Skip to main content
Version: 25.3

Seqera AI

caution

Seqera AI requires Seqera Platform Enterprise 26.1 or later for the agent backend, MCP server, portal web interface, and CLI integration.

Seqera AI is an intelligent command-line assistant that helps you build, run, and manage bioinformatics workflows. This guide describes how to deploy Seqera AI in a Seqera Enterprise deployment.

Prerequisites

Before you begin, you need:

  • Seqera Enterprise 26.1+ deployed via Helm

  • MySQL 8.0+ database

  • API key from a supported inference provider (see below)

  • MCP server deployed and accessible from your cluster

  • OIDC-compatible identity provider for the portal web interface, MCP server, and CLI login flow

  • Token encryption key for encrypting sensitive tokens at rest. Generate with:

    python -c "from cryptography.fernet import Fernet; print(Fernet.generate_key().decode())"
  • Helm v3 and kubectl installed locally

Supported inference providers

Seqera AI uses Claude models from Anthropic. The following inference providers are supported for Enterprise deployments:

Inference providerDescription
Anthropic APIDirect access to Claude models via Anthropic's API (console.anthropic.com)
AWS BedrockAccess Claude models through AWS Bedrock in your AWS account

Architecture

Seqera AI connects your local CLI environment to your Platform resources through a secure backend service:

Seqera AI infrastructure architecture

Components:

ComponentDescription
Agent backendFastAPI service that orchestrates AI interactions. Deployed as a Helm subchart alongside Platform.
MCP serverModel Context Protocol server providing Platform-aware tools (workflows, datasets, compute environments).
Portal web interfaceBrowser-based interface for Seqera AI and related Platform features.
MySQL databaseDedicated database for session state and conversation history. Separate from Platform database.

Flow:

  1. Users authenticate via seqera login, which initiates OIDC authentication with Platform.
  2. The CLI creates a session with the agent backend, passing the Platform access token.
  3. The agent backend validates tokens against Platform's /user-info endpoint.
  4. User prompts are processed by the inference provider, which can invoke Platform tools via MCP.
  5. MCP tools execute Platform operations using the user's credentials.
  6. Results stream back to the CLI via Server-Sent Events (SSE).

Configure Helm values

The Seqera AI components can be installed using the Seqera Helm charts. Refer to the examples in the repository for sample configurations. Some values (like database passwords, API keys, sensitive OIDC settings, cryptographic keys) are recommended to be stored as Kubernetes secrets and referenced in the Helm values in production installations, rather than be specified as plain text.

The Seqera AI components can be installed alongside Platform and other subcharts in a single Helm release, or can be installed individually as separate releases.

Documentation for the individual charts is available at:

Additional configuration

The following optional environment variables are not covered by the Helm chart values. Set them in the .extraEnvVars section of each chart as needed.

Agent backend

VariableDescriptionDefault
ANTHROPIC_MODELPrimary model for AI interactionsclaude-sonnet-4-6
FAST_MODELModel for quick tasks (search, summaries)claude-haiku-4-5-20251001
DEEP_MODELModel for complex planning tasksclaude-opus-4-5-20251101
SEQERA_PLATFORM_URLPlatform UI URL for constructing links to runs and pipelinesAutomatically derived from platform domain
SESSION_TIMEOUT_SECONDSSession timeout86400 (24 hours)
MAX_SESSIONS_PER_USERMax concurrent sessions per user10
SESSION_RETENTION_DAYSDays to retain session data14
CORS_ORIGINSAllowed CORS origins (JSON array)["*"]

Verify the installation

  1. Check the health endpoint of the agent backend and mcp to verify connectivity:

    curl -i https://ai-api.platform.example.com/health
    curl -i https://mcp.platform.example.com/health
    curl -i https://mcp.platform.example.com/service-info

Connect the CLI to Seqera AI

Set SEQERA_AI_BACKEND_URL before running seqera ai so the CLI connects to the correct backend.

Install the CLI first by following Seqera AI CLI installation, or install it directly with:

npm install -g seqera

Use your Enterprise deployment:

export SEQERA_AUTH_DOMAIN=https://platform.example.com/api
export SEQERA_AUTH_CLI_CLIENT_ID=seqera_ai_cli
export SEQERA_AI_BACKEND_URL=https://ai.platform.example.com
seqera login
seqera ai

If your Enterprise deployment uses a different OAuth client ID for the CLI, replace seqera_ai_cli with the value configured for your installation.

