Zed is a next-generation code editor engineered for high-performance collaboration between developers and AI. Integrating Portkey with Zed allows you to secure, observe, and govern your LLM workflows with enterprise-grade control. This guide walks through setting up Portkey as the gateway for all your Zed requests, enabling centralized monitoring, caching, cost control, and compliance.

Why Integrate Portkey with Zed?

  • Unified AI Gateway - Single interface for 1600+ LLMs with API key management. (not just OpenAI & Anthropic)
  • Centralized AI observability: Real-time usage tracking for 40+ key metrics and logs for every request
  • Governance - Real-time spend tracking, set budget limits and RBAC in your Zed setup
  • Security Guardrails - PII detection, content filtering, and compliance controls

If you are an enterprise looking to use Zed in your organisation, check out this section.

1. Setting up Portkey

Portkey allows you to use 1600+ LLMs with your Zed setup, with minimal configuration required. Let’s set up the core components in Portkey that you’ll need for integration.

1

Create Virtual Key

Virtual Keys are Portkey’s secure way to manage your LLM provider API keys. Think of them like disposable credit cards for your LLM API keys, providing essential controls like:

  • Budget limits for API usage
  • Rate limiting capabilities
  • Secure API key storage

To create a virtual key: Go to Virtual Keys in the Portkey App. Save and copy the virtual key ID

Save your virtual key ID - you’ll need it for the next step.

2

Create Default Config

Configs in Portkey are JSON objects that define how your requests are routed. They help with implementing features like advanced routing, fallbacks, and retries.

We need to create a default config to route our requests to the virtual key created in Step 1.

To create your config:

  1. Go to Configs in Portkey dashboard
  2. Create new config with:
    {
        "virtual_key": "YOUR_VIRTUAL_KEY_FROM_STEP1",
    }
    
  3. Save and note the Config name for the next step

This basic config connects to your virtual key. You can add more advanced portkey features later.

3

Configure Portkey API Key

Now create Portkey API key access point and attach the config you created in Step 2:

  1. Go to API Keys in Portkey and Create new API key
  2. Select your config from Step 2
  3. Generate and save your API key

Save your API key securely - you’ll need it for Zed integration.

2. Integrated Portkey with Zed

You will need your Portkey API key created in Step 1 for this integration

Portkey is an OpenAI compatible API, which means it can be easily integrated with zed without any changes to your setup. Here’s how you do it

  1. Open Settings.json in Zed using Command Palette (cmd-shift-p / ctrl-shift-p) and run zed: open settings Add the following configuration to your settings.json file: This configuration will allow you to use Portkey’s GPT-4o model in Zed. You can change the model according to your virtual key setup in step 1.ll power of GPT-4o. Configure Zed Update your settings.json in Zed:

    {
      "language_models": {
        "openai": {
          "api_url": "https://api.portkey.ai/v1",
          "available_models": [
            {
              "name": "gpt-4o", // choose the model you want to use according to your virtual key setup
              "display_name": "Portkey-Model", // you can change this to any name
              "max_tokens": 131072 // this is a required field
            }
          ],
          "version": "1"
        }
      }
    }
    
  2. Add API Key to Zed

    • Open Command Palette (cmd-shift-p / ctrl-shift-p)
    • Run “assistant: show configuration”
    • Add your Portkey API key under OpenAI configuration

3. Set Up Enterprise Governance for Zed

Why Enterprise Governance? If you are using Zed inside your orgnaization, you need to consider several governance aspects:

  • Cost Management: Controlling and tracking AI spending across teams
  • Access Control: Managing which teams can use specific models
  • Usage Analytics: Understanding how AI is being used across the organization
  • Security & Compliance: Maintaining enterprise security standards
  • Reliability: Ensuring consistent service across all users

Portkey adds a comprehensive governance layer to address these enterprise needs. Let’s implement these controls step by step.

Enterprise Implementation Guide

Enterprise Features Now Available

Zed now has:

  • Departmental budget controls
  • Model access governance
  • Usage tracking & attribution
  • Security guardrails
  • Reliability features

Portkey Features

Now that you have enterprise-grade Zed setup, let’s explore the comprehensive features Portkey provides to ensure secure, efficient, and cost-effective AI operations.

1. Comprehensive Metrics

Using Portkey you can track 40+ key metrics including cost, token usage, response time, and performance across all your LLM providers in real time. You can also filter these metrics based on custom metadata that you can set in your configs. Learn more about metadata here.

2. Advanced Logs

Portkey’s logging dashboard provides detailed logs for every request made to your LLMs. These logs include:

  • Complete request and response tracking
  • Metadata tags for filtering
  • Cost attribution and much more…

3. Unified Access to 1600+ LLMs

You can easily switch between 1600+ LLMs. Call various LLMs such as Anthropic, Gemini, Mistral, Azure OpenAI, Google Vertex AI, AWS Bedrock, and many more by simply changing the virtual key in your default config object.

4. Advanced Metadata Tracking

Using Portkey, you can add custom metadata to your LLM requests for detailed tracking and analytics. Use metadata tags to filter logs, track usage, and attribute costs across departments and teams.

Custom Metata

5. Enterprise Access Management

6. Reliability Features

7. Advanced Guardrails

Protect your Project’s data and enhance reliability with real-time checks on LLM inputs and outputs. Leverage guardrails to:

  • Prevent sensitive data leaks
  • Enforce compliance with organizational policies
  • PII detection and masking
  • Content filtering
  • Custom security rules
  • Data compliance checks

Guardrails

Implement real-time protection for your LLM interactions with automatic detection and filtering of sensitive content, PII, and custom security rules. Enable comprehensive data protection while maintaining compliance with organizational policies.

FAQs

Next Steps

Join our Community

For enterprise support and custom features, contact our enterprise team.