Hostinger VPS Deploy
Deploy Koda (OpenClaw) on Hostinger VPS servers with GUI access for AI virtual employees.
Overview
This skill automates:
- API-driven provisioning — Deploy VPS instances via Hostinger API MCP tools
- Server hardening — SSH keys, firewall, fail2ban
- GUI installation — XFCE desktop + VNC/XRDP for remote access
- Docker setup — Container runtime for Koda
- Koda deployment — AI assistant with webchat interface
- Identity config — Unique name/persona for each virtual employee
Hostinger API Integration (MCP)
Dashboard Tab
OpenClaw has a built-in Hostinger tab in the Control dashboard (Integrations group).
From the tab you can:
- Enter your Hostinger API token (stored securely in vault)
- Set your GitHub repo URL (OpenClaw fork to install on new VPS instances)
- View all available MCP tools grouped by category
- Reference the Key VPS Tools quick guide
Getting Your API Token
- Log into hPanel
- Go to API Tokens → Create new token
- Copy the token and paste it in the OpenClaw Hostinger tab
MCP Server
The hostinger-api-mcp npm package is Hostinger's official MCP server.
- Install:
npm install -g hostinger-api-mcp(already installed) - Auth: Bearer token via
API_TOKENenv var - Transport: stdio (default) or HTTP streaming
Important: The API token is stored in ~/.openclaw/secrets.json (the vault), not in plaintext in mcporter config. A SecretRef points to the vault key HOSTINGER_API_TOKEN.
Key API Endpoints
| Tool | Method | Path |
|---|---|---|
vps_getVirtualMachineListV1 | GET | /api/vps/v1/virtual-machines |
vps_createVirtualMachineV1 | POST | /api/vps/v1/virtual-machines |
vps_getDataCenterListV1 | GET | /api/vps/v1/data-centers |
vps_getOsListV1 | GET | /api/vps/v1/os |
vps_startVirtualMachineV1 | POST | /api/vps/v1/virtual-machines/{id}/start |
vps_stopVirtualMachineV1 | POST | /api/vps/v1/virtual-machines/{id}/stop |
vps_restartVirtualMachineV1 | POST | /api/vps/v1/virtual-machines/{id}/restart |
vps_resetPasswordV1 | POST | /api/vps/v1/virtual-machines/{id}/reset-password |
vps_getMetricsV1 | GET | /api/vps/v1/virtual-machines/{id}/metrics |
billing_getCatalogItemListV1 | GET | /api/billing/v1/catalog |
billing_getPaymentMethodListV1 | GET | /api/billing/v1/payment-methods |
Using Tools via mcporter
# List all VPS instances
mcporter call hostinger-api.vps_getVirtualMachineListV1
# View available VPS plans (prices in cents)
mcporter call hostinger-api.billing_getCatalogItemListV1 category=VPS
# List data centers
mcporter call hostinger-api.vps_getDataCenterListV1
# List OS options
mcporter call hostinger-api.vps_getOsListV1
# Deploy a new VPS (requires plan item ID, OS ID, datacenter ID)
mcporter call hostinger-api.vps_createVirtualMachineV1 ...
API Documentation Links
| Resource | URL |
|---|---|
| API Reference | https://developers.hostinger.com/ |
| Overview | https://developers.hostinger.com/#description/overview |
| Authentication | https://developers.hostinger.com/#description/authentication |
| SDKs & Tools | https://developers.hostinger.com/#description/sdks--tools |
| Official MCP Server (GitHub) | https://github.com/hostinger/api-mcp-server |
| Postman Collection | https://app.getpostman.com/run-collection/36145449-4a733c4f-6704-49f6-832a-0ccd28c37021 |
| hPanel API Tokens | https://hpanel.hostinger.com/api-tokens |
VPS Deployment Workflow
Step 1: Get a VPS
# 1. Check available plans
mcporter call hostinger-api.billing_getCatalogItemListV1 category=VPS
# 2. Pick a data center
mcporter call hostinger-api.vps_getDataCenterListV1
# 3. Pick an OS (Ubuntu 24.04 recommended)
mcporter call hostinger-api.vps_getOsListV1
# 4. Deploy
mcporter call hostinger-api.vps_createVirtualMachineV1 \
--args '{"plan":"...", "datacenter_id": "...", "os_id": "..."}'
Step 2: Set Up the Server
Once the VPS is running (get IP from vps_getVirtualMachineListV1):
# One-command full deploy
scripts/deploy-all.sh SERVER_IP "Agent Name" [KODA_PORT] [SSH_PORT]