If you are testing a development build of the CLI against the hosted production Seqera AI service, use the following settings instead:

VariablePurposeExample value
SEQERA_AI_BACKEND_URLSeqera AI backend endpoint used by the CLIhttps://ai-api.seqera.io
SEQERA_AUTH_DOMAINPlatform API base URL used for browser-based loginhttps://cloud.seqera.io/api
SEQERA_AUTH_CLI_CLIENT_IDOAuth client ID for the Seqera AI CLIseqera_ai_cli
SEQERA_ACCESS_TOKENPlatform personal access token used instead of browser login (TOWER_ACCESS_TOKEN also supported)<PLATFORM_ACCESS_TOKEN>

Use the OAuth login flow:

export SEQERA_AUTH_DOMAIN=https://cloud.seqera.io/api
export SEQERA_AUTH_CLI_CLIENT_ID=seqera_ai_cli
export SEQERA_AI_BACKEND_URL=https://ai-api.seqera.io
seqera ai

Use a Platform personal access token instead of browser login:

export SEQERA_ACCESS_TOKEN=<PLATFORM_ACCESS_TOKEN>
export SEQERA_AI_BACKEND_URL=https://ai-api.seqera.io
seqera ai

You only need SEQERA_AUTH_DOMAIN and SEQERA_AUTH_CLI_CLIENT_ID when using the OAuth login flow. SEQERA_ACCESS_TOKEN (TOWER_ACCESS_TOKEN) is also supported.

Environment variables reference

Required

VariableDescription
SEQERA_PLATFORM_API_URLPlatform API URL (e.g., https://platform.example.com/api)
SEQERA_MCP_URLMCP server URL (e.g., https://mcp.example.com/mcp)
ANTHROPIC_API_KEYAPI key for inference provider
AGENT_BACKEND_DB_HOSTMySQL database hostname
AGENT_BACKEND_DB_NAMEMySQL database name
AGENT_BACKEND_DB_USERMySQL database username
AGENT_BACKEND_DB_PASSWORDMySQL database password
TOKEN_ENCRYPTION_KEYFernet encryption key for encrypting sensitive tokens at rest. Also accepted as AGENT_BACKEND_TOKEN_ENCRYPTION_KEY.

Optional

VariableDescriptionDefault
SEQERA_PLATFORM_URLPlatform UI URL for constructing links to runs and pipelinesDerived from platform domain
AGENT_BACKEND_DB_PORTMySQL port3306
SESSION_TIMEOUT_SECONDSSession timeout86400 (24 hours)
MAX_SESSIONS_PER_USERMax concurrent sessions per user10
SESSION_RETENTION_DAYSDays to retain session data14
LOG_LEVELApplication log level (CRITICAL, ERROR, WARNING, INFO, DEBUG)INFO
CORS_ORIGINSAllowed CORS origins (JSON array)["*"]

Helm values reference

For the full list of configuration options, see the agent-backend chart documentation.

Global

ValueDescriptionDefault
global.platformExternalDomainDomain where Seqera Platform listensexample.com
global.agentBackendDomainDomain where the agent backend listens""
global.mcpDomainDomain where MCP server listens""

Agent backend

ValueDescriptionDefault
agentBackend.replicaCountNumber of replicas1
agentBackend.image.registryImage registrycr.seqera.io
agentBackend.image.repositoryImage repositoryprivate/nf-tower-enterprise/agent-backend
anthropicApiKeyExistingSecretNameExisting secret containing ANTHROPIC_API_KEY""
tokenEncryptionKeyExistingSecretNameExisting secret containing TOKEN_ENCRYPTION_KEY""

Database

ValueDescriptionDefault
database.hostMySQL hostname""
database.portMySQL port3306
database.nameMySQL database name""
database.usernameMySQL username""
database.existingSecretNameExisting secret with DB password""
database.existingSecretKeyKey in the secretDB_PASSWORD

Ingress

ValueDescriptionDefault
ingress.enabledEnable ingressfalse
ingress.pathIngress path (use /* for AWS ALB)/
ingress.ingressClassNameIngress class name""
ingress.annotationsIngress annotations{}
ingress.tlsTLS configuration[]

Security considerations

  • Token validation: Every request validates the user's Platform token
  • User isolation: Sessions are isolated by user ID
  • Credential passthrough: MCP tools use the user's credentials for Platform operations
  • Token encryption: Sensitive tokens (e.g., GitHub PATs) are encrypted at rest using Fernet symmetric encryption before storage in the database
  • No credential storage: The agent backend does not store user credentials
  • TLS required: All communication should use HTTPS

Next steps