Zum Hauptinhalt springen

Requirements

This page lists the prerequisites for deploying Atrium on your own infrastructure.

Hardware

Atrium is lightweight. A minimal deployment runs comfortably on:

ResourceMinimumRecommended
CPU2 vCPU4 vCPU
RAM4 GB8 GB
Storage20 GB50 GB+ (depends on visitor volume and PDF archive size)

These numbers cover the full stack: application server, PostgreSQL, NATS, WeasyPrint sidecar, and Traefik reverse proxy. The Atrium Agent runs on a separate host (on your local network) and has minimal requirements (1 vCPU, 256 MB RAM).

Operating system

Any Linux distribution that supports Docker:

  • Ubuntu 22.04 LTS or later
  • Debian 12 (Bookworm) or later
  • Rocky Linux 9 or later
  • RHEL 9 or later

Other distributions work if they run Docker Engine 24+.

Software

DependencyVersionNotes
Docker Engine24+With the Docker Compose plugin (docker compose, not the legacy docker-compose).
Docker Composev2.20+Bundled with Docker Engine as a plugin.

No other runtime dependencies. No Java, Python, Node.js, or database software needs to be installed on the host — everything runs in containers.

Network

Domain name

You need a domain name (or subdomain) pointing to your server's IP address. Atrium uses this domain for:

  • The admin dashboard and API (https://atrium.yourdomain.com)
  • Pre-registration emails (QR code deep links)
  • Kiosk access

An A record pointing to the server's public IP is sufficient.

Ports

PortProtocolDirectionPurpose
80TCPInboundHTTP → automatic redirect to HTTPS
443TCPInboundHTTPS (Traefik reverse proxy)

If you're also deploying the Atrium Agent on the same host (unusual but possible):

PortProtocolDirectionPurpose
1812UDPInbound (from WiFi controllers)RADIUS Authentication
1813UDPInbound (from WiFi controllers)RADIUS Accounting

Outbound connectivity

The Atrium server needs outbound HTTPS access to:

DestinationPurposeRequired?
ghcr.ioContainer image pulls (updates)Yes
Control Plane (cp.atrium.sprocksystems.de)License validation, feature flags, updatesYes (grace period if unavailable)
Let's Encrypt (acme-v02.api.letsencrypt.org)TLS certificate issuanceYes (if using Let's Encrypt)
Your OIDC provider (e.g., login.microsoftonline.com)User authenticationOnly if using external IdP
Your CRM API (e.g., login.salesforce.com)CRM integrationOnly if CRM integration is configured
SMTP serverEmail deliveryYes (for notifications)

If the server operates behind a corporate proxy or strict egress firewall, ensure these destinations are whitelisted.

Air-gapped deployments

Fully air-gapped deployments (no internet access) are supported with limitations:

  • Container images must be transferred manually (exported and imported).
  • TLS certificates must be provided manually (no Let's Encrypt).
  • The license operates on a grace period after the last successful Control Plane check-in.
  • Updates must be applied manually.

See Network Requirements for details.