Using the CLI
Install the CLI
Install homebrew for macOS, then enable our homebrew tap and install the CLI:
Login to RunReveal
Once RunReveal has enabled your domain on the platform, login with:
The init command is used to both create an account or log in to an existing account. If it is your first time running init, you'll be prompted to enter the name of your workspace.
You can validate that you're logged in by running the following command
Note: Some commands like runreveal config account require runreveal init authorization to display results but the majority of commands can be ran with token authorization via environment variables.
Now you're ready to search your logs like a pro and manage your RunReveal account from the terminal!
Environment Variables
RunReveal CLI uses environment variables to set up specific aspects of the CLI configuration. These are helpful
if you don't want to run runreveal init, configure your active workspace, proxy the CLI through a local proxy, or
any number of use cases.
RUNREVEAL_TOKEN
The RUNREVEAL_TOKEN environment variable is used to authenticate your CLI session. It supplants the need to run runreveal init
and it will override the token stored in your keychain or the RunReveal configuration file.
RUNREVEAL_WORKSPACE
This environment variable is used to set the active workspace for your CLI session. It will override the workspace ID if one is set in the RunReveal configuration file or keychain. This ID must be a workspace ID, not the name of your workspace.
RUNREVEAL_PROFILE
Selects a named profile for the current invocation. This is equivalent to passing --profile <name> on the command
line and overrides the current profile stored in the keyring or ~/.runreveal. Useful in CI/CD environments that
manage credentials for multiple workspaces:
RUNREVEAL_BASEURL
For customers who have deployed the RunReveal API on-prem or in a private cloud, you can set the RUNREVEAL_BASEURL
environment variable to point the CLI to your RunReveal API instance.
RunReveal Cloud:
Custom/On-Prem Instances:
RUNREVEAL_APPBASEURL
For customers who have deployed RunReveal on-prem or in a private cloud, you can set the RUNREVEAL_APPBASEURL
environment variable to specify the URL that users are routed to when running runreveal init to log into their workspace.
RunReveal Cloud:
Custom/On-Prem Instances:
RUNREVEAL_DEBUG
The RUNREVEAL_DEBUG environment variable is used to enable debug logging for the CLI. This is helpful if you're
troubleshooting an issue or want to see more information about the requests and responses from the RunReveal API.
This will output the HTTP requests that are being sent to the RunReveal API.
RUNREVEAL_HEADER_FILE
This is a file that contains additional headers that should be sent along with all HTTP requests that the CLI makes. This is helpful if you're using a proxy or need to send additional headers for authentication.
The structure of the header file is a JSON object in this format:
Migrating to Multi-Profile Credentials
Starting with the version that introduced profile support, the CLI stores credentials in a new format that supports
multiple named profiles. The old single-credential format (a ~/.runreveal file or keychain entry with no
schemaVersion field) is no longer recognized.
If you use RUNREVEAL_TOKEN and RUNREVEAL_WORKSPACE — no action needed. These environment variables bypass
stored credentials entirely and are unaffected by this change.
If you use the interactive login (runreveal init) — re-run runreveal init once after upgrading. Your
browser-auth session is still valid on the server; the CLI will write a fresh credential file in the new format.
If you write ~/.runreveal manually in CI/CD — switch to RUNREVEAL_TOKEN and RUNREVEAL_WORKSPACE instead.
This is the recommended approach for automation because API tokens are long-lived and do not require a browser flow.
If you must use file-based credentials (for example, in an environment with no keychain and restricted env vars),
write the file in the new v1 format:
For on-prem or custom-domain deployments, replace the apiBaseURL and appBaseURL values with your instance URLs.
The old format fields Session and DefaultWorkspace are silently ignored after the upgrade.
RunReveal CLI Commands
Complete reference for all RunReveal CLI commands and subcommands.
- agents - Manage scheduled AI agents
- aimodels - Manage AI model configurations
- alerts - Alerts and triage helpers
- automations - Investigation automation configs
- completion - Generate shell autocompletion scripts
- config - Manage your configuration
- custom-views - Manage custom views
- detections - Create and manage security detections
- enrichments - Manage data enrichments
- filters - Manage data filters
- init - Get started with RunReveal
- investigations - Manage investigations
- lint - Lint detection files
- logs - Search your logs
- managed-detections - Subscribe to community and premium detections
- managed-enrichments - Subscribe to community enrichments
- mcp - Model Context Protocol server
- notification-history - View notification history
- notifications - Manage notification destinations
- openai - OpenAI-compatible workspace config
- openapi - Generate API specifications
- pipelines - Manage data pipelines
- query - Manage saved queries
- sources - Manage log sources
- threatintel - Threat intel provider settings
- tokens - Create workspace API tokens
- topics - Manage data topics
- transforms - Manage data transforms
- workspaces - Manage workspaces and users
agents
Create, list, update, silence, and delete scheduled AI agents in the workspace.
