server/priv/docs/en/guides/cache/self-host.md
The Tuist cache service can be self-hosted to provide a private binary cache for your team. This is most useful for organizations with large artifacts and frequent builds, where placing the cache closer to your CI infrastructure reduces latency and improves cache efficiency. By minimizing the distance between your build agents and the cache, you ensure that network overhead doesn't negate the speed benefits of caching.
[!NOTE] Self-hosting cache nodes requires an Enterprise plan.
You can connect self-hosted cache nodes to either the hosted Tuist server (
https://tuist.dev) or a self-hosted Tuist server. Self-hosting the Tuist server itself requires a separate server license. See the <.localized_link href="/guides/server/self-host/install">server self-hosting guide</.localized_link>.
The cache service is distributed as a Docker image at ghcr.io/tuist/cache. We provide reference configuration files in the cache directory.
[!TIP] We provide a Docker Compose setup because it's a convenient baseline for evaluation and small deployments. You can use it as a reference and adapt it to your preferred deployment model (Kubernetes, raw Docker, etc.).
curl -O https://raw.githubusercontent.com/tuist/tuist/main/cache/docker-compose.yml
mkdir -p docker
curl -o docker/nginx.conf https://raw.githubusercontent.com/tuist/tuist/main/cache/docker/nginx.conf
Create a .env file with your configuration.
[!TIP] The service is built with Elixir/Phoenix, so some variables use the
PHX_prefix. You can treat these as standard service configuration.
# Secret key used to sign and encrypt data. Minimum 64 characters.
# Generate with: openssl rand -base64 64
SECRET_KEY_BASE=YOUR_SECRET_KEY_BASE
# Public hostname or IP address where your cache service will be reachable.
PUBLIC_HOST=cache.example.com
# URL of the Tuist server used for authentication (REQUIRED).
# - Hosted: https://tuist.dev
# - Self-hosted: https://your-tuist-server.example.com
SERVER_URL=https://tuist.dev
# S3 Storage configuration
S3_BUCKET=your-cache-bucket
S3_HOST=s3.us-east-1.amazonaws.com
S3_REGION=us-east-1
# Optional: dedicated Xcode cache bucket.
# Useful when you want separate retention policies, storage classes,
# or cost tracking for Xcode cache vs. module/Gradle cache artifacts.
# S3_XCODE_CACHE_BUCKET=your-xcode-cache-bucket
# S3 authentication (Option 1: static credentials)
S3_ACCESS_KEY_ID=your-access-key
S3_SECRET_ACCESS_KEY=your-secret-key
# S3 authentication (Option 2: IAM role / IRSA)
# Omit S3_ACCESS_KEY_ID and S3_SECRET_ACCESS_KEY, and set
# AWS_WEB_IDENTITY_TOKEN_FILE and AWS_ROLE_ARN instead.
# These are typically injected automatically by EKS or similar platforms.
# CAS storage (required for non-compose deployments)
STORAGE_DIR=/storage
# Optional dedicated KV SQLite database path.
# Defaults to /data/key_value.sqlite.
KEY_VALUE_DATABASE_PATH=/data/key_value.sqlite
| Variable | Required | Default | Description |
|---|---|---|---|
SECRET_KEY_BASE | Yes | Secret key used to sign and encrypt data (minimum 64 characters). | |
PUBLIC_HOST | Yes | Public hostname or IP address of your cache service. Used to generate absolute URLs. | |
SERVER_URL | No | https://tuist.dev | URL of your Tuist server for authentication. |
STORAGE_DIR | Yes | Directory where CAS artifacts are stored on disk. The provided Docker Compose setup uses /storage. | |
KEY_VALUE_DATABASE_PATH | No | /data/key_value.sqlite | Path to the dedicated SQLite database used by the key-value store. |
POOL_SIZE | No | 2 | Connection pool size for the primary metadata SQLite database. |
KEY_VALUE_POOL_SIZE | No | POOL_SIZE | Connection pool size for the dedicated key-value SQLite database. |
S3_BUCKET | Yes | S3 bucket for module and Gradle cache artifacts. Also used for Xcode cache artifacts when S3_XCODE_CACHE_BUCKET is unset. | |
S3_XCODE_CACHE_BUCKET | No | S3_BUCKET | Optional dedicated bucket for Xcode cache artifacts. When set, Xcode cache reads and writes use this bucket directly. Useful when you want separate retention policies, storage classes, or cost tracking for Xcode cache artifacts. |
S3_HOST | Yes | S3 endpoint hostname (e.g. s3.us-east-1.amazonaws.com). | |
S3_REGION | Yes | S3 region. Also accepted as AWS_REGION. | |
S3_ACCESS_KEY_ID | Conditional | S3 access key. Required when using static credentials. Also accepted as AWS_ACCESS_KEY_ID. See S3 authentication. | |
S3_SECRET_ACCESS_KEY | Conditional | S3 secret key. Required when using static credentials. Also accepted as AWS_SECRET_ACCESS_KEY. See S3 authentication. | |
S3_ENDPOINT | No | Full S3 endpoint URL. When set, overrides S3_HOST with the parsed host and scheme. Useful for S3-compatible providers. | |
AWS_WEB_IDENTITY_TOKEN_FILE | No | Path to a web identity token file for IAM role authentication. See S3 authentication. | |
AWS_ROLE_ARN | No | IAM role ARN to assume when using web identity token authentication. | |
DISK_HIGH_WATERMARK_PERCENT | No | 85 | Disk usage percentage that triggers LRU eviction. |
DISK_TARGET_PERCENT | No | 70 | Target disk usage after eviction. |
KEY_VALUE_MAX_DB_SIZE_BYTES | No | 26843545600 | Maximum size of the dedicated key-value SQLite database before size-based KV eviction starts. |
KEY_VALUE_EVICTION_MIN_RETENTION_DAYS | No | 1 | Minimum age a key-value entry must reach before size-based KV eviction can remove it. |
KEY_VALUE_EVICTION_MAX_DURATION_MS | No | 300000 | Maximum runtime for a single KV eviction pass. |
KEY_VALUE_EVICTION_HYSTERESIS_RELEASE_BYTES | No | 24696061952 | Target size after KV eviction finishes, providing hysteresis so the worker does not thrash near the limit. |
KEY_VALUE_READ_BUSY_TIMEOUT_MS | No | 2000 | SQLite busy-timeout (in milliseconds) for KV read-through requests. If the database is locked longer than this, the read is treated as a cache miss and the value is fetched from S3. |
KEY_VALUE_MAINTENANCE_BUSY_TIMEOUT_MS | No | 50 | SQLite busy-timeout (in milliseconds) for background maintenance operations (PRAGMA queries, incremental vacuum). A low value prevents maintenance from blocking read traffic. |
PHX_SOCKET_PATH | No | /run/cache/cache.sock | Path where the service creates its Unix socket (when enabled). |
PHX_SOCKET_LINK | No | /run/cache/current.sock | Symlink path that Nginx uses to connect to the service. |
OTEL_EXPORTER_OTLP_ENDPOINT | No | gRPC endpoint of an OpenTelemetry Collector for distributed tracing. | |
LOKI_URL | No | Base URL of a Loki-compatible endpoint for log forwarding. | |
DEPLOY_ENV | No | production | Environment label used in traces and log labels (e.g. production, staging). |
The cache service supports multiple methods for authenticating with S3. The method is determined automatically based on which environment variables are set.
Set S3_ACCESS_KEY_ID and S3_SECRET_ACCESS_KEY (or AWS_ACCESS_KEY_ID and AWS_SECRET_ACCESS_KEY). This is the simplest method and works with any S3-compatible provider.
S3_ACCESS_KEY_ID=AKIAIOSFODNN7EXAMPLE
S3_SECRET_ACCESS_KEY=wJalrXUtnFEMI/K7MDENG/bPxRfiCYEXAMPLEKEY
If you run the cache service on Kubernetes with EKS, you can authenticate using IAM Roles for Service Accounts (IRSA) or EKS Pod Identity. Omit S3_ACCESS_KEY_ID and S3_SECRET_ACCESS_KEY, and ensure the following environment variables are available to the container:
AWS_WEB_IDENTITY_TOKEN_FILE — path to the projected service account token (injected by EKS)AWS_ROLE_ARN — the IAM role to assumeEKS injects these variables automatically when a service account is annotated with the IAM role.
