You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
- [ ] bug report -> please search issues before submitting
- [x] feature request
- [ ] documentation issue or request
- [ ] regression (a behavior that used to work and stopped in a new release)
I decided to deploy qdrant on a single Azure VM (Standard E2s v3 (2 vcpus, 16 GiB memory)) for now.
It's much easier to use persistent volumes for large-scale datasets, setting SSL and API key.
i.e.
docker run -p 6333:6333
-v /mnt/qdrant/config/XXX-custom.yaml:/qdrant/config/production.yaml
-v /mnt/qdrant/storage:/mnt/qdrant/storage
-v /mnt/qdrant/snapshots:/mnt/qdrant/snapshots
qdrant/qdrant
and in the XXX-custom.yaml file,
storage:
storage_path: /mnt/qdrant//storage
...
snapshots_path: /mnt/qdrant/snapshots
...
on_disk_payload: true
Found this issue while trying to secure a cloud deployment of Qdrant. Unfortunately seems non-trivial outside of Qdrant Cloud.
@tawalke FYI- looks like the default config in this repo exposes the "internal" gRPC port via the load balancer. If the documentation is to be trusted, this is an inherent security flaw:
I followed the walkthrough blog post:
https://devblogs.microsoft.com/semantic-kernel/the-power-of-persistent-memory-with-semantic-kernel-and-qdrant-vector-database/
and I'm wondering how to secure it properly?
Qdrant supports api key but how do I enable it during the deployment?
https://qdrant.tech/documentation/guides/security/
The text was updated successfully, but these errors were encountered: