- Elastic integrations
- Integrations quick reference
- 1Password
- Abnormal Security
- ActiveMQ
- Active Directory Entity Analytics
- Admin By Request EPM integration
- Airflow
- Akamai
- Apache
- API (custom)
- Arbor Peakflow SP Logs
- Arista NG Firewall
- Atlassian
- Auditd
- Auth0
- authentik
- AWS
- Amazon CloudFront
- Amazon DynamoDB
- Amazon EBS
- Amazon EC2
- Amazon ECS
- Amazon EMR
- AWS API Gateway
- Amazon GuardDuty
- AWS Health
- Amazon Kinesis Data Firehose
- Amazon Kinesis Data Stream
- Amazon MQ
- Amazon Managed Streaming for Apache Kafka (MSK)
- Amazon NAT Gateway
- Amazon RDS
- Amazon Redshift
- Amazon S3
- Amazon S3 Storage Lens
- Amazon Security Lake
- Amazon SNS
- Amazon SQS
- Amazon VPC
- Amazon VPN
- AWS Bedrock
- AWS Billing
- AWS CloudTrail
- AWS CloudWatch
- AWS ELB
- AWS Fargate
- AWS Inspector
- AWS Lambda
- AWS Logs (custom)
- AWS Network Firewall
- AWS Route 53
- AWS Security Hub
- AWS Transit Gateway
- AWS Usage
- AWS WAF
- Azure
- Activity logs
- App Service
- Application Gateway
- Application Insights metrics
- Application Insights metrics overview
- Application State Insights metrics
- Azure logs (v2 preview)
- Azure OpenAI
- Billing metrics
- Container instance metrics
- Container registry metrics
- Container service metrics
- Custom Azure Logs
- Custom Blob Storage Input
- Database Account metrics
- Event Hub input
- Firewall logs
- Frontdoor
- Functions
- Microsoft Entra ID
- Monitor metrics
- Network Watcher VNet
- Network Watcher NSG
- Platform logs
- Resource metrics
- Spring Cloud logs
- Storage Account metrics
- Virtual machines metrics
- Virtual machines scaleset metrics
- Barracuda
- BeyondInsight and Password Safe Integration
- BitDefender
- Bitwarden
- blacklens.io
- Blue Coat Director Logs
- BBOT (Bighuge BLS OSINT Tool)
- Box Events
- Bravura Monitor
- Broadcom ProxySG
- Canva
- Cassandra
- CEL Custom API
- Ceph
- Check Point
- Cilium Tetragon
- CISA Known Exploited Vulnerabilities
- Cisco
- Cisco Meraki Metrics
- Citrix
- Claroty CTD
- Cloudflare
- Cloud Asset Inventory
- CockroachDB Metrics
- Common Event Format (CEF)
- Containerd
- CoreDNS
- Corelight
- Couchbase
- CouchDB
- Cribl
- CrowdStrike
- Cyberark
- Cybereason
- CylanceProtect Logs
- Custom Websocket logs
- Darktrace
- Data Exfiltration Detection
- DGA
- Digital Guardian
- Docker
- DomainTools Real Time Unified Feeds
- Elastic APM
- Elastic Fleet Server
- Elastic Security
- Elastic Stack monitoring
- Elasticsearch Service Billing
- Envoy Proxy
- ESET PROTECT
- ESET Threat Intelligence
- etcd
- Falco
- F5
- File Integrity Monitoring
- FireEye Network Security
- First EPSS
- Forcepoint Web Security
- ForgeRock
- Fortinet
- Gigamon
- GitHub
- GitLab
- Golang
- Google Cloud
- Custom GCS Input
- GCP
- GCP Audit logs
- GCP Billing metrics
- GCP Cloud Run metrics
- GCP CloudSQL metrics
- GCP Compute metrics
- GCP Dataproc metrics
- GCP DNS logs
- GCP Firestore metrics
- GCP Firewall logs
- GCP GKE metrics
- GCP Load Balancing metrics
- GCP Metrics Input
- GCP PubSub logs (custom)
- GCP PubSub metrics
- GCP Redis metrics
- GCP Security Command Center
- GCP Storage metrics
- GCP VPC Flow logs
- GCP Vertex AI
- GoFlow2 logs
- Hadoop
- HAProxy
- Hashicorp Vault
