- Elastic integrations
- Integrations quick reference
- 1Password
- Abnormal Security
- ActiveMQ
- Active Directory Entity Analytics
- Admin By Request EPM integration
- Airflow
- Akamai
- Apache
- API (custom)
- Arbor Peakflow SP Logs
- Arista NG Firewall
- Atlassian
- Auditd
- Auth0
- authentik
- AWS
- Amazon CloudFront
- Amazon DynamoDB
- Amazon EBS
- Amazon EC2
- Amazon ECS
- Amazon EMR
- AWS API Gateway
- Amazon GuardDuty
- AWS Health
- Amazon Kinesis Data Firehose
- Amazon Kinesis Data Stream
- Amazon MQ
- Amazon Managed Streaming for Apache Kafka (MSK)
- Amazon NAT Gateway
- Amazon RDS
- Amazon Redshift
- Amazon S3
- Amazon S3 Storage Lens
- Amazon Security Lake
- Amazon SNS
- Amazon SQS
- Amazon VPC
- Amazon VPN
- AWS Bedrock
- AWS Billing
- AWS CloudTrail
- AWS CloudWatch
- AWS ELB
- AWS Fargate
- AWS Inspector
- AWS Lambda
- AWS Logs (custom)
- AWS Network Firewall
- AWS Route 53
- AWS Security Hub
- AWS Transit Gateway
- AWS Usage
- AWS WAF
- Azure
- Activity logs
- App Service
- Application Gateway
- Application Insights metrics
- Application Insights metrics overview
- Application State Insights metrics
- Azure logs (v2 preview)
- Azure OpenAI
- Billing metrics
- Container instance metrics
- Container registry metrics
- Container service metrics
- Custom Azure Logs
- Custom Blob Storage Input
- Database Account metrics
- Event Hub input
- Firewall logs
- Frontdoor
- Functions
- Microsoft Entra ID
- Monitor metrics
- Network Watcher VNet
- Network Watcher NSG
- Platform logs
- Resource metrics
- Spring Cloud logs
- Storage Account metrics
- Virtual machines metrics
- Virtual machines scaleset metrics
- Barracuda
- BeyondInsight and Password Safe Integration
- BitDefender
- Bitwarden
- blacklens.io
- Blue Coat Director Logs
- BBOT (Bighuge BLS OSINT Tool)
- Box Events
- Bravura Monitor
- Broadcom ProxySG
- Canva
- Cassandra
- CEL Custom API
- Ceph
- Check Point
- Cilium Tetragon
- CISA Known Exploited Vulnerabilities
- Cisco
- Cisco Meraki Metrics
- Citrix
- Claroty CTD
- Cloudflare
- Cloud Asset Inventory
- CockroachDB Metrics
- Common Event Format (CEF)
- Containerd
- CoreDNS
- Corelight
- Couchbase
- CouchDB
- Cribl
- CrowdStrike
- Cyberark
- Cybereason
- CylanceProtect Logs
- Custom Websocket logs
- Darktrace
- Data Exfiltration Detection
- DGA
- Digital Guardian
- Docker
- DomainTools Real Time Unified Feeds
- Elastic APM
- Elastic Fleet Server
- Elastic Security
- Elastic Stack monitoring
- Elasticsearch Service Billing
- Envoy Proxy
- ESET PROTECT
- ESET Threat Intelligence
- etcd
- Falco
- F5
- File Integrity Monitoring
- FireEye Network Security
- First EPSS
- Forcepoint Web Security
- ForgeRock
- Fortinet
- Gigamon
- GitHub
- GitLab
- Golang
- Google Cloud
- Custom GCS Input
- GCP
- GCP Audit logs
- GCP Billing metrics
- GCP Cloud Run metrics
- GCP CloudSQL metrics
- GCP Compute metrics
- GCP Dataproc metrics
- GCP DNS logs
- GCP Firestore metrics
- GCP Firewall logs
- GCP GKE metrics
- GCP Load Balancing metrics
- GCP Metrics Input
- GCP PubSub logs (custom)
- GCP PubSub metrics
- GCP Redis metrics
- GCP Security Command Center
- GCP Storage metrics
- GCP VPC Flow logs
- GCP Vertex AI
- GoFlow2 logs
- Hadoop
- HAProxy
- Hashicorp Vault
- HTTP Endpoint logs (custom)
- IBM MQ
- IIS
- Imperva
- InfluxDb
- Infoblox
- Iptables
- Istio
- Jamf Compliance Reporter
- Jamf Pro
- Jamf Protect
- Jolokia Input
- Journald logs (custom)
- JumpCloud
- Kafka
- Keycloak
- Kubernetes
- LastPass
- Lateral Movement Detection
- Linux Metrics
- Living off the Land Attack Detection
- Logs (custom)
- Lumos
- Lyve Cloud
- Mattermost
- Memcached
- Menlo Security
- Microsoft
- Microsoft 365
- Microsoft Defender for Cloud
- Microsoft Defender for Endpoint
- Microsoft DHCP
- Microsoft DNS Server
- Microsoft Entra ID Entity Analytics
- Microsoft Exchange Online Message Trace
- Microsoft Exchange Server
- Microsoft Graph Activity Logs
- Microsoft M365 Defender
- Microsoft Office 365 Metrics Integration
- Microsoft Sentinel
- Microsoft SQL Server
- Mimecast
- ModSecurity Audit
- MongoDB
- MongoDB Atlas
- MySQL
- Nagios XI
- NATS
- NetFlow Records
- Netskope
- Network Beaconing Identification
- Network Packet Capture
- Nginx
- Okta
- Oracle
- OpenAI
- OpenCanary
- Osquery
- Palo Alto
- pfSense
- PHP-FPM
- PingOne
- PingFederate
- Pleasant Password Server
- PostgreSQL
- Prometheus
- Proofpoint TAP
- Proofpoint On Demand
- Pulse Connect Secure
- Qualys VMDR
- QNAP NAS
- RabbitMQ Logs
- Radware DefensePro Logs
- Rapid7
- Redis
- Rubrik RSC Metrics Integration
- Sailpoint Identity Security Cloud
- Salesforce
- SentinelOne
- ServiceNow
- Slack Logs
- Snort
- Snyk
- SonicWall Firewall
- Sophos
- Spring Boot
- SpyCloud Enterprise Protection
- SQL Input
- Squid Logs
- SRX
- STAN
- Statsd Input
- Sublime Security
- Suricata
- StormShield SNS
- Symantec
- Symantec Endpoint Security
- Sysmon for Linux
- Sysdig
- Syslog Router Integration
- System
- System Audit
- Tanium
- TCP Logs (custom)
- Teleport
- Tenable
- Threat intelligence
- ThreatConnect
- Threat Map
- Thycotic Secret Server
- Tines
- Traefik
- Trellix
- Trend Micro
- TYCHON Agentless
- UDP Logs (custom)
- Universal Profiling
- Vectra Detect
- VMware
- WatchGuard Firebox
- WebSphere Application Server
- Windows
- Wiz
- Zeek
- ZeroFox
- Zero Networks
- ZooKeeper Metrics
- Zoom
- Zscaler
Apache Integration
editApache Integration
editVersion |
1.29.1 (View all) |
Compatible Kibana version(s) |
8.13.0 or higher |
Supported Serverless project types |
Security |
Subscription level |
Basic |
Level of support |
Elastic |
This integration periodically fetches metrics from Apache servers. It can parse access and error logs created by the Apache server.
Compatibility
editThe Apache datasets were tested with Apache 2.4.12 and 2.4.46 and are expected to work with all versions >= 2.2.31 and >= 2.4.16 (independent from operating system).
Logs
editAccess Logs
editAccess logs collects the Apache access logs.
