Installation

This section provides documentation and guidance for installing AIStor. Each subsection represents a supported platform, where guidance reflects the specific installation and configuration methods associated with that platform.

Use the following order of procedures when creating a new AIStor deployment in any environment.

1) Deploy AIStor

Create the baseline deployment and validate connectivity with your client producer/consumer processes. This setup provides a foundation for configuring and enabling other more advanced features.

The following links provide documentation for each specified platform:

Use AIStor deployments on macOS, Windows, or container hosts for local development and evaluation.

2) Enable Network Encryption

AIStor supports Transport Layer Security (TLS) 1.2+ encryption of incoming and outgoing traffic. Configuring TLS requires providing AIStor with at least one certificate private and public key pair that can support the hostnames or IP addresses associated with the deployment.

The following links provide documentation for enabling TLS on the following platforms:

3) Configure Server-Side Encryption

Connect AIStor to a supported Key Management Service (KMS) such as AIStor Key Manager to enable S3 Server-Side Encryption (SSE). AIStor supports SSE-KMS and SSE-S3 protocols for use with customer-managed keys stored on the KMS.

The following links provide documentation for enabling SSE on the following platforms: