Documentation

Install InfluxDB Clustered

InfluxDB Clustered is deployed and managed using Kubernetes. This installation guide walks you through the following four installation phases and the goal of each phase. This process helps you set up and run your cluster and ensure it performs well with your expected production workload.

  1. Set up your cluster: Get a basic InfluxDB cluster up and running with as few external dependencies as possible and confirm you can write and query data.
  2. Customize your cluster: Review and customize the available configuration options specific to your workload.
  3. Optimize your cluster: Scale and load test your InfluxDB cluster to confirm that it will satisfy your scalability and performance needs. Work with InfluxData to review your schema and determine how best to organize your data and develop queries representative of your workload to ensure queries meet performance requirements.
  4. Secure your cluster: Integrate InfluxDB with your identity provider to manage access to your cluster. Install TLS certificates and enable TLS access. Prepare your cluster for production use.

InfluxDB Clustered license

InfluxDB Clustered is a commercial product offered by InfluxData, the creators of InfluxDB. Please contact InfluxData Sales to obtain a license before installing InfluxDB Clustered.

Contact InfluxData Sales

Setup, configure, and deploy InfluxDB Clustered


Was this page helpful?

Thank you for your feedback!


The future of Flux

Flux is going into maintenance mode. You can continue using it as you currently are without any changes to your code.

Read more

InfluxDB 3 Open Source Now in Public Alpha

InfluxDB 3 Open Source is now available for alpha testing, licensed under MIT or Apache 2 licensing.

We are releasing two products as part of the alpha.

InfluxDB 3 Core, is our new open source product. It is a recent-data engine for time series and event data. InfluxDB 3 Enterprise is a commercial version that builds on Core’s foundation, adding historical query capability, read replicas, high availability, scalability, and fine-grained security.

For more information on how to get started, check out: