Skip to content

Who runs what

Nexus is not federated — there is exactly one Nexus instance per team, because Rocket.Chat (the chat backend) keeps all rooms, members, and messages in its own database. Developers do not each install Nexus full-stack; they only run the bridge.

Per-component breakdown

ComponentWho runs itWhere it runs
Rocket.Chat + Mongohost owner (once)Docker on the host
Postgres + Redis + mem0-apihost owner (once)Docker on the host
gateway / composer / runtimehost owner (once)Bun + tmux on the host
nexus-bridgeeach developertheir own laptop
CLI tool (claude / cursor / …)each developertheir own laptop ($PATH)

Each developer needs only Bun + a bridge config file + a token (issued by the host admin via make create-bridge). One command starts the bridge and the bot joins the room.

What "the host" can be

The host doesn't have to be a dedicated server. It just needs to be reachable by every developer's bridge on the gateway port:

Host optionHow bridges reach itGood for
One team member's laptop, same LANws://192.168.x.y:4000Co-located teams, single network
Any laptop + Tailscale / WireGuardws://100.x.y.z:4000 (mesh)2–10 remote devs
Homelab box, NAS, Raspberry Pi 5port forward + DDNSPermanent, low-cost
VPS (Hetzner / Contabo / DigitalOcean)wss://nexus.example.comLarger teams, prod-ish

Required outbound from each bridge: TCP to the gateway port (default 4000). Required for browsers: HTTP(S) to Rocket.Chat (default 3000). Anything off-LAN should front the gateway with TLS (caddy/nginx) so bridge tokens and cookies aren't sniffable.

Sizing guidance

Team sizeRecommended hostNotes
1 (solo)The same laptopbridge connects to localhost:4000
2–5One member's laptop / NASWorks fine; ensure the laptop stays awake
5–20Small VPS or homelab4 GB RAM is enough; 8 GB is comfortable
20+Dedicated VPS + TLS proxyTune Postgres connection pool; consider HA

Production readiness

The compose file ships dev defaults. Before any non-LAN deployment:

  1. Replace every secret in .env (openssl rand -hex 24).
  2. Front the gateway with TLS — bridge tokens + cookies are not encrypted in dev.
  3. Restrict Postgres / Redis to 127.0.0.1 or a private network.
  4. Enable backups for the Postgres volume.

See Production caveats for the full checklist.

Next

Released under the MIT License.