You can not select more than 25 topics
Topics must start with a letter or number, can include dashes ('-') and can be up to 35 characters long.
6682 lines
264 KiB
6682 lines
264 KiB
# Translations template for PROJECT.
|
|
# Copyright (C) 2019 ORGANIZATION
|
|
# This file is distributed under the same license as the PROJECT project.
|
|
# FIRST AUTHOR <EMAIL@ADDRESS>, 2019.
|
|
#
|
|
#, fuzzy
|
|
msgid ""
|
|
msgstr ""
|
|
"Project-Id-Version: PROJECT VERSION\n"
|
|
"Report-Msgid-Bugs-To: EMAIL@ADDRESS\n"
|
|
"POT-Creation-Date: 2019-10-07 14:22-0700\n"
|
|
"PO-Revision-Date: YEAR-MO-DA HO:MI+ZONE\n"
|
|
"Last-Translator: FULL NAME <EMAIL@ADDRESS>\n"
|
|
"Language-Team: LANGUAGE <LL@li.org>\n"
|
|
"MIME-Version: 1.0\n"
|
|
"Content-Type: text/plain; charset=utf-8\n"
|
|
"Content-Transfer-Encoding: 8bit\n"
|
|
"Generated-By: Babel 2.6.0\n"
|
|
|
|
#: /Applications/Splunk/etc/apps/SA-ITOA/lib/ITOA/event_management/notable_event_utils.py:313
|
|
msgid "\"{0}\" does not have the capability \"{1}\"."
|
|
msgstr ""
|
|
|
|
#: /Applications/Splunk/etc/apps/SA-ITOA/lib/ITOA/event_management/notable_event_utils.py:310
|
|
msgid "\"{0}\" has the capability \"{1}\"."
|
|
msgstr ""
|
|
|
|
#: /Applications/Splunk/etc/apps/SA-ITOA/lib/itsi/csv_import/itsi_csv_import_utils.py:289
|
|
msgid "\"{}\" is not a file."
|
|
msgstr ""
|
|
|
|
#: /Applications/Splunk/etc/apps/SA-ITOA/lib/itsi/searches/itsi_searches.py:683
|
|
#, python-format
|
|
msgid "%s Value of \"%s\" field cannot be empty string."
|
|
msgstr ""
|
|
|
|
#: /Applications/Splunk/etc/apps/SA-ITOA/lib/ITOA/event_management/notable_event_actions.py:499
|
|
#, python-format
|
|
msgid "%s does not have any config"
|
|
msgstr ""
|
|
|
|
#: /Applications/Splunk/etc/apps/SA-ITOA/lib/itsi/objects/itsi_entity.py:116
|
|
#, python-format
|
|
msgid ""
|
|
"%s field specified in %s.fields attribute, not found in entity object. "
|
|
"entity_title=\"%s\", %s_field=\"%s\""
|
|
msgstr ""
|
|
|
|
#: /Applications/Splunk/etc/apps/SA-ITOA/lib/itsi/access_control/access_control_controller_utils.py:307
|
|
#, python-format
|
|
msgid ""
|
|
"%s is not accessible. User may not have access to the object, the ACL "
|
|
"object might not exist, or it might be corrupted."
|
|
msgstr ""
|
|
|
|
#: /Applications/Splunk/etc/apps/SA-ITOA/lib/ITOA/event_management/base_event_management.py:138
|
|
#, python-format
|
|
msgid "%s is not list"
|
|
msgstr ""
|
|
|
|
#: /Applications/Splunk/etc/apps/SA-ITOA/lib/itsi/event_management/utils.py:80
|
|
#, python-format
|
|
msgid "%s key does not exist in the data=%s."
|
|
msgstr ""
|
|
|
|
#: /Applications/Splunk/etc/apps/SA-ITOA/lib/ITOA/event_management/notable_event_comment.py:262
|
|
#: /Applications/Splunk/etc/apps/SA-ITOA/lib/ITOA/event_management/notable_event_comment.py:266
|
|
#: /Applications/Splunk/etc/apps/SA-ITOA/lib/ITOA/event_management/notable_event_comment.py:270
|
|
#: /Applications/Splunk/etc/apps/SA-ITOA/lib/ITOA/event_management/notable_event_comment.py:274
|
|
#: /Applications/Splunk/etc/apps/SA-ITOA/lib/ITOA/event_management/notable_event_comment.py:278
|
|
#: /Applications/Splunk/etc/apps/SA-ITOA/lib/ITOA/event_management/notable_event_tag.py:197
|
|
#: /Applications/Splunk/etc/apps/SA-ITOA/lib/ITOA/event_management/notable_event_tag.py:201
|
|
#: /Applications/Splunk/etc/apps/SA-ITOA/lib/ITOA/event_management/notable_event_tag.py:205
|
|
#: /Applications/Splunk/etc/apps/SA-ITOA/lib/ITOA/event_management/notable_event_tag.py:209
|
|
#, python-format
|
|
msgid "%s operation is not supported for this %s object type"
|
|
msgstr ""
|
|
|
|
#: /Applications/Splunk/etc/apps/SA-ITOA/lib/ITOA/event_management/notable_event_utils.py:525
|
|
#, python-format
|
|
msgid "%s resource(s) was not found."
|
|
msgstr ""
|
|
|
|
#: /Applications/Splunk/etc/apps/SA-ITOA/lib/ITOA/event_management/notable_event_actions.py:854
|
|
#, python-format
|
|
msgid "%s search failed. Refer search.log at \"%s\"."
|
|
msgstr ""
|
|
|
|
#: /Applications/Splunk/etc/apps/SA-ITOA/lib/itsi/searches/get_kpi_search.py:53
|
|
msgid "'searchField' attribute does not exist in args"
|
|
msgstr ""
|
|
|
|
#: /Applications/Splunk/etc/apps/SA-ITOA/lib/itsi/searches/get_kpi_search.py:44
|
|
msgid "'serviceId' attribute does not exist in args"
|
|
msgstr ""
|
|
|
|
#: /Applications/Splunk/etc/apps/SA-ITOA/lib/itsi/objects/itsi_kpi_base_search.py:396
|
|
#, python-format
|
|
msgid ", metric_name=\"%s\""
|
|
msgstr ""
|
|
|
|
#: /Applications/Splunk/etc/apps/SA-ITOA/bin/kvstore_to_json.py:631
|
|
msgid "-s(--splunkdport) must be a valid splunkd port number"
|
|
msgstr ""
|
|
|
|
#: /Applications/Splunk/etc/apps/SA-ITOA/default/itsi_kpi_threshold_template.conf:98
|
|
msgid "1-hour blocks every day (adaptive/quantile)"
|
|
msgstr ""
|
|
|
|
#: /Applications/Splunk/etc/apps/SA-ITOA/default/itsi_kpi_threshold_template.conf:107
|
|
msgid "1-hour blocks every day (adaptive/range)"
|
|
msgstr ""
|
|
|
|
#: /Applications/Splunk/etc/apps/SA-ITOA/default/itsi_kpi_threshold_template.conf:89
|
|
msgid "1-hour blocks every day (adaptive/stdev)"
|
|
msgstr ""
|
|
|
|
#: /Applications/Splunk/etc/apps/SA-ITOA/default/itsi_kpi_threshold_template.conf:80
|
|
msgid "1-hour blocks every day (static)"
|
|
msgstr ""
|
|
|
|
#: /Applications/Splunk/etc/apps/SA-ITOA/default/itsi_kpi_threshold_template.conf:206
|
|
msgid "1-hour blocks work week (adaptive/quantile)"
|
|
msgstr ""
|
|
|
|
#: /Applications/Splunk/etc/apps/SA-ITOA/default/itsi_kpi_threshold_template.conf:215
|
|
msgid "1-hour blocks work week (adaptive/range)"
|
|
msgstr ""
|
|
|
|
#: /Applications/Splunk/etc/apps/SA-ITOA/default/itsi_kpi_threshold_template.conf:197
|
|
msgid "1-hour blocks work week (adaptive/stdev)"
|
|
msgstr ""
|
|
|
|
#: /Applications/Splunk/etc/apps/SA-ITOA/default/itsi_kpi_threshold_template.conf:188
|
|
msgid "1-hour blocks work week (static)"
|
|
msgstr ""
|
|
|
|
#: /Applications/Splunk/etc/apps/SA-ITOA/default/itsi_kpi_threshold_template.conf:134
|
|
msgid "2-hour blocks every day (adaptive/quantile)"
|
|
msgstr ""
|
|
|
|
#: /Applications/Splunk/etc/apps/SA-ITOA/default/itsi_kpi_threshold_template.conf:143
|
|
msgid "2-hour blocks every day (adaptive/range)"
|
|
msgstr ""
|
|
|
|
#: /Applications/Splunk/etc/apps/SA-ITOA/default/itsi_kpi_threshold_template.conf:125
|
|
msgid "2-hour blocks every day (adaptive/stdev)"
|
|
msgstr ""
|
|
|
|
#: /Applications/Splunk/etc/apps/SA-ITOA/default/itsi_kpi_threshold_template.conf:116
|
|
msgid "2-hour blocks every day (static)"
|
|
msgstr ""
|
|
|
|
#: /Applications/Splunk/etc/apps/SA-ITOA/default/itsi_kpi_threshold_template.conf:242
|
|
msgid "2-hour blocks work week (adaptive/quantile)"
|
|
msgstr ""
|
|
|
|
#: /Applications/Splunk/etc/apps/SA-ITOA/default/itsi_kpi_threshold_template.conf:251
|
|
msgid "2-hour blocks work week (adaptive/range)"
|
|
msgstr ""
|
|
|
|
#: /Applications/Splunk/etc/apps/SA-ITOA/default/itsi_kpi_threshold_template.conf:233
|
|
msgid "2-hour blocks work week (adaptive/stdev)"
|
|
msgstr ""
|
|
|
|
#: /Applications/Splunk/etc/apps/SA-ITOA/default/itsi_kpi_threshold_template.conf:224
|
|
msgid "2-hour blocks work week (static)"
|
|
msgstr ""
|
|
|
|
#: /Applications/Splunk/etc/apps/SA-ITOA/default/itsi_kpi_threshold_template.conf:170
|
|
msgid "3-hour blocks every day (adaptive/quantile)"
|
|
msgstr ""
|
|
|
|
#: /Applications/Splunk/etc/apps/SA-ITOA/default/itsi_kpi_threshold_template.conf:179
|
|
msgid "3-hour blocks every day (adaptive/range)"
|
|
msgstr ""
|
|
|
|
#: /Applications/Splunk/etc/apps/SA-ITOA/default/itsi_kpi_threshold_template.conf:161
|
|
msgid "3-hour blocks every day (adaptive/stdev)"
|
|
msgstr ""
|
|
|
|
#: /Applications/Splunk/etc/apps/SA-ITOA/default/itsi_kpi_threshold_template.conf:152
|
|
msgid "3-hour blocks every day (static)"
|
|
msgstr ""
|
|
|
|
#: /Applications/Splunk/etc/apps/SA-ITOA/default/itsi_kpi_threshold_template.conf:278
|
|
msgid "3-hour blocks work week (adaptive/quantile)"
|
|
msgstr ""
|
|
|
|
#: /Applications/Splunk/etc/apps/SA-ITOA/default/itsi_kpi_threshold_template.conf:287
|
|
msgid "3-hour blocks work week (adaptive/range)"
|
|
msgstr ""
|
|
|
|
#: /Applications/Splunk/etc/apps/SA-ITOA/default/itsi_kpi_threshold_template.conf:269
|
|
msgid "3-hour blocks work week (adaptive/stdev)"
|
|
msgstr ""
|
|
|
|
#: /Applications/Splunk/etc/apps/SA-ITOA/default/itsi_kpi_threshold_template.conf:260
|
|
msgid "3-hour blocks work week (static)"
|
|
msgstr ""
|
|
|
|
#: /Applications/Splunk/etc/apps/SA-ITOA/default/data/ui/alerts/itsi_event_generator.html
|
|
msgid ""
|
|
"<form class=\"form-horizontal form-complex\">\n"
|
|
" <div class=\"alert alert-warn\">\n"
|
|
" <i class=\"icon-alert\" style=\"color:#d99f0d;\"></i>\n"
|
|
" It is not recommended to create notable events directly with "
|
|
"modular alerts. It is better to use the\n"
|
|
" <a href=\"../itsi/correlation_search_edit\">\n"
|
|
" ITSI Advanced Correlation Search Builder\n"
|
|
" </a>\n"
|
|
" </div>\n"
|
|
" <div class=\"control-group\">\n"
|
|
" <label class=\"control-label\" "
|
|
"for=\"action.itsi_event_generator.param.title\" style=\"width: 100px"
|
|
";padding-right: 10px;\">Title\n"
|
|
" <span class=\"required\">*</span>\n"
|
|
" </label>\n"
|
|
"\n"
|
|
" <div class=\"controls\">\n"
|
|
" <input type=\"text\" "
|
|
"name=\"action.itsi_event_generator.param.title\" "
|
|
"id=\"event_generator_title_id\" />\n"
|
|
" <span class=\"help-block\">\n"
|
|
" Notable events created by this search will have this "
|
|
"title.\n"
|
|
" </span>\n"
|
|
" </div>\n"
|
|
" </div>\n"
|
|
" <div class=\"control-group\">\n"
|
|
" <label class=\"control-label\" "
|
|
"for=\"action.itsi_event_generator.param.description\" style=\"width: "
|
|
"100px;padding-right: 10px;\">Description</label>\n"
|
|
" <div class=\"controls\">\n"
|
|
" <input type=\"text\" "
|
|
"name=\"action.itsi_event_generator.param.description\" "
|
|
"id=\"event_generator_desc_id\" />\n"
|
|
" <span class=\"help-block\">\n"
|
|
" Notable events created by this search will have this "
|
|
"description.\n"
|
|
" </span>\n"
|
|
" </div>\n"
|
|
" </div>\n"
|
|
" <div class=\"control-group\">\n"
|
|
" <label class=\"control-label\" "
|
|
"for=\"action.itsi_event_generator.param.owner\" style=\"width: 100px"
|
|
";padding-right: 10px;\">Default Owner\n"
|
|
" <span class=\"required\">*</span>\n"
|
|
" </label>\n"
|
|
" <div class=\"controls\">\n"
|
|
" <input type=\"text\" "
|
|
"name=\"action.itsi_event_generator.param.owner\" "
|
|
"id=\"event_generator_owner\"\n"
|
|
" value=\"unassigned\"/>\n"
|
|
" <span class=\"help-block\">\n"
|
|
" Username of the user assigned to the event.\n"
|
|
" </span>\n"
|
|
" </div>\n"
|
|
" </div>\n"
|
|
" <div class=\"control-group\">\n"
|
|
" <label class=\"control-label\" "
|
|
"for=\"action.itsi_event_generator.param.status\" style=\"width: 100px"
|
|
";padding-right: 10px;\">Default Status\n"
|
|
" <span class=\"required\">*</span>\n"
|
|
" </label>\n"
|
|
" <div class=\"controls\">\n"
|
|
" <input type=\"text\" "
|
|
"name=\"action.itsi_event_generator.param.status\" "
|
|
"id=\"event_generator_status\" value=\"1\"/>\n"
|
|
" <span class=\"help-block\">\n"
|
|
" Default status and severity of the event must match "
|
|
"integer values in itsi_notable_event_status.conf.\n"
|
|
" </span>\n"
|
|
" </div>\n"
|
|
" </div>\n"
|
|
" <div class=\"control-group\">\n"
|
|
" <label class=\"control-label\" "
|
|
"for=\"action.itsi_event_generator.param.severity\" style=\"width: 100px"
|
|
";padding-right: 10px;\">Default Severity\n"
|
|
" <span class=\"required\">*</span>\n"
|
|
" </label>\n"
|
|
" <div class=\"controls\">\n"
|
|
" <input type=\"text\" "
|
|
"name=\"action.itsi_event_generator.param.severity\" "
|
|
"id=\"event_generator_severity\" value=\"2\"/>\n"
|
|
" </div>\n"
|
|
" </div>\n"
|
|
" <div class=\"control-group\">\n"
|
|
" <label class=\"control-label\" "
|
|
"for=\"action.itsi_event_generator.param.drilldown_search_title\" "
|
|
"style=\"width: 100px;padding-right: 10px;\">Drilldown search "
|
|
"title</label>\n"
|
|
" <div class=\"controls\">\n"
|
|
" <input type=\"text\" "
|
|
"name=\"action.itsi_event_generator.param.drilldown_search_title\" "
|
|
"id=\"event_generator_drilldown_search_title\" />\n"
|
|
" <span class=\"help-block\">\n"
|
|
" The display name of the drilldown search link. \n"
|
|
" </span>\n"
|
|
" </div>\n"
|
|
" </div>\n"
|
|
" <div class=\"control-group\">\n"
|
|
" <label class=\"control-label\" "
|
|
"for=\"action.itsi_event_generator.param.drilldown_search_search\" "
|
|
"style=\"width: 100px;padding-right: 10px;\">Drilldown search</label>\n"
|
|
" <div class=\"controls\">\n"
|
|
" <textarea "
|
|
"name=\"action.itsi_event_generator.param.drilldown_search_search\" "
|
|
"id=\"event_generator_drilldown_search_search\" />\n"
|
|
" <span class=\"help-block\">\n"
|
|
" The Splunk search you drill down to.\n"
|
|
" </span>\n"
|
|
" </div>\n"
|
|
" </div>\n"
|
|
" <div class=\"control-group\">\n"
|
|
" <label class=\"control-label\" "
|
|
"for=\"action.itsi_event_generator.param.drilldown_search_earliest_offset\""
|
|
" style=\"width: 100px;padding-right: 10px;\">Drilldown earliest "
|
|
"offset</label>\n"
|
|
" <div class=\"controls\">\n"
|
|
" <select "
|
|
"name=\"action.itsi_event_generator.param.drilldown_search_earliest_offset\""
|
|
"\n"
|
|
" id=\"event_generator_dd_search_earliest_offset\">\n"
|
|
" <option selected=\"selected\" value=\"-60\">Last "
|
|
"minute</option>\n"
|
|
" <option value=\"-300\">Last 5 minute</option>\n"
|
|
" <option value=\"-900\">Last 15 minute</option>\n"
|
|
" <option value=\"-1800\">Last 30 minute</option>\n"
|
|
" <option value=\"-3600\">Last 60 minutes</option>\n"
|
|
" <option value=\"-14400\">Last 4 hours</option>\n"
|
|
" <option value=\"-86400\">Last 24 hours</option>\n"
|
|
" <option value=\"-604800\">Last 7 days</option>\n"
|
|
" <option value=\"-2592000\">Last 30 days</option>\n"
|
|
" <option value=\"-7776000\">Last 90 days</option>\n"
|
|
" </select>\n"
|
|
" </div>\n"
|
|
" </div>\n"
|
|
" <div class=\"control-group\">\n"
|
|
" <label class=\"control-label\" "
|
|
"for=\"action.itsi_event_generator.param.drilldown_search_latest_offset\" "
|
|
"style=\"width: 100px;padding-right: 10px;\">Drilldown latest "
|
|
"offset</label>\n"
|
|
" <div class=\"controls\">\n"
|
|
" <select "
|
|
"name=\"action.itsi_event_generator.param.drilldown_search_latest_offset\""
|
|
"\n"
|
|
" id=\"event_generator_dd_earliest_search\">\n"
|
|
" <option selected=\"selected\" value=\"60\">Next "
|
|
"minute</option>\n"
|
|
" <option value=\"300\">Next 5 minute</option>\n"
|
|
" <option value=\"900\">Next 15 minute</option>\n"
|
|
" <option value=\"1800\">Next 30 minute</option>\n"
|
|
" <option value=\"3600\">Next 60 minutes</option>\n"
|
|
" <option value=\"14400\">Next 4 hours</option>\n"
|
|
" <option value=\"86400\">Next 24 hours</option>\n"
|
|
" <option value=\"604800\">Next 7 days</option>\n"
|
|
" <option value=\"2592000\">Next 30 days</option>\n"
|
|
" <option value=\"7776000\">Next 90 days</option>\n"
|
|
" </select>\n"
|
|
" </div>\n"
|
|
" </div>\n"
|
|
" <div class=\"control-group\">\n"
|
|
" <label class=\"control-label\" "
|
|
"for=\"action.itsi_event_generator.param.drilldown_title\" style=\"width: "
|
|
"100px;padding-right: 10px;\">Drilldown webpage title</label>\n"
|
|
" <div class=\"controls\">\n"
|
|
" <input type=\"text\" "
|
|
"name=\"action.itsi_event_generator.param.drilldown_title\" "
|
|
"id=\"event_generator_drilldown_title\" />\n"
|
|
" <span class=\"help-block\">\n"
|
|
" The display name of the drilldown link.\n"
|
|
" </span>\n"
|
|
" </div>\n"
|
|
" </div>\n"
|
|
" <div class=\"control-group\">\n"
|
|
" <label class=\"control-label\" "
|
|
"for=\"event_generator_drilldown_uri\" style=\"width: 100px;padding-right:"
|
|
" 10px;\">Drilldown URI</label>\n"
|
|
" <div class=\"controls\">\n"
|
|
" <input type=\"text\" "
|
|
"name=\"action.itsi_event_generator.param.drilldown_uri\" "
|
|
"id=\"event_generator_drilldown_uri\" />\n"
|
|
" <span class=\"help-block\">\n"
|
|
" The link to the webpage you drill down to.\n"
|
|
" </span>\n"
|
|
" </div>\n"
|
|
" </div>\n"
|
|
" <div class=\"control-group\">\n"
|
|
" <label class=\"control-label\" for=\"itsi_notable_event_fields\" "
|
|
"style=\"width: 100px;padding-right: 10px;\">Notable Event Identifier "
|
|
"Fields</label>\n"
|
|
" <div class=\"controls\">\n"
|
|
" <input type=\"text\" "
|
|
"name=\"action.itsi_event_generator.param.event_identifier_fields\"\n"
|
|
" "
|
|
"id=\"itsi_event_generator.param.event_identifier_fields\"\n"
|
|
" placeholder=\"source\"\n"
|
|
" value=\"source,title,description\"\n"
|
|
" />\n"
|
|
" <span class=\"help-block\">\n"
|
|
" A comma-separated list of fields used to identify if a "
|
|
"notable event is unique.\n"
|
|
" </span>\n"
|
|
" </div>\n"
|
|
" </div>\n"
|
|
"</form>\n"
|
|
msgstr ""
|
|
|
|
#: /Applications/Splunk/etc/apps/SA-ITOA/default/data/ui/alerts/itsi_sample_event_action_ping.html
|
|
#, python-format
|
|
msgid ""
|
|
"<form class=\"form-horizontal form-complex\">\n"
|
|
" <div class=\"control-group\">\n"
|
|
" <label class=\"control-label\"\n"
|
|
" "
|
|
"for=\"action.itsi_sample_event_action_ping.param.host_to_ping\" "
|
|
"style=\"width: 100px;padding-right: 10px;\">Host\n"
|
|
" <span class=\"required\">*</span>\n"
|
|
" </label>\n"
|
|
"\n"
|
|
" <div class=\"controls\">\n"
|
|
" <input type=\"text\"\n"
|
|
" "
|
|
"name=\"action.itsi_sample_event_action_ping.param.host_to_ping\" "
|
|
"id=\"itsi_sample_event_action_ping_host_id\" value=\"%orig_host%\"/>\n"
|
|
" <span class=\"help-block\">\n"
|
|
" Field from the notable event representing the host to "
|
|
"ping. \n"
|
|
" If your event has `server`, set to `%server%`.\n"
|
|
" </span>\n"
|
|
" </div>\n"
|
|
" </div>\n"
|
|
"</form>\n"
|
|
msgstr ""
|
|
|
|
#: /Applications/Splunk/etc/apps/SA-ITOA/default/data/ui/alerts/itsi_event_action_link_ticket.html
|
|
msgid ""
|
|
"<form class=\"form-horizontal form-complex\">\n"
|
|
" <div class=\"control-group\">\n"
|
|
" <label class=\"control-label\"\n"
|
|
" for=\"itsi_event_action_link_ticket_ticket_system\" "
|
|
"style=\"width: 100px;padding-right: 10px;\">Ticket System\n"
|
|
" <span class=\"required\"></span>\n"
|
|
" </label>\n"
|
|
"\n"
|
|
" <div class=\"controls\">\n"
|
|
" <input type=\"text\"\n"
|
|
" "
|
|
"name=\"action.itsi_event_action_link_ticket.param.ticket_system\" "
|
|
"id=\"itsi_event_action_link_ticket_ticket_system\" value=\"\"/>\n"
|
|
" <span class=\"help-block\">\n"
|
|
" Name of the ticketing system. Used for display purposes in most cases, but must be "Service Now" to enable bidirectional ticketing.\n"
|
|
" </span>\n"
|
|
" </div>\n"
|
|
" </div>\n"
|
|
" <div class=\"control-group\">\n"
|
|
" <label class=\"control-label\"\n"
|
|
" for=\"itsi_event_action_link_ticket_ticket_id\" "
|
|
"style=\"width: 100px;padding-right: 10px;\">Ticket ID\n"
|
|
" <span class=\"required\"></span>\n"
|
|
" </label>\n"
|
|
"\n"
|
|
" <div class=\"controls\">\n"
|
|
" <input type=\"text\"\n"
|
|
" "
|
|
"name=\"action.itsi_event_action_link_ticket.param.ticket_id\" "
|
|
"id=\"itsi_event_action_link_ticket_ticket_id\" value=\"\"/>\n"
|
|
" <span class=\"help-block\">\n"
|
|
" ID of the specific ticket.\n"
|
|
" </span>\n"
|
|
" </div>\n"
|
|
" </div>\n"
|
|
" <div class=\"control-group\">\n"
|
|
" <label class=\"control-label\"\n"
|
|
" for=\"itsi_event_action_ticket_url\" style=\"width: 100px"
|
|
";padding-right: 10px;\">Ticket URL\n"
|
|
" <span class=\"required\"></span>\n"
|
|
" </label>\n"
|
|
"\n"
|
|
" <div class=\"controls\">\n"
|
|
" <input type=\"url\" pattern=\"https?://.+\"\n"
|
|
" "
|
|
"name=\"action.itsi_event_action_link_ticket.param.ticket_url\" "
|
|
"id=\"itsi_event_action_link_ticket_ticket_url\" value=\"\"/>\n"
|
|
" <span class=\"help-block\">\n"
|
|
" Drilldown link to the ticket in the external ticketing "
|
|
"system. Include http:// or https://. Otherwise the URL is interpreted as "
|
|
"a relative URI.\n"
|
|
" </span>\n"
|
|
" </div>\n"
|
|
" </div>\n"
|
|
"</form>\n"
|
|
msgstr ""
|
|
|
|
#: /Applications/Splunk/etc/apps/SA-ITOA/default/data/ui/alerts/itsi_event_action_send_to_phantom.html
|
|
msgid ""
|
|
"<form class=\"form-horizontal form-complex\">\n"
|
|
" <div class=\"control-group\">\n"
|
|
" <label class=\"send_to_phantom_action control-label\"\n"
|
|
" "
|
|
"for=\"action.itsi_event_action_send_to_phantom.param.ph_server\">Phantom "
|
|
"Server\n"
|
|
" <span class=\"required\">*</span>\n"
|
|
" </label>\n"
|
|
"\n"
|
|
" <div class=\"controls\">\n"
|
|
" <splunk-search-dropdown\n"
|
|
" "
|
|
"name=\"action.itsi_event_action_send_to_phantom.param.ph_server\" "
|
|
"id=\"itsi_event_action_send_to_phantom_ph_server\"\n"
|
|
" search=\"| rest /servicesNS/nobody/phantom/target_list\"\n"
|
|
" label-field=\"title\" value-field=\"title\">\n"
|
|
" </splunk-search-dropdown>\n"
|
|
" <span class=\"send_to_phantom_action help-block\" "
|
|
"name=\"ph_server\">\n"
|
|
" The Phantom server to which to send the ITSI episode.\n"
|
|
" </span>\n"
|
|
" </div>\n"
|
|
" </div>\n"
|
|
" <div class=\"control-group\">\n"
|
|
" <label class=\"send_to_phantom_action control-label\"\n"
|
|
" "
|
|
"for=\"action.itsi_event_action_send_to_phantom.param.ph_label\">Phantom "
|
|
"Label\n"
|
|
" </label>\n"
|
|
"\n"
|
|
" <div class=\"controls\">\n"
|
|
" <input type=\"text\"\n"
|
|
" "
|
|
"name=\"action.itsi_event_action_send_to_phantom.param.ph_label\" "
|
|
"id=\"itsi_event_action_send_to_phantom_ph_label\" value=\"events\"/>\n"
|
|
" <span class=\"send_to_phantom_action help-block\" "
|
|
"name=\"label\">\n"
|
|
" Label which determines which playbooks to trigger.\n"
|
|
" </span>\n"
|
|
" </div>\n"
|
|
" </div>\n"
|
|
"</form>\n"
|
|
"<style>\n"
|
|
".send_to_phantom_action.help-block {\n"
|
|
" padding-left: 20px;\n"
|
|
"}\n"
|
|
"\n"
|
|
".send_to_phantom_action.control-label {\n"
|
|
" text-align: left;\n"
|
|
"}\n"
|
|
"\n"
|
|
"input#itsi_event_action_send_to_phantom_ph_label {\n"
|
|
" width: 100%;\n"
|
|
"}\n"
|
|
"</style>\n"
|
|
msgstr ""
|
|
|
|
#: /Applications/Splunk/etc/apps/SA-ITOA/bin/kvstore_to_json.py:175
|
|
msgid ""
|
|
">> Enter full path of backup or restore directory. Note: It could be a "
|
|
"file, if you are importing from ITSI 1.2.0\n"
|
|
" Press enter to use your current working directory {} > "
|
|
msgstr ""
|
|
|
|
#: /Applications/Splunk/etc/apps/SA-ITOA/bin/kvstore_to_json.py:299
|
|
msgid ""
|
|
">> The ITSI version on which the backup data was collected is "
|
|
"unavailable. Enter the ITSI version on which the backup data was "
|
|
"collected, to restore to. Ex: '2.3.0', '2.3.1', '2.4.0' >"
|
|
msgstr ""
|
|
|
|
#: /Applications/Splunk/etc/apps/SA-ITOA/bin/itsi_async_csv_loader.py:188
|
|
#: /Applications/Splunk/etc/apps/SA-ITOA/bin/itsi_csv_import.py:222
|
|
msgid ""
|
|
"A comma separated list of services found in the CSV file itself that are "
|
|
"to be associated with the entity for the row. Optional"
|
|
msgstr ""
|
|
|
|
#: /Applications/Splunk/etc/apps/SA-ITOA/bin/itsi_async_csv_loader.py:122
|
|
#: /Applications/Splunk/etc/apps/SA-ITOA/bin/itsi_csv_import.py:135
|
|
msgid ""
|
|
"A mapping specification for the CSV (input) fields to ones that match "
|
|
"Splunk fields (output). Optional. It needs to be a comma separated list"
|
|
" of key=value pairs where the key is the field found in the CSV. For "
|
|
"example, if your CSV contains 'foo' and 'bar' as headers and you want to "
|
|
"map both of them to the Splunk field 'dest', you should set field "
|
|
"mappings as 'foo=dest,bar=dest'"
|
|
msgstr ""
|
|
|
|
#: /Applications/Splunk/etc/apps/SA-ITOA/lib/itsi/upgrade/itsi_migration.py:1233
|
|
#, python-format
|
|
msgid ""
|
|
"A problem occurred when updating adaptive threshold search %s. To resolve"
|
|
" this issue, refer to the documentation."
