Hi Tejo
To create a wazuh-archive-* ndex pattern, please refer to
https://documentation.wazuh.com/current/user-manual/manager/event-logging.htmlEdit the Wazuh manager configuration file /var/ossec/etc/ossec.conf and enable logall and logall_json lke:
<ossec_config>
..
<logall>yes</logall>
<logall_json>yes</logall_json>
...
</ossec_config>Restart the Wazuh manager to apply the configuration changes: systemctl
restart wazuh-managerEdit the Filebeat configuration file /etc/filebeat/filebeat.yml and change the value of archives: enabled from false to true:
archives:
enabled: trueRestart Filebeat to apply the configuration changes:
systemctl restart filebeatClick the upper-left menu icon to open the main menu. Expand Dashboard management and navigate to Dashboards management > Index patterns. Next, click Create index pattern. Use wazuh-archives-* as the index pattern name, and set timestamp in the Time field drop-down list.

For your second query, you need to first restore the backup on the other wazuh dashboard, for that you need to refer to
https://documentation.wazuh.com/current/migration-guide/restoring/wazuh-central-components.html#restoring-old-logs. However, the problem is if you have one manager node setup(no cluster)
, you will not be able to see the old events in the threat hunting but you will be able to see them in the discover. No issue will happen if you have a cluster name as the cluster name will be the same.
Let me know if you need any further assistance!