Does it matter that we recover something congruent to $x$ rather than equal to it?
It would matter, but to avoid that issue we insure that $0\le x<N$.
RSA textbook encryption has plaintext and ciphertext in the set $\{0,1,\ldots,N-1\}$. Encryption of $x\in\{0,1,\ldots,N-1\}$ goes $c:=x^e\bmod n$, with by definition of the$\bmod$ operator $c\in\{0,1,\ldots,N-1\}$. Decryption can go $m:=c^d\bmod n$ which also is in that set, and $m=x$ for proper choice of $N$, $e$, $d$.
Said RSA textbook encryption has numerous flaws. From a security standpoint, among other serious issues, a guess of $x$ can easily be verified from $c$ and the public key $(N,e)$. From a practical standpoint, large messages do not fit the message space, as rightly pointed in the question.
The security issues (except for implementation-related ones perhaps) can be fixed with proper random padding e.g. RSAES-OAEP, but that further reduces the maximum size of message: with 2048-bit $N$ (enough for 255 bytes and 7 bits in RSA textbook encryption) and SHA-256, RSAES-OAEP limits the message to 190 bytes.
The message size issue is dealt with by restricting to small messages. These often consist of symmetric key(s) that then are used to encipher the bulk of the message with a symmetric algorithm. That's hybrid encryption. For such key establishment, we can use RSA-KEM, which is simpler than using RSAES-OAEP to encipher a random key.