Recently Updated Pages
Manual Migration Using keydb-cli and Dump Files
Manual migrations using KeyDB’s native tools are ideal for users who prefer full control over dat...
Cloning a Service to Another Provider or Region
Migrating or cloning services across cloud providers or geographic regions is a critical part of ...
Database Migration Service for KeyDB
Elestio provides a structured approach for migrating KeyDB databases from various environments, s...
Deleting a Cluster
When a cluster is no longer needed whether it was created for testing, staging, or an obsolete wo...
Database Migrations
When managing production-grade services, the ability to perform reliable and repeatable database ...
Cluster Resynchronization
In distributed systems, consistency and synchronization between nodes are critical to ensure that...
Restricting Access by IP
Securing access to services is a fundamental part of managing cloud infrastructure. One of the mo...
Backups and Restores
Reliable backups are essential for data resilience, recovery, and business continuity. Elestio pr...
Removing a Node
Over time, infrastructure needs change. You may scale down a cluster after peak load, decommissio...
Promoting a Node
Clusters can be designed for high availability or role-based workloads, where certain nodes may t...
Adding a Node
As your application usage grows or your infrastructure requirements change, scaling your cluster ...
Node Management
Node management plays a critical role in operating reliable and scalable infrastructure on Elesti...
Deploying a New Cluster
Creating a cluster is a foundational step when deploying services in Elestio. Clusters provide is...
Overview
Elestio provides a complete solution for setting up and managing software clusters. This helps us...
Overview
KeyDB is an open-source, high-performance in-memory database solution designed for real-time appl...
Resetting User Passwords in KeycloakNew Page
Password resets are a critical part of account lifecycle management. Keycloak provides multiple s...
Enabling Two-Factor Authentication (2FA) in Keycloak
Two-Factor Authentication (2FA) adds an extra layer of security to user logins by requiring somet...
Enabling Identity Federation in Keycloak
Identity federation allows you to delegate authentication to external identity providers (IdPs) l...
Setting Up Roles and Permissions in Keycloak
Roles and permissions in Keycloak define what users and applications are allowed to do. Roles can...
Creating and Configuring Clients in Keycloak
A client in Keycloak represents an application or service that uses Keycloak to authenticate user...