Kestra Administrator Guide – Operate and Secure Your Cluster

The Administrator Guide covers everything you need to know about managing your Kestra cluster.

Operate and secure your Kestra cluster

Kestra Requirements – Software and Hardware Checklist

Check Kestra system requirements. Verify software prerequisites (Java, DB) and hardware recommendations for running Kestra effectively.

Alerting and Monitoring Kestra – Best Practices

Monitor and alert on Kestra health. Best practices for setting up Prometheus metrics, health checks, and failure notifications for your instance.

Troubleshooting Kestra – Common Issues and Fixes

Solutions for common Kestra issues, including pod restarts, unprocessable executions, and Docker-in-Docker problems.

Backup and Restore Kestra – Metadata and Data

Learn how to perform full or metadata-only backups and restores of your Kestra instance for disaster recovery and migration.

Basic Authentication Troubleshooting in Kestra

Troubleshoot common issues with Basic Authentication in Kestra, including configuration and login problems.

Configure DinD Behind MITM Proxy for Kestra

Configure Docker-in-Docker (DinD) to run securely behind a corporate or MITM proxy within your Kestra deployment.

High Availability for Kestra – Design and Configuration

Design and configure Kestra for High Availability (HA) to ensure fault tolerance and continuous operation in production.

Align JVM CPU Limits on Kubernetes

Configure the Kestra Helm chart to force the JVM to honor Kubernetes CPU limits, preventing pods from over-consuming resources.

Configure Kestra with MITM Proxy – Outbound HTTPS

Configure Kestra to route outbound HTTPS traffic through a Man-in-the-Middle (MITM) proxy for secure environments.

OpenTelemetry in Kestra – Traces, Metrics, Logs

Implement observability in Kestra with OpenTelemetry to export traces, metrics, and logs to your preferred monitoring tools.

Prometheus Metrics in Kestra – Endpoint and Signals

Explore the available Prometheus metrics in Kestra to monitor the performance and health of your orchestration cluster.

Purge Old Data in Kestra – Executions, Logs, Key-Value Store, Files

Use purge tasks to remove old executions, logs, and key-value pairs, helping reduce storage usage.

Security Hardening for Kestra – Isolation and Network Controls

Best practices for hardening Kestra security, including network isolation, host-level controls, and plugin validation.

Server Component Liveness in Kestra – Heartbeats and Recovery

Understand Kestra's server liveness mechanism, heartbeats, and how it handles component failures and recovery.

Configure SSL/TLS for Kestra – Secure the UI

Configure SSL/TLS encryption for Kestra to secure the UI and API access using self-signed or CA-signed certificates.

Manage Kestra Upgrades – Rolling and Rollback

Best practices for upgrading Kestra, performing rolling updates, and rolling back to previous versions safely.

Usage Reporting in Kestra – Configure Anonymous Metrics

Learn about anonymous usage reporting in Kestra and how to configure or disable data collection.

Configure Kestra Webserver URL – Links and Proxies

Configure the Kestra webserver URL and proxy settings to ensure correct link generation and access behind reverse proxies.

Was this page helpful?