Your monitoring stack is fine—until it isn’t. Metrics look healthy while requests vanish into the void and service meshes start whispering failure. That’s usually the moment someone mutters, “Do we have Kuma SolarWinds wired up right?”
Kuma, a CNCF service mesh built on Envoy, focuses on secure, policy-driven connectivity across services. SolarWinds, one of the long-time observability heavyweights, specializes in ingesting volumes of network and infrastructure data, then surfacing insights with dashboards every ops team knows by heart. Together they form a feedback loop: Kuma enforces trust at runtime, SolarWinds tells you whether that trust is holding up under load.
Integrating Kuma with SolarWinds aligns control and visibility. Think of Kuma as the traffic cop and SolarWinds as the city’s drone surveillance. The integration exports critical service-level telemetry—latency, identity tags, and policy traces—straight into SolarWinds. That allows you to pivot from a security alert to a performance chart without touching three different consoles.
How the integration fits together
Every service registered in Kuma emits Envoy metrics and tracing data. Instead of shipping these fragments to a separate collector, you stream them directly into SolarWinds through its centralized metrics endpoint. Policies from Kuma’s control plane tag data with service identity, version, or zone. SolarWinds ingests those labels, turning raw mesh data into meaningful topology views. Once configured, you can trace a failing API call across clusters, confirm the enforcing mesh policy, and verify response time—all in one pane.
Best practices
Keep identity consistent. Map Kuma service tags to the same naming strategy your SolarWinds agents use. Rotate API tokens under a managed secret vault such as AWS Secrets Manager or GCP Secret Manager, and give your telemetry pipeline its own service account to keep audit trails clean. Configure RBAC so only observability roles can write or delete metrics streams.