Installation
This section provides documentation and guidance for installing AIStor. Each subsection represents a supported platform, where guidance reflects the specific installation and configuration methods associated with that platform.
Use the following order of procedures when creating a new AIStor deployment in any environment.
1) Deploy AIStor
Create the baseline deployment and validate connectivity with your client producer/consumer processes. This setup provides a foundation for configuring and enabling other more advanced features.
The following links provide documentation for each specified platform:
- Red Hat Enterprise Linux
- Ubuntu Server Linux
- Upstream “native” Kubernetes
- Red Hat OpenShift Kubernetes
- Apple macOS
- Microsoft Windows
- Container runtimes
Use AIStor deployments on macOS, Windows, or container hosts for local development and evaluation.
2) Enable Network Encryption
AIStor supports Transport Layer Security (TLS) 1.2+ encryption of incoming and outgoing traffic. Configuring TLS requires providing AIStor with at least one certificate private and public key pair that can support the hostnames or IP addresses associated with the deployment.
The following links provide documentation for enabling TLS on the following platforms:
3) Configure Server-Side Encryption
Connect AIStor to a supported Key Management Service (KMS) such as AIStor Key Manager to enable S3 Server-Side Encryption (SSE). AIStor supports SSE-KMS and SSE-S3 protocols for use with customer-managed keys stored on the KMS.
The following links provide documentation for enabling SSE on the following platforms: