%! title = 'Splunk Admin Server Control' from splunk.appserver.mrsparkle.lib.util import build_breadcrumbs_string import splunk from splunk.appserver.mrsparkle.lib import util, i18n %> <%namespace name="lib" file="//lib.html" import="*"/> <%inherit file="//layout/admin.html" /> <% evt_local_source = '/' + '/'.join(['servicesNS', '-', APP['id'], 'admin', 'win-event-log-collections', 'localhost']) evt_local_uri = make_url(['manager', APP['id'], 'admin', 'win-event-log-collections', 'localhost'], _qs=dict(action='edit', uri=evt_local_source)) evt_remote_uri = make_url(['manager', APP['id'], 'admin', 'win-event-log-collections', '_new'], _qs=dict(action='edit', ns=APP['id'])) breadcrumbs = build_breadcrumbs_string( [ ('Manager', '/manager'), ('Data inputs', make_url(['manager', namespace, 'datainputstats'], translate=False)) ]) %>
| ${_('Type')} | ${_('Inputs')} | ${_('Actions')} |
|---|---|---|
| ${_('Local event log collection')} | - | ${_('Edit')} |
| ${_('Collect event logs from this machine.')} | ||
| ${_('Remote event log collections')} | ${indexData.get('elCount','0')} | ${_('Add new')} |
| ${_('Collect event logs from remote hosts. Note: this uses WMI and requires a domain account.')} | ||
| ${_('Files & directories')} | ${indexData.get('monitorCount','0')} | ${_('Add new')} |
| ${_('Upload a file, index a local file, or monitor an entire directory. ')} | ||
| ${_('Local performance monitoring')} | ${indexData.get('perfCount','0')} | ${_('Add new')} |
| ${_('Collect performance data from local machine. ')} | ||
| ${_('Remote performance monitoring')} | ${indexData.get('wmiCount','0')} | ${_('Add new')} |
| ${_('Collect performance and event information from remote hosts. Requires domain credentials. ')} | ||
| ${_('TCP')} | ${indexData.get('tcpCount','0')} | ${_('Add new')} |
| ${_('Listen on a TCP port for incoming data, e.g. syslog. ')} | ||
| ${_('UDP')} | ${indexData.get('udpCount','0')} | ${_('Add new')} |
| ${_('Listen on a UDP port for incoming data, e.g. syslog. ')} | ||
| ${_('Registry monitoring')} | ${indexData.get('regCount','0')} | ${_('Add new')} |
| ${_('Have Splunk index the local Windows Registry, and monitor it for changes. ')} | ||
| ${_('Active Directory monitoring')} | ${indexData.get('adCount','0')} | ${_('Add new')} |
| ${_('Index and monitor Active Directory. ')} | ||
| ${_('Scripts')} | ${indexData.get('scriptCount','0')} | ${_('Add new')} |
| ${_('Run custom scripts to collect or generate more data. ')} | ||
| ${_('Indexes data not returned')} | ||