Recently Updated Pages
Database Migrations
When managing production-grade services, the ability to perform reliable and repeatable database ...
Cluster Resynchronization
In distributed systems, consistency and synchronization between nodes are critical to ensure that...
Restricting Access by IP
Securing access to services is a fundamental part of managing cloud infrastructure. One of the mo...
Backups and Restores
Reliable backups are essential for data resilience, recovery, and business continuity. Elestio pr...
Removing a Node
Over time, infrastructure needs change. You may scale down a cluster after peak load, decommissio...
Promoting a Node
Clusters can be designed for high availability or role-based workloads, where certain nodes may t...
Adding a Node
As your application usage grows or your infrastructure requirements change, scaling your cluster ...
Node Management
Node management plays a critical role in operating reliable and scalable infrastructure on Elesti...
Deploying a New Cluster
Creating a cluster is a foundational step when deploying services in Elestio. Clusters provide is...
Overview
Elestio provides a complete solution for setting up and managing software clusters. This helps us...
Overview
KeyDB is an open-source, high-performance in-memory database solution designed for real-time appl...
Resetting User Passwords in KeycloakNew Page
Password resets are a critical part of account lifecycle management. Keycloak provides multiple s...
Enabling Two-Factor Authentication (2FA) in Keycloak
Two-Factor Authentication (2FA) adds an extra layer of security to user logins by requiring somet...
Enabling Identity Federation in Keycloak
Identity federation allows you to delegate authentication to external identity providers (IdPs) l...
Setting Up Roles and Permissions in Keycloak
Roles and permissions in Keycloak define what users and applications are allowed to do. Roles can...
Creating and Configuring Clients in Keycloak
A client in Keycloak represents an application or service that uses Keycloak to authenticate user...
Adding and Managing Users in Keycloak
Users in Keycloak represent the individuals or system accounts that authenticate and interact wit...
Creating a Realm in Keycloak
A realm in Keycloak is the top-level container for managing users, roles, groups, identity provid...
Connecting External Identity Providers
This guide explains how to integrate external identity providers (IdPs) like Google, GitHub, Face...
Connecting with Keycloak Admin Rest API
This guide explains how to authenticate with and use the Keycloak Admin REST API from a backend a...