Squid Proxy Access Logs Dashboard

Visualize your Squid Proxy traffic with this dedicated Kibana dashboard.
Tailored for data ingested via Filebeat’s Squid module, it offers insights into:

  • Traffic Volume: Bytes sent/received over time.
  • Top Domains: Most visited websites and domains.
  • Response Codes: HTTP status code distribution (200, 403, 503, etc.).
  • Client Activity: Top source IPs and user agents.

Contents: NDJSON file containing the dashboard and visualizations.

Source: molu8bits/squid-filebeat-kibana

Tested versions
ECS compliant

You must log in to submit a review.

Related downloads

Squid Proxy Access Logs Dashboard

Analyze Squid Proxy access logs ingested via Filebeat.

SigmaHQ Rules Bundle (ECS) – 2026-02-15

Download 1165 Sigma rules for Elastic Security. Includes coverage for MITRE ATT&CK tactics like Execution and Defense Evasion. Compatible with Elastic Stack 8.x and Serverless.

Elastic Stack Monitoring Dashboard

Kibana dashboards that is showing the monitoring data collected by Elastics in built monitoring capabilities.

Impossible travel transform job

Impossible travel detection by calculating the distance between two login locations in combination with the time between the two logins

Microsoft 365 Dashboards for Elastic

Visualize your Microsoft 365 data in Kibana.

Logstash Pipeline for Talend ESB & MDM

A Logstash Pipeline to collect json logs from Talend ESB & MDM.

These downloads could be also interesting for you

Postfix Mail Server Dashboard

Monitor Postfix mail server logs with Kibana.

Azure billing data network

A vega visualization that shows the connection between resource group, resource type and the resource itself based on Elastic agent azure billing data integration.

Ask Me Anything Booth – Canvas Example

This is an example canvas page that shows how to visualize using canvas in general.

Microsoft 365 Dashboards for Elastic

Visualize your Microsoft 365 data in Kibana.

Watch to detect large shards

This watch is getting data from the Elasticsearch shards API directly and checking for large shards.

Sigma Sysmon detection rules

A collection of rules based on the Sigma detection rules for Windows Sysmon events based on Winlogbeat data.