انتقل إلى المحتوى الرئيسي

System Requirements

AuroraSOC is a distributed system with multiple components. Below are the hardware and software requirements for different deployment scenarios.

Deployment Profiles

Development / Demo Mode

The minimal setup for local development and demonstrations:

ResourceRequirement
CPU4 cores
RAM8 GB minimum
Disk20 GB SSD
GPUNot required
OSLinux, macOS, or Windows (WSL2)

Components running: API + Dashboard + Database services

Production — Single Node

Full deployment on a single server:

ResourceRequirement
CPU16 cores
RAM64 GB
Disk500 GB NVMe SSD
GPUNVIDIA GPU with 16+ GB VRAM (for Ollama LLM)
Network1 Gbps
OSUbuntu 22.04+ / RHEL 9+

Production — Distributed

Multi-node deployment for large organizations:

ComponentNodesPer-Node Resources
API Gateway2+4 CPU, 8 GB RAM
Agent Workers4+8 CPU, 16 GB RAM, GPU
Database Cluster3+8 CPU, 32 GB RAM, 1 TB SSD
Event Bus3+4 CPU, 8 GB RAM
Edge GatewayPer-site2 CPU, 4 GB RAM

Software Prerequisites

Required

SoftwareVersionPurpose
Docker24.0+Container runtime
Docker Compose2.20+Multi-container orchestration
Python3.12+API and agent runtime
Node.js22+Dashboard build
npm10+JavaScript package manager

Optional

SoftwareVersionPurpose
Rust1.83+Building the Rust core engine
Ollama0.4+Local LLM inference
Alire2.0+Ada SPARK firmware (STM32)
probe-rs0.24+nRF52840 firmware flashing
Zephyr SDK0.16+ESP32-S3 firmware

Network Requirements

AuroraSOC uses the following ports by default:

PortProtocolServiceRequired
8000HTTPFastAPI REST APIYes
3000HTTPNext.js DashboardYes
5432TCPPostgreSQLYes
6379TCPRedisYes
4222TCPNATS ClientYes
8222HTTPNATS MonitoringOptional
6333HTTPQdrantYes
6334gRPCQdrantOptional
1883MQTTMosquitto (plain)Dev only
8883MQTTSMosquitto (TLS)Production
11434HTTPOllama LLMIf using agents
8001HTTPMCP Tool RegistryIf using agents
9000-9015HTTPAgent A2A portsIf using agents
9090HTTPPrometheusOptional
3001HTTPGrafanaOptional
4317gRPCOTel CollectorOptional
8200HTTPHashiCorp VaultOptional

Docker Network Architecture

AuroraSOC uses four isolated Docker networks for security:

Network Isolation

The four networks (frontend, agent-mesh, data-plane, iot-plane) ensure that edge devices on the IoT plane cannot directly access the database, and the dashboard cannot directly communicate with agents — all traffic flows through the API gateway.