
Personal Knowledge Base (RAG)
Build a searchable knowledge base from everything you save — articles, tweets, videos, PDFs — with semantic search and cross-workflow integration.
Ready to automate your workflow?
Deploy your own OpenClaw instance and try these use cases today.

Turn OpenClaw into a persistent infrastructure agent with SSH access, automated cron jobs, and the ability to detect, diagnose, and fix issues before you know there's a problem.
Monitor these services on my home server (192.168.1.100): - Docker containers: nginx, postgres, grafana - System metrics: CPU > 90%, disk > 85%, memory > 90% If a container goes down: 1. Check logs for error messages 2. Attempt restart with docker compose restart 3. If restart fails 3 times, send me an alert with the error logs Run health checks every 5 minutes.
ssh-operator
Built-inkubectl
Built-interraform
Built-indocker-admin
Built-inalert-routing
Built-inHome lab operators and self-hosters face a constant maintenance burden:
ssh access to home network machineskubectl for Kubernetes cluster managementterraform and ansible for infrastructure-as-code1password CLI for secrets managementgog CLI for email accessopenclaw doctor for self-diagnosticsName your agent and define its access scope in AGENTS.md. The example below is based on a real production agent named "Reef":
## Infrastructure Agent
You are Reef, an infrastructure management agent.
Access:
- SSH to all machines on the home network (192.168.1.0/24)
- kubectl for the K3s cluster
- 1Password vault (read-only for credentials, dedicated AI vault)
- Gmail via gog CLI
- Calendar (yours + partner's)
- Obsidian vault at ~/Documents/Obsidian/
Rules:
- NEVER hardcode secrets — always use 1Password CLI or environment variables
- NEVER push directly to main — always create a PR
- Run `openclaw doctor` as part of self-health checks
- Log all infrastructure changes to ~/logs/infra-changes.mdThe power of this setup is the scheduled job system. Configure in HEARTBEAT.md:
## Cron Schedule
Every 15 minutes:
- Check kanban board for in-progress tasks → continue work
Every hour:
- Monitor health checks (Gatus, ArgoCD, service endpoints)
- Triage Gmail (label actionable items, archive noise)
- Check for unanswered alerts or notifications
Every 6 hours:
- Knowledge base data entry (process new Obsidian notes)
- Self health check (openclaw doctor, disk usage, memory, logs)
Every 12 hours:
- Code quality and documentation audit
- Log analysis via Loki/monitoring stack
Daily:
- 4:00 AM: Nightly brainstorm (explore connections between notes)
- 8:00 AM: Morning briefing (weather, calendars, system stats, task board)
- 1:00 AM: Velocity assessment (process improvements)
Weekly:
- Knowledge base QA review
- Infrastructure security auditThis is non-negotiable. Before giving your agent SSH access:
Pre-push hooks:
Local-first Git workflow:
Defense in depth:
Agent constraints:
## Daily Briefing Format
Generate and deliver at 8:00 AM:
### Weather
- Current conditions and forecast for [your location]
### Calendars
- Your events today
- Partner's events today
- Conflicts or overlaps flagged
### System Health
- CPU / RAM / Storage across all machines
- Services: UP/DOWN status
- Recent deployments (ArgoCD)
- Any alerts in last 24h
### Task Board
- Cards completed yesterday
- Cards in progress
- Blocked items needing attention
### Highlights
- Notable items from nightly brainstorm
- Emails requiring action
- Upcoming deadlines this weekThis use case is based on Nathan's detailed writeup "Everything I've Done with OpenClaw (So Far)", where he describes his OpenClaw agent "Reef" running on a home server with SSH access to all machines, a Kubernetes cluster, 1Password integration, and an Obsidian vault with 5,000+ notes. Reef runs 15 active cron jobs, 24 custom scripts, and has autonomously built and deployed applications including a task management UI.
Also referenced on the OpenClaw Showcase, where @georgedagg_ described a similar pattern: deployment monitoring, log review, configuration fixes, and PR submissions — all while walking the dog.
Skip the setup — get a fully managed OpenClaw instance ready to run this use case.
| Starter Plan | Pro Plan | Business Plan | |
|---|---|---|---|
| Monthly | $49/mo | $99/mo | $200/mo |
| Infrastructure | 2 vCPU · 2 GB RAM · 20 GB SSD | 2 vCPU · 4 GB RAM · 50 GB SSD | 4 vCPU · 8 GB RAM · 100 GB SSD |
| AI Credits | $10/mo included | $25/mo included | $50/mo included |
The irony of running a self-healing server agent on the server it's healing: if the server goes down, so does the agent. ShipClaw runs your agent on Fly.io's infrastructure, so it can detect and alert on home server outages from the outside.
Starter ($49/mo) works for basic server health monitoring. Start with Pro for full self-healing with SSH, cron jobs, and knowledge extraction. Upgrade to Business when managing a multi-machine homelab.

Build a searchable knowledge base from everything you save — articles, tweets, videos, PDFs — with semantic search and cross-workflow integration.

Create a live dashboard that spawns sub-agents to fetch data from multiple sources in parallel — GitHub, social media, markets, and system health — with threshold alerts.

Delegate all external API interactions to n8n workflows via webhooks — the agent never touches credentials, and every integration is visually inspectable.
Join the community
Subscribe to our newsletter for the latest news and updates