- HTTP Endpoint logs (custom)
- IBM MQ
- IIS
- Imperva
- InfluxDb
- Infoblox
- Iptables
- Istio
- Jamf Compliance Reporter
- Jamf Pro
- Jamf Protect
- Jolokia Input
- Journald logs (custom)
- JumpCloud
- Kafka
- Keycloak
- Kubernetes
- LastPass
- Lateral Movement Detection
- Linux Metrics
- Living off the Land Attack Detection
- Logs (custom)
- Lumos
- Lyve Cloud
- Mattermost
- Memcached
- Menlo Security
- Microsoft
- Microsoft 365
- Microsoft Defender for Cloud
- Microsoft Defender for Endpoint
- Microsoft DHCP
- Microsoft DNS Server
- Microsoft Entra ID Entity Analytics
- Microsoft Exchange Online Message Trace
- Microsoft Exchange Server
- Microsoft Graph Activity Logs
- Microsoft M365 Defender
- Microsoft Office 365 Metrics Integration
- Microsoft Sentinel
- Microsoft SQL Server
- Mimecast
- ModSecurity Audit
- MongoDB
- MongoDB Atlas
- MySQL
- Nagios XI
- NATS
- NetFlow Records
- Netskope
- Network Beaconing Identification
- Network Packet Capture
- Nginx
- Okta
- Oracle
- OpenAI
- OpenCanary
- Osquery
- Palo Alto
- pfSense
- PHP-FPM
- PingOne
- PingFederate
- Pleasant Password Server
- PostgreSQL
- Prometheus
- Proofpoint TAP
- Proofpoint On Demand
- Pulse Connect Secure
- Qualys VMDR
- QNAP NAS
- RabbitMQ Logs
- Radware DefensePro Logs
- Rapid7
- Redis
- Rubrik RSC Metrics Integration
- Sailpoint Identity Security Cloud
- Salesforce
- SentinelOne
- ServiceNow
- Slack Logs
- Snort
- Snyk
- SonicWall Firewall
- Sophos
- Spring Boot
- SpyCloud Enterprise Protection
- SQL Input
- Squid Logs
- SRX
- STAN
- Statsd Input
- Sublime Security
- Suricata
- StormShield SNS
- Symantec
- Symantec Endpoint Security
- Sysmon for Linux
- Sysdig
- Syslog Router Integration
- System
- System Audit
- Tanium
- TCP Logs (custom)
- Tenable OT Security
- Teleport
- Tenable
- Threat intelligence
- ThreatConnect
- Threat Map
- Thycotic Secret Server
- Tines
- Traefik
- Trellix
- Trend Micro
- TYCHON Agentless
- UDP Logs (custom)
- Universal Profiling
- Varonis integration
- Vectra Detect
- VMware
- WatchGuard Firebox
- WebSphere Application Server
- Windows
- Wiz
- Zeek
- ZeroFox
- Zero Networks
- ZooKeeper Metrics
- Zoom
- Zscaler
Custom Windows event log package
editCustom Windows event log package
editVersion |
2.4.0 (View all) |
Compatible Kibana version(s) |
8.10.1 or higher |
Supported Serverless project types |
Security |
Subscription level |
Basic |
Level of support |
Elastic |
The custom Windows event log package allows you to ingest events from any Windows event log channel.
You can get a list of available event log channels by running Get-WinEvent -ListLog * | Format-List -Property LogName
in PowerShell on Windows Vista or newer.
If Get-WinEvent
is not available, Get-EventLog *
may be used.
Custom ingest pipelines may be added by setting one up in Ingest Node Pipelines (use the global search field to search for "ingest pipelines").
Configuration
editWindows Event ID clause limit
editIf you specify more than 22 query conditions (event IDs or event ID ranges), some versions of Windows will prevent the integration from reading the event log due to limits in the query system. If this occurs, a similar warning as shown below:
The specified query is invalid.