# Examples:
scripts/deploy-all.sh 1.2.3.4 "Alex"
scripts/deploy-all.sh 1.2.3.4 "Alex" 9443 2222
Step 3: Install OpenClaw Fork
If a GitHub repo is configured (via the Hostinger tab), Koda will:
- SSH into the new VPS
- Clone the configured repo (e.g.,
https://github.com/your-org/openclaw) - Run the install script
Manual Step-by-Step Scripts
# 1. Initial server setup (with custom ports)
ssh root@SERVER_IP 'bash -s 9443 2222' < scripts/01-server-setup.sh
# 2. Install GUI + remote desktop
ssh -p 2222 root@SERVER_IP 'bash -s' < scripts/02-install-gui.sh
# 3. Install Docker
ssh -p 2222 root@SERVER_IP 'bash -s' < scripts/03-install-docker.sh
# 4. Deploy Koda (with custom port)
ssh -p 2222 root@SERVER_IP 'bash -s 9443' < scripts/04-deploy-koda.sh
# 5. Configure identity
ssh -p 2222 root@SERVER_IP 'bash -s' < scripts/05-configure-identity.sh "Agent Name"
Scripts
| Script | Purpose |
|---|---|
01-server-setup.sh | Updates, firewall, fail2ban, create user |
02-install-gui.sh | XFCE desktop + XRDP (Windows Remote Desktop) |
03-install-docker.sh | Docker + Docker Compose |
04-deploy-koda.sh | Pull/build Koda, start container |
05-configure-identity.sh | Set agent name, create workspace |
deploy-all.sh | Run all scripts in sequence |
Connecting to Your VPS
After deployment:
- Remote Desktop (RDP): Connect with Windows Remote Desktop or Remmina to
SERVER_IP:3389 - VNC: Connect to
SERVER_IP:5901(if VNC installed) - Webchat: Open
http://SERVER_IP:18789in browser - SSH:
ssh koda@SERVER_IP
Default credentials (change after first login):
- Username:
koda - Password: Set during deployment
Firewall Ports
| Port | Service | Customizable |
|---|---|---|
| 22 (default) | SSH | ✅ Set via SSH_PORT |
| 3389 | XRDP (Remote Desktop) | ❌ |
| 18789 (default) | Koda webchat | ✅ Set via KODA_PORT |
Security
Vault Storage
The Hostinger API token is stored in ~/.openclaw/secrets.json under the key HOSTINGER_API_TOKEN. It is never stored in plaintext in mcporter.json — only a SecretRef pointer is stored there.
Post-Deployment Hardening
# Tailscale (zero-trust VPN — recommended)
ssh root@SERVER_IP 'bash -s' < scripts/security/setup-tailscale.sh
ssh root@SERVER_IP 'bash -s' < scripts/security/lockdown-public.sh
# Or: Cloudflare Tunnel for HTTPS
ssh root@SERVER_IP 'bash -s' < scripts/security/setup-cloudflare-tunnel.sh
| Script | Purpose |
|---|---|
security/setup-ssh-keys.sh | SSH key-only auth |
security/setup-tailscale.sh | Zero-trust VPN mesh |
security/setup-cloudflare-tunnel.sh | HTTPS via Cloudflare |
security/setup-wireguard.sh | Self-hosted VPN |
security/setup-https.sh | Let's Encrypt SSL + Nginx |
security/harden-server.sh | Kernel hardening, auto-updates |
security/lockdown-public.sh | Remove all public port access |
Reference Files
| File | Purpose |
|---|---|
references/hostinger-backend.ts | Gateway RPC handlers for Hostinger API |
references/hostinger-views.ts | UI tab rendering (Lit) |
references/hostinger-controller.ts | UI state management |
references/hostinger-notes.md | hPanel navigation notes |
references/identity-setup.md | Per-agent identity configuration |
references/security-options.md | Security comparison guide |
VPS Plans
Recommended for Koda/OpenClaw:
- KVM 2 (2 GB RAM) — Minimum for headless Koda
- KVM 4 (4 GB RAM) — Recommended for GUI + Koda
- KVM 8 (8 GB RAM) — Comfortable for heavy workloads
OS: Ubuntu 22.04 or 24.04 LTS
Troubleshooting
Can't connect via RDP?
- Ensure port 3389 is open:
sudo ufw status - Check XRDP status:
sudo systemctl status xrdp
Koda not starting?
- Check Docker:
docker ps - View logs:
docker logs koda
GUI slow?
- XFCE is lightweight but VPS needs 2GB+ RAM
- Consider headless mode if GUI not needed
MCP tools not loading?
- Verify token is saved: check
~/.openclaw/secrets.jsonforHOSTINGER_API_TOKEN - Run:
API_TOKEN=your-token mcporter list hostinger-api