<%= _('Input Settings').t() %>

<%= _('Optionally set additional input parameters for this data input as follows: ').t() %>

<%= _('Sourcetype').t() %>
<%= _("The source type is one of the default fields that Splunk assigns to all incoming data. It tells Splunk what kind of data you've got, so that Splunk can format the data intelligently during indexing. And it's a way to categorize your data, so that you can search it easily.").t() %>
<%= _('App context').t() %>
<%= _('Application contexts are folders within a Splunk instance that contain configurations for a specific use case or domain of data. App contexts improve manageability of input and source type definitions. Splunk loads all app contexts based on precedence rules.').t() %> <%= _("Learn More").t() %>
<%= _('Host').t() %>
<%= _("When Splunk indexes data, each event receives a \"host\" value. The host value should be the name of the machine from which the event originates, and can be defined based either on the path to the source data, a regular expression, or a number that represents a segment of a file path.").t() %> <%= _("Learn More").t() %>
<%= _('Index').t() %>
<%= _("Splunk stores incoming data as events in the selected index. Consider using a \"sandbox\" index as a destination if you have problems determining a source type for your data. A sandbox index lets you troubleshoot your configuration without impacting production indexes. You can always change this setting later.").t() %> <%= _("Learn More").t() %>