diff --git a/docs/detections/images/filter-icon.png b/docs/detections/images/filter-icon.png new file mode 100644 index 0000000000..fb75463d13 Binary files /dev/null and b/docs/detections/images/filter-icon.png differ diff --git a/docs/detections/images/rule-execution-logs.png b/docs/detections/images/rule-execution-logs.png index 0f616e6823..a75bd50ebd 100644 Binary files a/docs/detections/images/rule-execution-logs.png and b/docs/detections/images/rule-execution-logs.png differ diff --git a/docs/detections/rules-ui-monitor.asciidoc b/docs/detections/rules-ui-monitor.asciidoc index 04b25ef2bd..2e96c654be 100644 --- a/docs/detections/rules-ui-monitor.asciidoc +++ b/docs/detections/rules-ui-monitor.asciidoc @@ -51,6 +51,8 @@ Use these controls to filter what's included in the logs table: * The *Show metrics columns* toggle includes more or less data in the table, pertaining to the timing of each rule execution. +* The *Actions* column allows you to show alerts generated from a given rule execution. Click the filter icon (image:images/filter-icon.png[Filter icon,18,17]) to create a global search filter based on the rule execution's ID value. This replaces any previously applied filters, changes the global date and time range to 24 hours before and after the rule execution, and displays a confirmation notification. You can revert this action by clicking *Restore previous filters* in the notification. + [float] [[troubleshoot-signals]] === Troubleshoot missing alerts