Our main use case for Sonatype Nexus Repository is managing artifacts and having them in a central repository that is accessible for all our software engineers on the team. In our day-to-day activities, we use Sonatype Nexus Repository for managing artifacts, and it gives us a centralized repository instead of pulling from public Maven NPM registries every time. Our organization has internal libraries hosted on Sonatype, so software engineers pull these libraries from Sonatype Nexus Repository, which solves the problem of engineers pulling libraries from Maven almost all the time.
External reviews
External reviews are not included in the AWS star rating for the product.
Centralized artifacts have unified our builds and now streamline onboarding and role-based access
What is our primary use case?
What is most valuable?
One of the features I love about Sonatype Nexus Repository is storing the company's internal artifacts along with version management and release/snapshot separation, where we have separation between release files and snapshot files. There is access control for internal and external artifacts, and combining multiple repositories into one logical endpoint is something I appreciate about Sonatype, along with how Sonatype Nexus Repository handles large artifact stores and disk space optimization.
Role-based access in Sonatype Nexus Repository allows us to control who can read, write, or deploy artifacts. Developers can read artifacts and deploy snapshots, while CI/CD systems have specific credentials for automated deploys, and administrators have full access for maintenance. Contractors and interns have limited read-only access if needed, which helps prevent unauthorized changes, as only authorized people can push production releases. Sonatype Nexus Repository logs who deployed what and when, which is crucial for compliance.
In our team, the development team can push snapshots and pull any artifact for development. The release manager can promote snapshots to releases, and the CI/CD pipeline setup has a special service account with limited permissions to only pull artifacts. New interns have read-only access until they are fully onboarded, and external partners can only access specific repositories that we share.
Before using Sonatype Nexus Repository, developers waited for Maven Central downloads on every build, leading to inconsistent build times depending on internet speed. Builds failed if Maven Central was down or slow, and working offline was almost impossible. When we started using Sonatype Nexus Repository, build times improved by 30 to 40 percent through artifact caching with consistent, predictable build performance. Offline builds became very easy for us because we have cached artifacts locally, which increased team productivity immediately, saving approximately 50 to 150 minutes of developer time daily. This recovery of hundreds of hours allows developers to focus on actual development work instead of waiting for downloads.
Before Sonatype Nexus Repository, different developers had different versions of the same library, leading to the "it works on my machine" syndrome that caused frustrated troubleshooting. With Sonatype Nexus Repository, we now have a single source of truth for all artifacts, ensuring all developers use identical versions and enabling reproducible builds across all machines. This speeds up debugging and reduces versioning inconsistencies, allowing the team to trust that if it works for one person, it works for everyone.
Onboarding also improved significantly, as new developers previously spent hours configuring Maven settings and understanding multiple repository URLs, leading to mistakes in setup and blocked starts. After implementing Sonatype Nexus Repository, new team members are productive in minutes due to a single repository URL to configure in the settings.xml files and documented, foolproof setup. This frees senior developers for actual mentoring and reduces ramp-up time for contractors and interns.
Sonatype Nexus Repository also provided cost optimization since it eliminated the need for local repository caches on each developer's machine, centralizing storage and reducing overall storage by 70 percent, resulting in lower bandwidth usage through shared caching.
What needs improvement?
In terms of improvement for Sonatype Nexus Repository, the user interface and user experience need attention, as navigation can be confusing for someone who is just starting out. I suggest implementing a search command palette similar to VS Code's, perhaps with functionality similar to Ctrl+K, or modernizing the UI with contemporary design patterns. Introducing dark mode options would also be beneficial.
Regarding performance, bulk operations can be slow, and deleting a thousand or more old artifacts takes a very long time, making the system sluggish during cleanup. There is no way to perform background deletion and cleanup policies cannot be optimally scheduled. I suggest the team implement asynchronous bulk delete operations that can happen behind the scenes, improving background job processing. This ensures cleanup operations do not block normal artifact access, as well as providing granular scheduling for maintenance tasks and progress tracking for long operations.
For how long have I used the solution?
I have been using Sonatype Nexus Repository for almost two to three years.
How was the initial setup?
On my team, we actually have Sonatype Nexus Repository installed on all engineers' computers locally, and one of the issues we have with that is the initial setup complexity, leading to disk space management issues whenever we onboard a new engineer into the team. Because of these problems, we have to look for a way to solve this problem, which is actually moving from local to remote server deployment, enhancing team collaboration and shared repository, eliminating redundancy with no duplicates on multiple machines, simplifying dependency management across the team, and having a single source of truth for all of our artifacts, resulting in consistent builds across members, reduced bandwidth, easier onboarding of new team members, and better security.
I recall a day when a developer was onboarded, and I had to help with setup. The new engineer needed to configure Maven, open the M2 settings, the M2 folder, the settings.xml files, add repository URLs, authentication credentials, and all of that. In the afternoon when he tried his first build, it failed due to artifact not found, leading him to run back to me in frustration. Eventually, we discovered he was using the wrong repository order in the settings.xml, making me spend another 30 minutes debugging. At the end of the day, after finally getting this new developer's build working, he expressed that the setup was confusing with multiple URLs to remember, making him feel an unease about whether he was doing something wrong, causing frustration.
