System Requirements¶
This page summarizes the technical system requirements for running the Identity Operations Platform with Docker Compose.
The requirements are derived from the containerized production installation model described in the Installation Guide and from the service topology in compose.yaml.
Scope¶
This guidance is intended for customer-managed production deployments using Docker Compose. It covers host sizing, Docker runtime prerequisites, network requirements, and persistent storage requirements.
Recommended Production Sizing¶
For small to medium environments, use the following baseline sizing:
web: at least 4 GB RAMworker: at least 4 GB RAMleadworker: at least 4 GB RAMdatabase(PostgreSQL): at least 4 GB RAM
Additional guidance:
- The platform has been tested with lower resource limits, but lower limits are not the recommended production baseline.
- Each additional worker container should be planned with an additional ~4 GB RAM.
- Capacity planning must include all additional infrastructure containers (for example Redis, RabbitMQ, EchoHub, scheduler, and backup services).
Docker Runtime Requirements¶
Before installation, ensure the Docker runtime environment is available and operational:
- Docker Engine is installed and running.
- Docker Compose is available.
- A writable installation directory is available.
- The host can run Compose memory and CPU limits as configured in
compose.yaml.
The production stack relies on container-level resource controls (mem_limit, memswap_limit, cpus, cpu_shares).
Required Container Topology¶
The production topology includes application and infrastructure services.
Core application services:
webworkerleadworkerscheduler
Core infrastructure services:
database(PostgreSQL)rabbitmqredisechohub
Backup and restore infrastructure:
pgbackrestpgbackrest_backuppgbackrest_checkpgbackrest_restore(restore workflow)
Persistent Storage Requirements¶
The Docker host must provide reliable persistent volume storage for:
pg_datapg_backrest_repopg_backrest_spoolredis
The host must also persist and protect the generated ./secrets directory.
Losing this directory can make encrypted data permanently unrecoverable.
Required Secret Material¶
compose.yaml requires secret files under ./secrets, including:
- application and token secrets
- database credentials and encryption/integrity keys
- Redis and RabbitMQ credentials
- TLS key/certificate/DH parameter files for the web service
- audit signing key pair
All required secret files are generated by the installation flow and must be backed up securely.
Network and Port Requirements¶
Published inbound ports (by default):
${HTTP_PORT:-9080}-> container port8080(web)${HTTPS_PORT:-9443}-> container port8443(web)
Infrastructure services communicate internally on the Docker network. Direct external publishing of database, Redis, and RabbitMQ is not required for normal operation.
If the platform is deployed behind a reverse proxy or load balancer, configure TRUSTED_PROXIES to the actual proxy source addresses.
Operational Readiness Checklist¶
Before go-live, validate:
- Host sizing reflects the 4-GB baseline for
web,worker,leadworker, anddatabase. - Additional worker scaling capacity is planned (about 4 GB RAM per additional worker).
- Persistent volumes for database and backup data are available and monitored.
- The
./secretsdirectory is backed up and access-protected. - Required ingress ports and proxy forwarding settings are correctly configured.