|
|
msgstr ""
|
|
|
|
#: /Applications/Splunk/etc/apps/SA-ITOA/lib/itsi/csv_import/itoa_bulk_import_specification.py:435
|
|
msgid ""
|
|
"A reserved word is being used as column title for either \"Entity "
|
|
"Title\", \"Entity Alias\" or \"Entity Informational\" column. Rename the "
|
|
"following column titles: {0}.\n"
|
|
" Alternatively, field map them to non-reserved words.\n"
|
|
" Reserved words are: {1}"
|
|
msgstr ""
|
|
|
|
#: /Applications/Splunk/etc/apps/SA-ITOA/lib/itsi/objects/itsi_service.py:2306
|
|
msgid ""
|
|
"A service key specified does not exist. Cannot change KPIs for non-"
|
|
"existing services."
|
|
msgstr ""
|
|
|
|
#: /Applications/Splunk/etc/apps/SA-ITOA/default/itsi_base_service_template.conf:3
|
|
msgid ""
|
|
"A service template that contains out-of-box KPIs for *nix based services "
|
|
"imported from SAI."
|
|
msgstr ""
|
|
|
|
#: /Applications/Splunk/etc/apps/SA-ITOA/default/itsi_base_service_template.conf:2536
|
|
msgid ""
|
|
"A service template that contains out-of-box KPIs for AWS EC2 based "
|
|
"services imported from SAI."
|
|
msgstr ""
|
|
|
|
#: /Applications/Splunk/etc/apps/SA-ITOA/default/itsi_base_service_template.conf:1549
|
|
msgid ""
|
|
"A service template that contains out-of-box KPIs for Windows based "
|
|
"services imported from SAI."
|
|
msgstr ""
|
|
|
|
#: /Applications/Splunk/etc/apps/SA-ITOA/default/itsi_base_service_template.conf:3330
|
|
msgid ""
|
|
"A service template that contains performance KPIs for AWS EBS Volumes "
|
|
"from metrics collected by AWS CloudWatch."
|
|
msgstr ""
|
|
|
|
#: /Applications/Splunk/etc/apps/SA-ITOA/lib/itsi/upgrade/itsi_migration.py:3656
|
|
msgid ""
|
|
"A service template was syncing when Splunk restarted. All ongoing syncs "
|
|
"may be stopped and marked as \"Sync failed\". Manually re-initiate all "
|
|
"failed service template syncs after the upgrade has completed."
|
|
msgstr ""
|
|
|
|
#: /Applications/Splunk/etc/apps/SA-ITOA/lib/itsi/objects/itsi_kpi.py:640
|
|
msgid ""
|
|
"A valid aggregation operator is not specified for a KPI. Aggregate "
|
|
"operator must be specified."
|
|
msgstr ""
|
|
|
|
#: /Applications/Splunk/etc/apps/SA-ITOA/lib/itsi/objects/itsi_kpi.py:552
|
|
msgid ""
|
|
"A valid threshold field is not specified for a KPI with ad hoc search. "
|
|
"Threshold fields must be specified for ad hoc search based KPIs."
|
|
msgstr ""
|
|
|
|
#: /Applications/Splunk/etc/apps/SA-ITOA/lib/itsi/objects/itsi_kpi.py:546
|
|
msgid ""
|
|
"A valid threshold field is not specified for a KPI with shared base "
|
|
"search. Threshold fields must be specified for shared base search KPIs."
|
|
msgstr ""
|
|
|
|
#: /Applications/Splunk/etc/apps/SA-ITOA/lib/itsi/searches/itsi_shared_base_search.py:262
|
|
#: /Applications/Splunk/etc/apps/SA-ITOA/lib/itsi/upgrade/migration_handlers_3_1_1.py:228
|
|
#, python-format
|
|
msgid "ACL update failed for saved search %s. Manual update required."
|
|
msgstr ""
|
|
|
|
#: /Applications/Splunk/etc/apps/SA-ITOA/default/itsi_kpi_threshold_template.conf:62
|
|
msgid "AM, PM (adaptive/quantile)"
|
|
msgstr ""
|
|
|
|
#: /Applications/Splunk/etc/apps/SA-ITOA/default/itsi_kpi_threshold_template.conf:71
|
|
msgid "AM, PM (adaptive/range)"
|
|
msgstr ""
|
|
|
|
#: /Applications/Splunk/etc/apps/SA-ITOA/default/itsi_kpi_threshold_template.conf:53
|
|
msgid "AM, PM (adaptive/stdev)"
|
|
msgstr ""
|
|
|
|
#: /Applications/Splunk/etc/apps/SA-ITOA/default/itsi_kpi_threshold_template.conf:44
|
|
msgid "AM, PM (static)"
|
|
msgstr ""
|
|
|
|
#: /Applications/Splunk/etc/apps/SA-ITOA/lib/ITOA/itoa_exceptions.py:56
|
|
#, python-format
|
|
msgid "Access denied. %s"
|
|
msgstr ""
|
|
|
|
#: /Applications/Splunk/etc/apps/SA-ITOA/lib/ITOA/event_management/notable_event_aggregation_policy.py:227
|
|
msgid ""
|
|
"Access denied. Default Aggregation Policy can only be edited by "
|
|
"itoa_admin role."
|
|
msgstr ""
|
|
|
|
#: /Applications/Splunk/etc/apps/SA-ITOA/lib/ITOA/itoa_object.py:269
|
|
#: /Applications/Splunk/etc/apps/SA-ITOA/lib/ITOA/itoa_object.py:392
|
|
msgid "Access denied. Object of type {} can only be created in Global team."
|
|
msgstr ""
|
|
|
|
#: /Applications/Splunk/etc/apps/SA-ITOA/lib/ITOA/itoa_object.py:482
|
|
msgid "Access denied. Object of type {} can only be updated in the Global team."
|
|
msgstr ""
|
|
|
|
#: /Applications/Splunk/etc/apps/SA-ITOA/lib/ITOA/itoa_object.py:664
|
|
msgid "Access denied. You do not have permission to access this object."
|
|
msgstr ""
|
|
|
|
#: /Applications/Splunk/etc/apps/SA-ITOA/lib/ITOA/itoa_object.py:277
|
|
#: /Applications/Splunk/etc/apps/SA-ITOA/lib/ITOA/itoa_object.py:401
|
|
msgid "Access denied. You do not have permission to create this object."
|
|
msgstr ""
|
|
|
|
#: /Applications/Splunk/etc/apps/SA-ITOA/lib/ITOA/itoa_object.py:548
|
|
#: /Applications/Splunk/etc/apps/SA-ITOA/lib/itsi/objects/itsi_security_group.py:55
|
|
msgid "Access denied. You do not have permission to delete this object."
|
|
msgstr ""
|
|
|
|
#: /Applications/Splunk/etc/apps/SA-ITOA/lib/itsi/objects/itsi_security_group.py:224
|
|
msgid "Access denied. You do not have permission to update the Global team."
|
|
msgstr ""
|
|
|
|
#: /Applications/Splunk/etc/apps/SA-ITOA/lib/ITOA/event_management/correlation_search.py:396
|
|
#: /Applications/Splunk/etc/apps/SA-ITOA/lib/ITOA/itoa_object.py:491
|
|
msgid "Access denied. You do not have permission to update this object."
|
|
msgstr ""
|
|
|
|
#: /Applications/Splunk/etc/apps/SA-ITOA/lib/ITOA/event_management/notable_event_actions.py:979
|
|
#, python-format
|
|
msgid "Action name is not specified=\"%s\"."
|
|
msgstr ""
|
|
|
|
#: /Applications/Splunk/etc/apps/SA-ITOA/lib/ITOA/event_management/notable_event_actions.py:146
|
|
msgid "Action {0} does not exist for this user {1}."
|
|
msgstr ""
|
|
|
|
#: /Applications/Splunk/etc/apps/SA-ITOA/lib/ITOA/event_management/rules_engine/actions.py:61
|
|
#, python-format
|
|
msgid "Actions: Expected type for `actions[\"items\"]`=listReceived=%s."
