<%= _('Optionally set additional input parameters for this data input as follows: ').t() %>
<%= _('Sourcetype').t() %>
<%= _("The source type is one of the default fields that Splunk assigns to all incoming \
data. It tells Splunk what kind of data you've got, so that Splunk can format the data intelligently \
during indexing. And it's a way to categorize your data, so that you can search it easily.").t() %>
<%= _('App context').t() %>
<%= _('Application contexts are folders within a Splunk instance that contain configurations \
for a specific use case or domain of data. App contexts improve manageability of input and source type \
definitions. Splunk loads all app contexts based on precedence rules.').t() %>
<%= _("Learn More").t() %>
<%= _('Host').t() %>
<%= _('When Splunk indexes data, each event receives a "host" value. The host value should \
be the name of the machine from which the event originates, and can be defined based either on the path \
to the source data, a regular expression, or a number that represents a segment of a file path. ').t() %>
<%= _("Learn More").t() %>
<%= _('Index').t() %>
<%= _('Splunk stores incoming data as events in the selected index. Consider using a “sandbox” \
index as a destination if you have problems determining a source type for your data. A sandbox index \
lets you troubleshoot your configuration without impacting production indexes. You can always change this setting later.').t() %>
<%= _("Learn More").t() %>