Availability
| Edition | Deployment Type |
|---|---|
| Enterprise | Self-Managed, Hybrid |
This guide focuses on the Enterprise Edition of Tyk AI Studio. For the Community Edition, please refer to the Tyk AI Studio GitHub repository. The Community Edition uses different Docker images (
tykio/tyk-ai-studio and tykio/tyk-microgateway) and does not require a license key.Prerequisites
- Kubernetes 1.16+
- Helm 3.0+
kubectlconfigured with access to your cluster- A Tyk AI License key (contact support@tyk.io or your account manager to obtain)
- For production with TLS: cert-manager installed in your cluster
Running on Podman, containerd, or another container runtime? See Container Runtimes.
Generate Secrets
Before installing, generate three secret keys to secure communication and encrypt data:Option 1: Testing / Quickstart
For local development or test clusters. Uses NodePort services, internal PostgreSQL, and no ingress.1. Add the Helm Chart
2. Create values-testing.yaml
Replace the placeholder secrets with your generated values. The grpcAuthToken / edgeAuthToken and microgatewayEncryptionKey / encryptionKey pairs must match.
Expandable
3. Install
4. Set External Gateway URL
The Edge Gateway’s internal service URL is used for routing by default, but the portal needs to display the correct external URL for tools and datasources. After install, patch the config with your cluster’s node IP:Tip: If you know your cluster’s external IP or hostname upfront, you can skip this step by setting
config.toolDisplayUrl and config.datasourceDisplayUrl in your values file instead.5. Verify
Access Points
| Port | URL | Purpose |
|---|---|---|
| 32580 | http://<node-ip>:32580 | AI Studio UI + REST API |
| 32590 | http://<node-ip>:32590 | Embedded AI Gateway |
| 32591 | http://<node-ip>:32591 | Edge Gateway |
Option 2: Production with TLS
For production deployments with Ingress, TLS via cert-manager, and an external database.1. Create values-production.yaml
Replace all placeholder values with your actual configuration.
Expandable
2. Install
3. Verify
After Deployment
First User Registration
After deployment, you need to create your first admin user:- Access the application: Navigate to your configured
SITE_URL(e.g.,https://studio.yourdomain.com) - Register with admin email: Use the EXACT email address you set in the
ADMIN_EMAILenvironment variable in your configuration. - Complete registration: The first user who registers with the admin email will automatically become the administrator.
Important: The first user registration must use the same email address specified in the
ADMIN_EMAIL environment variable. This user will have full administrative privileges.Add Your API Keys
AI Studio pre-populates OpenAI and Anthropic LLM configurations on first startup with placeholder secrets (OPENAI_KEY and ANTHROPIC_KEY). To start using them:
- Open AI Studio at the
siteUrlyou configured and log in with your admin account - Navigate to Governance → Secrets in the sidebar
- Click on
OPENAI_KEYand edit it to add your OpenAI API key - Click on
ANTHROPIC_KEYand edit it to add your Anthropic API key
Push Configuration to the Edge Gateway
- Navigate to AI Portal → Edge Gateways in the sidebar
- Verify your edge gateway (
edge-1) shows as Connected - Click Push Configuration to sync the latest settings to the Edge Gateway
Shared Secrets Reference
These values must match between AI Studio and Edge Gateway configuration:| AI Studio Config | Edge Gateway Config | Purpose |
|---|---|---|
config.grpcAuthToken | microgateway.secrets.edgeAuthToken | Authenticates the gRPC connection |
config.microgatewayEncryptionKey | microgateway.secrets.encryptionKey | Encrypts synced configuration data |
config.tykAiLicense | microgateway.secrets.tykAiLicense | Enterprise license |
Port Reference
| Port | Component | Purpose |
|---|---|---|
| 8080 | AI Studio | Admin UI + REST API |
| 9090 | AI Studio | Embedded AI Gateway |
| 50051 | AI Studio | gRPC control server (internal) |
| 8080 | Edge Gateway | Edge AI Gateway |
| 5432 | PostgreSQL | Database |
Advanced Configuration
Message Queue (NATS)
For distributed deployments with message persistence, add NATS configuration to your values file:Optional Components
Reranker Service
Improves RAG result relevance:Transformer Server
Handles embedding generation:Scaling Edge Gateways
To deploy multiple edge gateways for different regions, overrideedgeId and edgeNamespace per instance. You can either deploy separate Helm releases or create additional Kubernetes Deployments with unique values:
Database Options
Internal PostgreSQL (testing/small deployments):Maintenance
Upgrading
Uninstalling
Viewing Logs
Troubleshooting
Check pod and ingress status
Check pod and ingress status
Common Issues
Common Issues
- Database connection failures: Check credentials and network access
- Ingress not working: Verify DNS records and TLS configuration
- Login fails on HTTP: Set
devMode: "true"— session cookies require this when not using HTTPS - Marketplace page is empty: Set
ociCacheDir: "./data/cache/plugins"in your config values — the marketplace service will not start without it - Plugin signature verification: Docker images use distroless bases without cosign. Set
ociRequireSignature: "false"to disable signature verification
Edge Gateway cannot connect to AI Studio
Edge Gateway cannot connect to AI Studio
- Verify the Edge Gateway pod logs:
- Check that
CONTROL_ENDPOINTresolves to the AI Studio service (default:midsommar:50051) - Verify
edgeAuthTokenmatchesgrpcAuthTokenexactly - Verify
encryptionKeymatchesmicrogatewayEncryptionKeyexactly - Check that
GATEWAY_MODE=controlis set in AI Studio config