How to configure Weaviate
Configure and manage key operational aspects of your Weaviate instance with these guides:
Reduce memory usage with Product, Binary, or Scalar Quantization techniques.
Explore Weaviate's ecosystem of vectorizer, generative (RAG), and other modules.
Set up methods to authenticate and to verify user identities before granting access.
Learn about Role-Based Access Control concepts, predefined/custom roles, and permissions.
Deployment guides
Configuration
Configure backup and restore processes for your Weaviate instance.
Configure your environment variables for connection strings, ports, and security credentials.
Scale your deployment for high availability.
Enable backups and configure retention policies.
Manage resource usage by offloading inactive tenants in multi-tenant setups.
Authorization and Authentication
Configure access management of your deployment.
Define and manage user roles and permissions.
Set up Role-Based Access Control for fine-grained permissions.
Configure OpenID Connect for secure authentication with Weaviate.
Replication
Set up data replication across nodes for high availability and fault tolerance.
Ensure eventual consistency across nodes in a distributed cluster.
Cluster Information
Access and manage metadata about your Weaviate cluster.
Monitor the status and health of your Weaviate instance.
View and manage data about individual nodes in your cluster.
Monitor the status and health of your Weaviate instance.
Understand how Weaviate telemetry works and how to configure it.
Questions and feedback
If you have any questions or feedback, let us know in the user forum.