Skip to main content

System Requirements

AuroraSOC is a distributed system with multiple components. Below are the hardware and software requirements for different deployment scenarios.

Deployment Profiles

Development / Demo Mode

The minimal setup for local development and demonstrations:

ResourceRequirement
CPU4 cores
RAM8 GB minimum
Disk20 GB SSD
GPUNot required
OSFedora 39+ / RHEL 9+ / Debian 12+ / Arch Linux / Windows 11 (WSL2)

Components running: API + Dashboard + Database services

Production — Single Node

Full deployment on a single server:

ResourceRequirement
CPU16 cores
RAM64 GB
Disk500 GB NVMe SSD
GPUNVIDIA GPU with 16+ GB VRAM (for vLLM inference)
Network1 Gbps
OSFedora 39+ / RHEL 9+ / Debian 12+ / Ubuntu 22.04+ / Arch Linux

Production — Distributed

Multi-node deployment for large organizations:

ComponentNodesPer-Node Resources
API Gateway2+4 CPU, 8 GB RAM
Agent Workers4+8 CPU, 16 GB RAM, GPU
Database Cluster3+8 CPU, 32 GB RAM, 1 TB SSD
Event Bus3+4 CPU, 8 GB RAM
Edge GatewayPer-site2 CPU, 4 GB RAM

Software Prerequisites

Required

SoftwareVersionPurpose
Docker or PodmanDocker 27+ or Podman 5.0+Container runtime for AuroraSOC services
Compose supportDocker Compose plugin or podman composeMulti-container orchestration
Python3.12+API and agent runtime
Node.js22+Dashboard build
npm10+JavaScript package manager

AuroraSOC repository tooling auto-detects Docker or Podman. Use COMPOSE_BIN for Makefile and script overrides, and FLEET_COMPOSE_BIN when the backend compose orchestrator must target a specific runtime.

Optional

SoftwareVersionPurpose
NVIDIA Container ToolkitLatestGPU passthrough via CDI for vLLM
Rust1.83+Building the optional Rust fast path
Ollama0.4+CPU-only LLM inference alternative to vLLM
Alire2.0+Ada SPARK firmware (STM32)
probe-rs0.24+nRF52840 firmware flashing
Zephyr SDK0.16+ESP32-S3 firmware

Network Requirements

AuroraSOC uses the following ports by default:

PortProtocolServiceRequired
8000HTTPFastAPI REST APIYes
3000HTTPNext.js DashboardYes
5432TCPPostgreSQLYes
6379TCPRedisYes
4222TCPNATS ClientYes
8222HTTPNATS MonitoringOptional
8080HTTPvLLM inference serverIf using agents
1883MQTTMosquitto (plain)Dev only
8883MQTTSMosquitto (TLS)Production
11434HTTPOllama LLM (alternative to vLLM)If using Ollama
8001HTTPMCP Tool RegistryIf using agents
9000-9016HTTPAgent A2A portsIf using agents
9090HTTPPrometheusOptional
3001HTTPGrafanaOptional
4317gRPCOTel CollectorOptional
8200HTTPHashiCorp VaultOptional

Container Network Architecture

AuroraSOC uses four isolated container networks for security:

Network Isolation

The four networks (frontend, agent-mesh, data-plane, iot-plane) ensure that edge devices on the IoT plane cannot directly access the database, and the dashboard cannot directly communicate with agents — all traffic flows through the API gateway.

The default deployment uses the Python API and event-processing path. The rust-core service joins the data-plane and iot-plane networks only when you enable --profile rust-core, and its host binding can be changed with RUST_CORE_HOST_PORT.