Example
An example event for access
looks as following:
{ "@timestamp": "2024-06-21T13:03:30.000Z", "agent": { "ephemeral_id": "a8296a9f-087a-48ae-af44-8f064213f161", "id": "9326664e-5848-4401-a0fb-4494a1538c2e", "name": "docker-fleet-agent", "type": "filebeat", "version": "8.13.0" }, "apache": { "access": { "remote_addresses": [ "127.0.0.1" ] } }, "data_stream": { "dataset": "apache.access", "namespace": "ep", "type": "logs" }, "ecs": { "version": "8.11.0" }, "elastic_agent": { "id": "9326664e-5848-4401-a0fb-4494a1538c2e", "snapshot": false, "version": "8.13.0" }, "event": { "agent_id_status": "verified", "category": [ "web" ], "created": "2024-06-21T13:03:44.637Z", "dataset": "apache.access", "ingested": "2024-06-21T13:03:56Z", "kind": "event", "outcome": "success" }, "host": { "architecture": "x86_64", "containerized": true, "hostname": "docker-fleet-agent", "id": "8259e024976a406e8a54cdbffeb84fec", "ip": [ "192.168.240.7" ], "mac": [ "02-42-C0-A8-F0-07" ], "name": "docker-fleet-agent", "os": { "codename": "focal", "family": "debian", "kernel": "3.10.0-1160.118.1.el7.x86_64", "name": "Ubuntu", "platform": "ubuntu", "type": "linux", "version": "20.04.6 LTS (Focal Fossa)" } }, "http": { "request": { "method": "GET" }, "response": { "body": { "bytes": 45 }, "status_code": 200 }, "version": "1.1" }, "input": { "type": "log" }, "log": { "file": { "path": "/tmp/service_logs/access.log" }, "offset": 0 }, "related": { "ip": [ "127.0.0.1" ] }, "source": { "address": "127.0.0.1", "ip": "127.0.0.1" }, "tags": [ "apache-access" ], "url": { "original": "/", "path": "/" }, "user_agent": { "device": { "name": "Other" }, "name": "curl", "original": "curl/7.64.0", "version": "7.64.0" } }
ECS Field Reference
Please refer to the following document for detailed information on ECS fields.
Exported fields
Field | Description | Type | Unit |
---|---|---|---|
@timestamp |
Event timestamp. |
date |
|
apache.access.http.request_headers |
Http request headers. |
keyword |
|
apache.access.identity |
The client’s identity, as specified in RFC 1413, determined by the identd on the client’s machine. |
keyword |
|
apache.access.remote_addresses |
An array of remote addresses. It is a list because it is common to include, besides the client IP address, IP addresses from headers like |
keyword |
|
apache.access.response_time |
Time to serve the request in microseconds. |
long |
micros |
apache.access.ssl.cipher |
SSL cipher name. - name: nginx.access |
keyword |
|
apache.access.ssl.protocol |
SSL protocol version. |
keyword |
|
apache.access.tls_handshake.error |
TLS handshake error. |
keyword |
|
cloud.image.id |
Image ID for the cloud instance. |
keyword |
|
data_stream.dataset |
Data stream dataset. |
constant_keyword |
|
data_stream.namespace |
Data stream namespace. |
constant_keyword |
|
data_stream.type |
Data stream type. |
constant_keyword |
|
event.dataset |
Event dataset |
constant_keyword |
|
event.module |
Event module |
constant_keyword |
|
host.containerized |
If the host is a container. |
boolean |
|
host.os.build |
OS build information. |
keyword |
|
host.os.codename |
OS codename, if any. |
keyword |
|
input.type |
Input type |
keyword |
|
log.offset |
Log offset |
long |
Supported format for the access logs are:
-
-
The common
LogFormat
can be used as follows:%h %l %u %t \"%r\" %>s %b
-
Example:
127.0.0.1 user-identifier frank [10/Oct/2000:13:55:36 -0700] "GET /apache_pb.gif HTTP/1.0" 200 2326
-
-
Combined Log Format
-
The combined
LogFormat
can be used as follows:-
%h %l %u %t \"%r\" %>s %b \"%{Referer}i\" \"%{User-Agent}i\"
-
%A:%p %h %l %u %t \"%r\" %>s %b \"%{Referer}i\" \"%{User-Agent}i\"
-
%h:%p %l %u %t \"%{req}i %U %H\" %>s %b \"%{Referer}i\" \"%{User-Agent}i\"
-
-
Example:
-
127.0.0.1 user-identifier frank [10/Oct/2000:13:55:36 -0700] "GET /apache_pb.gif HTTP/1.0" 200 2326 "http://datawarehouse.us.oracle.com/datamining/contents.htm" "Mozilla/4.7 [en] (WinNT; I)"
-
127.0.0.1:80 127.0.0.1 - - [20/Jun/2024:16:23:43 +0530] "\x16\x03\x01" 400 226 "-" "-"
-
127.0.0.1:80 - - [20/Jun/2024:16:31:41 +0530] "<SCRIPT>NXSSTEST</SCRIPT> / HTTP/1.1" 403 4897 "-" "-"
-
-
-
Combined Log Format + X-Forwarded-For header
-
The combined
LogFormat
with x-forwarded-for header can be used as follows:%h %l %u %t \"%r\" %>s %b \"%{Referer}i\" \"%{User-Agent}i\" X-Forwarded-For=\"%{X-Forwarded-For}i\"
-
Example:
127.0.0.1 user-identifier frank [10/Oct/2000:13:55:36 -0700] "GET /apache_pb.gif HTTP/1.0" 200 2326 "http://datawarehouse.us.oracle.com/datamining/contents.htm" "Mozilla/4.7 [en] (WinNT; I)" X-Forwarded-For="10.225.192.17, 10.2.2.121"
-
Error Logs
editError logs collects the Apache error logs.
Example
An example event for error
looks as following:
{ "@timestamp": "2024-07-03T11:17:00.781Z", "agent": { "ephemeral_id": "7abcc15c-0d38-4f16-843e-622a20dcfe13", "id": "7417c67c-5b97-401f-b722-6becf94a2f17", "name": "docker-fleet-agent", "type": "filebeat", "version": "8.13.0" }, "apache": { "error": { "module": "mpm_event" } }, "data_stream": { "dataset": "apache.error", "namespace": "ep", "type": "logs" }, "ecs": { "version": "8.11.0" }, "elastic_agent": { "id": "7417c67c-5b97-401f-b722-6becf94a2f17", "snapshot": false, "version": "8.13.0" }, "event": { "agent_id_status": "verified", "category": [ "web" ], "dataset": "apache.error", "ingested": "2024-07-03T11:17:27Z", "kind": "event", "timezone": "+00:00", "type": [ "info" ] }, "host": { "architecture": "x86_64", "containerized": true, "hostname": "docker-fleet-agent", "id": "8259e024976a406e8a54cdbffeb84fec", "ip": [ "192.168.246.7" ], "mac": [ "02-42-C0-A8-F6-07" ], "name": "docker-fleet-agent", "os": { "codename": "focal", "family": "debian", "kernel": "3.10.0-1160.118.1.el7.x86_64", "name": "Ubuntu", "platform": "ubuntu", "type": "linux", "version": "20.04.6 LTS (Focal Fossa)" } }, "input": { "type": "log" }, "log": { "file": { "path": "/tmp/service_logs/error.log" }, "level": "notice", "offset": 0 }, "message": "AH00489: Apache/2.4.46 (Unix) configured -- resuming normal operations", "process": { "pid": 1, "thread": { "id": 139928782480512 } }, "tags": [ "apache-error" ] }
ECS Field Reference
Please refer to the following document for detailed information on ECS fields.
Exported fields
Field | Description | Type |
---|---|---|
@timestamp |
Event timestamp. |
date |
apache.error.module |
The module producing the logged message. |
keyword |
cloud.image.id |
Image ID for the cloud instance. |
keyword |
data_stream.dataset |
Data stream dataset. |
constant_keyword |
data_stream.namespace |
Data stream namespace. |
constant_keyword |
data_stream.type |
Data stream type. |
constant_keyword |
event.dataset |
Event dataset |
constant_keyword |
event.module |
Event module |
constant_keyword |
host.containerized |
If the host is a container. |
boolean |
host.os.build |
OS build information. |
keyword |
host.os.codename |
OS codename, if any. |
keyword |
input.type |
Input type |
keyword |
log.offset |
Log offset |
long |
Metrics
editStatus Metrics
editThe server status stream collects data from the Apache Status module. It scrapes the status data from the web page
generated by the mod_status
module.
Example
An example event for status
looks as following:
{ "@timestamp": "2022-12-09T03:56:04.531Z", "agent": { "ephemeral_id": "de9a4641-fef3-4e54-b95a-cd2c722fb9d3", "id": "46343e0c-0d8c-464b-a216-cacf63027d6f", "name": "docker-fleet-agent", "type": "metricbeat", "version": "8.5.0" }, "apache": { "status": { "bytes_per_request": 0, "bytes_per_sec": 0, "connections": { "async": { "closing": 0, "keep_alive": 0, "writing": 0 }, "total": 0 }, "cpu": { "children_system": 0, "children_user": 0, "load": 0.133333, "system": 0.01, "user": 0.01 }, "load": { "1": 1.79, "15": 1.04, "5": 1.5 }, "requests_per_sec": 0.933333, "scoreboard": { "closing_connection": 0, "dns_lookup": 0, "gracefully_finishing": 0, "idle_cleanup": 0, "keepalive": 0, "logging": 0, "open_slot": 325, "reading_request": 0, "sending_reply": 1, "starting_up": 0, "total": 400, "waiting_for_connection": 74 }, "total_accesses": 14, "total_bytes": 0, "uptime": { "server_uptime": 15, "uptime": 15 }, "workers": { "busy": 1, "idle": 74 } } }, "data_stream": { "dataset": "apache.status", "namespace": "ep", "type": "metrics" }, "ecs": { "version": "8.11.0" }, "elastic_agent": { "id": "46343e0c-0d8c-464b-a216-cacf63027d6f", "snapshot": false, "version": "8.5.0" }, "event": { "agent_id_status": "verified", "dataset": "apache.status", "duration": 6186792, "ingested": "2022-12-09T03:56:04Z", "module": "apache" }, "host": { "architecture": "x86_64", "containerized": false, "hostname": "docker-fleet-agent", "id": "66392b0697b84641af8006d87aeb89f1", "ip": [ "172.18.0.7" ], "mac": [ "02-42-AC-12-00-07" ], "name": "docker-fleet-agent", "os": { "codename": "focal", "family": "debian", "kernel": "5.15.49-linuxkit", "name": "Ubuntu", "platform": "ubuntu", "type": "linux", "version": "20.04.5 LTS (Focal Fossa)" } }, "metricset": { "name": "status", "period": 30000 }, "service": { "address": "http://elastic-package-service-apache-1:80/server-status?auto=", "type": "apache" } }
ECS Field Reference
Please refer to the following document for detailed information on ECS fields.
Exported fields
Field | Description | Type | Unit | Metric Type |
---|---|---|---|---|
@timestamp |
Event timestamp. |
date |
||
agent.id |
keyword |
|||
apache.status.bytes_per_request |
Bytes per request. |
scaled_float |
gauge |
|
apache.status.bytes_per_sec |
Bytes per second. |
scaled_float |
gauge |
|
apache.status.connections.async.closing |
Async closed connections. |
long |
gauge |
|
apache.status.connections.async.keep_alive |
Async keeped alive connections. |
long |
gauge |
|
apache.status.connections.async.writing |
Async connection writing. |
long |
gauge |
|
apache.status.connections.total |
Total connections. |
long |
counter |
|
apache.status.cpu.children_system |
CPU of children system. |
scaled_float |
gauge |
|
apache.status.cpu.children_user |
CPU of children user. |
scaled_float |
gauge |
|
apache.status.cpu.load |
CPU Load. |
scaled_float |
gauge |
|
apache.status.cpu.system |
System cpu. |
scaled_float |
gauge |
|
apache.status.cpu.user |
CPU user load. |
scaled_float |
gauge |
|
apache.status.load.1 |
Load average for the last minute. |
scaled_float |
gauge |
|
apache.status.load.15 |
Load average for the last 15 minutes. |
