Openclaw Health Command List

O

Complete reference for openclaw health, fetching Gateway health snapshots, verbose provider probing, multi-agent session details, and targeting remote Gateways.

What does Openclaw Health do?

It queries the running Gateway over its local RPC connection and returns a health snapshot—a summary of whether the Gateway is up, which channels are connected, and (with –verbose) how those channels are actually performing with live probes.

It’s a faster, narrower diagnostic than the full Openclaw Doctor Commands and Uses; while health tells you the current live state in seconds, doctor performs a full system audit with repair options. Think of health as the equivalent of a quick pulse check before escalating to a deeper investigation with the doctor.

Choosing Between Openclaw Health and Openclaw Gateway Health

The top-level openclaw health command is a convenience alias for checking your local Gateway, it connects to the Gateway already running on your machine with no connection flags needed. If you need to check a remote Gateway (a VPS, a Tailnet node, or another machine), use openclaw gateway health with explicit –url–token, or –password flags. See Remote Gateway for that pattern.

Commands & Flags

Three variants, basic snapshot, JSON output, and verbose live probing.

openclaw healthread-only

Fetches and prints the basic health snapshot from the running local Gateway. Returns channel connectivity state, Gateway version, and uptime. Use this as the first check when something feels wrong with message delivery or agent responses.
openclaw health –jsonmachine-readable

Outputs the health snapshot in machine-readable JSON format. Use this when piping the output into scripts, monitoring systems, or CI health checks.
openclaw health –verboselive probes

Provides a more detailed output. Runs live probes against configured providers, prints per-account timings when multiple accounts are configured, and displays the target URL and config path if any errors occur.

Live provider probes: actively tests connectivity to each configured channel provider, not just cached state.
Per-account timings: when multiple accounts are configured, shows response latency per account to identify slow or failing connections.
Error context: on failures, prints the target URL and config path so you know exactly which endpoint and configuration entry is involved.

all three variants

# Basic snapshot — quick pass/fail
openclaw health

# Machine-readable output for scripts and monitoring
openclaw health --json

# Full detail with live probes and per-account timings
openclaw health --verbose

Multi-Agent Details

When multiple agents are configured, the health output automatically includes additional per-agent information.

If you have multiple agents configured, the health output will automatically include details about the per-agent session stores. This means you can see at a glance whether each agent’s session state is healthy, without needing to inspect them individually.

SetupWhat health output includes
Single agentOverall Gateway state, channel connectivity, version and uptime.
Multiple agentsAll of the above, plus per-agent session store details for each configured agent. Useful for identifying if one agent’s session state has drifted or failed without affecting others.
Multiple agents + –verboseAll of the above, plus live channel probes and per-account timings scoped per agent account where relevant.

Remote Gateway Health

The top-level openclaw health always targets your local Gateway. To check a remote instance, use the gateway-scoped variant with explicit connection flags.

openclaw gateway healthremote-capable

The gateway-specific variant of the health command. Accepts explicit connection overrides to target any reachable Gateway instance, a VPS, Tailnet node, or remote machine. All the same output as openclaw health, just pointed at a different endpoint.

–url ws://<host>:<port> | –token <token> | –password <password>

local vs. remote health check

# Local Gateway — no connection flags needed
openclaw health

# Remote Gateway — explicit URL and auth required
openclaw gateway health --url ws://<host>:<port> --token <token>

# Remote Gateway with password auth
openclaw gateway health --url ws://<host>:<port> --password <password>

# Verbose probe against a remote instance
openclaw gateway health --url ws://<host>:<port> --token <token> --verbose

When passing –url to openclaw gateway health, the CLI will not fall back to config or environment credentials, you must also explicitly pass –token or –password, or the command will fail with an auth error.

About the author

Hairun Wicaksana

Hi, I just another vibecoder from Southeast Asia, currently based in Stockholm. Building startup experiments while keeping close to the KTH Innovation startup ecosystem. I focus on AI tools, automation, and fast product experiments, sharing the journey while turning ideas into working software.

Get in touch

Quickly communicate covalent niche markets for maintainable sources. Collaboratively harness resource sucking experiences whereas cost effective meta-services.