Compatibility Matrix
This page documents version compatibility between the self-hosted Governance Gateway and TruthVouch cloud services, system requirements, and supported architectures.
Gateway and SaaS Compatibility
The self-hosted gateway communicates with TruthVouch cloud for configuration sync, policy updates, and optional audit telemetry. Each gateway version requires a minimum SaaS API version.
| Gateway Version | Min SaaS API Version | Sync Protocol | SDK Compatibility |
|---|---|---|---|
| 1.0.x | v1 | v1 | Python SDK 1.0+, TypeScript SDK 1.0+, .NET SDK 1.0+ |
Notes:
- The sync agent negotiates protocol versions with the cloud API automatically. If your gateway version is too old for the current cloud API, the sync agent logs a clear error with the required minimum version.
- SDK compatibility refers to the TruthVouch client SDKs used by your application to call the gateway. SDKs are backward-compatible within a major version.
System Requirements
Hardware
| Component | Minimum | Recommended | Notes |
|---|---|---|---|
| CPU | 4 cores | 8 cores | AI engine benefits from additional cores for NLI inference |
| RAM | 8 GB | 16 GB | The AI engine loads NLI and embedding models into memory |
| Disk | 20 GB | 50 GB | Includes database storage, Redis cache, and container images |
Software
| Dependency | Minimum Version | Recommended |
|---|---|---|
| Docker Engine | 24+ | Latest stable |
| Docker Compose | v2.0+ | Latest stable |
The stack provisions its own PostgreSQL 16 and Redis 7 containers — you do not need to install these separately unless you prefer to use external instances.
Supported Architectures
All TruthVouch container images are built as multi-architecture images supporting:
| Architecture | Platform | Status |
|---|---|---|
linux/amd64 | x86_64 servers, AWS EC2 (Intel/AMD), GCP, Azure | Supported |
linux/arm64 | AWS Graviton, Apple Silicon (via Docker Desktop), ARM servers | Supported |
Docker automatically pulls the correct architecture for your host. No configuration is needed.
Network Requirements
Outbound Connectivity
The self-hosted stack requires outbound HTTPS access to the following endpoints:
| Destination | Port | Purpose | Required? |
|---|---|---|---|
api.truthvouch.com | 443 (HTTPS) | Sync agent — pulls config, policies, JWKS keys | Yes |
OpenAI API (api.openai.com) | 443 (HTTPS) | AI engine — embedding generation, NLI inference | Yes |
ghcr.io | 443 (HTTPS) | Pull container images during install/upgrade | During install/upgrade only |
If you use a different LLM provider (e.g., Azure OpenAI), substitute the OpenAI endpoint with your provider’s API endpoint.
Internal Ports
The following ports are used for inter-container communication within the Docker network. You only need to expose them to the host if your application connects from outside the Docker network:
| Port | Service | Protocol | Expose to Host? |
|---|---|---|---|
| 50052 | Governance Gateway (gRPC) | gRPC/HTTP2 | Yes — your application calls this |
| 8090 | Governance Gateway (REST/health) | HTTP | Optional — for health monitoring |
| 5010 | Gateway API | HTTP | Optional — for knowledge base management |
| 8091 | Sync Agent (health) | HTTP | Optional — for health monitoring |
| 50051 | AI Engine (gRPC) | gRPC/HTTP2 | No — internal only |
| 5432 | PostgreSQL | TCP | No — internal only (unless using external DB tools) |
| 6379 | Redis | TCP | No — internal only |
Firewall Rules
If your infrastructure uses egress filtering, allow outbound HTTPS (port 443) to:
api.truthvouch.com- Your LLM provider’s API endpoint
ghcr.ioand*.githubusercontent.com(for image pulls)
No inbound ports need to be open to the public internet. The gateway only needs to be reachable by your internal applications.
Resource Scaling Guidelines
The default configuration handles moderate traffic. For higher throughput, consider these adjustments:
| Scenario | CPU | RAM | Disk | Notes |
|---|---|---|---|---|
| Low traffic (<100 req/min) | 4 cores | 8 GB | 20 GB | Default configuration |
| Medium traffic (100–1,000 req/min) | 8 cores | 16 GB | 50 GB | Increase GATEWAY_WORKERS in .env |
| High traffic (>1,000 req/min) | 16+ cores | 32+ GB | 100+ GB | Consider Kubernetes deployment with horizontal scaling |
Database disk usage depends on audit retention settings. At the default 90-day retention (AUDIT_RETENTION_DAYS=90), expect approximately 1 GB of database growth per 1 million scanned requests.
Next Steps
- Installation — Deploy the gateway stack
- Upgrading — Update to a new version
- Network Requirements — Detailed network architecture
- Firewall: Docker — Docker-specific configuration