Kibana Automatic
Overview⚓︎
Visualize your Hydrolix data in Kibana using the Kibana Gateway database proxy.
All the components required for a working Kibana instance are packaged with Hydrolix as an in-cluster integration. Kibana provides dashboards, while the Kibana Gateway and Elasticsearch are also automatically deployed within your cluster to convert data and maintain the Kibana installation.
This document covers the activation, configuration, and deactivation of Kibana in your Hydrolix cluster. Instructions on how to use Kibana are in the Kibana documentation.
Kibana Gateway is a lightweight database proxy that enables interoperability between a front end such as Kibana and multiple back end datastores such as Hydrolix and Elasticsearch. It provides this interoperability by acting as a SQL translation layer that decouples your dashboard and ingestion layers from your datastore.
Container and pod names
Hydrolix acquired the database proxy software from Quesma. The Kubernetes pod, container, and tunable are named quesma since the cluster integration predated the software acquisition in 2025 September. The product is called Kibana Gateway.
Before you begin⚓︎
Ensure you have the following:
- Kubernetes
cluster-adminprivileges as described in the Kubernetes documentation - The name of the Hydrolix table to use with Kibana
- Sufficient resources in your Kubernetes cluster to accommodate new Kibana, Kibana Gateway, and Elasticsearch pods
Installation⚓︎
-
Install the Elasticsearch Custom Resource Definitions (CRD) and operator. With
kubectlconfigured for your Hydrolix cluster, run the following commands:Install Elasticsearch CRD and operator For more information, see the Elasticsearch documentation.
-
Edit the Hydrolix cluster configuration to include the Kibana in-cluster integration. Add the following lines to the
spec:section of yourhydrolixcluster.yamlfile:Example
hydrolixcluster.yamlconfiguration: -
Apply the configuration changes:
Apply cluster configuration -
Wait for the pods to start. The
elasticsearch,quesma(Kibana Gateway), andkibana-kb(Kibana) pods can take several minutes to start. Verify the pods are running:Check pod status Expected output showing Running status:
-
Verify the Kibana web interface:
- Sign in to your Hydrolix cluster UI at
https://{hostname}.hydrolix.live. - Navigate to
https://{hostname}.hydrolix.live/kibanato access the Kibana UI.
- Sign in to your Hydrolix cluster UI at
Use Kibana and Kibana Gateway⚓︎
The Hydrolix in-cluster Kibana integration is configured to use the Hydrolix hydro.logs table as a data source.
- Visit your Kibana installation at
https://{hostname}.hydrolix.live/kibana. - Select Stack Management from the main menu.
- Select Kibana > Data Views.
- Create a data view:
- If this is your first data source, select the link at the bottom of the introduction page. The link is part of the text "You can also create a data view against hidden, system, or default indices."
- If this isn't your first data source, select the Create data view button.
- Enter a name, index pattern, and timestamp in the form.
- Select Save data view to Kibana.
Configuration⚓︎
The in-cluster Kibana Gateway can be configured to have access to additional tables within the Hydrolix cluster and to be interoperable with a Kibana instance running outside the Hydrolix cluster.
Query additional projects and tables⚓︎
By default, Kibana Gateway uses data from the hydro.logs table. To configure Kibana Gateway to use a different table, add the following configuration to your hydrolixcluster.yaml file:
Apply the changes to restart the quesma pod and point it to the specified table:
| Apply table configuration | |
|---|---|
Example configuration using the sample_project.sample_table table:
| Example configuration with sample table | |
|---|---|
Enable public access to Kibana Gateway⚓︎
To allow external clients (such as Kibana running outside the cluster) to communicate with Kibana Gateway, enable public access using the following configuration:
| Enable Kibana Gateway public access | |
|---|---|
This configuration exposes Kibana Gateway at quesma.{myhost}.hydrolix.live for external access. The username and password are stored in the hdx-elastic-user Kubernetes secret. For more information about managing secrets, see Managing Secrets using kubectl.
Deactivation⚓︎
To remove the Kibana integration:
- Edit your
hydrolixcluster.yamlfile and remove thedata_visualization_toolsandquesma_configsections. -
Apply the configuration changes:
Apply deactivation changes -
Remove the Elasticsearch CRDs and operator: