Governance in Kestra Enterprise – Security and Control
Available on:
Give your team secured, isolated environments and control over workflows with tenants, audit logs, secrets and more.
Governance – security and control
With tailored automation and precise access management, you can ensure compliance and efficiency at scale.
Audit Logs in Kestra – Governance and Compliance Guide
How to use Audit Logs to govern activities in your Kestra instance.
Namespace Management in Kestra Enterprise – Secure Configuration
How to manage secrets, variables, and plugin defaults at the namespace level.
Allowed & Restricted Plugins in Kestra Enterprise
How to configure Kestra to allow or restrict specific plugins.
Custom & Template Blueprints in Kestra Enterprise – Private Templates
How to create and manage Custom and Template Blueprints.
Log Shipper for Kestra Enterprise – Centralize Logs
Manage and distribute logs across your entire infrastructure.
Read-Only Secret Manager in Kestra Enterprise
Integrate external secrets managers in a read-only mode.
Configure External Secrets Manager in Kestra Enterprise
How to configure a secrets manager.
Secrets in Kestra Enterprise – Manage Sensitive Data
How to create and manage Secrets in the Enterprise Edition.
Multi-Tenancy in Kestra – Configure and Manage Tenants
How to enable multi-tenancy in your Kestra instance.
Unit Tests in Kestra Enterprise – Validate Flows Safely
Build Tests to ensure proper Flow behavior.
Worker Isolation in Kestra Enterprise – Enforce Separation
How to configure worker isolation in Kestra.
Assets in Kestra – Track Lineage and Metadata
Track and manage the resources your workflows create and use.
Was this page helpful?