%! title = 'Splunk Admin Server Control' from splunk.appserver.mrsparkle.lib.util import build_breadcrumbs_string import splunk from splunk.appserver.mrsparkle.lib import util, i18n isLite = (cherrypy.config['product_type'] == 'lite' or cherrypy.config['product_type'] == 'lite_free') %> <%namespace name="lib" file="//lib.html" import="*"/> <%inherit file="//layout/admin.html" /> <%def name="title()">${_('Data inputs')} - ${parent.title()}%def> <% evt_local_source = '/' + '/'.join(['servicesNS', '-', APP['id'], 'data', 'inputs', 'win-event-log-collections', 'localhost']) evt_local_uri = make_url(['manager', APP['id'], 'data', 'inputs', 'win-event-log-collections', 'localhost'], _qs=dict(action='edit', uri=evt_local_source)) evt_remote_uri = make_url(['manager', APP['id'], 'adddata', 'selectsource'], _qs=dict(input_type='evt_logs_remote', input_mode=1)) breadcrumbs = build_breadcrumbs_string( [ (_('Manager'), '/manager'), (_('Data inputs'), make_url(['manager', namespace, 'datainputstats'], translate=False)) ]) newInputMap = { 'data/inputs/win-event-log-collections/localhost': 'evt_logs_local', 'data/inputs/win-event-log-collections': 'evt_logs_remote', 'data/inputs/monitor': 'file_monitor', 'data/inputs/win-perfmon': 'perfmon_local', 'data/inputs/win-wmi-collections': 'perfmon_remote', 'data/inputs/tcp/raw': 'tcp', 'data/inputs/udp': 'udp', 'data/inputs/registry': 'regmon', 'data/inputs/ad': 'admon', 'data/inputs/WinHostMon': 'hostmon', 'data/inputs/WinNetMon': 'netmon', 'data/inputs/WinPrintMon': 'printmon', 'data/inputs/script': 'scripts', 'deploymentsetup/app/data/inputs/remote_monitor': 'file_monitor', 'deploymentsetup/app/data/inputs/tcp/remote_raw': 'tcp', 'deploymentsetup/app/data/inputs/remote_script': 'scripts' } isCloudTrial = cherrypy.config['instance_type'] == 'cloudtrial' %>
${_('Type')} | ${_('Inputs')} | ${_('Actions')} |
---|---|---|
${_('Local event log collection')} | - | ${_('Edit')} |
${_('Collect event logs from this machine.')} | ||
${_('Remote event log collections')} | ${indexData.get('elCount','0')} | ${_('Add new')} |
${_('Collect event logs from remote hosts. Note: this uses WMI and requires a domain account.')} | ||
${_('Files & directories')} | ${indexData.get('monitorCount','0')} | ${_('Add new')} |
${_('Index a local file or monitor an entire directory. ')} | ||
${_('Local performance monitoring')} | ${indexData.get('perfCount','0')} | ${_('Add new')} |
${_('Collect performance data from local machine. ')} | ||
${_('Remote performance monitoring')} | ${indexData.get('wmiCount','0')} | ${_('Add new')} |
${_('Collect performance and event information from remote hosts. Requires domain credentials. ')} | ||
${_('TCP')} | ${indexData.get('tcpCount','0')} | ${_('Add new')} |
${_('Listen on a TCP port for incoming data, e.g. syslog. ')} | ||
${_('UDP')} | ${indexData.get('udpCount','0')} | ${_('Add new')} |
${_('Listen on a UDP port for incoming data, e.g. syslog. ')} | ||
${_('Registry monitoring')} | ${indexData.get('regCount','0')} | ${_('Add new')} |
${_('Have Splunk index the local Windows Registry, and monitor it for changes. ')} | ||
${_('Active Directory monitoring')} | ${indexData.get('adCount','0')} | ${_('Add new')} |
${_('Index and monitor Active Directory. ')} | ||
${_('Scripts')} | ${indexData.get('scriptCount','0')} | ${_('Add new')} |
${_('Run custom scripts to collect or generate more data. ')} | ||
${_(input['title'])} | ${input['count']} | ${_('Add new')} |
${_(input['description'])} | ||
${_('Indexes data not returned')} |
${_('Type')} | ${_('Inputs')} | ${_('Actions')} |
---|---|---|
${_('Windows Event Logs')} | ${indexData.get('fwdEvtLogsCount','0')} | ${_('Add new')} |
${_('Collect event logs from Forwarders.')} | ||
${_('Files & Directories')} | ${indexData.get('fwdMonitorCount','0')} | ${_('Add new')} |
${_('Monitor files or directories on Forwarders configured as Deployment Clients ')} | ||
${_('Windows Performance Monitoring')} | ${indexData.get('fwdPerfmonCount','0')} | ${_('Add new')} |
${_('Collect performance data from Forwarders. ')} | ||
${_('TCP')} | ${indexData.get('fwdTcpCount','0')} | ${_('Add new')} |
${_('Listen on a TCP port for incoming data, e.g. syslog. ')} | ||
${_('UDP')} | ${indexData.get('fwdUdpCount','0')} | ${_('Add new')} |
${_('Listen on a UDP port for incoming data, e.g. syslog. ')} | ||
${_('Scripts')} | ${indexData.get('fwdScriptCount','0')} | ${_('Add new')} |
${_('Run custom scripts on Forwarders to collect or generate more data. ')} | ||
${_('Indexes data not returned')} |