|
|
msgstr ""
|
|
|
|
#: /Applications/Splunk/etc/apps/SA-ITOA/lib/ITOA/event_management/rules_engine/actions.py:57
|
|
msgid "Actions: Missing key `condition`"
|
|
msgstr ""
|
|
|
|
#: /Applications/Splunk/etc/apps/SA-ITOA/lib/ITOA/event_management/rules_engine/actions.py:59
|
|
msgid "Actions: Missing key `items`"
|
|
msgstr ""
|
|
|
|
#: /Applications/Splunk/etc/apps/SA-ITOA/lib/itsi/objects/itsi_kpi.py:535
|
|
msgid ""
|
|
"Ad hoc search KPIs does not seem to have populated a base search. Specify"
|
|
" a base search for the KPI."
|
|
msgstr ""
|
|
|
|
#: /Applications/Splunk/etc/apps/SA-ITOA/lib/ITOA/event_management/correlation_search.py:98
|
|
msgid "Addition validation has failed"
|
|
msgstr ""
|
|
|
|
#: /Applications/Splunk/etc/apps/SA-ITOA/bin/itsi_age_kpi_alert_value_cache.py:42
|
|
msgid "Aging/retention time in seconds for entries present in KPIs Summary Cache."
|
|
msgstr ""
|
|
|
|
#: /Applications/Splunk/etc/apps/SA-ITOA/default/itsi_notable_event_status.conf:11
|
|
msgid "An error is preventing the issue from having a valid status assignment"
|
|
msgstr ""
|
|
|
|
#: /Applications/Splunk/etc/apps/SA-ITOA/lib/itsi/objects/itsi_kpi.py:433
|
|
msgid ""
|
|
"An invalid aggregation operator is specified for a KPI. Refer to the ITSI"
|
|
" documentation for a listof valid operators and syntax."
|
|
msgstr ""
|
|
|
|
#: /Applications/Splunk/etc/apps/SA-ITOA/lib/itsi/objects/itsi_event_management_state.py:44
|
|
msgid "An invalid value is specified for {0}. Specify a valid value."
|
|
msgstr ""
|
|
|
|
#: /Applications/Splunk/etc/apps/SA-ITOA/lib/itsi/upgrade/itsi_migration.py:985
|
|
#, python-format
|
|
msgid ""
|
|
"Anomaly detection search: %s in $SPLUNK_HOME/etc/apps/itsi/local will be "
|
|
"deleted."
|
|
msgstr ""
|
|
|
|
#: /Applications/Splunk/etc/apps/SA-ITOA/default/app.conf:14
|
|
msgid "App for configuring and storing entities, services, and the like"
|
|
msgstr ""
|
|
|
|
#: /Applications/Splunk/etc/apps/SA-ITOA/bin/itsi_user_access_init.py:57
|
|
msgid "Application name"
|
|
msgstr ""
|
|
|
|
#: /Applications/Splunk/etc/apps/SA-ITOA/lib/ITOA/itoa_object.py:363
|
|
msgid ""
|
|
"Are you sure you wanted to save a batch? Are you sure it wasn't "
|
|
"NOTHING?!?!, cannot save empty payload, received {}"
|
|
msgstr ""
|
|
|
|
#: /Applications/Splunk/etc/apps/SA-ITOA/lib/ITOA/event_management/notable_event_comment.py:248
|
|
msgid "Array of comments expected"
|
|
msgstr ""
|
|
|
|
#: /Applications/Splunk/etc/apps/SA-ITOA/lib/maintenance_services/objects/maintenance_calendar.py:626
|
|
msgid ""
|
|
"At least one object specified in invalid. Must specify a key and an "
|
|
"object type for each object."
|
|
msgstr ""
|
|
|
|
#: /Applications/Splunk/etc/apps/SA-ITOA/lib/maintenance_services/objects/maintenance_calendar.py:632
|
|
msgid "At least one object specified with invalid key. Must specify a valid key."
|
|
msgstr ""
|
|
|
|
#: /Applications/Splunk/etc/apps/SA-ITOA/lib/itsi/csv_import/itoa_bulk_import_entity.py:73
|
|
msgid "Attempt to use reserved word \"{}\" as a fieldname."
|
|
msgstr ""
|
|
|
|
#: /Applications/Splunk/etc/apps/SA-ITOA/lib/itsi/backfill/__init__.py:154
|
|
msgid "Attempting to add a job already in the queue"
|
|
msgstr ""
|
|
|
|
#: /Applications/Splunk/etc/apps/SA-ITOA/lib/ITOA/storage/itoa_generic_persistables.py:168
|
|
#: /Applications/Splunk/etc/apps/SA-ITOA/lib/ITOA/storage/itoa_generic_persistables.py:171
|
|
msgid "Attempting to call an abstract method"
|
|
msgstr ""
|
|
|
|
#: /Applications/Splunk/etc/apps/SA-ITOA/lib/ITOA/storage/itoa_storage.py:112
|
|
msgid "Backend not registered or undefined"
|
|
msgstr ""
|
|
|
|
#: /Applications/Splunk/etc/apps/SA-ITOA/lib/itsi/upgrade/kvstore_backup_restore.py:211
|
|
msgid "Backup file not found. Ensure backup zip file is present."
|
|
msgstr ""
|
|
|
|
#: /Applications/Splunk/etc/apps/SA-ITOA/lib/ITOA/controller_utils.py:1182
|
|
msgid ""
|
|
"Backup/restore jobs are in progress. Configuration changes are not "
|
|
"allowed while backup/restore jobs are in progress."
|
|
msgstr ""
|
|
|
|
#: /Applications/Splunk/etc/apps/SA-ITOA/lib/ITOA/event_management/rules_engine/clause.py:39
|
|
#, python-format
|
|
msgid "Bad Request. Expecting either \"AND\" or \"OR\". Received \"%s\""
|
|
msgstr ""
|
|
|
|
#: /Applications/Splunk/etc/apps/SA-ITOA/lib/ITOA/event_management/rules_engine/clause.py:43
|
|
#, python-format
|
|
msgid "Bad Request. Expecting type=list. Received type=%s"
|
|
msgstr ""
|
|
|
|
#: /Applications/Splunk/etc/apps/SA-ITOA/lib/ITOA/controller_utils.py:460
|
|
#: /Applications/Splunk/etc/apps/SA-ITOA/lib/itsi/access_control/access_control_controller_utils.py:251
|
|
#, python-format
|
|
msgid "Bad Request: Missing one/all of the keys=`%s`. Received=%s."
|
|
msgstr ""
|
|
|
|
#: /Applications/Splunk/etc/apps/SA-ITOA/lib/itsi/access_control/splunkd_controller_rbac_utils.py:121
|
|
msgid "Bad Request: Missing required args needed by decorator."
|
|
msgstr ""
|
|
|
|
#: /Applications/Splunk/etc/apps/SA-ITOA/lib/ITOA/controller_utils.py:560
|
|
#, python-format
|
|
msgid "Bad Request: Unable to jsonify data, %s."
|
|
msgstr ""
|
|
|
|
#: /Applications/Splunk/etc/apps/SA-ITOA/bin/backfill_services.py:30
|
|
msgid "Bad argument count."
|
|
msgstr ""
|
|
|
|
#: /Applications/Splunk/etc/apps/SA-ITOA/lib/ITOA/event_management/notable_event_aggregation_policy.py:87
|
|
#, python-format
|
|
msgid "Bad collection name. Received=%s."
|
|
msgstr ""
|
|
|
|
#: /Applications/Splunk/etc/apps/SA-ITOA/lib/itsi/csv_import/itoa_bulk_import_entity_parser.py:151
|
|
msgid ""
|
|
"Bad data in source: Identifiers cannot contain equal or quote characters:"
|
|
" \"{}\""
|
|
msgstr ""
|
|
|
|
#: /Applications/Splunk/etc/apps/SA-ITOA/lib/itsi/csv_import/itoa_bulk_import_entity_parser.py:117
|
|
#: /Applications/Splunk/etc/apps/SA-ITOA/lib/itsi/csv_import/itoa_bulk_import_service_parser.py:113
|
|
msgid "Bad data in source: Names cannot contain equal or quote characters: \"{}\""
|
|
msgstr ""
|
|
|
|
#: /Applications/Splunk/etc/apps/SA-ITOA/lib/itsi/csv_import/itoa_bulk_import_entity_parser.py:112
|
|
msgid "Bad data in source: Row contains empty title: \"{}\""
|
|
msgstr ""
|
|
|
|
#: /Applications/Splunk/etc/apps/SA-ITOA/lib/itsi/csv_import/itoa_bulk_import_entity_parser.py:105
|
|
#: /Applications/Splunk/etc/apps/SA-ITOA/lib/itsi/csv_import/itoa_bulk_import_entity_parser.py:128
|
|
#: /Applications/Splunk/etc/apps/SA-ITOA/lib/itsi/csv_import/itoa_bulk_import_service_parser.py:102
|
|
#: /Applications/Splunk/etc/apps/SA-ITOA/lib/itsi/csv_import/itoa_bulk_import_service_parser.py:122
|
|
#: /Applications/Splunk/etc/apps/SA-ITOA/lib/itsi/csv_import/itoa_bulk_import_service_parser.py:141
|
|
msgid ""
|
|
"Bad data in source: Row contains not enough data to process all requested"
|
|
" fields: \"{}\""
|
|
msgstr ""
|
|
|
|
#: /Applications/Splunk/etc/apps/SA-ITOA/lib/ITOA/event_management/notable_event_aggregation_policy.py:83
|
|
#, python-format
|
|
msgid "Bad object type. Received=%s."
|
|
msgstr ""
|
|
|
|
#: /Applications/Splunk/etc/apps/SA-ITOA/lib/ITOA/event_management/notable_event_aggregation_policy.py:79
|
|
#, python-format
|
|
msgid "Bad owner. Received=%s."
|
|
msgstr ""
|
|
|
|
#: /Applications/Splunk/etc/apps/SA-ITOA/lib/ITOA/event_management/notable_event_aggregation_policy.py:75
|
|
msgid "Bad session key."
|
|
msgstr ""
|
|
|
|
#: /Applications/Splunk/etc/apps/SA-ITOA/lib/itsi/searches/itsi_searches.py:818
|
|
msgid "Base search of KPI cannot be a empty string."
|
|
msgstr ""
|
|
|
|
#: /Applications/Splunk/etc/apps/SA-ITOA/lib/itsi/objects/itsi_kpi.py:221
|
|
#, python-format
|
|
msgid "Base search with ID: \"%s\" does not exist. No attributes to populate."
|
|
msgstr ""
|
|
|
|
#: /Applications/Splunk/etc/apps/SA-ITOA/lib/ITOA/storage/statestore.py:582
|
|
msgid "Batch save requires input be a list, actual data input={0}"
|
|
msgstr ""
|
|
|
|
#: /Applications/Splunk/etc/apps/SA-ITOA/lib/ITOA/storage/statestore.py:626
|
|
msgid "Batch save to KV store failed with code {0}. Error details: {1}"
|
|
msgstr ""
|
|
|
|
#: /Applications/Splunk/etc/apps/SA-ITOA/bin/itsi_notable_event_actions_queue_consumer.py:53
|
|
msgid "Batch size"
|
|
msgstr ""
|
|
|
|
#: /Applications/Splunk/etc/apps/SA-ITOA/lib/SA_ITOA_app_common/solnlib/packages/schematics/types/base.py:1051
|
|
msgid "Both values in point must be float or int"
|
|
msgstr ""
|
|
|
|
#: /Applications/Splunk/etc/apps/SA-ITOA/lib/itsi/objects/itsi_service_template.py:888
|
|
msgid "Bulk creation of Service Template objects is not supported."
|
|
msgstr ""
|
|
|
|
#: /Applications/Splunk/etc/apps/SA-ITOA/lib/itsi/objects/itsi_service_template.py:872
|
|
msgid ""
|
|
"Bulk creation of service template objects is not supported or ID field "
|
|
"missing for at least one of the objects in bulk update request."
|
|
msgstr ""
|
|
|
|
#: /Applications/Splunk/etc/apps/SA-ITOA/bin/itsi_async_csv_loader.py:83
|
|
#: /Applications/Splunk/etc/apps/SA-ITOA/bin/itsi_csv_import.py:96
|
|
msgid "CSV Location"
|
|
msgstr ""
|
|
|
|
#: /Applications/Splunk/etc/apps/SA-ITOA/lib/itsi/csv_import/itoa_bulk_import_rest_interface_provider.py:234
|
|
msgid "CSV Upload failure. Check the logs for details."
|
|
msgstr ""
|
|
|
|
#: /Applications/Splunk/etc/apps/SA-ITOA/lib/ITOA/storage/statestore.py:405
|
|
msgid "Cannot change permissions from 'app' to 'user' without cloning."
|
|
msgstr ""
|
|
|
|
#: /Applications/Splunk/etc/apps/SA-ITOA/lib/itsi/objects/itsi_service.py:2344
|
|
msgid ""
|
|
"Cannot change service health type KPIs. Remove service health KPIs and "
|
|
"retry."
|
|
msgstr ""
|
|
|
|
#: /Applications/Splunk/etc/apps/SA-ITOA/lib/itsi/objects/itsi_security_group.py:313
|
|
msgid "Cannot create team without valid ACL."
|
|
msgstr ""
|
|
|
|
#: /Applications/Splunk/etc/apps/SA-ITOA/lib/itsi/objects/changehandlers/kpi_delete_handler.py:150
|
|
msgid ""
|
|
"Cannot delete all KPI saved searches. We recommend that you manually "
|
|
"delete them. Saves search names are: {0}"
|
|
msgstr ""
|
|
|
|
#: /Applications/Splunk/etc/apps/SA-ITOA/lib/ITOA/itoa_object.py:539
|
|
#: /Applications/Splunk/etc/apps/SA-ITOA/lib/itsi/objects/itsi_security_group.py:46
|
|
#: /Applications/Splunk/etc/apps/SA-ITOA/lib/maintenance_services/objects/maintenance_calendar.py:488
|
|
msgid "Cannot delete object with invalid object ID."
|
|
msgstr ""
|
|
|
|
#: /Applications/Splunk/etc/apps/SA-ITOA/lib/itsi/upgrade/itsi_migration.py:992
|
|
#, python-format
|
|
msgid ""
|
|
"Cannot delete/disable old Anomaly Detection search: %s, check the search "
|
|
"manually."
|
|
msgstr ""
|
|
|
|
#: /Applications/Splunk/etc/apps/SA-ITOA/lib/itsi/objects/changehandlers/kpi_delete_handler.py:130
|
|
msgid ""
|
|
"Cannot disable/delete all impacted correlation searches. We recommend "
|
|
"that you update the impacted correlation searches by the UI. Correlation "
|
|
"search names are: {0}"
|
|
msgstr ""
|
|
|
|
#: /Applications/Splunk/etc/apps/SA-ITOA/lib/itsi_module/itsi_module_modules.py:42
|
|
msgid "Cannot download requested file. No downloads have been exported yet."
|
|
msgstr ""
|
|
|
|
#: /Applications/Splunk/etc/apps/SA-ITOA/lib/ITOA/storage/itoa_generic_persistables.py:334
|
|
msgid "Cannot fetch an unsaved model."
|
|
msgstr ""
|
|
|
|
#: /Applications/Splunk/etc/apps/SA-ITOA/lib/itsi/objects/itsi_service.py:1845
|
|
msgid ""
|
|
"Cannot filter on entities in {0} \"{1}\" for kpi \"{2}\" if there are no "
|
|
"entities in the {3}."
|
|
msgstr ""
|
|
|
|
#: /Applications/Splunk/etc/apps/SA-ITOA/lib/itsi/searches/itsi_shared_base_search.py:55
|
|
#, python-format
|
|
msgid "Cannot find KPI base search with ID: %s."
|
|
msgstr ""
|
|
|
|
#: /Applications/Splunk/etc/apps/SA-ITOA/lib/itsi/searches/itsi_searches.py:1054
|
|
msgid ""
|
|
"Cannot generate an entity time series for a KPI without entity breakdown "
|
|
"enabled."
|
|
msgstr ""
|
|
|
|
#: /Applications/Splunk/etc/apps/SA-ITOA/lib/ITOA/event_management/rules_engine/criterion.py:76
|
|
msgid ""
|
|
"Cannot instantiate this class. Call "
|
|
"`ActivationCriteria.validate(criteria)`"
|
|
msgstr ""
|
|
|
|
#: /Applications/Splunk/etc/apps/SA-ITOA/lib/ITOA/event_management/rules_engine/criterion.py:50
|
|
msgid "Cannot instantiate this class. Call `BreakingCriteria.validate(criteria)`"
|
|
msgstr ""
|
|
|
|
#: /Applications/Splunk/etc/apps/SA-ITOA/lib/ITOA/event_management/rules_engine/actions.py:45
|
|
#: /Applications/Splunk/etc/apps/SA-ITOA/lib/ITOA/event_management/rules_engine/clause.py:24
|
|
msgid "Cannot instantiate this class. Call `Clause.validate(condition, items)`"
|
|
msgstr ""
|
|
|
|
#: /Applications/Splunk/etc/apps/SA-ITOA/lib/ITOA/event_management/rules_engine/criterion.py:104
|
|
msgid "Cannot instantiate this class. Call `ExecutionCriteria.validate(criteria)`"
|
|
msgstr ""
|
|
|
|
#: /Applications/Splunk/etc/apps/SA-ITOA/lib/ITOA/event_management/rules_engine/criterion.py:26
|
|
msgid "Cannot instantiate this class. Call `FilterCriteria.validate(criteria)`"
|
|
msgstr ""
|
|
|
|
#: /Applications/Splunk/etc/apps/SA-ITOA/lib/ITOA/event_management/rules_engine/actions.py:18
|
|
#: /Applications/Splunk/etc/apps/SA-ITOA/lib/ITOA/event_management/rules_engine/clause_item_config.py:12
|
|
#: /Applications/Splunk/etc/apps/SA-ITOA/lib/ITOA/event_management/rules_engine/clause_item_config.py:21
|
|
#: /Applications/Splunk/etc/apps/SA-ITOA/lib/ITOA/event_management/rules_engine/clause_item_config.py:30
|
|
#: /Applications/Splunk/etc/apps/SA-ITOA/lib/ITOA/event_management/rules_engine/clause_item_config.py:39
|
|
#: /Applications/Splunk/etc/apps/SA-ITOA/lib/ITOA/event_management/rules_engine/clause_item_config.py:48
|
|
#: /Applications/Splunk/etc/apps/SA-ITOA/lib/ITOA/event_management/rules_engine/clause_item_config.py:57
|
|
#: /Applications/Splunk/etc/apps/SA-ITOA/lib/ITOA/event_management/rules_engine/clause_item_config.py:66
|
|
#: /Applications/Splunk/etc/apps/SA-ITOA/lib/ITOA/event_management/rules_engine/clause_item_config.py:75
|
|
#: /Applications/Splunk/etc/apps/SA-ITOA/lib/ITOA/event_management/rules_engine/item.py:21
|
|
#: /Applications/Splunk/etc/apps/SA-ITOA/lib/ITOA/event_management/rules_engine/item.py:57
|
|
msgid "Cannot instantiate this class. Call `Item.validate(item)`"
|
|
msgstr ""
|
|
|
|
#: /Applications/Splunk/etc/apps/SA-ITOA/lib/ITOA/event_management/rules_engine/rule.py:19
|
|
msgid "Cannot instantiate this class. Call `Rule.validate(rule)`"
|
|
msgstr ""
|
|
|
|
#: /Applications/Splunk/etc/apps/SA-ITOA/lib/itsi_module/itsi_module_common.py:733
|
|
#, python-format
|
|
msgid "Cannot replace special characters in string: %s."
|
|
msgstr ""
|
|
|
|
#: /Applications/Splunk/etc/apps/SA-ITOA/lib/ITOA/itoa_object.py:644
|
|
msgid "Cannot retrieve object with invalid object ID."
|
|
msgstr ""
|
|
|
|
#: /Applications/Splunk/etc/apps/SA-ITOA/lib/itsi/upgrade/itsi_migration.py:1059
|
|
#, python-format
|
|
msgid "Cannot update fields for an invalid deep dive=%s. Type=%s."
