Overview
This is a repackaged software product wherein additional charges apply for hardening, security configuration, and support.
WHAT IS QDRANT
Qdrant is an open-source, high-performance vector database and similarity search engine written in Rust. It stores high-dimensional embeddings and retrieves them at millisecond latency using HNSW indexing, scalar quantization, and binary quantization.
Qdrant is the vector store layer in RAG (Retrieval-Augmented Generation) pipelines, semantic search engines, recommendation systems, and any AI application that needs to find semantically similar items at scale. It integrates natively with LangChain, LlamaIndex, OpenAI, and all major embedding models.
Ports: 6333 (REST API + Web UI), 6334 (gRPC).
WHY SELF-HOST YOUR VECTOR STORE
Sending your document embeddings and query vectors to a cloud SaaS means your data leaves your infrastructure. For teams building RAG on proprietary documents, legal data, medical records, or any GDPR-regulated content, self-hosted Qdrant keeps your embeddings and payloads entirely within your own VPC.
Self-hosted Qdrant also eliminates per-request SaaS pricing - for high-query workloads the cost difference compounds quickly.
ENHANCED SECURITY OUT OF THE BOX
Out of the box, Qdrant starts without API key authentication and binds to all network interfaces, exposing both the REST API and the Web UI. Enabling authentication, restricting network access, and hardening the underlying OS requires careful manual configuration.
This AMI pre-configures all of these for you at first boot.
WHAT THIS AMI ADDS
Security defaults:
- Unique API key generated per instance at first boot - no default empty key
- Qdrant REST API (6333) and gRPC API (6334) - open to trusted IPs only; configure Security Group
- UFW firewall - ports 22, 6333, 6334 only; all other ports blocked
- fail2ban - SSH brute-force protection
- AppArmor - mandatory access control
OS hardening (CIS Level 1):
- CIS Ubuntu 24.04 LTS Level 1 benchmark applied via ansible-lockdown
- auditd - system call auditing for critical paths
- SSH hardening - PasswordAuthentication disabled, key-only access
- Kernel hardening - SYN cookies, ASLR, rp_filter, TCP BBR
- IMDSv2 enforced - SSRF protection
Compliance artifacts (inside the AMI):
- SBOM - CycloneDX 1.6 software bill of materials at /etc/lynxroute/sbom.json
- CIS Conformance Report - OpenSCAP HTML report at /etc/lynxroute/cis-report.html
- Tailored CIS profile - documents all applied controls and any deviations at /usr/share/doc/lynxroute/CIS_TAILORED_PROFILE.md
Quick Start:
- Launch instance (t3.medium recommended)
- SSH: ssh -i key.pem ubuntu@<PUBLIC_IP>
- Read credentials: sudo cat /root/qdrant-credentials.txt
- Open Security Group - allow TCP 6333 from your IP
- Open http://<PUBLIC_IP>:6333/dashboard - enter API key from credentials file
Credentials and API key are saved to /root/qdrant-credentials.txt at first boot. Important: never expose port 6333 to 0.0.0.0/0 without restricting to trusted IPs - the API key is the only authentication layer.
Highlights
- Qdrant secure by default: unique API key per instance, UFW firewall pre-configured, Web UI access controlled - vector database API and admin interface are not exposed to the internet out of the box.
- CIS Level 1 hardened Ubuntu 24.04 LTS: auditd, fail2ban, AppArmor, SSH key-only, IMDSv2 enforced, SBOM and CIS Conformance Report included for compliance and audit teams.
- AI-ready out of the box: fastembed pre-installed for local embedding without external API calls, Python SDK included, quickstart examples at /etc/lynxroute/tests/ - start building RAG pipelines in minutes.
Details
Introducing multi-product solutions
You can now purchase comprehensive solutions tailored to use cases and industries.
Features and programs
Financing for AWS Marketplace purchases
Pricing
Free trial
Dimension | Cost/hour |
|---|---|
t3.medium Recommended | $0.10 |
t3.micro | $0.05 |
t3.large | $0.12 |
t3.small | $0.07 |
m6i.xlarge | $0.20 |
m6i.large | $0.15 |
Vendor refund policy
We do not offer refunds for this product. AWS infrastructure charges (EC2, EBS, data transfer) are billed separately by AWS and are not refundable by us. If you experience technical issues with the AMI, please contact us at support@lynxroute.com before requesting a refund.
How can we make this page better?
Legal
Vendor terms and conditions
Content disclaimer
Delivery details
64-bit (x86) Amazon Machine Image (AMI)
Amazon Machine Image (AMI)
An AMI is a virtual image that provides the information required to launch an instance. Amazon EC2 (Elastic Compute Cloud) instances are virtual servers on which you can run your applications and workloads, offering varying combinations of CPU, memory, storage, and networking resources. You can launch as many instances from as many different AMIs as you need.
Version release notes
Version 1.17.1 - Initial release (April 2026)
- Qdrant 1.17.1 on Ubuntu 24.04 LTS
- CIS Level 1 hardening applied (ansible-lockdown/UBUNTU24-CIS)
- Unique API key generated per instance at first boot - no default empty key
- Web UI included - accessible at /dashboard on port 6333
- fastembed (BAAI/bge-small-en-v1.5) pre-installed for local embedding
- Python SDK (qdrant-client) pre-installed with quickstart examples
- UFW firewall pre-configured (ports 22, 6333, 6334 only)
- fail2ban, auditd, AppArmor pre-configured
- SBOM (CycloneDX 1.6) at /etc/lynxroute/sbom.json
- CIS Conformance Report (OpenSCAP) at /etc/lynxroute/cis-report.html
- Tailored CIS profile with documented controls at /usr/share/doc/lynxroute/CIS_TAILORED_PROFILE.md
- IMDSv2 enforced
Additional details
Usage instructions
- Launch instance (t3.medium recommended)
- SSH: ssh -i key.pem ubuntu@<PUBLIC_IP>
- Read credentials: sudo cat /root/qdrant-credentials.txt
- Open Security Group - allow TCP 6333 from your IP
- Open http://<PUBLIC_IP>:6333/dashboard - enter API key from credentials file
Credentials and API key are saved to /root/qdrant-credentials.txt at first boot. Important: never expose port 6333 to 0.0.0.0/0 without restricting to trusted IPs - the API key is the only authentication layer.
Resources
Vendor resources
Support
Vendor support
Visit us online
AWS infrastructure support
AWS Support is a one-on-one, fast-response support channel that is staffed 24x7x365 with experienced and technical support engineers. The service helps customers of all sizes and technical abilities to successfully utilize the products and features provided by Amazon Web Services.