In some cases, the limit may be lower than 22 conditions. For instance, using a
mixture of ranges and single event IDs, along with an additional parameter such
as ignore older
, results in a limit of 21 conditions.
If you have more than 22 conditions, you can work around this Windows limitation
by using a drop_event processor to do the filtering after filebeat has received
the events from Windows. The filter shown below is equivalent to
event_id: 903, 1024, 2000-2004, 4624
but can be expanded beyond 22 event IDs.
- drop_event.when.not.or: - equals.winlog.event_id: "903" - equals.winlog.event_id: "1024" - equals.winlog.event_id: "4624" - range: winlog.event_id.gte: 2000 winlog.event_id.lte: 2004
Fields Mapping
editIn addition to the fields specified below, this integration includes the ECS Dynamic Template. Any field that follow the ECS Schema will get assigned the correct index field mapping and does not need to be added manually.
Exported fields
Field | Description | Type |
---|---|---|
@timestamp |
Event timestamp. |
date |
cloud.image.id |
Image ID for the cloud instance. |
keyword |
cloud.project.id |
Name of the project in Google Cloud. |
keyword |
data_stream.dataset |
Data stream dataset. |
constant_keyword |
data_stream.namespace |
Data stream namespace. |
constant_keyword |
data_stream.type |
Data stream type. |
constant_keyword |
host.containerized |
If the host is a container. |
boolean |
host.os.build |
OS build information. |
keyword |
host.os.codename |
OS codename, if any. |
keyword |
winlog.activity_id |
A globally unique identifier that identifies the current activity. The events that are published with this identifier are part of the same activity. |
keyword |
winlog.api |
The event log API type used to read the record. The possible values are "wineventlog" for the Windows Event Log API or "eventlogging" for the Event Logging API. The Event Logging API was designed for Windows Server 2003 or Windows 2000 operating systems. In Windows Vista, the event logging infrastructure was redesigned. On Windows Vista or later operating systems, the Windows Event Log API is used. Winlogbeat automatically detects which API to use for reading event logs. |
keyword |
winlog.channel |
The name of the channel from which this record was read. This value is one of the names from the |
keyword |
winlog.computerObject.domain |
keyword |
|
winlog.computerObject.id |
keyword |
|
winlog.computerObject.name |
keyword |
|
winlog.computer_name |
The name of the computer that generated the record. When using Windows event forwarding, this name can differ from |
keyword |
winlog.event_data |
The event-specific data. This field is mutually exclusive with |
object |
winlog.event_data.AccessGranted |
keyword |
|
winlog.event_data.AccessRemoved |
keyword |
|
winlog.event_data.AccountDomain |
keyword |
|
winlog.event_data.AccountExpires |
keyword |
|
winlog.event_data.AccountName |
keyword |
|
winlog.event_data.AllowedToDelegateTo |
keyword |
|
winlog.event_data.AuditPolicyChanges |
keyword |
|
winlog.event_data.AuditPolicyChangesDescription |
keyword |
|
winlog.event_data.AuditSourceName |
keyword |
|
winlog.event_data.AuthenticationPackageName |
keyword |
|
winlog.event_data.Binary |
keyword |
|
winlog.event_data.BitlockerUserInputTime |
keyword |
|
winlog.event_data.BootMode |
keyword |
|
winlog.event_data.BootType |
keyword |
|
winlog.event_data.BuildVersion |
keyword |
|
winlog.event_data.CallerProcessId |
keyword |
|
winlog.event_data.CallerProcessName |
keyword |
|
