UseDocumentation Index
Fetch the complete documentation index at: https://docs.remotemux.com/llms.txt
Use this file to discover all available pages before exploring further.
backend=gcp when you want the RemoteMux control plane to provision into your own GCP project.
What This Backend Does
- Authenticates to the RemoteMux control plane with
rmux login - Validates your GCP credentials, project settings, and required APIs/permissions
- Creates one Compute Engine VM per environment
- Uses
gcloud compute ssh --tunnel-through-iapfor attach and remote commands
Prerequisites
gcloudCLI installed- Either an authenticated
gcloudsession or a credential file whengcp.authMode=credentials-file - Compute Engine API and IAP API enabled in the target project
- A project ID and zone for the VM
- A VPC network (optionally with a subnetwork)
Configure
gcloud-cli mode, interactive rmux configure --backend gcp validates the current gcloud auth state first and can seed the project, region, and zone from your local gcloud config.
Full configuration:
gcp.projectId is required. gcp.zone is required in practice, and RemoteMux derives gcp.region from it when you do not set one explicitly. gcp.authMode defaults to gcloud-cli; use credentials-file when you want gcloud commands to initialize from a service-account JSON key or another gcloud auth login --cred-file credential file. gcp.impersonateServiceAccount is optional and applies to all gcloud operations RemoteMux runs.
Validate
- Usable GCP credentials and the active
gcloudaccount when applicable - Project access and project number
- Compute Engine and IAP API enablement
- Zone reachability and machine-type availability
- Network and subnetwork existence
- Base image availability
- Default Compute Engine service-account resolution
- Required project and service-account permissions when IAM permission probing is reachable
Create and Use
Editor Access
Open workspaces in VS Code or Cursor:gcloud compute config-ssh to seed the local SSH key and then writes an IAP-backed host alias under ~/.ssh/rmux/config. See Editor Access for details.
Port Exposure
GCP BYOC exposed ports currently return direct public-IP URLs such ashttp://PUBLIC_IP:3000.
Private previews and preview share links are currently available only on Managed and E2B environments. RemoteMux does not currently provision preview-domain ingress for backend=gcp, so gcp.previewDomain is reserved for future work and is not used for live port URLs today.