OpenSRE integrates with OpenClaw in a native, one-way support loop:Documentation Index
Fetch the complete documentation index at: https://opensre.com/docs/llms.txt
Use this file to discover all available pages before exploring further.
- OpenSRE can search recent OpenClaw conversations during an investigation.
- OpenSRE can read full OpenClaw threads for extra engineering context.
- OpenSRE writes completed RCA findings back into OpenClaw through the OpenClaw bridge.
opensre-mcp command. You do not need to register OpenSRE itself as an MCP server inside OpenClaw.
Setup
0. Preflight the local OpenClaw CLI
Before you onboard OpenClaw in OpenSRE, make sure the OpenClaw CLI itself is healthy in the same shell:node -vshows Nodev22.12+or neweropenclaw --helpexits cleanlyopenclaw gateway statusdoes not fail immediately
nvm, the safe sequence is:
nvm alias default 22 only affects future shells. It does not switch the current shell that launches uv run opensre.
1. Install and configure OpenSRE locally
2. Configure the OpenSRE → OpenClaw bridge
Use the guided wizard:3. Verify the bridge
From the repo root:4. Run a smoke test
Use the bundled OpenClaw fixture directly:Write-back behavior
After every completed investigation, OpenSRE attempts to write the full RCA report back into OpenClaw.- If the investigation state contains an
openclaw_context.conversation_id, OpenSRE first tries to append the result to that conversation. - Otherwise, OpenSRE creates a new OpenClaw conversation containing the RCA report, root cause, remediation steps, and confidence score.
Investigation behavior
When OpenClaw is configured, OpenSRE now prefers the high-signal conversation actions first:search_openclaw_conversationsto find recent related contextget_openclaw_conversationto read the full threadsend_openclaw_messageto append a concrete follow-up
Accurate RCA
OpenClaw improves RCA quality by supplying engineering context, but OpenClaw alone is not enough for a strong investigation. For accurate RCA, also configure at least one of these:GrafanaorDatadogfor metrics/logs/tracesAWSfor infra topology and runtime stateGitHubfor deploy/code-change context
tests/test_openclaw_integration.pytests/tools/test_openclaw_mcp_tool.pytests/utils/test_openclaw_delivery.pytests/e2e/openclaw/(e2e suite — see the “End-to-end tests” section below)
Environment variables
| Variable | Meaning | Default |
|---|---|---|
OPENCLAW_MCP_MODE | OpenClaw bridge transport: stdio, streamable-http, or sse | streamable-http |
OPENCLAW_MCP_COMMAND | Executable used for stdio mode | openclaw |
OPENCLAW_MCP_ARGS | Space-separated arguments for stdio mode | mcp serve |
OPENCLAW_MCP_URL | Remote MCP endpoint for streamable-http or sse | none |
OPENCLAW_MCP_AUTH_TOKEN | Optional bearer token for remote MCP transports | empty |
Troubleshooting
OpenClaw bridge validation failed: Node.js ... is required: switch the current shell to Node22.12+or newer. Withnvm:nvm install 22 && nvm use 22 && nvm alias default 22. With Homebrew:brew install node@22 && brew link --overwrite node@22. Then re-runopenclaw --helpbefore retrying onboarding.uv run opensre integrations verify openclawfails againsthttp://127.0.0.1:18789/: that URL is the OpenClaw Control UI/Gateway, not the MCP bridge. Usestdiomode withopenclaw mcp serve.search_openclaw_conversationsor write-back fails withConnection closedorECONNREFUSED: the OpenClaw Gateway is not running. Checkopenclaw gateway status, then runopenclaw gateway run.Command not found: openclaw: install the OpenClaw CLI or pointOPENCLAW_MCP_COMMANDat the full executable path.
End-to-end tests
The OpenClaw e2e suite lives attests/e2e/openclaw/. See its README for prerequisites, how to run the suite, scenario layout, and CI behavior.
Tracer