<%! title = 'Splunk Admin Server Control' from splunk.appserver.mrsparkle.lib.util import build_breadcrumbs_string import splunk from splunk.appserver.mrsparkle.lib import util, i18n isLite = (cherrypy.config['product_type'] == 'lite' or cherrypy.config['product_type'] == 'lite_free') %> <%namespace name="lib" file="//lib.html" import="*"/> <%inherit file="//layout/admin.html" /> <%def name="title()">${_('Data inputs')} - ${parent.title()} <% evt_local_source = '/' + '/'.join(['servicesNS', '-', APP['id'], 'data', 'inputs', 'win-event-log-collections', 'localhost']) evt_local_uri = make_url(['manager', APP['id'], 'data', 'inputs', 'win-event-log-collections', 'localhost'], _qs=dict(action='edit', uri=evt_local_source)) evt_remote_uri = make_url(['manager', APP['id'], 'adddata', 'selectsource'], _qs=dict(input_type='evt_logs_remote', input_mode=1)) breadcrumbs = build_breadcrumbs_string( [ (_('Manager'), '/manager'), (_('Data inputs'), make_url(['manager', namespace, 'datainputstats'], translate=False)) ]) newInputMap = { 'data/inputs/win-event-log-collections/localhost': 'evt_logs_local', 'data/inputs/win-event-log-collections': 'evt_logs_remote', 'data/inputs/monitor': 'file_monitor', 'data/inputs/win-perfmon': 'perfmon_local', 'data/inputs/win-wmi-collections': 'perfmon_remote', 'data/inputs/tcp/raw': 'tcp', 'data/inputs/udp': 'udp', 'data/inputs/registry': 'regmon', 'data/inputs/ad': 'admon', 'data/inputs/WinHostMon': 'hostmon', 'data/inputs/WinNetMon': 'netmon', 'data/inputs/WinPrintMon': 'printmon', 'data/inputs/script': 'scripts', 'deploymentsetup/app/data/inputs/remote_monitor': 'file_monitor', 'deploymentsetup/app/data/inputs/tcp/remote_raw': 'tcp', 'deploymentsetup/app/data/inputs/remote_script': 'scripts' } isCloudTrial = cherrypy.config['instance_type'] == 'cloudtrial' %>

${_('Local inputs')}

% if isLite: ${_('Set up data inputs from files and directories, network ports, and scripted inputs. To configure Splunk Light to receive data from a Splunk Forwarder, go to Data Receiving.') % dict([('url',make_url(['manager', namespace, 'forwardreceive']))])} % else: ${_('Set up data inputs from files and directories, network ports, and scripted inputs. If you want to set up forwarding and receiving between two Splunk instances, go to Forwarding and receiving.') % dict([('url',make_url(['manager', namespace, 'forwardreceive']))])} % endif
% if indexData: % if winData: % endif % if not isCloudTrial: % endif % if winData: % endif % if not isCloudTrial: % endif % if winData: % endif % if not isCloudTrial: % endif % for input in modInputs: % endfor % else: % endif
${_('Type')} ${_('Inputs')} ${_('Actions')}
${_('Local event log collection')} - ${_('Edit')}
${_('Collect event logs from this machine.')}
${_('Remote event log collections')} ${indexData.get('elCount','0')} ${_('Add new')}
${_('Collect event logs from remote hosts. Note: this uses WMI and requires a domain account.')}
${_('Files & directories')} ${indexData.get('monitorCount','0')} ${_('Add new')}
${_('Index a local file or monitor an entire directory. ')}
${_('Local performance monitoring')} ${indexData.get('perfCount','0')} ${_('Add new')}
${_('Collect performance data from local machine. ')}
${_('Remote performance monitoring')} ${indexData.get('wmiCount','0')} ${_('Add new')}
${_('Collect performance and event information from remote hosts. Requires domain credentials. ')}
${_('TCP')} ${indexData.get('tcpCount','0')} ${_('Add new')}
${_('Listen on a TCP port for incoming data, e.g. syslog. ')}
${_('UDP')} ${indexData.get('udpCount','0')} ${_('Add new')}
${_('Listen on a UDP port for incoming data, e.g. syslog. ')}
${_('Registry monitoring')} ${indexData.get('regCount','0')} ${_('Add new')}
${_('Have Splunk index the local Windows Registry, and monitor it for changes. ')}
${_('Active Directory monitoring')} ${indexData.get('adCount','0')} ${_('Add new')}
${_('Index and monitor Active Directory. ')}
${_('Scripts')} ${indexData.get('scriptCount','0')} ${_('Add new')}
${_('Run custom scripts to collect or generate more data. ')}
${_(input['title'])} ${input['count']} ${_('Add new')}
${_(input['description'])}
${_('Indexes data not returned')}

${_('Forwarded inputs')}


% if indexData: % else: % endif
${_('Type')} ${_('Inputs')} ${_('Actions')}
${_('Windows Event Logs')} ${indexData.get('fwdEvtLogsCount','0')} ${_('Add new')}
${_('Collect event logs from Forwarders.')}
${_('Files & Directories')} ${indexData.get('fwdMonitorCount','0')} ${_('Add new')}
${_('Monitor files or directories on Forwarders configured as Deployment Clients ')}
${_('Windows Performance Monitoring')} ${indexData.get('fwdPerfmonCount','0')} ${_('Add new')}
${_('Collect performance data from Forwarders. ')}
${_('TCP')} ${indexData.get('fwdTcpCount','0')} ${_('Add new')}
${_('Listen on a TCP port for incoming data, e.g. syslog. ')}
${_('UDP')} ${indexData.get('fwdUdpCount','0')} ${_('Add new')}
${_('Listen on a UDP port for incoming data, e.g. syslog. ')}
${_('Scripts')} ${indexData.get('fwdScriptCount','0')} ${_('Add new')}
${_('Run custom scripts on Forwarders to collect or generate more data. ')}
${_('Indexes data not returned')}