agents create
agents delete
agents get
agents list
agents silence
agents update
alerts
Send notifications and triage alerts via the API.
alerts send-notification
alerts triage
automations
Create and update investigation automation configurations.
automations create
automations update
custom-views
Manage custom views (list, get, create, update, delete, test).
custom-views create
custom-views delete
custom-views get
custom-views list
custom-views test
custom-views update
investigations
List, create, update, delete, and query investigations (including by alert or detection).
investigations alert-status
investigations bulk-close
investigations by-alert
investigations by-detection
investigations create
investigations delete
investigations get
investigations list
investigations update
openai
Update OpenAI-compatible workspace configuration (see also aimodels for provider setup).
openai config-update
threatintel
View and update workspace threat intelligence integrations (VirusTotal, CrowdStrike).
threatintel info
threatintel update-crowdstrike
threatintel update-virustotal
tokens
Create workspace API tokens.
tokens create
aimodels
Configure AI model integrations for RunReveal's AI-powered investigation features. Set up connections to OpenAI, Anthropic Claude, Google AI, and AWS Bedrock for enhanced log analysis and automated threat detection.
aimodels info
aimodels update-anthropic
aimodels update-bedrock
aimodels update-googleai
aimodels update-openai
aimodels update-provider-config
completion
Generate shell autocompletion scripts to enable tab completion for RunReveal CLI commands in bash, zsh, fish, and PowerShell environments.
completion bash
completion fish
completion powershell
completion zsh
config
Manage RunReveal CLI configuration settings, view account information, and handle subscription management. Access stored credentials and display configuration for external integrations like Grafana.
config account
config show
config subscribe
detections
Create, test, and manage custom security detection rules using SQL or Sigma formats. Supports detections-as-code workflows with Git-style synchronization, local testing, and export capabilities.
detections create-wizard
detections export
detections list
detections run
detections set-enabled
detections sync
detections test
enrichments
Add contextual data to logs through enrichment rules. Enhance raw log data with IP geolocation, threat intelligence, asset information, and custom business context for improved analysis and alerting.
enrichments create
enrichments delete
enrichments get
enrichments list
enrichments set-enabled
enrichments update
filters
Manage data filtering rules to control which logs are ingested and processed. Configure filters to reduce noise, manage costs, and focus on security-relevant events.
filters list
init
Initialize RunReveal CLI authentication and workspace configuration. Sets up credentials, selects default workspace, and configures API endpoints for first-time users.
lint
Validate and format detection rule files for syntax errors and best practices. Supports both Sigma rule validation and SQL query formatting using ClickHouse standards.
lint sigma
lint sql
logs
Execute log searches and run saved queries against your security data. Supports multiple output formats (table, JSON, CSV) and parameterized queries for flexible analysis.
managed-detections
Subscribe to community-maintained and premium detection rules from RunReveal's detection library. Access curated threat detection content without writing custom rules.
managed-detections clone
managed-detections get
managed-detections get-subscription
managed-detections list
managed-detections list-subscriptions
managed-detections subscribe
managed-detections subscription-set-enabled
managed-detections unsubscribe
managed-detections update-subscription
managed-enrichments
Subscribe to community-maintained data enrichment rules. Access pre-built enrichment logic for common security use cases like IP reputation, geolocation, and threat intelligence.
managed-enrichments get
managed-enrichments list
managed-enrichments list-subscriptions
managed-enrichments subscribe
managed-enrichments unsubscribe
mcp
Start the Model Context Protocol server to integrate RunReveal with AI tools and editors. Enables AI assistants like Claude, ChatGPT, and Cursor to query your security data and assist with investigations.
notification-history
View the history of sent notifications and alerts. Track notification delivery status, troubleshoot notification issues, and audit alert communications.
notification-history list
notification-history list-by-alert
notifications
Configure notification destinations for security alerts and detection matches. Set up integrations with Slack, email, webhooks, and other communication channels for incident response.
notifications del
notifications email
notifications list
notifications slack
notifications test
notifications webhook
openapi
Generate OpenAPI 3.0 specifications for the RunReveal API. Use the generated specification to build custom integrations, validate API requests, or import into API documentation tools.
pipelines
Monitor and manage data ingestion pipelines. View pipeline status, throughput metrics, and troubleshoot data flow issues from sources to destinations.
pipelines list
query
Execute saved queries and manage query scheduling. Run parameterized queries, view scheduled query results, and manage automated query execution for regular reporting.
query run
query schedule
sources
View and manage log data sources connected to RunReveal. Monitor source health, connection status, and data ingestion from various platforms and services.
sources list
topics
Manage data organization topics for log categorization and routing. Configure how different types of security events are classified and processed within RunReveal.
topics list
transforms
Configure data transformation rules to normalize and structure incoming log data. Apply parsing, field mapping, and data standardization before storage in the data lake.
transforms list
workspaces
Manage RunReveal workspaces, user access, and workspace switching. Control team access, invite users, manage roles, and switch between different organizational contexts.