|
|
msgstr ""
|
|
|
|
#: /Applications/Splunk/etc/apps/SA-ITOA/lib/ITOA/itoa_object.py:458
|
|
#: /Applications/Splunk/etc/apps/SA-ITOA/lib/itsi/objects/itsi_security_group.py:208
|
|
msgid "Cannot update object with invalid object ID."
|
|
msgstr ""
|
|
|
|
#: /Applications/Splunk/etc/apps/SA-ITOA/lib/itsi/upgrade/itsi_migration.py:1131
|
|
#, python-format
|
|
msgid "Cannot update overlay settings for an invalid deep dive=%s. Type=%s."
|
|
msgstr ""
|
|
|
|
#: /Applications/Splunk/etc/apps/SA-ITOA/lib/itsi/upgrade/itsi_migration.py:1095
|
|
#, python-format
|
|
msgid "Cannot update threshold settings for an invalid deep dive=%s. Type=%s."
|
|
msgstr ""
|
|
|
|
#: /Applications/Splunk/etc/apps/SA-ITOA/lib/itsi/csv_import/itsi_csv_import_utils.py:283
|
|
msgid "Cannot work with \"{}\"."
|
|
msgstr ""
|
|
|
|
#: /Applications/Splunk/etc/apps/SA-ITOA/lib/itsi/access_control/access_control_controller_utils.py:353
|
|
msgid ""
|
|
"Checking for accessible object IDs.\n"
|
|
"Requested IDs: {0}\n"
|
|
"operation: {1}\n"
|
|
"app: {2}\n"
|
|
"object type: {3}\n"
|
|
"object store: {4}"
|
|
msgstr ""
|
|
|
|
#: /Applications/Splunk/etc/apps/SA-ITOA/default/savedsearches.conf:156
|
|
msgid "Clean up models that is 24 hours old and not saved in any service models."
|
|
msgstr ""
|
|
|
|
#: /Applications/Splunk/etc/apps/SA-ITOA/default/itsi_notable_event_status.conf:42
|
|
msgid "Closed"
|
|
msgstr ""
|
|
|
|
#: /Applications/Splunk/etc/apps/SA-ITOA/default/itsi_base_service_template.conf:3329
|
|
msgid "Cloud KPIs - AWS EBS (SAI)"
|
|
msgstr ""
|
|
|
|
#: /Applications/Splunk/etc/apps/SA-ITOA/default/itsi_base_service_template.conf:2535
|
|
msgid "Cloud KPIs - AWS EC2 (SAI)"
|
|
msgstr ""
|
|
|
|
#: /Applications/Splunk/etc/apps/SA-ITOA/default/savedsearches.conf:54
|
|
msgid ""
|
|
"Collect the *nix hosts provided through the TA-nix app for entry into IT "
|
|
"Service Intelligence"
|
|
msgstr ""
|
|
|
|
#: /Applications/Splunk/etc/apps/SA-ITOA/default/savedsearches.conf:111
|
|
msgid "Collect the OS X hosts provided through the TA-nix app for entry into ITSI"
|
|
msgstr ""
|
|
|
|
#: /Applications/Splunk/etc/apps/SA-ITOA/default/savedsearches.conf:107
|
|
msgid ""
|
|
"Collect the solaris hosts provided through the TA-nix app for entry into "
|
|
"ITSI"
|
|
msgstr ""
|
|
|
|
#: /Applications/Splunk/etc/apps/SA-ITOA/default/savedsearches.conf:103
|
|
msgid ""
|
|
"Collect the unix and linux hosts provided through the TA-nix app for "
|
|
"entry into ITSI"
|
|
msgstr ""
|
|
|
|
#: /Applications/Splunk/etc/apps/SA-ITOA/bin/itsi_csv_import.py:196
|
|
msgid ""
|
|
"Column in CSV file that contains the name of the service template that "
|
|
"the imported service should be linked to. Optional"
|
|
msgstr ""
|
|
|
|
#: /Applications/Splunk/etc/apps/SA-ITOA/bin/itsi_async_csv_loader.py:96
|
|
#: /Applications/Splunk/etc/apps/SA-ITOA/bin/itsi_csv_import.py:109
|
|
msgid ""
|
|
"Column in CSV file that represents the conflict resolution field of an "
|
|
"entity. Case sensitive"
|
|
msgstr ""
|
|
|
|
#: /Applications/Splunk/etc/apps/SA-ITOA/bin/itsi_async_csv_loader.py:141
|
|
#: /Applications/Splunk/etc/apps/SA-ITOA/bin/itsi_csv_import.py:154
|
|
msgid ""
|
|
"Column in CSV file that represents the title of a service. Mandatory. "
|
|
"Case sensitive"
|
|
msgstr ""
|
|
|
|
#: /Applications/Splunk/etc/apps/SA-ITOA/bin/itsi_async_csv_loader.py:90
|
|
#: /Applications/Splunk/etc/apps/SA-ITOA/bin/itsi_csv_import.py:103
|
|
msgid ""
|
|
"Column in CSV file that represents title of an entity. Mandatory. Case "
|
|
"sensitive"
|
|
msgstr ""
|
|
|
|
#: /Applications/Splunk/etc/apps/SA-ITOA/bin/itsi_async_csv_loader.py:172
|
|
#: /Applications/Splunk/etc/apps/SA-ITOA/bin/itsi_csv_import.py:185
|
|
msgid ""
|
|
"Comma separated list of services which need to be attached to "
|
|
"entities/services being imported. Optional"
|
|
msgstr ""
|
|
|
|
#: /Applications/Splunk/etc/apps/SA-ITOA/bin/itsi_async_csv_loader.py:102
|
|
#: /Applications/Splunk/etc/apps/SA-ITOA/bin/itsi_async_csv_loader.py:147
|
|
#: /Applications/Splunk/etc/apps/SA-ITOA/bin/itsi_csv_import.py:115
|
|
#: /Applications/Splunk/etc/apps/SA-ITOA/bin/itsi_csv_import.py:160
|
|
msgid ""
|
|
"Comma separated names of column headers from the CSV file that may "
|
|
"describe an asset. Case sensitive"
|
|
msgstr ""
|
|
|
|
#: /Applications/Splunk/etc/apps/SA-ITOA/bin/itsi_async_csv_loader.py:108
|
|
#: /Applications/Splunk/etc/apps/SA-ITOA/bin/itsi_csv_import.py:121
|
|
msgid ""
|
|
"Comma separated names of column headers to be imported from the CSV File "
|
|
"that represent fields that may identify the asset. Case sensitive."
|
|
msgstr ""
|
|
|
|
#: /Applications/Splunk/etc/apps/SA-ITOA/bin/itsi_async_csv_loader.py:115
|
|
#: /Applications/Splunk/etc/apps/SA-ITOA/bin/itsi_csv_import.py:128
|
|
msgid ""
|
|
"Comma separated names of column headers to be imported from the CSV File "
|
|
"that represent fields that provide non-identifying data about the asset. "
|
|
"Case sensitive."
|
|
msgstr ""
|
|
|
|
#: /Applications/Splunk/etc/apps/SA-ITOA/bin/itsi_user_access_init.py:51
|
|
msgid "Configuration Flag"
|
|
msgstr ""
|
|
|
|
#: /Applications/Splunk/etc/apps/SA-ITOA/bin/configure_itsi.py:49
|
|
msgid "Configuration flag"
|
|
msgstr ""
|
|
|
|
#: /Applications/Splunk/etc/apps/SA-ITOA/bin/configure_itsi.py:28
|
|
msgid "Configures IT Service Intelligence"
|
|
msgstr ""
|
|
|
|
#: /Applications/Splunk/etc/apps/SA-ITOA/bin/itsi_entity_exchange_consumer.py:28
|
|
msgid "Consumes entities published on the entity exchange module."
|
|
msgstr ""
|
|
|
|
#: /Applications/Splunk/etc/apps/SA-ITOA/bin/itsi_notable_event_actions_queue_consumer.py:29
|
|
msgid "Consumes producer data from the KV Store and executes an episode action."
|
|
msgstr ""
|
|
|
|
#: /Applications/Splunk/etc/apps/SA-ITOA/lib/itsi/mad/itsi_mad_searches.py:82
|
|
#: /Applications/Splunk/etc/apps/SA-ITOA/lib/itsi/mad/itsi_mad_searches.py:112
|
|
#: /Applications/Splunk/etc/apps/SA-ITOA/lib/itsi/mad/itsi_mad_searches.py:163
|
|
#: /Applications/Splunk/etc/apps/SA-ITOA/lib/itsi/mad/itsi_mad_searches.py:203
|
|
#: /Applications/Splunk/etc/apps/SA-ITOA/lib/itsi/mad/itsi_mad_searches.py:237
|
|
#: /Applications/Splunk/etc/apps/SA-ITOA/lib/itsi/mad/itsi_mad_searches.py:276
|
|
#: /Applications/Splunk/etc/apps/SA-ITOA/lib/itsi/mad/itsi_mad_searches.py:311
|
|
#: /Applications/Splunk/etc/apps/SA-ITOA/lib/itsi/mad/itsi_mad_searches.py:344
|
|
#: /Applications/Splunk/etc/apps/SA-ITOA/lib/itsi/mad/itsi_mad_searches.py:392
|
|
msgid "Context name must be in the format of a valid string."
|
|
msgstr ""
|
|
|
|
#: /Applications/Splunk/etc/apps/SA-ITOA/lib/ITOA/event_management/notable_event_ticketing.py:286
|
|
msgid "Correlation id is mandated for operations pertaining to external ticket."
|
|
msgstr ""
|
|
|
|
#: /Applications/Splunk/etc/apps/SA-ITOA/lib/SA_ITOA_app_common/solnlib/packages/schematics/types/base.py:741
|
|
msgid "Could not convert {0}. Time zone offsets not allowed."
|
|
msgstr ""
|
|
|
|
#: /Applications/Splunk/etc/apps/SA-ITOA/lib/SA_ITOA_app_common/solnlib/packages/schematics/types/base.py:740
|
|
msgid "Could not convert {0}. Time zone required but not found."
