Picture this: your monitoring dashboard lights up with alerts while your recovery system is already running replication jobs in the background. You pivot to Kibana, pull up metrics, and dive into incident logs. Somewhere underneath, Zerto has been silently pushing data through your DR pipeline. If you could make these two talk natively, you’d spend less time in console hopscotch and more time solving real problems.
Kibana brings visibility, Zerto brings resilience. One turns logs into insight. The other turns downtime into a recoverable state. Integrated correctly, they create a feedback loop between observability and continuity. Teams get not just alerts, but context on what to restore, when, and why it failed in the first place.
The key connection flows through identity and data routing. Kibana holds indexed event data from your stack—think Elasticsearch queries, access logs, and visualization layers. Zerto tracks replication states across virtual machines or cloud workloads. When Kibana queries replication health metrics published by Zerto APIs, your dashboards start showing not just “up” or “down,” but replication lag, checkpoint frequency, and site failover readiness. A clean link between the analytics and recovery layers means an outage graph can instantly tell you what’s restorable within seconds.
To get that right, map authentication between both systems under one identity provider. OIDC integration with Okta or Azure AD lets Kibana read authenticated API endpoints from Zerto without exposing credentials. Keep RBAC tight: viewer roles shouldn’t trigger restores, only display health data. Rotate API secrets with your existing key vault to avoid “mystery access” incidents.
Quick answer: How do I connect Kibana and Zerto?
You can link Kibana visualizations to Zerto metrics by using Zerto’s REST API and secure tokens. Feed that data into Elasticsearch indices, then plot it through standard dashboard panels. This gives real-time visibility into replication performance without custom connectors.