Deploy the TrueFoundry control plane and AI Gateway. See the overview for compute requirements and prerequisites.Documentation Index
Fetch the complete documentation index at: https://www.truefoundry.com/llms.txt
Use this file to discover all available pages before exploring further.
Installation Instructions
Create Azure Blob Storage
Create Azure Blob Storage
Create Azure Blob Storage
To setup Azure Blob Storage for control plane, follow the steps below:
-
Create a Azure Storage account in your resource group
-
Instance details - You must
Geo-redundant storageto make sure your data is available through other regions in case of region unavailability. -
Security - Make sure
- DISABLE
Allow enabling anonymous access on individual containers - ENABLE
Enable storage account key access
- DISABLE
-
Network access - ENABLE
Allow public access from all networks - Recovery - You can keep it to default for 7 days.
-
Instance details - You must
- Create an Azure container inside the above storage account.
-
Search for
CORSfrom the left panel and forBlob service(optional forFile serviceQueue serviceandTable Service, only apply the change if you are using them) select the below options- Allowed Origins -
*or your control plane URL - Allowed Methods -
GET, POST, PUT - Allowed Headers -
* - Exposed Headers -
Etag - MaxAgeSeconds -
3600
- Allowed Origins -
-
Collect the following information
- Standard endpoint - Endpoint of the blob storage Once the container is created we need to get the standard endpoint of the blob storage along with the container which will look something like this. Replace this with your storage account name and the container name.
- Connection string - From the Azure portal in your storage account, head over to the
Security + Networkingsection underAccess keyswhich will contain theConnection String.
- Standard endpoint - Endpoint of the blob storage Once the container is created we need to get the standard endpoint of the blob storage along with the container which will look something like this. Replace this with your storage account name and the container name.
Create Azure Database for PostgreSQL database
Create a PostgreSQL database of size
GP_Standard_D4ds_v5 with storage size of 30GB.In case you want to setup PostgreSQL on Kubernetes in the dev mode, skip this step and set
devMode to true in the values file in the steps below.Create Kubernetes Secrets
We will create two secrets in this step:
- Store the License Key and DB Credentials
- Store the Image Pull Secret
Create Kubernetes Secret for License Key and DB Credentials
Create Kubernetes Secret for License Key and DB Credentials
We need to create a Kubernetes secret containing the licence key and db credentials.Apply the secret to the Kubernetes cluster (Assuming you are installing the control plane in the
If you are using PostgreSQL on Kubernetes in the dev mode, the values will be as follows:DB_HOST: <HELM_RELEASE_NAME>-postgresql.<NAMESPACE>.svc.cluster.local // eg. truefoundry-postgresql.truefoundry.svc.cluster.localDB_NAME: truefoundryDB_USERNAME: postgres # In order to use custom username, please update the same at
postgresql.auth.usernameDB_PASSWORD: randompassword # You can change this to any value here.truefoundry-creds.yaml
truefoundry namespace)Create Kubernetes Secret for Image Pull Secret
Create Kubernetes Secret for Image Pull Secret
We need to create a Image Pull Secret to enable pulling the truefoundry images from the private registry.Apply the secret to the Kubernetes cluster (Assuming you are installing the control plane in the
truefoundry-image-pull-secret.yaml
truefoundry namespace)Create HelmChart Values file
Create a values file as given below and replace the following values:
Control Plane URL: URL that you will map to the control plane dashboard.Tenant Name: Tenant name provided by TrueFoundry team.Azure Blob URI: Azure Blob URI provided by TrueFoundry team.Azure Blob Connection String: Azure Blob Connection String provided by TrueFoundry team.
truefoundry-values.yaml