Configuration overview
Deploying Weaviate successfully depends on robust, well-considered configuration. This section outlines key configuration requirements and best practices for production deployments. Whether you are setting up a new environment or optimizing an existing one, configuration choices impact security, scalability, and reliability.
Authorization and Authentication
Configure access management of your deployment.
Define and manage user roles and permissions.
Configure OpenID Connect for secure authentication with Weaviate.
Set up Role-Based Access Control for fine-grained permissions.
Database configuration
Configure your environment variables for connection strings, ports, and security credentials.
Manage runtime configuration settings for your Weaviate instance.
Monitoring and Logging
Collect Prometheus metrics to monitor the health and performance of your Weaviate instance.
Configure log levels, formats, and audit logging for operational visibility and troubleshooting.
Monitor cluster health, node data, and instance metadata.
Understand how Weaviate telemetry works and how to configure it.
Replication and Scaling
Set up data replication across nodes for high availability and fault tolerance.
Ensure eventual consistency across nodes in a distributed cluster.
Configure how replicas are moved between nodes during rebalancing.
Scale your deployment for high availability.
Storage and Backups
Configure backup and restore processes for your Weaviate instance.
Enable backups and configure retention policies.
Manage resource usage by offloading inactive tenants in multi-tenant setups.
Questions and feedback
If you have any questions or feedback, let us know in the user forum.
