<%! title = 'Splunk Admin Server Control' from splunk.appserver.mrsparkle.lib.util import build_breadcrumbs_string import splunk from splunk.appserver.mrsparkle.lib import util, i18n %> <%namespace name="lib" file="//lib.html" import="*"/> <%inherit file="//layout/admin.html" /> <% evt_local_source = '/' + '/'.join(['servicesNS', '-', APP['id'], 'admin', 'win-event-log-collections', 'localhost']) evt_local_uri = make_url(['manager', APP['id'], 'admin', 'win-event-log-collections', 'localhost'], _qs=dict(action='edit', uri=evt_local_source)) evt_remote_uri = make_url(['manager', APP['id'], 'admin', 'win-event-log-collections', '_new'], _qs=dict(action='edit', ns=APP['id'])) breadcrumbs = build_breadcrumbs_string( [ ('Manager', '/manager'), ('Data inputs', make_url(['manager', namespace, 'datainputstats'], translate=False)) ]) %>

${_('Data inputs')}

${_('Set up data inputs from files and directories, network ports, and scripted inputs. If you want to set up forwarding and receiving between two Splunk instances, go to Forwarding and receiving.') % dict([('url',make_url(['manager', namespace, 'forwardreceive']))])}

${_('Add data')}


% if indexData: % if winData: % endif % if winData: % endif % if winData: % endif % else: % endif
${_('Type')} ${_('Inputs')} ${_('Actions')}
${_('Local event log collection')} - ${_('Edit')}
${_('Collect event logs from this machine.')}
${_('Remote event log collections')} ${indexData.get('elCount','0')} ${_('Add new')}
${_('Collect event logs from remote hosts. Note: this uses WMI and requires a domain account.')}
${_('Files & directories')} ${indexData.get('monitorCount','0')} ${_('Add new')}
${_('Upload a file, index a local file, or monitor an entire directory. ')}
${_('Local performance monitoring')} ${indexData.get('perfCount','0')} ${_('Add new')}
${_('Collect performance data from local machine. ')}
${_('Remote performance monitoring')} ${indexData.get('wmiCount','0')} ${_('Add new')}
${_('Collect performance and event information from remote hosts. Requires domain credentials. ')}
${_('TCP')} ${indexData.get('tcpCount','0')} ${_('Add new')}
${_('Listen on a TCP port for incoming data, e.g. syslog. ')}
${_('UDP')} ${indexData.get('udpCount','0')} ${_('Add new')}
${_('Listen on a UDP port for incoming data, e.g. syslog. ')}
${_('Registry monitoring')} ${indexData.get('regCount','0')} ${_('Add new')}
${_('Have Splunk index the local Windows Registry, and monitor it for changes. ')}
${_('Active Directory monitoring')} ${indexData.get('adCount','0')} ${_('Add new')}
${_('Index and monitor Active Directory. ')}
${_('Scripts')} ${indexData.get('scriptCount','0')} ${_('Add new')}
${_('Run custom scripts to collect or generate more data. ')}
${_('Indexes data not returned')}