Create an index patternedit

Kibana requires an index pattern to access the Elasticsearch data that you want to explore. An index pattern selects the data to use and allows you to define properties of the fields.

An index pattern can point to a specific index, for example, your log data from yesterday, or all indices that contain your data. It can also point to a data stream or index alias.

You’ll learn how to:

  • Create index patterns
  • Set the default index pattern
  • Delete index patterns

Before you beginedit

  • To access the Index Patterns view, you must have the Kibana privilege Index Pattern Management. To create an index pattern, you must have the Elasticsearch privilege view_index_metadata. To add the privileges, open the main menu, then click Stack Management > Roles.
  • If a read-only indicator appears in Kibana, you have insufficient privileges to create or save index patterns. The buttons to create new index patterns or save existing index patterns are not visible. For more information, refer to Granting access to Kibana.

Create an index patternedit

If you collected data using one of the Kibana ingest options, uploaded a file, or added sample data, you get an index pattern for free, and can start exploring your data. If you loaded your own data, follow these steps to create an index pattern.

  1. Open the main menu, then click to Stack Management > Index Patterns.
  2. Click Create index pattern.

    Create index pattern

  3. Start typing in the Index pattern field, and Kibana looks for the names of Elasticsearch indices that match your input.

    • Use a wildcard (*) to match multiple indices. For example, suppose your system creates indices for Apache data using the naming scheme filebeat-apache-a, filebeat-apache-b, and so on. An index pattern named filebeat-a matches a single source, and filebeat-* matches multiple data sources. Using a wildcard is the most popular approach.
    • Select multiple indices by entering multiple strings, separated with a comma. Make sure there is no space after the comma. For example, filebeat-a,filebeat-b matches two indices, but not other indices you might have afterwards (filebeat-c).
    • Use a minus sign (-) to exclude an index, for example, test*,-test3.
  4. Click Next step.
  5. If Kibana detects an index with a timestamp, expand the Time field menu, and then specify the default field for filtering your data by time.

    If your index doesn’t have time-based data, or if you don’t want to select the default timestamp field, choose I don’t want to use the Time Filter.

    If you don’t set a default time field, you will not be able to use global time filters on your dashboards. This is useful if you have multiple time fields and want to create dashboards that combine visualizations based on different timestamps.

  6. Click Create index pattern.

    Kibana is now configured to use your Elasticsearch data.

  7. Select this index pattern when you search and visualize your data.

Create an index pattern for rolled up dataedit

An index pattern can match one rollup index. For a combination rollup index pattern with both raw and rolled up data, use the standard notation:

rollup_logstash,kibana_sample_data_logs

For an example, refer to Create and visualize rolled up data.

Create an index pattern that searches across clustersedit

If your Elasticsearch clusters are configured for cross-cluster search, you can create an index pattern to search across the clusters of your choosing. Use the same syntax that you’d use in a raw cross-cluster search request in Elasticsearch:

<cluster-names>:<pattern>

For example, to query Logstash indices across two Elasticsearch clusters that you set up for cross-cluster search, named cluster_one and cluster_two, use this for your index pattern:

 cluster_one:logstash-*,cluster_two:logstash-*

You can use wildcards in your cluster names to match any number of clusters. For example, to search Logstash indices across clusters named cluster_foo, cluster_bar, and so on, create this index pattern:

cluster_*:logstash-*

To query across all Elasticsearch clusters that have been configured for cross-cluster search, use a standalone wildcard for your cluster name in your index pattern:

*:logstash-*

You can use exclusions to exclude indices that might contain mapping errors. To match indices starting with logstash-, and exclude those starting with logstash-old from all clusters having a name starting with cluster_, you can use cluster_*:logstash-*,cluster*:logstash-old*. To exclude a cluster, use cluster_*:logstash-*,cluster_one:-*.

Once an index pattern is configured using the cross-cluster search syntax, all searches and aggregations using that index pattern in Kibana take advantage of cross-cluster search.

Delete index patternsedit

When you delete an index pattern, you are unable to recover the associated field formatters, scripted fields, source filters, and field popularity data. Deleting an index pattern does not remove any indices or data documents from Elasticsearch.

Deleting an index pattern breaks all visualizations, saved searches, and other saved objects that reference the index pattern.

  1. Open the main menu, then click Stack Management > Index Patterns.
  2. Click the index pattern you want to delete.
  3. Delete (Delete icon) the index pattern.

What’s nextedit

Learn how to manage the data fields in your index patterns.