Skip to main content

Documentation Index

Fetch the complete documentation index at: https://docs.remotemux.com/llms.txt

Use this file to discover all available pages before exploring further.

RemoteMux merges configuration from several sources so you can override defaults per project.

Resolution Order

Highest precedence first:
  1. CLI flags for config values such as --backend or --api-base-url
  2. Local ./.rmux.toml
  3. Environment variables
Hosted RemoteMux auth is resolved separately from project config:
  1. RMUX_API_KEY
  2. Stored hosted auth selected with rmux auth use or rmux login
Stored hosted auth is single-mode: either an OAuth session or an API key, never both at once. .rmux.toml is not a hosted auth source. In CI, you can skip ./.rmux.toml entirely if the job sets the required config env vars such as RMUX_BACKEND and RMUX_API_BASE_URL. Use these commands to inspect and switch hosted auth explicitly:
rmux auth status
rmux auth use oauth
rmux auth use api-key --token <api-key>
rmux auth clear

Config Files

PathScope
./.rmux.tomlProject-local config for this directory.
Legacy rmux.conf and .rmux.conf are still read, but rmux configure writes ./.rmux.toml.
rmux configure            # interactive setup, writes ./.rmux.toml
rmux configure --show     # print resolved config after all merges
When backend=managed, interactive rmux configure prompts for the hosted auth mode on every run so you can explicitly choose OAuth or API key auth for that project. Do not commit .rmux.toml if it contains service tokens or cloud credentials. On hosted backends, organizationId and projectId in .rmux.toml set the default scope for commands like rmux env new, rmux usage, and rmux token create.

Backend Selection

rmux configure --backend aws
rmux configure --backend gcp
rmux configure --backend e2b
rmux configure --backend managed
The config format is TOML with top-level [aws], [gcp], [e2b], and [managed] tables. A single file can carry settings for multiple backends; the backend key decides which is active. Legacy aliases local (aws) and cloud (managed) are still accepted.

Example .rmux.toml

backend = "gcp"
apiBaseUrl = "https://api.remotemux.com"
organizationId = "org_123"
projectId = "proj_123"

[aws]
region = "us-east-1"
authMode = "aws-cli"
profile = "default"
vpcId = "vpc-123456"
subnetIds = ["subnet-a", "subnet-b"]
securityGroupIds = ["sg-123"]
instanceType = "t3.large"
workspaceBucket = "rmux-byoc-workspaces"
previewDomain = "preview.rmux.dev"

[gcp]
authMode = "gcloud-cli"
projectId = "rmux-dev"
region = "us-central1"
zone = "us-central1-a"
network = "default"
subnetwork = "default-us-central1"
machineType = "e2-standard-4"

[e2b]
apiKey = "e2b_xxx"
template = "base"
previewDomain = "preview.rmux.dev"
timeoutMs = 3600000

[managed]
region = "us-east-1"
instanceType = "t3.large"
previewDomain = "preview.rmux.dev"

Full Settings Reference

Core

SettingEnvironment variableNotes
backendRMUX_BACKENDaws, gcp, e2b, or managed.
apiBaseUrlRMUX_API_BASE_URLControl plane URL.
organizationIdRMUX_ORGANIZATION_IDDefault hosted organization for new environments, usage, and token creation.
projectIdRMUX_PROJECT_IDDefault hosted project scope within the selected organization.
brewServicesOptional machine bootstrap services. Example: ["redis", "temporal"].
environment (env var only)RMUX_ENVIRONMENTTarget environment by name or ID for workspace commands (useful in CI).
Hosted auth is environment/session only:
Environment variableNotes
RMUX_API_KEYExplicit hosted auth override for the current shell or process. If unset, rmux falls back to the stored auth selected with rmux auth use or rmux login.

AWS

SettingEnvironment variableNotes
aws.regionRMUX_AWS_REGIONAWS region.
aws.vpcIdRMUX_AWS_VPC_IDVPC for auto-discovered subnets and security groups.
aws.authModeRMUX_AWS_AUTH_MODEaws-cli, env, or access-key.
aws.profileRMUX_AWS_PROFILEAWS profile for aws-cli auth mode.
aws.accessKeyIdRMUX_AWS_ACCESS_KEY_IDAccess key for access-key auth mode.
aws.secretAccessKeyRMUX_AWS_SECRET_ACCESS_KEYSecret key for access-key auth mode.
aws.sessionTokenRMUX_AWS_SESSION_TOKENOptional session token.
aws.subnetIdsRMUX_AWS_SUBNET_IDSComma-separated in env var form.
aws.securityGroupIdsRMUX_AWS_SECURITY_GROUP_IDSComma-separated in env var form.
aws.instanceTypeRMUX_AWS_INSTANCE_TYPEEC2 instance type.
aws.workspaceBucketRMUX_AWS_WORKSPACE_BUCKETRequired for staged flows. BYOC path can auto-resolve.
aws.previewDomainRMUX_AWS_PREVIEW_DOMAINReserved for future BYOC ingress. AWS BYOC exposed ports currently use direct public-IP URLs.

GCP

SettingEnvironment variableNotes
gcp.authModeRMUX_GCP_AUTH_MODEgcloud-cli or credentials-file. Defaults to gcloud-cli unless a credentials file is set.
gcp.projectIdRMUX_GCP_PROJECT_IDRequired.
gcp.regionRMUX_GCP_REGIONOptional if zone is set.
gcp.zoneRMUX_GCP_ZONERequired in practice.
gcp.networkRMUX_GCP_NETWORKVPC network.
gcp.subnetworkRMUX_GCP_SUBNETWORKOptional subnetwork.
gcp.machineTypeRMUX_GCP_MACHINE_TYPECompute Engine machine type.
gcp.previewDomainRMUX_GCP_PREVIEW_DOMAINReserved for future ingress. GCP BYOC exposed ports currently use direct public-IP URLs.
gcp.credentialsFileRMUX_GCP_CREDENTIALS_FILEPath to a service-account JSON key or another credential file accepted by gcloud auth login --cred-file. gcloud must still be installed for attach and remote commands.
gcp.impersonateServiceAccountRMUX_GCP_IMPERSONATE_SERVICE_ACCOUNTOptional service account email passed to gcloud --impersonate-service-account.

E2B

SettingEnvironment variableNotes
e2b.apiKeyRMUX_E2B_API_KEYRequired.
e2b.templateRMUX_E2B_TEMPLATEDefaults to base.
e2b.previewDomainRMUX_E2B_PREVIEW_DOMAINPreview/share-link domain. Defaults to preview.rmux.dev.
e2b.timeoutMsRMUX_E2B_TIMEOUT_MSSandbox timeout in milliseconds.
e2b.domainRMUX_E2B_DOMAINOptional API domain override.

Managed

The managed backend provisions sandbox environments through the control plane. Users only need backend = "managed" plus either a stored hosted auth selection or RMUX_API_KEY for hosted auth. No cloud credentials or infrastructure settings are required.

Tooling Overrides

Environment variableNotes
RMUX_SESSION_MANAGER_PLUGIN_PATHPoint RemoteMux at a specific Session Manager plugin binary.
RMUX_SESSION_MANAGER_PLUGIN_DIRPoint RemoteMux at a directory containing the plugin.

List-valued variables (subnet IDs, security group IDs) use comma-separated values.
rmux configure --help    # full flag surface
rmux configure --show    # resolved config for current directory
Last modified on April 9, 2026