scaled_float |
gauge |
|
apache.status.load.5 |
Load average for the last 5 minutes. |
scaled_float |
gauge |
|
apache.status.requests_per_sec |
Requests per second. |
scaled_float |
gauge |
|
apache.status.scoreboard.closing_connection |
Closing connections. |
long |
gauge |
|
apache.status.scoreboard.dns_lookup |
Dns Lookups. |
long |
gauge |
|
apache.status.scoreboard.gracefully_finishing |
Gracefully finishing. |
long |
gauge |
|
apache.status.scoreboard.idle_cleanup |
Idle cleanups. |
long |
gauge |
|
apache.status.scoreboard.keepalive |
Keep alive. |
long |
gauge |
|
apache.status.scoreboard.logging |
Logging |
long |
gauge |
|
apache.status.scoreboard.open_slot |
Open slots. |
long |
gauge |
|
apache.status.scoreboard.reading_request |
Reading requests. |
long |
gauge |
|
apache.status.scoreboard.sending_reply |
Sending Reply. |
long |
gauge |
|
apache.status.scoreboard.starting_up |
Starting up. |
long |
gauge |
|
apache.status.scoreboard.total |
Total. |
long |
gauge |
|
apache.status.scoreboard.waiting_for_connection |
Waiting for connections. |
long |
gauge |
|
apache.status.total_accesses |
Total number of access requests. |
long |
counter |
|
apache.status.total_bytes |
Total number of bytes served. |
long |
byte |
counter |
apache.status.uptime.server_uptime |
Server uptime in seconds. |
long |
counter |
|
apache.status.uptime.uptime |
Server uptime. |
long |
counter |
|
apache.status.workers.busy |
Number of busy workers. |
long |
gauge |
|
apache.status.workers.idle |
Number of idle workers. |
long |
gauge |
|
cloud.account.id |
The cloud account or organization id used to identify different entities in a multi-tenant environment. Examples: AWS account id, Google Cloud ORG Id, or other unique identifier. |
keyword |
||
cloud.availability_zone |
Availability zone in which this host is running. |
keyword |
||
cloud.image.id |
Image ID for the cloud instance. |
keyword |
||
cloud.instance.id |
Instance ID of the host machine. |
keyword |
||
cloud.provider |
Name of the cloud provider. Example values are aws, azure, gcp, or digitalocean. |
keyword |
||
cloud.region |
Region in which this host is running. |
keyword |
||
container.id |
Unique container id. |
keyword |
||
data_stream.dataset |
Data stream dataset. |
constant_keyword |
||
data_stream.namespace |
Data stream namespace. |
constant_keyword |
||
data_stream.type |
Data stream type. |
constant_keyword |
||
event.dataset |
Event dataset |
constant_keyword |
||
event.module |
Event module |
constant_keyword |
||
host.containerized |
If the host is a container. |
boolean |
||
host.name |
Name of the host. It can contain what |
keyword |
||
host.os.build |
OS build information. |
keyword |
||
host.os.codename |
OS codename, if any. |
keyword |
||
service.address |
Address where data about this service was collected from. This should be a URI, network address (ipv4:port or [ipv6]:port) or a resource path (sockets). |
keyword |
Anomaly Detection Configurations
editThese anomaly detection jobs are available in the Machine Learning app in Kibana when you have data that matches the query specified in the manifest.
Apache Access Logs
editFind unusual activity in HTTP access logs.
