The AI Provisioning Platform, simplifying the management and deployment of complex AI stacks. Provision and manage trusted, containerized AI environments consistently, anywhere from cloud, on-prem, or edge.
π Full Docs πΊ YouTube π§ Configuration Builder βοΈ API Docs π§βπ» CLI Docs π¬ Discord π Blog
TrustGraph streamlines the delivery and management of complex AI environments, acting as a comprehensive provisioning platform for your containerized AI tools, pipelines, and integrations.
Deploying state-of-the-art AI requires managing a complex web of models, frameworks, data pipelines, and monitoring tools. TrustGraph simplifies this by providing a unified, open-source solution to provision complete, trusted AI environments anywhere you need them β from cloud instances and on-premises servers to edge devices.
See the API Developerβs Guide for more information.
For users, TrustGraph has the following interfaces:
The TrustGraph CLI
installs the commands for interacting with TrustGraph while running along with the Python SDK. The Configuration Builder
enables customization of TrustGraph deployments prior to launching. The REST API can be accessed through port 8088
of the TrustGraph host machine with JSON request and response bodies.
pip3 install trustgraph-cli==0.21.17
[!NOTE]
TheTrustGraph CLI
version must match the desiredTrustGraph
release version.
TrustGraph is endlessly customizable by editing the YAML
launch files. The Configuration Builder
provides a quick and intuitive tool for building a custom configuration that deploys with Docker, Podman, Minikube, AWS, Azure, Google Cloud, or Scaleway. There is a Configuration Builder
for the both the lastest and stable TrustGraph
releases.
The Configuration Builder
has 4 important sections:
8888
YAML
files with deployment instructionsThe Configuration Builder
will generate the YAML
files in deploy.zip
. Once deploy.zip
has been downloaded and unzipped, launching TrustGraph is as simple as navigating to the deploy
directory and running:
docker compose up -d
[!TIP]
Docker is the recommended container orchestration platform for first getting started with TrustGraph.
When finished, shutting down TrustGraph is as simple as:
docker compose down -v
The -v
flag will destroy all data on shut down. To restart the system, itβs necessary to keep the volumes. To keep the volumes, shut down without the -v
flag:
docker compose down
With the volumes preserved, restarting the system is as simple as:
docker compose up -d
All data previously in TrustGraph will be saved and usable on restart.
If added to the build in the Configuration Builder
, the Test Suite
will be available at port 8888
. The Test Suite
has the following capabilities:
.pdf
, .txt
, or .md
into the system with document metadataTrustGraph is fully containerized and is launched with a YAML
configuration file. Unzipping the deploy.zip
will add the deploy
directory with the following subdirectories:
docker-compose
minikube-k8s
gcp-k8s
[!NOTE]
As more integrations have been added, the number of possible combinations of configurations has become quite large. It is recommended to use theConfiguration Builder
to build your deployment configuration. Each directory containsYAML
configuration files for the default component selections.
Docker:
docker compose -f <launch-file.yaml> up -d
Kubernetes:
kubectl apply -f <launch-file.yaml>
TrustGraph is designed to be modular to support as many LLMs and environments as possible. A natural fit for a modular architecture is to decompose functions into a set of modules connected through a pub/sub backbone. Apache Pulsar serves as this pub/sub backbone. Pulsar acts as the data broker managing data processing queues connected to procesing modules.
TrustGraph incorporates TrustRAG, an advanced RAG approach that leverages automatically constructed Knowledge Graphs to provide richer and more accurate context to LLMs. Instead of relying solely on unstructured text chunks, TrustRAG understands and utilizes the relationships between pieces of information.
How TrustRAG Works:
Automated Knowledge Graph Construction:
Hybrid Retrieval Process:
Context Generation via Subgraph Traversal:
One of the biggest challenges currently facing RAG architectures is the ability to quickly reuse and integrate knowledge sets. TrustGraph solves this problem by storing the results of the document ingestion process in reusable Knowledge Cores. Being able to store and reuse the Knowledge Cores means the process has to be run only once for a set of documents. These reusable Knowledge Cores can be loaded back into TrustGraph and used for TrustRAG.
A Knowledge Core has two components:
When a Knowledge Core is loaded into TrustGraph, the corresponding graph edges and vector embeddings are queued and loaded into the chosen graph and vector stores.
As a full-stack platform, TrustGraph provides all the stack layers needed to connect the data layer to the app layer for autonomous operations.
TrustGraph seamlessly integrates API services, data stores, observability, telemetry, and control flow for a unified platform experience.
TrustGraph extracts knowledge documents to an ultra-dense knowledge graph using 3 automonous data extraction agents. These agents focus on individual elements needed to build the knowledge graph. The agents are:
The agent prompts are built through templates, enabling customized data extraction agents for a specific use case. The data extraction agents are launched automatically with the loader commands.
PDF file:
tg-load-pdf <document.pdf>
Text or Markdown file:
tg-load-text <document.txt>
Once the knowledge graph and embeddings have been built or a cognitive core has been loaded, RAG queries are launched with a single line:
tg-invoke-graph-rag -q "What are the top 3 takeaways from the document?"
Invoking the Agent Flow will use a ReAct style approach the combines Graph RAG and text completion requests to think through a problem solution.
tg-invoke-agent -v -q "Write a blog post on the top 3 takeaways from the document."
[!TIP]
Adding-v
to the agent request will return all of the agent managerβs thoughts and observations that led to the final response.
Once the platform is running, access the Grafana dashboard at:
http://localhost:3000
Default credentials are:
user: admin
password: admin
The default Grafana dashboard tracks the following:
TrustGraph is licensed under AGPL-3.0.