Azure
RemoteClaw on Azure Linux VM
This guide sets up an Azure Linux VM with the Azure CLI, applies Network Security Group (NSG) hardening, configures Azure Bastion for SSH access, and installs RemoteClaw.
What you will do
- Create Azure networking (VNet, subnets, NSG) and compute resources with the Azure CLI
- Apply Network Security Group rules so VM SSH is allowed only from Azure Bastion
- Use Azure Bastion for SSH access (no public IP on the VM)
- Install RemoteClaw with the installer script
- Verify the Gateway
What you need
- An Azure subscription with permission to create compute and network resources
- Azure CLI installed (see Azure CLI install steps if needed)
- An SSH key pair (the guide covers generating one if needed)
- ~20-30 minutes
Configure deployment
The `ssh` extension is required for Azure Bastion native SSH tunneling.Verify registration. Wait until both show `Registered`.
```bashaz provider show --namespace Microsoft.Compute --query registrationState -o tsvaz provider show --namespace Microsoft.Network --query registrationState -o tsv```Adjust names and CIDR ranges to fit your environment. The Bastion subnet must be at least `/26`.```bashSSH_PUB_KEY="$(cat ~/.ssh/id_ed25519.pub)"```
If you don't have an SSH key yet, generate one:
```bashssh-keygen -t ed25519 -a 100 -f ~/.ssh/id_ed25519 -C "you@example.com"SSH_PUB_KEY="$(cat ~/.ssh/id_ed25519.pub)"```Choose a VM size and OS disk size available in your subscription and region:
- Start smaller for light usage and scale up later- Use more vCPU/RAM/disk for heavier automation, more channels, or larger model/tool workloads- If a VM size is unavailable in your region or subscription quota, pick the closest available SKU
List VM sizes available in your target region:
```bashaz vm list-skus --location "${LOCATION}" --resource-type virtualMachines -o table```
Check your current vCPU and disk usage/quota:
```bashaz vm list-usage --location "${LOCATION}" -o table```Deploy Azure resources
```bashaz network nsg create \ -g "${RG}" -n "${NSG_NAME}" -l "${LOCATION}"
# Allow SSH from the Bastion subnet onlyaz network nsg rule create \ -g "${RG}" --nsg-name "${NSG_NAME}" \ -n AllowSshFromBastionSubnet --priority 100 \ --access Allow --direction Inbound --protocol Tcp \ --source-address-prefixes "${BASTION_SUBNET_PREFIX}" \ --destination-port-ranges 22
# Deny SSH from the public internetaz network nsg rule create \ -g "${RG}" --nsg-name "${NSG_NAME}" \ -n DenyInternetSsh --priority 110 \ --access Deny --direction Inbound --protocol Tcp \ --source-address-prefixes Internet \ --destination-port-ranges 22
# Deny SSH from other VNet sourcesaz network nsg rule create \ -g "${RG}" --nsg-name "${NSG_NAME}" \ -n DenyVnetSsh --priority 120 \ --access Deny --direction Inbound --protocol Tcp \ --source-address-prefixes VirtualNetwork \ --destination-port-ranges 22```
The rules are evaluated by priority (lowest number first): Bastion traffic is allowed at 100, then all other SSH is blocked at 110 and 120.```bashaz network vnet create \ -g "${RG}" -n "${VNET_NAME}" -l "${LOCATION}" \ --address-prefixes "${VNET_PREFIX}" \ --subnet-name "${VM_SUBNET_NAME}" \ --subnet-prefixes "${VM_SUBNET_PREFIX}"
# Attach the NSG to the VM subnetaz network vnet subnet update \ -g "${RG}" --vnet-name "${VNET_NAME}" \ -n "${VM_SUBNET_NAME}" --nsg "${NSG_NAME}"
# AzureBastionSubnet — name is required by Azureaz network vnet subnet create \ -g "${RG}" --vnet-name "${VNET_NAME}" \ -n AzureBastionSubnet \ --address-prefixes "${BASTION_SUBNET_PREFIX}"``````bashaz vm create \ -g "${RG}" -n "${VM_NAME}" -l "${LOCATION}" \ --image "Canonical:ubuntu-24_04-lts:server:latest" \ --size "${VM_SIZE}" \ --os-disk-size-gb "${OS_DISK_SIZE_GB}" \ --storage-sku StandardSSD_LRS \ --admin-username "${ADMIN_USERNAME}" \ --ssh-key-values "${SSH_PUB_KEY}" \ --vnet-name "${VNET_NAME}" \ --subnet "${VM_SUBNET_NAME}" \ --public-ip-address "" \ --nsg ""```
`--public-ip-address ""` prevents a public IP from being assigned. `--nsg ""` skips creating a per-NIC NSG (the subnet-level NSG handles security).
**Reproducibility:** The command above uses `latest` for the Ubuntu image. To pin a specific version, list available versions and replace `latest`:
```bashaz vm image list \ --publisher Canonical --offer ubuntu-24_04-lts \ --sku server --all -o table``````bashaz network public-ip create \ -g "${RG}" -n "${BASTION_PIP_NAME}" -l "${LOCATION}" \ --sku Standard --allocation-method Static
az network bastion create \ -g "${RG}" -n "${BASTION_NAME}" -l "${LOCATION}" \ --vnet-name "${VNET_NAME}" \ --public-ip-address "${BASTION_PIP_NAME}" \ --sku Standard --enable-tunneling true```
Bastion provisioning typically takes 5-10 minutes but can take up to 15-30 minutes in some regions.Install RemoteClaw
az network bastion ssh \ --name "${BASTION_NAME}" \ --resource-group "${RG}" \ --target-resource-id "${VM_ID}" \ --auth-type ssh-key \ --username "${ADMIN_USERNAME}" \ --ssh-key ~/.ssh/id_ed25519```The installer installs Node LTS and dependencies if not already present, installs RemoteClaw, and launches the onboarding wizard. See [Install](/install) for details.```bashremoteclaw gateway status```
Most enterprise Azure teams already have GitHub Copilot licenses. If that is your case, we recommend choosing the GitHub Copilot provider in the RemoteClaw onboarding wizard. See [GitHub Copilot provider](/providers/github-copilot).Cost considerations
Azure Bastion Standard SKU runs approximately $140/month and the VM (Standard_B2as_v2) runs approximately $55/month.
To reduce costs:
-
Deallocate the VM when not in use (stops compute billing; disk charges remain). The RemoteClaw Gateway will not be reachable while the VM is deallocated — restart it when you need it live again:
Terminal window az vm deallocate -g "${RG}" -n "${VM_NAME}"az vm start -g "${RG}" -n "${VM_NAME}" # restart later -
Delete Bastion when not needed and recreate it when you need SSH access. Bastion is the largest cost component and takes only a few minutes to provision.
-
Use the Basic Bastion SKU (~$38/month) if you only need Portal-based SSH and don’t require CLI tunneling (
az network bastion ssh).
Cleanup
To delete all resources created by this guide:
az group delete -n "${RG}" --yes --no-waitThis removes the resource group and everything inside it (VM, VNet, NSG, Bastion, public IP).
Next steps
- Set up messaging channels: Channels
- Pair local devices as nodes: Nodes
- Configure the Gateway: Gateway configuration
- For more details on RemoteClaw Azure deployment with the GitHub Copilot model provider: RemoteClaw on Azure with GitHub Copilot