Configuration Guides
Deploying Weaviate successfully depends on robust, well-considered configuration. This section outlines key configuration requirements and best practices for production deployments. Whether you are setting up a new environment or optimizing an existing one, configuration choices impact security, scalability, and reliability.
Configuration
Configure backup and restore processes for your Weaviate instance.
Configure your environment variables for connection strings, ports, and security credentials.
Scale your deployment for high availability.
Enable backups and configure retention policies.
Manage resource usage by offloading inactive tenants in multi-tenant setups.
Authorization and Authentication
Configure access management of your deployment.
Define and manage user roles and permissions.
Set up Role-Based Access Control for fine-grained permissions.
Configure OpenID Connect for secure authentication with Weaviate.
Replication
Set up data replication across nodes for high availability and fault tolerance.
Ensure eventual consistency across nodes in a distributed cluster.
Cluster Information
Access and manage metadata about your Weaviate cluster.
Monitor the status and health of your Weaviate instance.
View and manage data about individual nodes in your cluster.
Monitor the status and health of your Weaviate instance.
Understand how Weaviate telemetry works and how to configure it.
Questions and feedback
If you have any questions or feedback, let us know in the user forum.