Memory failure
is not an option.
Self-hosted memory infrastructure for mission-critical environments.
Every conversation, every briefing detail, every operational decision — captured, connected, and instantly retrievable. On your network. Under your control. Zero cloud dependencies.
Self-Hosted
Runs entirely on your infrastructure. On-premises, air-gapped, or hybrid. Your data never leaves your network unless you explicitly configure it to.
Air-Gap Ready
Core operations require zero internet connectivity. No telemetry, no phone-home, no cloud APIs. Fully operational offline with local LLM processing.
API-Key Auth
No OAuth middlemen. No third-party identity providers. Direct API key authentication on every endpoint. You control who accesses what.
Full Audit Trail
Every mutation logged with actor, timestamp, and reason. Immutable audit log. Export to your SIEM. Compliance-ready by design.
Built for environments that don't trust clouds.
Open stack. No vendor lock-in. Inspectable source.
Network Requirements
- Ingress: None required (polling architecture)
- Egress: None required for core operations
- Optional: Internet for cloud LLM APIs (or use local models)
- Ports: 8000 (API), 10002 (MCP), 5432 (DB), 7687 (graph)
Processing Pipeline
- Ingestion: 500+ messages/minute throughput
- Embedding: 100+ memories/minute (batch)
- Search: < 500ms p99 (hybrid vector + BM25 + graph)
- Quality gate: A-MAC scoring on every incoming item
What Kanister does in the field.
Multi-Source Intelligence Ingestion
Automatically captures from encrypted messaging (Telegram, Signal, WhatsApp), email (Gmail, Exchange), radio transcripts, field reports, and document uploads. Configurable per-source sync intervals.
Entity & Relationship Extraction
Auto-extracts people, organizations, locations, dates, amounts, and operational terms. Builds and maintains a knowledge graph linking every interaction. Fuzzy matching handles aliases and code names.
Semantic Retrieval
Natural language queries across all sources. "What did the convoy commander report about route security last week?" — instant results with source, timestamp, and confidence. Hybrid vector + full-text + graph search.
Contradiction & Anomaly Detection
Flags when new information conflicts with existing knowledge. Detects changes in reported facts, timeline inconsistencies, and contradictory statements across sources.
Agent-Native Access (MCP)
AI agents query and store memories via MCP protocol. 10 agent tools covering search, capture, entity management, session tracking, and proactive context. Works with Claude, custom agents, and automated workflows.
Automated Quality Gate
A-MAC scoring (Accuracy, Mission-relevance, Actionability, Completeness) on every incoming item. Rejects noise, surfaces signal. Human oversight for edge cases.
Designed for zero-trust environments.
Data Sovereignty
All data stays on your hardware. PostgreSQL, Redis, and graph database run locally. No cloud sync. No third-party analytics. Export and delete on your terms.
Access Control
API key authentication on every endpoint. No OAuth, no SSO middlemen, no third-party identity providers. Direct key management under your control.
Audit & Observability
Every mutation logged with actor, timestamp, and reason. Prometheus metrics endpoint. Health checks on all services. Immutable audit log exportable to SIEM.
Deployment
Docker Compose with 10 containers. Runs on commodity hardware (Mac Mini / rack server). ~14.5 GB RAM total. No special hardware or GPU required for core operations.
Adapts to your environment.
Air-Gapped
Fully operational with zero internet connectivity. Local LLM for entity extraction. All data stays on local hardware. Portable via ruggedized server.
On-Premises
Standard deployment on your network. Optional cloud LLM APIs for enhanced processing. Full audit trail and access control. Integrates with existing SIEM.
Distributed
Multiple Kanister instances with sync capability. Each site operates independently. Federated search across deployments. Centralized audit aggregation.
Let's discuss your requirements.
We work directly with defense and government teams to configure Kanister for your specific operational environment and security requirements.
- Technical architecture review
- Air-gap deployment planning
- Custom entity extraction models
- Integration with existing systems
- On-site deployment support