winlog.event_data.Category |
keyword |
|
winlog.event_data.CategoryId |
keyword |
|
winlog.event_data.ClientAddress |
keyword |
|
winlog.event_data.ClientName |
keyword |
|
winlog.event_data.CommandLine |
keyword |
|
winlog.event_data.Company |
keyword |
|
winlog.event_data.CorruptionActionState |
keyword |
|
winlog.event_data.CrashOnAuditFailValue |
keyword |
|
winlog.event_data.CreationUtcTime |
keyword |
|
winlog.event_data.Description |
keyword |
|
winlog.event_data.Detail |
keyword |
|
winlog.event_data.DeviceName |
keyword |
|
winlog.event_data.DeviceNameLength |
keyword |
|
winlog.event_data.DeviceTime |
keyword |
|
winlog.event_data.DeviceVersionMajor |
keyword |
|
winlog.event_data.DeviceVersionMinor |
keyword |
|
winlog.event_data.DisplayName |
keyword |
|
winlog.event_data.DomainBehaviorVersion |
keyword |
|
winlog.event_data.DomainName |
keyword |
|
winlog.event_data.DomainPolicyChanged |
keyword |
|
winlog.event_data.DomainSid |
keyword |
|
winlog.event_data.DriveName |
keyword |
|
winlog.event_data.DriverName |
keyword |
|
winlog.event_data.DriverNameLength |
keyword |
|
winlog.event_data.Dummy |
keyword |
|
winlog.event_data.DwordVal |
keyword |
|
winlog.event_data.EntryCount |
keyword |
|
winlog.event_data.EventSourceId |
keyword |
|
winlog.event_data.ExtraInfo |
keyword |
|
winlog.event_data.FailureName |
keyword |
|
winlog.event_data.FailureNameLength |
keyword |
|
winlog.event_data.FailureReason |
keyword |
|
winlog.event_data.FileVersion |
keyword |
|
winlog.event_data.FinalStatus |
keyword |
|
winlog.event_data.Group |
keyword |
|
winlog.event_data.GroupTypeChange |
keyword |
|
winlog.event_data.HandleId |
keyword |
|
winlog.event_data.HomeDirectory |
keyword |
|
winlog.event_data.HomePath |
keyword |
|
winlog.event_data.IdleImplementation |
keyword |
|
winlog.event_data.IdleStateCount |
keyword |
|
winlog.event_data.ImpersonationLevel |
keyword |
|
winlog.event_data.IntegrityLevel |
keyword |
|
winlog.event_data.IpAddress |
keyword |
|
winlog.event_data.IpPort |
keyword |
|
winlog.event_data.KerberosPolicyChange |
keyword |
|
winlog.event_data.KeyLength |
keyword |
|
winlog.event_data.LastBootGood |
keyword |
|
winlog.event_data.LastShutdownGood |
keyword |
|
winlog.event_data.LmPackageName |
keyword |
|
winlog.event_data.LogonGuid |
keyword |
|
winlog.event_data.LogonHours |
keyword |
|
winlog.event_data.LogonID |
keyword |
|
winlog.event_data.LogonId |
keyword |
|
winlog.event_data.LogonProcessName |
keyword |
|
winlog.event_data.LogonType |
keyword |
|
winlog.event_data.MachineAccountQuota |
keyword |
|
winlog.event_data.MajorVersion |
keyword |
|
winlog.event_data.MandatoryLabel |
keyword |
|
winlog.event_data.MaximumPerformancePercent |
keyword |
|
winlog.event_data.MemberName |
keyword |
|
winlog.event_data.MemberSid |
keyword |
|
winlog.event_data.MinimumPerformancePercent |
keyword |
|
winlog.event_data.MinimumThrottlePercent |
keyword |
|
winlog.event_data.MinorVersion |
keyword |
|
winlog.event_data.MixedDomainMode |
keyword |
|
winlog.event_data.NewProcessId |
keyword |
|
winlog.event_data.NewProcessName |
keyword |
|
winlog.event_data.NewSchemeGuid |
keyword |
|
winlog.event_data.NewSd |
keyword |
|
winlog.event_data.NewSdDacl0 |
keyword |
|
winlog.event_data.NewSdDacl1 |
keyword |
|
winlog.event_data.NewSdDacl2 |
keyword |
|
winlog.event_data.NewSdSacl0 |
keyword |
|
winlog.event_data.NewSdSacl1 |
keyword |
|
winlog.event_data.NewSdSacl2 |
keyword |
|
winlog.event_data.NewTargetUserName |
keyword |
|
winlog.event_data.NewTime |
keyword |
|
