Elastic Watcher Dashboard

Description

The Watcher History Dashboard shows the history of all the watcher jobs that are configured in your Elasticsearch deployment. This works by taking data from the system watcher history index that is created automatically when you are using watchers.

This is an Kibana example dashboard that can be easily extended based on your own needs. Also have a look into our Watcher job library if you need more information regardings watchers and what you can do with it.

Tested versions 7.12
ECS compliant

You must log in to submit a review.

Related downloads

Move to next ILM phase Watcher

This watcher job is moving specific indices based on e.g. disc usage into the next ILM phase.

Threat detection Kibana dashboard

Kibana dashboard example visualizing the results of the Elastic SIEM detection engine

Ingest Pipeline Monitoring

This Kibana dashboard can be used monitor your ingest pipelines

Cloudflare Kibana dashboards

Cloudflare dashboards and ingest pipelines to visualize cloudflare logs

Office 365 dashboards

A collection of Kibana dashboards to provide a holistic view of Microsoft Office 365 environments

These downloads could be also interesting for you

Elastic Cloud Billing data collection and Kibana dashboard

Pulls Elastic Cloud Billing information from the Billing API then sends it to an Elasticsearch cluster and visualizes the results in Kibana dashboards.

Kibana alerting enhancement

This bundle enhances the Kibana alerting experience. Storing all relevant information in indices and visualize the data in dashboards.

Sankey visualization example

This is an example of how to build an sankey visualization using the vega visualization in Kibana.

Sigma Windows Process Creation detection rules

A collection of rules based on the Sigma rules for Windows (process creation folder) based on Winlogbeat data .

Impossible travel transform job

Impossible travel detection by calculating the distance between two login locations in combination with the time between the two logins

Sigma Sysmon detection rules

A collection of rules based on the Sigma detection rules for Windows Sysmon events based on Winlogbeat data.