Declarative, GitOps-ready control for your entire cluster lifecycle. Install, configure, monitor, and scale infrastructure components using a single CustomResource. No complex manifests, no manual sync scripts.
A closed-loop control plane that continuously reconciles your desired state with reality.
Apply a CloudNexus CRD to your cluster. Specify version, topology, networking, and security policies declaratively.
The controller watches your CR, validates specs, and triggers provisioning across CloudNexus infrastructure endpoints.
Resources are instantiated, secrets are rotated, ingress is provisioned, and monitoring hooks are attached automatically.
Continuous drift detection. If external changes occur, the operator restores the desired state or alerts your GitOps pipeline.
Enterprise-grade control plane features built for platform engineering teams.
First-class K8s objects for databases, clusters, load balancers, and storage. Native validation and schema enforcement.
v1beta1 / v1 GADeploy identical infrastructure across dev, staging, and prod clusters with a single source of truth.
Hub-Spoke TopologyNative support for ArgoCD and Flux. Webhook triggers, PR previews, and automated sync loops.
ArgoCD / Flux v2Automatic rotation, Vault/SealedSecrets integration, and least-privilege RBAC templates for operator service accounts.
FIPS 140-2 ReadyExport metrics to Prometheus, traces to OpenTelemetry, and structured logs to your SIEM out of the box.
OTel CompatibleVersion-pinned deployments with automated blue/green migration paths and instant rollback on health check failure.
Canary SupportProvision a highly available PostgreSQL cluster with backup policies, networking rules, and monitoring in under 40 lines. The operator handles provisioning, credential rotation, and lifecycle management.
# cloudnexus-db.yaml
apiVersion: cloudnexus.io/v1
kind: ManagedPostgreSQL
metadata:
name: prod-analytics-db
namespace: data-platform
spec:
version: "16.1"
highAvailability: true
replicas: 3
storage:
size: "500Gi"
class: "cn-nvme-ssd"
network:
vpcId: "vpc-0a1b2c3d"
privateSubnets: ["subnet-dev-1", "subnet-dev-2"]
allowedCIDRs: ["10.0.0.0/16"]
backup:
retentionDays: 14
crossRegion: true
region: "eu-west-1"
monitoring:
prometheus: true
otelTracing: true
Open-source core with enterprise support and advanced control plane features.
Everything your engineering team needs to evaluate and deploy the operator.
The operator requires Kubernetes 1.25 or newer. We maintain compatibility with the latest three minor versions of upstream K8s, as well as OpenShift 4.12+ and Rancher RKE2/K3s distributions.
No. The operator runs entirely within your cluster. It communicates with CloudNexus infrastructure via outbound HTTPS to regional API endpoints. Air-gapped deployments are available with on-prem license servers.
Credentials are never stored in the CR spec. The operator generates and rotates secrets automatically, storing them in K8s Secrets. Integration with HashiCorp Vault, AWS Secrets Manager, and SealedSecrets is natively supported.
Yes. The operator is designed to be GitOps-first. Apply manifests via ArgoCD Application or Flux Kustomization. The controller respects the sync loop and will not overwrite externally managed resources.