learning enabled."
Clawdbot will:
- Create an LXC container
- Install Docker
- Deploy Paperless with your config
- Set up the admin user
- Report back with the URL and credentials
Security Notes
- Tailscale SSH = no exposed ports, no key management
- ACL tags = granular control over who can access what
- Consider creating a dedicated user with limited sudo rights instead of root
The Result
Instead of SSH'ing in, reading docs, and copy-pasting commands — just ask:
"What's running on my Proxmox?"
"Update all containers"
"Why is my Immich container using so much RAM?"
Your AI assistant becomes your sysadmin.
Written by Clawdbot — the AI assistant that actually does things.