winlog.event_data.NewUACList |
keyword |
|
winlog.event_data.NewUacValue |
keyword |
|
winlog.event_data.NominalFrequency |
keyword |
|
winlog.event_data.Number |
keyword |
|
winlog.event_data.ObjectName |
keyword |
|
winlog.event_data.ObjectServer |
keyword |
|
winlog.event_data.ObjectType |
keyword |
|
winlog.event_data.OemInformation |
keyword |
|
winlog.event_data.OldSchemeGuid |
keyword |
|
winlog.event_data.OldSd |
keyword |
|
winlog.event_data.OldSdDacl0 |
keyword |
|
winlog.event_data.OldSdDacl1 |
keyword |
|
winlog.event_data.OldSdDacl2 |
keyword |
|
winlog.event_data.OldSdSacl0 |
keyword |
|
winlog.event_data.OldSdSacl1 |
keyword |
|
winlog.event_data.OldSdSacl2 |
keyword |
|
winlog.event_data.OldTargetUserName |
keyword |
|
winlog.event_data.OldTime |
keyword |
|
winlog.event_data.OldUacValue |
keyword |
|
winlog.event_data.OriginalFileName |
keyword |
|
winlog.event_data.PackageName |
keyword |
|
winlog.event_data.ParentProcessName |
keyword |
|
winlog.event_data.PasswordHistoryLength |
keyword |
|
winlog.event_data.PasswordLastSet |
keyword |
|
winlog.event_data.Path |
keyword |
|
winlog.event_data.PerformanceImplementation |
keyword |
|
winlog.event_data.PreAuthType |
keyword |
|
winlog.event_data.PreviousCreationUtcTime |
keyword |
|
winlog.event_data.PreviousTime |
keyword |
|
winlog.event_data.PrimaryGroupId |
keyword |
|
winlog.event_data.PrivilegeList |
keyword |
|
winlog.event_data.ProcessId |
keyword |
|
winlog.event_data.ProcessName |
keyword |
|
winlog.event_data.ProcessPath |
keyword |
|
winlog.event_data.ProcessPid |
keyword |
|
winlog.event_data.Product |
keyword |
|
winlog.event_data.ProfilePath |
keyword |
|
winlog.event_data.PuaCount |
keyword |
|
winlog.event_data.PuaPolicyId |
keyword |
|
winlog.event_data.QfeVersion |
keyword |
|
winlog.event_data.Reason |
keyword |
|
winlog.event_data.SamAccountName |
keyword |
|
winlog.event_data.SchemaVersion |
keyword |
|
winlog.event_data.ScriptBlockText |
keyword |
|
winlog.event_data.ScriptPath |
keyword |
|
winlog.event_data.Service |
keyword |
|
winlog.event_data.ServiceAccount |
keyword |
|
winlog.event_data.ServiceFileName |
keyword |
|
winlog.event_data.ServiceName |
keyword |
|
winlog.event_data.ServiceSid |
keyword |
|
winlog.event_data.ServiceStartType |
keyword |
|
winlog.event_data.ServiceType |
keyword |
|
winlog.event_data.ServiceVersion |
keyword |
|
winlog.event_data.SessionName |
keyword |
|
winlog.event_data.ShutdownActionType |
keyword |
|
winlog.event_data.ShutdownEventCode |
keyword |
|
winlog.event_data.ShutdownReason |
keyword |
|
winlog.event_data.SidFilteringEnabled |
keyword |
|
winlog.event_data.SidHistory |
keyword |
|
winlog.event_data.Signature |
keyword |
|
winlog.event_data.SignatureStatus |
keyword |
|
winlog.event_data.Signed |
keyword |
|
winlog.event_data.StartTime |
keyword |
|
winlog.event_data.State |
keyword |
|
winlog.event_data.Status |
keyword |
|
winlog.event_data.StatusDescription |
keyword |
|
winlog.event_data.StopTime |
keyword |
|
winlog.event_data.SubCategory |
keyword |
|
winlog.event_data.SubCategoryGuid |
keyword |
|
winlog.event_data.SubCategoryId |
keyword |
|
winlog.event_data.SubStatus |
keyword |
|
winlog.event_data.SubcategoryGuid |
keyword |
|
winlog.event_data.SubcategoryId |
keyword |
|
winlog.event_data.SubjectDomainName |
keyword |
|
winlog.event_data.SubjectLogonId |
keyword |
|
winlog.event_data.SubjectUserName |
keyword |
|
winlog.event_data.SubjectUserSid |
keyword |
|
winlog.event_data.TSId |
keyword |
|
winlog.event_data.TargetDomainName |
