<%= _('Input Settings').t() %>

<%= _('Optionally set additional input parameters for this data input as follows: ').t() %>

<%= _('Source type').t() %>
<%= _("The source type is one of the default fields that the Splunk platform assigns to all incoming data. It tells the Splunk platform what kind of data you've got, so that the Splunk platform can format the data intelligently during indexing. And it's a way to categorize your data, so that you can search it easily.").t() %>
<%= _('App context').t() %>
<%= _("Application contexts are folders within a Splunk platform instance that contain configurations for a specific use case or domain of data. App contexts improve manageability of input and source type definitions. The Splunk platform loads all app contexts based on precedence rules.").t() %> <%= _("Learn More").t() %>
<%= _('Host').t() %>
<%= _("When the Splunk platform indexes data, each event receives a \"host\" value. The host value should be the name of the machine from which the event originates. The type of input you choose determines the available configuration options.").t() %> <%= _("Learn More").t() %>
<%= _('Index').t() %>
<%= _("The Splunk platform stores incoming data as events in the selected index. Consider using a \"sandbox\" index as a destination if you have problems determining a source type for your data. A sandbox index lets you troubleshoot your configuration without impacting production indexes. You can always change this setting later.").t() %> <%= _("Learn More").t() %>