Deployment - Quick Start
FoundationaLLM is designed for seamless deployment within your Azure Subscription. It initially utilizes Azure Container Apps (ACA) for rapid deployment and streamlined development. For scaling up to production environments, FoundationaLLM also supports deployment on Azure Kubernetes Service (AKS), offering robust scalability and management features.
Be mindful of the Azure OpenAI regional quota limits on the number of Azure OpenAI Service instances. To optimize resource usage, FoundationaLLM offers the flexibility to connect to an existing Azure OpenAI Service resource, thereby avoiding the creation of additional instances during deployment. This feature is particularly useful for managing resource allocation and ensuring efficient Azure OpenAI Service quota utilization.
Prerequisites
You will need the following resources and access to deploy the solution:
- Azure Subscription: An Azure Subscription is a logical container in Microsoft Azure that links to an Azure account and is the basis for billing, resource management, and allocation. It allows users to create and manage Azure resources like virtual machines, databases, and more, providing a way to organize access and costs associated with these resources.
- Subscription access to Azure OpenAI service: Access to Azure OpenAI Service provides users with the ability to integrate OpenAI's advanced AI models and capabilities within Azure. This service combines OpenAI's powerful models with Azure's robust cloud infrastructure and security, offering scalable AI solutions for a variety of applications like natural language processing and generative tasks. Start here to Request Access to Azure OpenAI Service
- Minimum quota of 65 CPUs across all VM family types: Azure CPU quotas refer to the limits set on the number and type of virtual CPUs that can be used in an Azure Subscription. These quotas are in place to manage resource allocation and ensure fair usage across different users and services. Users can request quota increases if their application or workload requires more CPU resources. Start here to Manage VM Quotas
- App Registrations created in the Entra ID tenant (formerly Azure Active Directory): Azure App Registrations is a feature in Entra ID that allows developers to register their applications for identity and access management. This registration process enables applications to authenticate users, request and receive tokens, and access Azure resources that are secured by Entra ID. Follow the instructions in the Authentication and Authorization setup document to configure authentication for the solution.
- User with the proper role assignments: Azure Role-Based Access Control (RBAC) roles are a set of permissions in Azure that control access to Azure resource management. These roles can be assigned to users, groups, and services in Azure, allowing granular control over who can perform what actions within a specific scope, such as a subscription, resource group, or individual resource.
- Owner on the target subscription
- Owner on the App Registrations described in the Authentication setup document
You will use the following tools during deployment:
- Azure Developer CLI (v1.6.1 or greater)
- Azure CLI (v2.51.0 or greater):
- Latest Git
- PowerShell 7 (7.4.1 or greater)
Optional To run or debug the solution locally, you will need to install the following dependencies:
- .NET 8 SDK
- Visual Studio 2022
Optional To build or test container images, you will need to install the following dependencies:
Important
The perception of the main
branch in GitHub, or any version control system, can vary depending on the development workflow adopted by a particular team or organization. The FoundationaLLM team uses the main
branch as the primary development branch. In this case, the main
branch might indeed be considered a work in progress, with developers regularly pushing changes and updates directly to it. It is where ongoing development work happens.
So for deployment purposes, it is recommended to use the latest release branch, which is considered stable and tested. The release branch is a snapshot of the main
branch at a specific point in time, where the code is considered stable and ready for deployment. The release branch is tagged with a version number, such as 0.6.0
, and is the recommended branch for deployment. Please find our latest releases here
Deployment steps
Follow the steps below to deploy the solution to your Azure subscription.
If you are upgrading from a previous version, like 0.5.0
, please refer to the changes in the breaking changes notes.
Important
Follow the instructions in the Authentication and Authorization setup document to finalize authentication and authorization for the solution. Bear in mind that creating the app registrations in the Entra ID tenant is a prerequisite for the deployment, but you will have to revisit some of these settings after the deployment is complete later to fill in some missing values that are generated during the deployment.
Ensure all the prerequisites are met and you have installed the tools required to complete the deployment.
From a PowerShell prompt, execute the following to clone the repository:
git clone https://github.com/solliancenet/foundationallm.git cd foundationallm/deploy/quick-start git checkout release/0.8.3
Run the following script to install the deployment utilities, including
AzCopy
, locally.cd .\deploy\common\scripts .\Get-AzCopy.ps1
Run the following commands to log into Azure CLI, Azure Developer CLI and AzCopy (the instance you just installed above):
cd .\deploy\quick-start az login # Log into Azure CLI azd auth login # Log into AZD ..\common\tools\azcopy\azcopy login # Log into AzCopy
Set up an
azd
environment targeting your Azure subscription and desired deployment region:# Set your target Subscription and Location azd env new --location <Supported Azure Region> --subscription <Azure Subscription ID>
Run the following commands to set the appropriate application registration settings for OIDC authentication.
cd .\deploy\quick-start ..\common\scripts\Set-AzdEnvEntra.ps1
Optional: Bring Your Own Azure OpenAI Instance
If you have an existing Azure OpenAI instance, you can use it by setting the following environment variables:
azd env set OPENAI_NAME <OpenAI Name>
azd env set OPENAI_RESOURCE_GROUP <OpenAI Resource Group>
azd env set OPENAI_SUBSCRIPTION_ID <OpenAI Subscription ID>
Important
Deploying with Bring Your Own Azure OpenAI
, customers need to make sure that the relevant Managed Identities (LangChain API, Semantic Kernel API, and Gateway API) are assigned the Open AI reader role
on the Azure OpenAI account object.
Deploy the solution
After setting the OIDC-specific settings in the AZD environment above, run
azd up
in the same folder location to provision the infrastructure, update the App Configuration entries, deploy the API and web app services, and import files into the storage account.azd up
Running script to allow MS Graph access through Role Permissions
After the deployment is complete, you will need to run the following script to allow MS Graph access through Role Permissions. (See below)
Important
The user running the script will need to have the appropriate permissions to assign roles to the managed identities. The user will need to be a Global Administrator
or have the Privileged Role Administrator
role in the Entra ID tenant.
The syntax for running the script from the deploy\quick-start\common\scripts
folder is:
cd .\deploy\quick-start
..\common\scripts\Set-FllmGraphRoles.ps1 -resourceGroupName rg-<azd env name>
Finally, you will need to update the Authorization Callbacks in the App Registrations created in the Entra ID tenant by running the following script:
cd .\deploy\quick-start
..\common\scripts\Update-OAuthCallbackUris.ps1
Teardown
To tear down the environment, execute azd down
in the same folder location.
azd down --purge
Note
The --purge
argument in the command above. This ensures that resources that would otherwise be soft-deleted are instead completely purged from your Azure subscription.