When neither static credentials nor a web identity token file are present, the service falls back to the default AWS credential chain. This means it can authenticate using an EC2 instance profile or ECS task role without any additional configuration — just ensure the instance or task has an IAM role with S3 access.
docker compose up -d
curl http://localhost/up
After deploying the cache service, register it with your Tuist server:
Hosted Tuist server (https://tuist.dev):
https://cache.example.com).Self-hosted Tuist server:
TUIST_CACHE_ENDPOINTS to a comma-separated list of cache node URLs (for example, https://cache-1.example.com,https://cache-2.example.com).graph TD
A[Deploy cache service] --> B[Register cache endpoint]
B --> C[Tuist CLI uses your endpoint]
Once configured, the Tuist CLI will use your self-hosted cache.
The Docker Compose configuration uses three volumes:
| Volume | Purpose |
|---|---|
storage | Binary artifact storage |
sqlite_data | SQLite metadata storage. By default this holds both /data/repo.sqlite (artifact metadata, orphan cleanup state, Oban) and /data/key_value.sqlite (KV metadata). |
cache_socket | Unix socket for Nginx-service communication |
The cache service runs several background maintenance loops that keep disk and database usage within bounds. You can tune their behavior through the environment variables listed in the configuration table above.
DISK_HIGH_WATERMARK_PERCENT (default 85%), the service removes the least-recently-used local artifacts until usage drops to DISK_TARGET_PERCENT (default 70%). Evicted artifacts remain in S3.KEY_VALUE_MAX_DB_SIZE_BYTES (default 25 GiB), the service removes entries older than KEY_VALUE_EVICTION_MIN_RETENTION_DAYS until the database shrinks to KEY_VALUE_EVICTION_HYSTERESIS_RELEASE_BYTES. Each pass is capped at KEY_VALUE_EVICTION_MAX_DURATION_MS.cache_artifacts row and removes them. This depends on the primary metadata database, not the KV database.For a detailed explanation of how each process works internally, see the <.localized_link href="/guides/cache/architecture">architecture guide</.localized_link>.
GET /up — Returns 200 when healthy, 503 otherwiseGET /metrics — Prometheus metricsThe cache service exposes Prometheus-compatible metrics at /metrics.
Database pool metrics exposed by the cache service include:
cache_repo_pool_checkout_queue_lengthcache_repo_pool_ready_conn_countcache_repo_pool_sizecache_repo_pool_db_connection_connected_totalcache_repo_pool_db_connection_disconnected_totalThe pool last_value metrics are labeled with:
repo — cache or key_valuedatabase — sqliteIf you use Grafana, a reference dashboard is published at infra/grafana-dashboards/cache-service.json. The file is wrapped in the Grafana dashboard.grafana.app/v1 resource format so it can be provisioned via Git Sync; to import it manually, download it and extract the .spec field (for example, jq '.spec' cache-service.json > dashboard.json) before using Grafana's Import UI.
Set OTEL_EXPORTER_OTLP_ENDPOINT to enable OpenTelemetry traces. The cache service instruments Bandit (HTTP server), Phoenix (request lifecycle), Ecto (database queries), Finch (outgoing HTTP), and Broadway (message processing). Traces are exported via gRPC to the configured collector.
Set LOKI_URL to forward application logs to a Loki-compatible endpoint. Logs are pushed via the Loki HTTP API with app=tuist-cache, env, and level labels.
docker compose pull
docker compose up -d
The service runs database migrations automatically on startup. After upgrading, expect a brief warm-up period while the KV cache repopulates from new traffic.
If you expect caching but are seeing consistent cache misses (for example, the CLI is repeatedly uploading the same artifacts, or downloads never happen), follow these steps:
tuist auth login.docker compose logs cache.repo.sqlite is the primary metadata database. It stores artifact metadata, orphan cleanup state, and background job data. It is required for normal operation.
If you upgraded from an older version that also stored KV metadata in repo.sqlite, KV data has moved to the dedicated key_value.sqlite file. The legacy KV tables (key_value_entries, key_value_entry_hashes) in repo.sqlite are no longer used and can be removed during a maintenance window to reclaim space.
If you see connection refused errors:
PHX_SOCKET_LINK points to the socket path configured in nginx.conf (default: /run/cache/current.sock)PHX_SOCKET_PATH and PHX_SOCKET_LINK are both set correctly in docker-compose.ymlcache_socket volume is mounted in both containers