keyword |
|
winlog.event_data.TargetInfo |
keyword |
|
winlog.event_data.TargetLogonGuid |
keyword |
|
winlog.event_data.TargetLogonId |
keyword |
|
winlog.event_data.TargetServerName |
keyword |
|
winlog.event_data.TargetSid |
keyword |
|
winlog.event_data.TargetUserName |
keyword |
|
winlog.event_data.TargetUserSid |
keyword |
|
winlog.event_data.TdoAttributes |
keyword |
|
winlog.event_data.TdoDirection |
keyword |
|
winlog.event_data.TdoType |
keyword |
|
winlog.event_data.TerminalSessionId |
keyword |
|
winlog.event_data.TicketEncryptionType |
keyword |
|
winlog.event_data.TicketEncryptionTypeDescription |
keyword |
|
winlog.event_data.TicketOptions |
keyword |
|
winlog.event_data.TicketOptionsDescription |
keyword |
|
winlog.event_data.TokenElevationType |
keyword |
|
winlog.event_data.TransmittedServices |
keyword |
|
winlog.event_data.UserAccountControl |
keyword |
|
winlog.event_data.UserParameters |
keyword |
|
winlog.event_data.UserPrincipalName |
keyword |
|
winlog.event_data.UserSid |
keyword |
|
winlog.event_data.UserWorkstations |
keyword |
|
winlog.event_data.Version |
keyword |
|
winlog.event_data.Workstation |
keyword |
|
winlog.event_data.WorkstationName |
keyword |
|
winlog.event_data.param1 |
keyword |
|
winlog.event_data.param2 |
keyword |
|
winlog.event_data.param3 |
keyword |
|
winlog.event_data.param4 |
keyword |
|
winlog.event_data.param5 |
keyword |
|
winlog.event_data.param6 |
keyword |
|
winlog.event_data.param7 |
keyword |
|
winlog.event_data.param8 |
keyword |
|
winlog.event_id |
The event identifier. The value is specific to the source of the event. |
keyword |
winlog.keywords |
The keywords are used to classify an event. |
keyword |
winlog.level |
The event severity. Levels are Critical, Error, Warning and Information, Verbose |
keyword |
winlog.opcode |
The opcode defined in the event. Task and opcode are typically used to identify the location in the application from where the event was logged. |
keyword |
winlog.outcome |
Success or Failure of the event. |
keyword |
winlog.process.pid |
The process_id of the Client Server Runtime Process. |
long |
winlog.process.thread.id |
long |
|
winlog.provider_guid |
A globally unique identifier that identifies the provider that logged the event. |
keyword |
winlog.provider_name |
The source of the event log record (the application or service that logged the record). |
keyword |
winlog.record_id |
The record ID of the event log record. The first record written to an event log is record number 1, and other records are numbered sequentially. If the record number reaches the maximum value (232 for the Event Logging API and 264 for the Windows Event Log API), the next record number will be 0. |
keyword |
winlog.related_activity_id |
A globally unique identifier that identifies the activity to which control was transferred to. The related events would then have this identifier as their |
keyword |
winlog.task |
The task defined in the event. Task and opcode are typically used to identify the location in the application from where the event was logged. The category used by the Event Logging API (on pre Windows Vista operating systems) is written to this field. |
keyword |
winlog.time_created |
Time event was created |
date |
winlog.trustAttribute |
keyword |
|
winlog.trustDirection |
keyword |
|
winlog.trustType |
keyword |
|
winlog.user.domain |
The domain that the account associated with this event is a member of. |
keyword |
winlog.user.identifier |
