<%! title = 'Splunk Admin Server Control' from splunk.appserver.mrsparkle.lib.util import build_breadcrumbs_string import splunk import copy import splunk.appserver.mrsparkle.lib.paginator as paginator from splunk.appserver.mrsparkle.lib import util, i18n %> <%namespace name="lib" file="//lib.html" import="*"/> <%inherit file="//layout/admin.html" /> <%def name="title()">${_('Data inputs')} - ${parent.title()} <% evt_local_source = '/' + '/'.join(['servicesNS', '-', APP['id'], 'data', 'inputs', 'win-event-log-collections', 'localhost']) evt_local_uri = make_url(['manager', APP['id'], 'data', 'inputs', 'win-event-log-collections', 'localhost'], _qs=dict(action='edit', uri=evt_local_source)) evt_remote_uri = make_url(['manager', APP['id'], 'adddata', 'selectsource'], _qs=dict(input_type='evt_logs_remote', input_mode=1)) breadcrumbs = build_breadcrumbs_string( [ (_('Manager'), '/manager'), (_('Data inputs'), make_url(['manager', namespace, 'datainputstats'], translate=False)) ]) newInputMap = { 'data/inputs/win-event-log-collections/localhost': 'evt_logs_local', 'data/inputs/win-event-log-collections': 'evt_logs_remote', 'data/inputs/monitor': 'file_monitor', 'data/inputs/win-perfmon': 'perfmon_local', 'data/inputs/win-wmi-collections': 'perfmon_remote', 'data/inputs/tcp/raw': 'tcp', 'data/inputs/udp': 'udp', 'data/inputs/http': 'http', 'data/inputs/registry': 'regmon', 'data/inputs/ad': 'admon', 'data/inputs/WinHostMon': 'hostmon', 'data/inputs/WinNetMon': 'netmon', 'data/inputs/WinPrintMon': 'printmon', 'data/inputs/script': 'scripts', 'deployment/server/setup/data/inputs/remote_monitor': 'file_monitor', 'deployment/server/setup/data/inputs/tcp/remote_raw': 'tcp', 'deployment/server/setup/data/inputs/remote_script': 'scripts' } isCloud = util.isCloud() isSingleCloud = util.isSingleCloud() spanStart = 1 if offset == 0 else (offset + 1) spanEnd = offset + count if spanEnd > totalResults: spanEnd = totalResults max_pages = 10 pager = paginator.Google(totalResults, count, max_pages=max_pages, item_offset=offset) page_range = [] for page in pager.page_range: page_range.append( { 'number':page, 'offset':pager.page_item_offset(page), 'active':pager.is_active_page(page) } ) newOffset = count + offset prevOffset = 0 if ( (offset - count) < 0 ) else (offset - count) %>
% if isForwardReceiveAccessible: % if util.isLite(): ${_('Set up data inputs from files and directories, network ports, and scripted inputs. To configure Splunk Light to receive data from a Splunk Forwarder, go to Data Receiving.') % dict([('url',make_url(['manager', namespace, 'forwardreceive']))])} % else: ${_('Set up data inputs from files and directories, network ports, and scripted inputs. If you want to set up forwarding and receiving between two Splunk instances, go to Forwarding and receiving.') % dict([('url',make_url(['manager', namespace, 'forwardreceive']))])} % endif % else: ${_('Set up data inputs from files and directories, network ports, and scripted inputs.')} % endif

${_('Local inputs')}

% if indexData: % if winData: % if canView['win-event-log']: % endif % endif % if not isCloud and canView['monitor']: % endif % if winData: % if canView['win-perfmon']: % endif % if canView['win-wmi']: % endif % endif % if canView['http']: % endif % if not isCloud: % if canView['tcp']: % endif % if canView['udp']: % endif % endif % if winData: % if canView['win-regmon']: % endif % if canView['win-admon']: % endif % endif % if not isCloud and canView['scripts']: % endif % for input in modInputs: % if input['add_as_mod_input']: % else: % endif % endfor % else: % endif
${_('Type')} ${_('Inputs')} ${_('Actions')}
${_('Local event log collection')} - ${_('Edit')}
${_('Collect event logs from this machine.')}
${_('Remote event log collections')} ${indexData.get('win-event-log','0')} ${_('Add new')}
${_('Collect event logs from remote hosts. Note: this uses WMI and requires a domain account.')}
${_('Files & Directories')} ${indexData.get('monitor','0')} ${_('Add new')}
${_('Index a local file or monitor an entire directory. ')}
${_('Local performance monitoring')} ${indexData.get('win-perfmon','0')} ${_('Add new')}
${_('Collect performance data from local machine. ')}
${_('Remote performance monitoring')} ${indexData.get('win-wmi','0')} ${_('Add new')}
${_('Collect performance and event information from remote hosts. Requires domain credentials. ')}
${_('HTTP Event Collector')} ${indexData.get('http','0')} ${_('Add new')}
${_('Receive data over HTTP or HTTPS.')}
${_('TCP')} ${indexData.get('tcp','0')} ${_('Add new')}
${_('Listen on a TCP port for incoming data, e.g. syslog.')}
${_('UDP')} ${indexData.get('udp','0')} ${_('Add new')}
${_('Listen on a UDP port for incoming data, e.g. syslog. ')}
${_('Registry monitoring')} ${indexData.get('win-regmon','0')} ${_('Add new')}
${_('Have Splunk index the local Windows Registry, and monitor it for changes. ')}
${_('Active Directory monitoring')} ${indexData.get('win-admon','0')} ${_('Add new')}
${_('Index and monitor Active Directory. ')}
${_('Scripts')} ${indexData.get('scripts','0')} ${_('Add new')}
${_('Run custom scripts to collect or generate more data. ')}
${_(input['title'])} ${input['count']}${_('Add new')}${_('Add new')}
${_(input['description'])}
${_('Indexes data not returned')}
% if totalResults > 0:

${ungettext('Showing %(first)s-%(last)s of %(total)s modular inputs', 'Showing %(first)s-%(last)s of %(total)s modular inputs', totalResults) % dict(first=spanStart, last=spanEnd, total=totalResults)}

% endif
<% page_opts = copy.deepcopy(pageargs) %>

${_('Forwarded inputs')}


% if indexData: % if canView['fwdEventLogs']: % endif % if canView['fwdMonitor']: % endif % if canView['fwdPerfMon']: % endif % if canView['fwdTcp']: % endif % if canView['fwdUdp']: % endif % if canView['fwdScripts']: % endif % else: % endif
${_('Type')} ${_('Inputs')} ${_('Actions')}
${_('Windows Event Logs')} ${indexData.get('fwdEventLogs','0')} ${_('Add new')}
${_('Collect event logs from forwarders.')}
${_('Files & Directories')} ${indexData.get('fwdMonitor','0')} ${_('Add new')}
${_('Monitor files or directories on forwarders.')}
${_('Windows Performance Monitoring')} ${indexData.get('fwdPerfMon','0')} ${_('Add new')}
${_('Collect performance data from forwarders.')}
${_('TCP')} ${indexData.get('fwdTcp','0')} ${_('Add new')}
${_('Configure a forwarder to listen on a TCP port for incoming data.')}
${_('UDP')} ${indexData.get('fwdUdp','0')} ${_('Add new')}
${_('Configure a forwarder to listen on a UDP port for incoming data.')}
${_('Scripts')} ${indexData.get('fwdScripts','0')} ${_('Add new')}
${_('Collect data from scripts installed on forwarders.')}
${_('Indexes data not returned')}