cloudX is the modern successor to AWS Cloud9. Use your local VSCode with the power of AWS EC2 instances for seamless remote development.
Stopped instances are automatically started when you connect. Save costs without hassle.
Work with instances in private networks via AWS Systems Manager. No public IPs needed.
SSH keys are automatically distributed via EC2 Instance Connect. Secure and temporary.
Works perfectly with your existing VSCode setup, extensions, and workflow.
Support for Windows, macOS, and Linux. One tool, works everywhere.
Integration with 1Password SSH agent for secure key management.
An IAM user is created with exactly the right permissions for cloudX. These credentials are stored locally.
An EC2 instance with the right tags and IAM role. Available via Service Catalog for easy deployment.
The proxy handles SSH connections via Systems Manager Session Manager plugin. Automatically starts instances.
VSCode connects via SSH config. Completely transparent, as if you're working locally.
# Python 3.9+, AWS CLI v2, Session Manager plugin
pip install uv
Make sure you have Python, AWS CLI, and the Session Manager plugin installed.
# Basic setup with prompts
uvx cloudX-proxy setup
# Or fully automated
uvx cloudX-proxy setup \
--profile myprofile \
--instance i-1234567890abcdef0 \
--hostname myserver \
--yes
Setup automatically configures your AWS profile, SSH keys, and VSCode settings.
{
"remote.SSH.configFile": "~/.ssh/vscode/config",
"remote.SSH.connectTimeout": 90
}
Open VSCode Remote Explorer and connect to your cloudX-{env}-{hostname}. First time takes 2-3 minutes.
Use --1password for secure key management in your 1Password vault
Use --aws-env prod for different AWS environments
Specify a custom location with --ssh-config
The server-side of cloudX runs on AWS and can be deployed with CloudFormation templates. One click and your infrastructure is ready.
Deploy once per environment (Dev, Test, Prod)
EnvironmentName
e.g. "OTA", "Prod", "Dev"
Subnet
VPC subnet ID for instances
SSODomain
AWS SSO domain
Deploy per developer per environment
UserName
e.g. "erik", "john"
EnvironmentName
Existing environment
InstanceType
default: t3.large
Only needed if dedicated IAM credentials are desired
UserName
Same as instance
EnvironmentName
Existing environment
EmailAddress
For notifications (opt.)
Not needed if developers already have IAM/SSO permissions. ABAC policies match on username format.
cloudX supports multiple isolated environments within a single AWS account. Each environment has its own:
Perfect for separating development, testing, and production, or for isolated workspaces per team or project.
Start with cloudX today and experience modern remote development.