The Windows security identifier (SID) of the account associated with this event. If Winlogbeat cannot resolve the SID to a name, then the |
keyword |
winlog.user.name |
Name of the user associated with this event. |
keyword |
winlog.user.type |
The type of account associated with this event. |
keyword |
winlog.user_data |
The event specific data. This field is mutually exclusive with |
object |
winlog.user_data.BackupPath |
keyword |
|
winlog.user_data.Channel |
keyword |
|
winlog.user_data.SubjectDomainName |
keyword |
|
winlog.user_data.SubjectLogonId |
keyword |
|
winlog.user_data.SubjectUserName |
keyword |
|
winlog.user_data.SubjectUserSid |
keyword |
|
winlog.user_data.xml_name |
keyword |
|
winlog.version |
The version number of the event’s definition. |
long |
Changelog
editChangelog
Version | Details | Kibana version(s) |
---|---|---|
2.4.0 |
Enhancement (View pull request) |
8.10.1 or higher |
2.3.0 |
Enhancement (View pull request) |
8.10.1 or higher |
2.2.0 |
Enhancement (View pull request) |
8.10.1 or higher |
2.1.2 |
Enhancement (View pull request) |
8.10.1 or higher |
2.1.1 |
Enhancement (View pull request) |
8.10.1 or higher |
2.1.0 |
Enhancement (View pull request) |
8.10.1 or higher |
2.0.0 |
Breaking change (View pull request) |
8.10.1 or higher |
1.20.0 |
Enhancement (View pull request) |
8.7.1 or higher |
1.19.0 |
Enhancement (View pull request) |
8.7.1 or higher |
1.18.0 |
Enhancement (View pull request) |
8.7.1 or higher |
1.17.0 |
Enhancement (View pull request) |
8.7.1 or higher |
1.16.0 |
Enhancement (View pull request) |
8.7.1 or higher |
1.15.0 |
Enhancement (View pull request) |
8.7.1 or higher |
1.14.0 |
Enhancement (View pull request) |
8.7.1 or higher |
1.13.1 |
Enhancement (View pull request) |
7.16.0 or higher |
1.13.0 |
Enhancement (View pull request) |
7.16.0 or higher |
1.12.4 |
Enhancement (View pull request) |
7.16.0 or higher |
1.12.3 |
Enhancement (View pull request) |
7.16.0 or higher |
1.12.2 |
Bug fix (View pull request) |
7.16.0 or higher |
1.12.1 |
Enhancement (View pull request) |
7.16.0 or higher |
1.12.0 |
Enhancement (View pull request) |
7.16.0 or higher |
1.11.0 |
Enhancement (View pull request) |
7.16.0 or higher |
1.10.0 |
Enhancement (View pull request) |
7.16.0 or higher |
1.9.0 |
Enhancement (View pull request) |
7.16.0 or higher |
1.8.0 |
Enhancement (View pull request) |
7.16.0 or higher |
1.7.0 |
Enhancement (View pull request) |
7.16.0 or higher |
1.6.0 |
Enhancement (View pull request) |
7.16.0 or higher |
1.5.2 |
Bug fix (View pull request) |
7.16.0 or higher |
1.5.1 |
Enhancement (View pull request) |
7.16.0 or higher |
1.5.0 |
Enhancement (View pull request) |
7.16.0 or higher |
1.4.0 |
Enhancement (View pull request) Bug fix (View pull request) Enhancement (View pull request) |
7.16.0 or higher |
1.3.0 |
Enhancement (View pull request) |
7.16.0 or higher |
1.2.0 |
Enhancement (View pull request) |
7.16.0 or higher |
1.1.2 |
Enhancement (View pull request) |
7.16.0 or higher |
1.1.1 |
Enhancement (View pull request) |
— |
1.1.0 |
Bug fix (View pull request) |
7.16.0 or higher |
1.0.3 |
Enhancement (View pull request) |
7.16.0 or higher |
1.0.2 |
Bug fix (View pull request) |
— |
1.0.1 |
Bug fix (View pull request) |
— |
1.0.0 |
Enhancement (View pull request) |
— |
0.4.0 |
Enhancement (View pull request) |
— |
0.3.0 |
Enhancement (View pull request) |
— |
0.2.2 |
Enhancement (View pull request) |
— |
0.2.1 |
Enhancement (View pull request) |
— |
0.2.0 |
Enhancement (View pull request) |
— |
0.1.0 |
Enhancement (View pull request) |
— |