%! title = 'Splunk Admin Server Control' from splunk.appserver.mrsparkle.lib.util import build_breadcrumbs_string import splunk from splunk.appserver.mrsparkle.lib import util, i18n %> <%namespace name="lib" file="//lib.html" import="*"/> <%inherit file="//layout/admin.html" /> <% evt_local_source = '/' + '/'.join(['servicesNS', '-', APP['id'], 'data', 'inputs', 'win-event-log-collections', 'localhost']) evt_local_uri = make_url(['manager', APP['id'], 'data', 'inputs', 'win-event-log-collections', 'localhost'], _qs=dict(action='edit', uri=evt_local_source)) evt_remote_uri = make_url(['manager', APP['id'], 'data', 'inputs', 'win-event-log-collections', '_new'], _qs=dict(action='edit', ns=APP['id'])) breadcrumbs = build_breadcrumbs_string( [ (_('Manager'), '/manager'), (_('Data inputs'), make_url(['manager', namespace, 'datainputstats'], translate=False)) ]) %>
${_('Type')} | ${_('Inputs')} | ${_('Actions')} |
---|---|---|
${_('Local event log collection')} | - | ${_('Edit')} |
${_('Collect event logs from this machine.')} | ||
${_('Remote event log collections')} | ${indexData.get('elCount','0')} | ${_('Add new')} |
${_('Collect event logs from remote hosts. Note: this uses WMI and requires a domain account.')} | ||
${_('Files & directories')} | ${indexData.get('monitorCount','0')} | ${_('Add new')} |
${_('Upload a file, index a local file, or monitor an entire directory. ')} | ||
${_('Local performance monitoring')} | ${indexData.get('perfCount','0')} | ${_('Add new')} |
${_('Collect performance data from local machine. ')} | ||
${_('Remote performance monitoring')} | ${indexData.get('wmiCount','0')} | ${_('Add new')} |
${_('Collect performance and event information from remote hosts. Requires domain credentials. ')} | ||
${_('TCP')} | ${indexData.get('tcpCount','0')} | ${_('Add new')} |
${_('Listen on a TCP port for incoming data, e.g. syslog. ')} | ||
${_('UDP')} | ${indexData.get('udpCount','0')} | ${_('Add new')} |
${_('Listen on a UDP port for incoming data, e.g. syslog. ')} | ||
${_('Registry monitoring')} | ${indexData.get('regCount','0')} | ${_('Add new')} |
${_('Have Splunk index the local Windows Registry, and monitor it for changes. ')} | ||
${_('Active Directory monitoring')} | ${indexData.get('adCount','0')} | ${_('Add new')} |
${_('Index and monitor Active Directory. ')} | ||
${_('Scripts')} | ${indexData.get('scriptCount','0')} | ${_('Add new')} |
${_('Run custom scripts to collect or generate more data. ')} | ||
${_(input['title'])} | ${input['count']} | ${_('Add new')} |
${_(input['description'])} | ||
${_('Indexes data not returned')} |