Skip to main content

Documentation Index

Fetch the complete documentation index at: https://docs.tensor9.com/llms.txt

Use this file to discover all available pages before exploring further.

About this documentationThis guide walks you through installing and managing your vendor’s application in your environment. Throughout these pages, “we” and “us” refer to your software vendor, and “you” and “your” refer to you, the customer. These pages cover multiple deployment environments (e.g. AWS, Kubernetes, on-prem) - your vendor may customize or limit the options shown to match the environments they support.
Installing our application into your environment is a guided, step-by-step process. You stay in control of your infrastructure and credentials at every stage.

How It Works

The installation flow has two parts: Part 1 - Set up your environment. You receive a setup link from us, choose your deployment environment, download infrastructure templates, and apply them in your own cloud account or cluster. This provisions the networking, permissions, and compute resources needed to run the application. Part 2 - Configure your deployment. Once the controller is running in your environment, you configure DNS, select services, and create any required credentials. Sensitive data stays entirely within your infrastructure - it is never sent to our systems. After both parts are complete, we deploy the application into the environment you prepared. You don’t need to do anything for the deployment step - the controller running in your environment handles it automatically.

What You’ll Need

  • A dedicated cloud account (AWS) or Kubernetes cluster
  • Terraform installed on your workstation
  • The setup link we provide
  • Any credentials the application requires (API keys, tokens, etc.)
See Prerequisites for the full list.

How Long Does It Take?

Most installations complete in under an hour. The time depends on your environment and how many services need configuration. The process is designed so you can pause and resume at any point - your progress is saved automatically.

What Happens to Your Credentials?

Your credentials never leave your infrastructure. When the application needs secrets (API keys, database passwords, etc.), you create them directly in your own cluster or cloud secret manager. The controller detects them automatically. We never see or store your sensitive data. See Security Model for the full picture.