Kestra Administrator Guide – Operate and Secure Your Cluster
The Administrator Guide covers everything you need to know about managing your Kestra cluster.
Operate and secure your Kestra cluster
- Check the Installation Guide for details on how to install Kestra to your preferred environment.
- Check the Configuration Reference for details on how to configure Kestra based your specific needs.
Kestra Requirements – Software and Hardware Checklist
Alerting and Monitoring Kestra – Best Practices
Troubleshooting Kestra – Common Issues and Fixes
Backup and Restore Kestra – Metadata and Data
Basic Authentication Troubleshooting in Kestra
Configure DinD Behind MITM Proxy for Kestra
High Availability for Kestra – Design and Configuration
Configure Kestra with MITM Proxy – Outbound HTTPS
OpenTelemetry in Kestra – Traces, Metrics, Logs
Prometheus Metrics in Kestra – Endpoint and Signals
Purge Old Data in Kestra – Executions, Logs, KV
Security Hardening for Kestra – Isolation and Network Controls
Server Component Liveness in Kestra – Heartbeats and Recovery
Configure SSL/TLS for Kestra – Secure the UI
Manage Kestra Upgrades – Rolling and Rollback
Usage Reporting in Kestra – Configure Anonymous Metrics
Configure Kestra Webserver URL – Links and Proxies
Was this page helpful?