- Import SSH remotes straight from `~/.ssh/config` via new dropdown picker 🚀 - Run remotes using SSH Host patterns, not raw IPs anymore 🧭 - Username and private key become optional when SSH config is enabled 🔑 - SSH commands now omit `-i` unless you explicitly override keys 🎛️ - Default port 22 no longer forced; only send `-p` when overriding 🔌 - New SSH config parser supports HostName, User, Port, IdentityFile, ProxyJump 🧩 - Wildcard-only hosts (`Host *`, `dev-*`) are ignored for cleaner imports 🧹 - UI shows “Using SSH Config” indicator with one-click clear toggle 🏷️ - Added IPC + preload API to fetch SSH config hosts safely 🛡️ - Expanded test coverage for SSH-config mode command-building and parsing ✅
7.5 KiB
title, description, icon
| title | description | icon |
|---|---|---|
| SSH Remote Execution | Run AI agents on remote hosts via SSH for access to powerful machines or specialized tools. | server |
Run AI agents on remote machines via SSH instead of locally. This enables you to leverage powerful remote servers, access tools not installed on your local machine, or work with projects that must run in specific environments.
Overview
SSH Remote Execution wraps agent commands in SSH, executing them on a configured remote host while streaming output back to Maestro. Your local Maestro instance remains the control center, but the AI agent runs remotely.
Use cases:
- Run agents on a powerful cloud VM with more CPU/RAM
- Access tools or SDKs installed only on specific servers
- Work with codebases that require particular OS or architecture
- Execute agents in secure/isolated environments
Configuring SSH Remotes
Adding a Remote Host
- Open Settings (
Cmd+,/Ctrl+,) - Scroll to the SSH Remote Hosts section under Remote Execution
- Click Add SSH Remote
- Configure the connection:
| Field | Description |
|---|---|
| Name | Display name for this remote (e.g., "Dev Server", "GPU Box") |
| Host | Hostname or IP address (or SSH config Host pattern when using SSH config) |
| Port | SSH port (default: 22) |
| Username | SSH username for authentication (optional when using SSH config) |
| Private Key Path | Path to your SSH private key (optional when using SSH config) |
| Remote Working Directory | Optional default working directory on the remote host |
| Environment Variables | Optional key-value pairs to set on the remote |
| Enabled | Toggle to temporarily disable without deleting |
- Click Test Connection to verify connectivity
- Click Save to store the configuration
Using SSH Config File
Maestro can import connection settings from your ~/.ssh/config file, making setup faster and more consistent with your existing SSH workflow.
Importing from SSH Config
When adding a new remote, Maestro automatically detects hosts defined in your SSH config:
- Click Add SSH Remote
- If SSH config hosts are detected, you'll see an Import from SSH Config dropdown
- Select a host to auto-fill settings from your config
- The form shows "Using SSH Config" indicator when importing
How It Works
When using SSH config mode:
- Host becomes the SSH config Host pattern (e.g.,
dev-serverinstead of192.168.1.100) - Username and Private Key Path become optional—SSH inherits them from your config
- Port defaults to your config's value (only sent to SSH if overriding a non-default port)
- You can still override any field to customize the connection
Example ~/.ssh/config:
Host dev-server
HostName 192.168.1.100
User developer
IdentityFile ~/.ssh/dev_key
Port 2222
Host gpu-box
HostName gpu.example.com
User admin
IdentityFile ~/.ssh/gpu_key
ProxyJump bastion
With the above config, you can:
- Select "dev-server" from the dropdown
- Leave username/key fields empty (inherited from config)
- Optionally override specific settings
- Benefit from advanced features like
ProxyJumpfor bastion hosts
Field Labels
When using SSH config mode, field labels indicate which values are optional:
- Username (optional override) — leave empty to use SSH config's
User - Private Key Path (optional override) — leave empty to use SSH config's
IdentityFile
Clearing SSH Config Mode
To switch back to manual configuration:
- Click the × button next to "Using SSH Config" indicator
- Fill in all required fields manually
Connection Testing
Before saving, you can test your SSH configuration:
- Basic test: Verifies SSH connectivity and authentication
- Agent test: Checks if the AI agent command is available on the remote host
A successful test shows the remote hostname. Failed tests display specific error messages to help diagnose issues.
Setting a Global Default
Click the checkmark icon next to any remote to set it as the global default. When set:
- All agents use this remote by default
- Individual agents can override this setting
- The default badge appears next to the remote name
Click the checkmark again to clear the default and return to local execution.
Per-Agent Configuration
Each agent can have its own SSH remote setting, overriding the global default.
Configuring an Agent
- Open the agent's configuration panel (gear icon in session header, or via Settings → Agents)
- Find the SSH Remote dropdown
- Select an option:
| Option | Behavior |
|---|---|
| Use Global Default | Follows the global setting (shows which remote if one is set) |
| Force Local Execution | Always runs locally, ignoring any global default |
| [Specific Remote] | Always uses this remote, regardless of global setting |
Resolution Order
When spawning an agent, Maestro resolves which SSH remote to use:
- Per-agent explicit remote → Uses that specific remote
- Per-agent "Force Local" → Runs locally (ignores global)
- Per-agent "Use Global Default" → Falls through to global setting
- Global default set → Uses the global default remote
- No global default → Runs locally
Status Visibility
When a session is running via SSH remote:
- The session displays the remote host name in the status area
- Connection state reflects SSH connectivity
- Errors are detected and displayed with SSH-specific context
Troubleshooting
Authentication Errors
| Error | Solution |
|---|---|
| "Permission denied (publickey)" | Ensure your SSH key is added to the remote's ~/.ssh/authorized_keys |
| "Host key verification failed" | Add the host to known_hosts: ssh-keyscan hostname >> ~/.ssh/known_hosts |
| "Enter passphrase for key" | Use a key without a passphrase, or add it to ssh-agent: ssh-add ~/.ssh/your_key |
Connection Errors
| Error | Solution |
|---|---|
| "Connection refused" | Verify SSH server is running on the remote host |
| "Connection timed out" | Check network connectivity and firewall rules |
| "Could not resolve hostname" | Verify the hostname/IP is correct |
| "No route to host" | Check network path to the remote host |
Agent Errors
| Error | Solution |
|---|---|
| "Command not found" | Install the AI agent on the remote host |
| "Agent binary not found" | Ensure the agent is in the remote's PATH |
Tips
- Import from SSH config: Use the dropdown when adding remotes to import from
~/.ssh/config—saves time and keeps configuration consistent - Bastion hosts: Use
ProxyJumpin your SSH config for multi-hop connections; Maestro inherits this automatically - Key management: Use
ssh-agentto avoid passphrase prompts - Keep-alive: Configure
ServerAliveIntervalin SSH config for long sessions - Test manually first: Verify
ssh host 'claude --version'works before configuring in Maestro
Security Considerations
- SSH keys should have appropriate permissions (
chmod 600) - Use dedicated keys for Maestro if desired
- Remote working directories should have appropriate access controls
- Environment variables may contain sensitive data; they're passed via SSH command line
Limitations
- PTY (pseudo-terminal) features are not available over SSH
- Some interactive agent features may behave differently
- Network latency affects perceived responsiveness
- The remote host must have the agent CLI installed and configured