A lot of organizations deploy Nx Cloud to Kubernetes.
This repo contains:
If you’re deploying on EKS, check out our AWS Guide. Otherwise, continue reading below.
Skip if you already have a hosted Mongo instance, such as Atlas or CosmosDB): Install the Mongo Community operator
Create a secret by running kubectl apply -f examples/secret.yml
> helm repo add nx-cloud https://nrwl.github.io/nx-cloud-helm
> helm install nx-cloud nx-cloud/nx-cloud --values=overrides.yml
examples/overrides
contains the min overrides files. You need to provision:
nxCloudAppURL
which is the url used to access ingress from CI and dev machines (
e.g., https://nx-cloud.myorg.com
).secret/name
the name of the secret you created in Step 3.secret/nxCloudMongoServerEndpoint
, the name of the key from the secret.
5secret/adminPassword
, the name of the key from the secret.If you only applied the secret from Step 3, the only thing you will need to change is nxCloudAppURL
.
The installation will create the following:
You can configure Ingress. For instance, the following will see the ingress class to ‘gce’, the global static ip name to ‘nx-cloud-ip’, and will set a global Google managed certificate.
global:
imageTag: 'latest'
nxCloudAppURL: 'https://nx-cloud.myorg.com'
ingress:
class: 'gce'
globalStaticIpName: 'nx-cloud-ip'
managedCertificates: 'cloud-cert'
secret:
name: 'cloud'
nxCloudMongoServerEndpoint: 'NX_CLOUD_MONGO_SERVER_ENDPOINT'
adminPassword: 'ADMIN_PASSWORD'
This configuration will look different for you. You will have a different global static ip and your cert name will also be different. If you are interested in creating the two using GKE, check out the following links:
If you aren’t using GKE, ingress.class
will also be different. For example, see our example config for AWS or check out the AWS Load Balancer set-up section here for AWS set-up instructions.
If you need to have a detailed Ingress configuration, you can tell the package to skip defining ingress:
image:
tag: 'latest'
nxCloudAppURL: 'https://nx-cloud.myorg.com'
ingress:
skip: true
If you use AWS or Azure, you can configure Nx Cloud to store cached artifacts on S3 or Azure Blob. In this case, you won’t need the PVC or the file-server container. S3 and Azure Blob also tend to be faster.
For S3 buckets, see the AWS Guide
For Azure:
global:
imageTag: 'latest'
nxCloudAppURL: 'https://nx-cloud.myorg.com'
azure:
enabled: true
container: 'nx-cloud'
secret:
name: 'cloudsecret'
nxCloudMongoServerEndpoint: 'NX_CLOUD_MONGO_SERVER_ENDPOINT'
adminPassword: 'ADMIN_PASSWORD'
azureConnectionString: 'AZURE_CONNECTION_STRING'
Note that the secret for setting up Azure must contain AZURE_CONNECTION_STRING
.
To use GitHub for user authentication, you can use the following configuration:
global:
imageTag: 'latest'
nxCloudAppURL: 'https://nx-cloud.myorg.com'
github:
auth:
enabled: true
secret:
name: 'cloudsecret'
nxCloudMongoServerEndpoint: 'NX_CLOUD_MONGO_SERVER_ENDPOINT'
githubAuthClientId: 'GITHUB_AUTH_CLIENT_ID'
githubAuthClientSecret: 'GITHUB_AUTH_CLIENT_SECRET'
Note that the secret must contain GITHUB_AUTH_CLIENT_ID
and GITHUB_AUTH_CLIENT_SECRET
.
Read here on how to get those values.
To enable the GitHub PR integration, you can use the following configuration:
global:
imageTag: 'latest'
nxCloudAppURL: 'https://nx-cloud.myorg.com'
github:
pr:
enabled: true
# apiUrl: '' uncomment when using github enterprise
secret:
name: 'cloudsecret'
nxCloudMongoServerEndpoint: 'NX_CLOUD_MONGO_SERVER_ENDPOINT'
githubWebhookSecret: 'GITHUB_WEBHOOK_SECRET'
githubAuthToken: 'GITHUB_AUTH_TOKEN'
Note that the secret must contain GITHUB_WEBHOOK_SECRET
and GITHUB_AUTH_TOKEN
.
Read here on how to get those values.
Please refer to this guide.
We recommend setting up EKS Autoscaling or GKE Autopilot for your cluster, so that you don’t pay for unecesarry resources, and your Nodes can scale up automatically, as needed. However, this is indication of the resources you might need (you can always start with less and scale up to this as needed):
Disk size:
You can find more information about Nx Cloud and running it on prem here.