LogoDev portal

iMBrace Platform Environment Specification

Technical specification of iMBrace platform environments including AWS Private Cloud and On-Premise deployments

iMBrace Platform Environment Specification

By: iMBrace Limited
Version: 1.0 (2025-09-12)
Author: Kong Lee
Status: First version


🏗️ AWS Private Cloud — Single Node

EC2 Instance Requirements

CategorySpecification
CPUIntel or AMD x86 (36 cores)
Memory96 GB
StorageLocal SSD Disks: 2 TB
Operating SystemRHEL-compatible (AlmaLinux 10+, Rocky Linux 9.5+), RHEL 10+, or Ubuntu 24.04 LTS+
DependenciesRed Hat subscription may be required for dependency installation

iMBrace Platform Components

ComponentSummary
Operating SystemRHEL, AlmaLinux, Rocky, or Ubuntu 24.04 LTS+
System DependenciesOS patches, essential tools, user accounts, AWS credentials, directory structure handled by automation scripts
Docker EngineDocker Engine – Community v28.0.2 or later
Docker Composev2.34.0 or later
MongoDB Atlas Localv8.0.5 or later
MongoDBv8.0.6 or later
Redisv7.2.4 or later
PostgreSQL DBv15.9 or later
Apache Kafka Brokerv4.0.0 or later
iMBrace ApplicationsMultiple containers serving different platform layers

Firewall and Networking

CategorySpecification
Public IP AddressFixed or dynamic (1-1 NAT preferred)
Private IP AddressFixed private IP
Inbound RulesAllow TCP ports 22, 80, 443, 4000, 5000, 8000, 8888, 9000, 9981
Traffic SourcePrivate networks only (restrict port 22 via whitelist or VPN)
Outbound RulesAllow all traffic (0.0.0.0/0)
Internet AccessAllowed

AWS Account & IAM

  • Create sub-accounts (member accounts) under an AWS Organization for isolation.
  • One IAM user with programmatic access keys and least privileges is required.
  • The iMBrace platform uses this IAM user to access AWS resources.

AWS VPC and Networking

  • Create multiple VPCs for separate environments (development, staging, production).
  • Configure NAT gateways for outbound internet access from private subnets.
  • Inbound SSH traffic should be restricted through VPN or jump hosts.

DNS Management

  • Use AWS Route53 to host DNS records for both public and private zones.

Bedrock Configuration

ParameterDescription
Regionus-west-2 (Oregon)
LLM ModelLlama 4 Maverick 17B Instruct
Embedding ModelTitan Text Embeddings V2
AccessEnable Bedrock service in the AWS account
IAM Policy Example
{
  "Version": "2012-10-17",
  "Statement": [
    {
      "Sid": "BedrockFullAccess",
      "Effect": "Allow",
      "Action": ["bedrock:*"],
      "Resource": "*"
    }
  ]
}

| Connectivity | The iMBrace platform (Node.js client) connects to Bedrock via HTTPS through the NAT gateway for encrypted communication. | | Configuration | All configurations for the imbrace platform to call Bedrock are implemented by configuration files. |


AWS Private Cloud — High Availability (HA)

Components Specification

ComponentCPU CoresRAMStorageNotes
**EC2 Web **614.5 GB500 GBRegion: ap-east-1
**EC2 Web **614.5 GB500 GBRegion: ap-east-1
EC2 Backend614.5 GB500 GBRegion: ap-east-1
**EC2 Backend **614.5 GB500 GBRegion: ap-east-1
MongoDB Atlas Cluster416 GB100 GB (Auto-Scale)Tier: M40
MongoDB Atlas Cluster416 GB100 GB (Auto-Scale)Tier: M40
AWS RDS PostgreSQL24 GB100 GB (Auto-Scale)Type: db.t3.medium
ElastiCache Redis23 GBType: cache.t3.medium
Confluent Cloud (Kafka)ManagedManagedManagedStandard Cluster, ap-east-1

On-Premise — Single Node

System Requirements (Without GPU):

CategorySpecification
CPUIntel or AMD x86, 36 cores
Memory96 GB
StorageLocal SSD Disks: 2 TB
Operating SystemRed Hat Enterprise Linux 10+ (RHEL) (subscription required required to download and install necessary system dependencies and packages)
DependenciesProper Linux drivers for hardware compatibility

System Requirements (With GPU)

CategorySpecification
CPUIntel or AMD x86, 36 cores
Memory128 GB
StorageLocal SSD Disks: 4 TB
GPU4–8 × NVIDIA L20 (48 GB VRAM per GPU)
Operating SystemRHEL 9.5+
DependenciesNVIDIA CUDA Toolkit, Drivers, and Container Toolkit
Additional NotesOther serving tools (e.g. vLLM, lmdeploy) may be used depending on model requirements.

Firewall and Networking (On-Premise)

CategorySpecification
General Requirements
Public IPFixed or via 1-1 NAT (preferred)
Private IPFixed private address
Inbound Traffic Rules
Allowed PortsTCP 22, 80, 443, 4000, 5000, 8000, 8888, 9000, 9981 (more ports can be opened upon request).
Traffic SourcesRestrict SSH (port 22) via whitelist or VPN (Port 22 (SSH) is for remotely managing server and software updates. It can be restricted by whitelisting source IP addresses or VPN solutions)
Outbound Traffic Rules
Allowed RulesAll traffic to all IP addresses (0.0.0.0/0) for all protocols.
Internet AccessThe server can access the internet.

Platform Components (On-Premise)

ComponentSummary
Operating SystemRHEL, Rocky, AlmaLinux, or Ubuntu 24.04 LTS+
System DependenciesPatches, tools, user setup, and credentials via automation scripts
NVIDIA ComponentsCUDA toolkit, drivers, container toolkit
Docker Enginev28.0.2+
Docker Composev2.34.0+
MongoDB Atlas Localv8.0.5+
MongoDBv8.0.6+
Redisv7.2.4+
PostgreSQL DBv15.9+
Apache Kafka Brokerv4.0.0+
LLM Model Serving ToolOllama Docker Image v0.9.6 (alternatively vLLM or lmdeploy)
iMBrace Application ContainersHandle all platform layers and services

IAM, SSL, and DNS (On-Premise)

  • Even for on-premise deployments, create one IAM user with programmatic keys (least privileges) to access iMBrace AWS resources.
  • Use the customer’s SSL certificate for HTTPS configuration.
  • Manage DNS through the customer’s DNS server.

On-Premise — HA and Resilient

(To be confirmed in future revisions.)