Kestra Administrator Guide – Operate and Secure Your Cluster
The Administrator Guide covers everything you need to know about managing your Kestra cluster.
Operate and secure your Kestra cluster
- Check the Installation Guide for details on how to install Kestra to your preferred environment.
- Check the Configuration Reference for details on how to configure Kestra based your specific needs.
Kestra Requirements – Software and Hardware Checklist
Check Kestra system requirements. Verify software prerequisites (Java, DB) and hardware recommendations for running Kestra effectively.
Alerting and Monitoring Kestra – Best Practices
Monitor and alert on Kestra health. Best practices for setting up Prometheus metrics, health checks, and failure notifications for your instance.
Troubleshooting Kestra – Common Issues and Fixes
Solutions for common Kestra issues, including pod restarts, unprocessable executions, and Docker-in-Docker problems.
Backup and Restore Kestra – Metadata and Data
Learn how to perform full or metadata-only backups and restores of your Kestra instance for disaster recovery and migration.
Basic Authentication Troubleshooting in Kestra
Troubleshoot common issues with Basic Authentication in Kestra, including configuration and login problems.
Configure DinD Behind MITM Proxy for Kestra
Configure Docker-in-Docker (DinD) to run securely behind a corporate or MITM proxy within your Kestra deployment.
High Availability for Kestra – Design and Configuration
Design and configure Kestra for High Availability (HA) to ensure fault tolerance and continuous operation in production.
Align JVM CPU Limits on Kubernetes
Configure the Kestra Helm chart to force the JVM to honor Kubernetes CPU limits, preventing pods from over-consuming resources.
Configure Kestra with MITM Proxy – Outbound HTTPS
Configure Kestra to route outbound HTTPS traffic through a Man-in-the-Middle (MITM) proxy for secure environments.
OpenTelemetry in Kestra – Traces, Metrics, Logs
Implement observability in Kestra with OpenTelemetry to export traces, metrics, and logs to your preferred monitoring tools.
Prometheus Metrics in Kestra – Endpoint and Signals
Explore the available Prometheus metrics in Kestra to monitor the performance and health of your orchestration cluster.
Purge Old Data in Kestra – Executions, Logs, Key-Value Store, Files
Use purge tasks to remove old executions, logs, and key-value pairs, helping reduce storage usage.
Security Hardening for Kestra – Isolation and Network Controls
Best practices for hardening Kestra security, including network isolation, host-level controls, and plugin validation.
Server Component Liveness in Kestra – Heartbeats and Recovery
Understand Kestra's server liveness mechanism, heartbeats, and how it handles component failures and recovery.
Configure SSL/TLS for Kestra – Secure the UI
Configure SSL/TLS encryption for Kestra to secure the UI and API access using self-signed or CA-signed certificates.
Manage Kestra Upgrades – Rolling and Rollback
Best practices for upgrading Kestra, performing rolling updates, and rolling back to previous versions safely.
Usage Reporting in Kestra – Configure Anonymous Metrics
Learn about anonymous usage reporting in Kestra and how to configure or disable data collection.
Configure Kestra Webserver URL – Links and Proxies
Configure the Kestra webserver URL and proxy settings to ensure correct link generation and access behind reverse proxies.
Was this page helpful?