After improving the onboarding process by moving to Sonatype Nexus Repository, the setup became much smoother and this new developer stated that setup was super simple, requiring just one URL and one command to get everything working, making him productive within the first hour, which was way better than expected.
What other advice do I have?
For others looking into using Sonatype Nexus Repository, I would advise considering how it can streamline their development processes.
Stores artifacts reliably with secure access and detailed file auditing
What is our primary use case?
I'm using the Sonatype Nexus Repository to store the artifact files, specifically the build files from my company. The project builds into many binary files and images, so I store all of that on Sonatype Nexus Repository. We have retention days for all artifacts. Whenever the server needs to get the binary file, it requests it from the Sonatype Nexus Repository and takes the correct file for deployment. Instead of ECR, AWS has something called ECR and some other services to store binary files, but the Sonatype Nexus Repository open-source is sufficient without any cost.
The Sonatype Nexus Repository is running on AWS Cloud, on EKS as a service. The current functions fit our corporation, and we're presently using it free without the need for a license. However, we plan to buy a license in the future.
What is most valuable?
Hosting, proxying, and grouping repositories in Sonatype Nexus Repository have no impact on development process time and are perceived as very fast. It simplifies version management by storing a consistent library version, avoiding conflicts.
User policies and granular access control, though not integrated with LDAP or Azure Entra, work well for specific action configurations.
What needs improvement?
We installed the Sonatype Nexus Repository using an open-source Helm chart but need to test it for credential-less AWS integration. We may seek support in the future.
One of the challenging aspects of the Sonatype Nexus Repository is understanding its procedures, as job scheduling is not fully explained in documentation and logs are cumbersome and unhelpful for issues such as troubleshooting push file errors.
For how long have I used the solution?
What was my experience with deployment of the solution?
What do I think about the stability of the solution?
What do I think about the scalability of the solution?
Which solution did I use previously and why did I switch?
How was the initial setup?
Which other solutions did I evaluate?
What other advice do I have?
Our team pushes libraries to the Sonatype Nexus Repository to store them with fixed versions. Before using Sonatype Nexus Repository, we pulled from external sources, which sometimes caused issues with library versions changing and breaking code.
One of the notable features of Sonatype Nexus Repository is the detailed file information provided for stored files, including SHA and checksums.
I rate the Sonatype Nexus Repository 9.5 out of 10.
Which deployment model are you using for this solution?
If public cloud, private cloud, or hybrid cloud, which cloud provider do you use?
Easy to use repository for sharing artifacts within team
Perfect solution for artifact management
A stable solution that provides a central platform for storing build artifacts, saving us significant maintenance and hardware costs.
What is our primary use case?
Our primary tool is Sonatype Nexus Repository Manager. We use it for NPM, Maven, and Docker repositories. Additionally, we utilize Nexus Firewall for repository governance. Looking ahead, I'm considering implementing Nexus Repository Manager 3 as an alternative. This would help us manage packages from Nexus IQ Server and support various package formats such as NPM, Maven, and Docker.
We rely on Sonatype Nexus Repository Manager as our main tool, employing it for NPM, Maven, and Docker repositories. In addition, Nexus Firewall plays a crucial role in our repository governance. As we plan for the future, I'm exploring the option of incorporating Nexus Repository Manager 3. This move would enhance our ability to manage packages from Nexus IQ Server and cater to different package formats like NPM, Maven, and Docker.
What is most valuable?
Primarily, the extensive support for a wide range of packages is a crucial factor. The effectiveness of new-age package managers is often determined by the breadth of packages they can handle. In this regard, Nexus Repository Manager 3 stands out for its comprehensive coverage, accommodating a vast array of packages widely utilized across the globe. This inclusivity enables easy access to a diverse range of packages, making it a pivotal aspect of its functionality.
What needs improvement?
Particularly concerning OSF-type licenses, while they support a multitude of features, there's room for improvement in the single point transform, especially for grouping. It appears that currently, the grouping functionality is not robust, particularly for Docker images within a group. The support for this aspect seems to be contingent on the license type. For instance, with the Voss license type, there is a noticeable absence of support for this feature. This is an area that could benefit from enhancement in the upcoming updates.
For how long have I used the solution?
I have been using Sonatype Nexus Repository for five months.
What do I think about the stability of the solution?
I am, personally, quite satisfied with the stability and would rate it 8 out of 10.
What do I think about the scalability of the solution?
I would rate the scalability of this solution a four out of ten. The reason being, it's not very scalable, and significant efforts are required to enhance scalability. There are noticeable limitations that need to be addressed for smoother scalability.Currently, there are approximately forty-eight users working with Nexus Repository in our company. As for future plans, I don't foresee a significant increase in the usage of Nexus Repository.
How are customer service and support?
While it's true that there is no explicit support for various license types, the summer type seems to be highly favored and encouraged among users. It holds a prominent position, perhaps earning a rating of seven for its effectiveness and user adoption.
How was the initial setup?
It is easy and I would rate it 8 out of 10.The entire deployment process, including installation, manual testing, and all implementation phases, typically takes around one week but only one person is usually sufficient to handle the entire deployment efficiently.
What other advice do I have?
I can confidently recommend this solution. The main reason is its stability. In comparison to other competitors, especially when I consider alternatives like Project X, Nexus stands out as a stable and reliable choice. This reliability is a key factor that makes me feel comfortable recommending it to other users. Based on its performance, I would rate it 8 out of 10.
Easy-to-scale product with a valuable scanning feature
What is our primary use case?
We use Sonatype Nexus Repository as a proxy for external packages for internet users. It also helps us manage internal packages and works as a repository for container images.
How has it helped my organization?
The product helped our organization improve runtime efficiency. We do not have to connect third-party vendors while building external packages or storing container-approved images. It allows end-to-end life cycle accessibility.
What is most valuable?
Sonatype Nexus Repository has a valuable internal scanner feature. It automatically scans external artifacts, such as Fortify SAST, before storing them in the repository.
What needs improvement?
There could be more add-on features for the product. They should provide automation for adding container images and artifacts in compliance with security requirements.
For how long have I used the solution?
We have been using Sonatype Nexus Repository for one year.
What do I think about the stability of the solution?
I rate the product's stability a seven out of ten. Sometimes, there are challenges in mitigating intermittent incidents. There might be factors such as network issues impacting communication.
What do I think about the scalability of the solution?
We have 20,000 to 40,000 end users for the product. It is easy to scale. I rate its scalability an eight out of ten. We use it 24/7.
How are customer service and support?
The technical support team takes time to respond and depends on the nature of the request. We have to keep contacting them. However, the process to create tickets is simple.
Which solution did I use previously and why did I switch?
I have worked on POCs for different products.
How was the initial setup?
The initial setup is simple if you have access to container images. It is a seamless process for upgrading as well. Everything is well documented on the vendor’s official site. They form regular maintenance to comply with organizational requirements. They have a good maintenance process for updating and addressing issues. We have a team of 100 executives working on the current project to maintain components.
What's my experience with pricing, setup cost, and licensing?
I use the open-source version of the product, which is free of cost.
What other advice do I have?
I rate Sonatype Nexus Repository an eight out of ten. I advise others to update the business continuity plan for components regularly, i.e., semi-annually or quarterly. Use container images for the next migration or maintenance update. They should secure the user interface. Additionally, they should ensure a good storage process and plan a retention policy for all attacks.
Provides proxy repository to Maven and stable solution
What is our primary use case?
It's our building background. We use it as a proxy repository to Maven, for example, and we use it to store our own good results and to bring them into production. So it's a turning point for this.
How has it helped my organization?
It works well together with the Nexus IQ. We can check our incoming artifacts from third parties with the help of the Nexus Secure server, which correlates with the Nexus support.
And we can provide good results or products to customers where they can download it from there and bring it into production on servers or something like that. So it's everything in this field.
What is most valuable?
The quality of documentation is good. I can find what I'm looking for every time. Except, there are some mistakes or errors in the backpacks. So, in this case I have to contact support.
What needs improvement?
It is not as well-suited for managing NPM packages as it is for managing Maven packages.
So, there are potential challenges in seamlessly integrating with non-Maven technologies.
For how long have I used the solution?
I have been using this for five years. I am using Sonatype Nexus Repository version 3.48.
What do I think about the stability of the solution?
The product has been stable since the deployment. I would rate the stability a nine out of ten.
What do I think about the scalability of the solution?
We are not using any scaling mechanisms which are provided with this product. We would just use more CPU, something like that. But it's okay. There's not much need for scalability here. Not so many people are accessing the repository right now. So it works fine for us.
There are over 130 end users using this solution.
How are customer service and support?
The customer service and support are good because if there are some problems, we can open a ticket there. And usually, we get help within a day at the latest. Often much earlier.
They are good regarding their speed of response, and the staff is very good.
How was the initial setup?
The initial setup was not challenging. We've changed from Nexus 2, which we have used earlier. So, this was a migration process, which was just a simple turn-on. Just that system is a step on, but however, it worked fine. So there was no real problem.
What about the implementation team?
The deployment took around two months. Two to three people were involved in the process.
We have around five administrators for the solution.
What's my experience with pricing, setup cost, and licensing?
The licensing cost is transparent and cheap. Overall, it is a very good price.
We pay for a license, and the support is connected to it. We regularly communicate with our customer success engineer. And we have the technical support and the documentation. So, there's no extra charge for the support included in the license.
Which other solutions did I evaluate?
Our company used JFrog.
What other advice do I have?
I recommend examining your processes to determine if they align with this tool, as its history is heavily concentrated on Maven. If your operations involve Maven, this solution is likely the most suitable.
As we primarily focus on Java and Maven, I would give this solution a rating of nine out of ten in such cases.
However, if your emphasis shifts towards NPM products or NuGet, using Nexus is still feasible but may require more effort. The tool is more centered around Maven, making it a bit challenging to seamlessly integrate with NPM.
In such scenarios, opting for a different product might be more favorable. Nevertheless, if your environment revolves around Java or related technologies, Nexus stands out as a top-notch product in the market.