Job | Description |
---|---|
visitor_rate_apache |
HTTP Access Logs: Detect unusual visitor rates |
status_code_rate_apache |
HTTP Access Logs: Detect unusual status code rates |
source_ip_url_count_apache |
HTTP Access Logs: Detect unusual source IPs - high distinct count of URLs |
source_ip_request_rate_apache |
HTTP Access Logs: Detect unusual source IPs - high request rates |
low_request_rate_apache |
HTTP Access Logs: Detect low request rates |
Changelog
editChangelog
Version | Details | Kibana version(s) |
---|---|---|
1.29.1 |
Bug fix (View pull request) |
8.13.0 or higher |
1.29.0 |
Enhancement (View pull request) |
8.13.0 or higher |
1.28.0 |
Enhancement (View pull request) |
8.13.0 or higher |
1.27.0 |
Enhancement (View pull request) |
8.13.0 or higher |
1.26.0 |
Enhancement (View pull request) |
8.13.0 or higher |
1.25.0 |
Enhancement (View pull request) |
8.13.0 or higher |
1.24.0 |
Enhancement (View pull request) |
8.13.0 or higher |
1.23.0 |
Enhancement (View pull request) |
8.13.0 or higher |
1.22.0 |
Enhancement (View pull request) |
8.13.0 or higher |
1.21.0 |
Enhancement (View pull request) |
8.13.0 or higher |
1.20.0 |
Enhancement (View pull request) |
8.10.2 or higher |
1.19.0 |
Enhancement (View pull request) |
8.10.2 or higher |
1.18.0 |
Enhancement (View pull request) Enhancement (View pull request) Enhancement (View pull request) Bug fix (View pull request) Bug fix (View pull request) |
8.10.2 or higher |
1.17.2 |
Bug fix (View pull request) |
8.10.2 or higher |
1.17.1 |
Bug fix (View pull request) |
8.10.2 or higher |
1.17.0 |
Enhancement (View pull request) |
8.10.2 or higher |
1.16.0 |
Enhancement (View pull request) |
8.10.2 or higher |
1.15.1 |
Bug fix (View pull request) |
8.8.0 or higher |
1.15.0 |
Enhancement (View pull request) |
8.8.0 or higher |
1.14.0 |
Enhancement (View pull request) |
8.8.0 or higher |
1.13.0 |
Enhancement (View pull request) |
8.7.1 or higher |
1.12.0 |
Enhancement (View pull request) |
8.7.1 or higher |
1.11.0 |
Enhancement (View pull request) |
8.3.0 or higher |
1.10.0 |
Enhancement (View pull request) |
8.3.0 or higher |
1.9.0 |
Enhancement (View pull request) |
8.3.0 or higher |
1.8.2 |
Bug fix (View pull request) |
8.0.0 or higher |
1.8.1 |
Enhancement (View pull request) |
8.0.0 or higher |
1.8.0 |
Enhancement (View pull request) |
8.0.0 or higher |
1.7.0 |
Enhancement (View pull request) |
8.0.0 or higher |
1.6.0 |
Enhancement (View pull request) |
8.0.0 or higher |
1.5.1 |
Enhancement (View pull request) |
8.0.0 or higher |
1.5.0 |
Enhancement (View pull request) |
8.0.0 or higher |
1.4.1 |
Bug fix (View pull request) |
8.0.0 or higher |
1.4.0 |
Enhancement (View pull request) |
— |
1.3.6 |
Enhancement (View pull request) |
— |
1.3.5 |
Enhancement (View pull request) |
7.14.0 or higher |
1.3.4 |
Bug fix (View pull request) |
— |
1.3.3 |
Bug fix (View pull request) |
— |
1.3.2 |
Bug fix (View pull request) |
7.14.0 or higher |
1.3.1 |
Bug fix (View pull request) |
— |
1.3.0 |
Enhancement (View pull request) |
7.14.0 or higher |
1.2.0 |
Enhancement (View pull request) |
— |
1.1.1 |
Bug fix (View pull request) |
— |
1.1.0 |
Enhancement (View pull request) |
7.14.0 or higher |
1.0.0 |
Enhancement (View pull request) |
— |
0.9.2 |
Enhancement (View pull request) |
— |
0.9.1 |
Enhancement (View pull request) |
— |
0.9.0 |
Enhancement (View pull request) |
— |
0.8.1 |
Enhancement (View pull request) |
— |
0.8.0 |
Bug fix (View pull request) |
— |
0.7.1 |
Bug fix (View pull request) |
— |
0.7.0 |
Enhancement (View pull request) |
— |
0.6.0 |
Enhancement (View pull request) |
— |
0.5.1 |
Enhancement (View pull request) |
— |
0.5.0 |
Enhancement (View pull request) |
— |
0.4.1 |
Enhancement (View pull request) |
— |
0.3.5 |
Enhancement (View pull request) |
— |
0.3.4 |
Bug fix (View pull request) |
— |
0.1.0 |
Enhancement (View pull request) |
— |
On this page