|
|
msgstr ""
|
|
|
|
#: /Applications/Splunk/etc/apps/SA-ITOA/lib/ITOA/saved_search_utility.py:161
|
|
msgid "Could not create search {0} because it already exists."
|
|
msgstr ""
|
|
|
|
#: /Applications/Splunk/etc/apps/SA-ITOA/lib/itsi/upgrade/kvstore_backup_restore.py:1091
|
|
msgid ""
|
|
"Could not determine the ITSI version from which the backup data was "
|
|
"collected. Make sure all the backup files are contained within a folder "
|
|
"named \"backup\". It may be a backup taken from an old ITSI version. Use "
|
|
"the command line tool to perform the restore operation by specifying the "
|
|
"ITSI version from which the backup data was collected."
|
|
msgstr ""
|
|
|
|
#: /Applications/Splunk/etc/apps/SA-ITOA/lib/ITOA/rest_interface_provider_base.py:352
|
|
msgid "Could not extract \"data\" from payload. Check input."
|
|
msgstr ""
|
|
|
|
#: /Applications/Splunk/etc/apps/SA-ITOA/lib/itsi/objects/itsi_service_template.py:778
|
|
msgid "Could not find cached service `{}`. Please debug."
|
|
msgstr ""
|
|
|
|
#: /Applications/Splunk/etc/apps/SA-ITOA/lib/kvstore_queue/kvstore_queue_consumer.py:243
|
|
#, python-format
|
|
msgid "Could not find commit method %s."
|
|
msgstr ""
|
|
|
|
#: /Applications/Splunk/etc/apps/SA-ITOA/lib/itsi/searches/itsi_searches.py:198
|
|
msgid "Could not find datamodel object {0} in datamodel {1}"
|
|
msgstr ""
|
|
|
|
#: /Applications/Splunk/etc/apps/SA-ITOA/lib/itsi/event_management/itsi_correlation_search.py:116
|
|
#: /Applications/Splunk/etc/apps/SA-ITOA/lib/itsi/event_management/itsi_correlation_search.py:138
|
|
msgid "Could not find metadata to generate search"
|
|
msgstr ""
|
|
|
|
#: /Applications/Splunk/etc/apps/SA-ITOA/lib/kvstore_queue/kvstore_queue_consumer.py:197
|
|
#, python-format
|
|
msgid "Could not find processing method method=%s uid=%s."
|
|
msgstr ""
|
|
|
|
#: /Applications/Splunk/etc/apps/SA-ITOA/lib/ITOA/itoa_common.py:1282
|
|
#, python-format
|
|
msgid "Could not find roles for the user \"%s\". User access info: %s"
|
|
msgstr ""
|
|
|
|
#: /Applications/Splunk/etc/apps/SA-ITOA/lib/ITOA/event_management/ace_interface.py:53
|
|
msgid "Could not find search with sid: {}, seed group save failed."
|
|
msgstr ""
|
|
|
|
#: /Applications/Splunk/etc/apps/SA-ITOA/lib/itsi/objects/itsi_service_template.py:526
|
|
msgid ""
|
|
"Could not find service object with id `{}`. Cannot create base service "
|
|
"template from non-existent service"
|
|
msgstr ""
|
|
|
|
#: /Applications/Splunk/etc/apps/SA-ITOA/lib/itsi/objects/itsi_service_template.py:602
|
|
msgid ""
|
|
"Could not find service template object with id `{}`. Cannot create base "
|
|
"service template from non-existent service template"
|
|
msgstr ""
|
|
|
|
#: /Applications/Splunk/etc/apps/SA-ITOA/lib/itsi/objects/itsi_service.py:1343
|
|
msgid ""
|
|
"Could not find service template object(s) with id(s) `{}`. Cannot create "
|
|
"service(s) from non-existent service template(s)."
|
|
msgstr ""
|
|
|
|
#: /Applications/Splunk/etc/apps/SA-ITOA/lib/itsi/backup_restore/backup_restore_rest_provider.py:297
|
|
msgid ""
|
|
"Could not find the backup file to get counts of knowledge objects for "
|
|
"preview."
|
|
msgstr ""
|
|
|
|
#: /Applications/Splunk/etc/apps/SA-ITOA/lib/ITOA/event_management/push_event_manager.py:38
|
|
msgid "Could not find token value in response from server for token name=\"{0}\"."
|
|
msgstr ""
|
|
|
|
#: /Applications/Splunk/etc/apps/SA-ITOA/lib/itsi/searches/itsi_searches.py:157
|
|
msgid "Could not get all datamodel objects"
|
|
msgstr ""
|
|
|
|
#: /Applications/Splunk/etc/apps/SA-ITOA/lib/SA_ITOA_app_common/solnlib/packages/schematics/types/compound.py:216
|
|
msgid "Could not interpret the value as a list"
|
|
msgstr ""
|
|
|
|
#: /Applications/Splunk/etc/apps/SA-ITOA/lib/itsi/event_management/itsi_correlation_search.py:125
|
|
msgid "Could not load metadata into JSON format"
|
|
msgstr ""
|
|
|
|
#: /Applications/Splunk/etc/apps/SA-ITOA/lib/itsi/objects/itsi_service_template.py:358
|
|
#: /Applications/Splunk/etc/apps/SA-ITOA/lib/itsi/searches/itsi_searches.py:149
|
|
msgid "Could not locate specified datamodel {}"
|
|
msgstr ""
|
|
|
|
#: /Applications/Splunk/etc/apps/SA-ITOA/lib/SA_ITOA_app_common/solnlib/packages/schematics/types/base.py:737
|
|
msgid "Could not parse {0}."
|
|
msgstr ""
|
|
|
|
#: /Applications/Splunk/etc/apps/SA-ITOA/lib/SA_ITOA_app_common/solnlib/packages/schematics/types/base.py:639
|
|
msgid "Could not parse {0}. Should be ISO 8601 (YYYY-MM-DD)."
|
|
msgstr ""
|
|
|
|
#: /Applications/Splunk/etc/apps/SA-ITOA/lib/SA_ITOA_app_common/solnlib/packages/schematics/types/base.py:735
|
|
msgid "Could not parse {0}. Should be ISO 8601 or timestamp."
|
|
msgstr ""
|
|
|
|
#: /Applications/Splunk/etc/apps/SA-ITOA/lib/SA_ITOA_app_common/solnlib/packages/schematics/types/base.py:739
|
|
msgid "Could not parse {0}. Time zone offset not allowed."
|
|
msgstr ""
|
|
|
|
#: /Applications/Splunk/etc/apps/SA-ITOA/lib/SA_ITOA_app_common/solnlib/packages/schematics/types/base.py:738
|
|
msgid "Could not parse {0}. Time zone offset required."
|
|
msgstr ""
|
|
|
|
#: /Applications/Splunk/etc/apps/SA-ITOA/lib/SA_ITOA_app_common/solnlib/packages/schematics/types/base.py:640
|
|
#: /Applications/Splunk/etc/apps/SA-ITOA/lib/SA_ITOA_app_common/solnlib/packages/schematics/types/base.py:736
|
|
msgid "Could not parse {0}. Valid formats: {1}"
|
|
msgstr ""
|
|
|
|
#: /Applications/Splunk/etc/apps/SA-ITOA/lib/ITOA/event_management/base_event_generation.py:77
|
|
#: /Applications/Splunk/etc/apps/SA-ITOA/lib/ITOA/event_management/base_event_generation.py:80
|
|
msgid "Could not retrieve search job info."
|
|
msgstr ""
|
|
|
|
#: /Applications/Splunk/etc/apps/SA-ITOA/lib/ITOA/event_management/correlation_search.py:96
|
|
#: /Applications/Splunk/etc/apps/SA-ITOA/lib/itsi/event_management/itsi_correlation_search.py:96
|
|
msgid "Could not validate searches because the provided data is not a valid list."
|
|
msgstr ""
|
|
|
|
#: /Applications/Splunk/etc/apps/SA-ITOA/lib/SA_ITOA_app_common/solnlib/packages/schematics/contrib/enum_type.py:33
|
|
msgid "Couldn't interpret '{0}' as member of {1}."
|
|
msgstr ""
|
|
|
|
#: /Applications/Splunk/etc/apps/SA-ITOA/lib/SA_ITOA_app_common/solnlib/packages/schematics/types/base.py:385
|
|
msgid "Couldn't interpret '{0}' as string."
|
|
msgstr ""
|
|
|
|
#: /Applications/Splunk/etc/apps/SA-ITOA/lib/SA_ITOA_app_common/solnlib/packages/schematics/types/base.py:981
|
|
msgid "Couldn't interpret '{0}' value as Timedelta."
|
|
msgstr ""
|
|
|
|
#: /Applications/Splunk/etc/apps/SA-ITOA/lib/SA_ITOA_app_common/solnlib/packages/schematics/types/base.py:354
|
|
msgid "Couldn't interpret '{0}' value as UUID."
|
|
msgstr ""
|
|
|
|
#: /Applications/Splunk/etc/apps/SA-ITOA/lib/SA_ITOA_app_common/solnlib/packages/schematics/types/union.py:34
|
|
msgid "Couldn't interpret value '{0}' as any of {1}."
|
|
msgstr ""
|
|
|
|
#: /Applications/Splunk/etc/apps/SA-ITOA/lib/SA_ITOA_app_common/solnlib/packages/schematics/contrib/mongo.py:27
|
|
msgid "Couldn't interpret value as an ObjectId."
|
|
msgstr ""
|
|
|
|
#: /Applications/Splunk/etc/apps/SA-ITOA/lib/SA_ITOA_app_common/solnlib/packages/schematics/types/base.py:1092
|
|
msgid "Couldn't interpret value as string."
|
|
msgstr ""
|
|
|
|
#: /Applications/Splunk/etc/apps/SA-ITOA/default/itsi_notable_event_severity.conf:38
|
|
msgid "Critical"
|
|
msgstr ""
|
|
|
|
#: /Applications/Splunk/etc/apps/SA-ITOA/lib/itsi/objects/itsi_kpi.py:149
|
|
#, python-format
|
|
msgid ""
|
|
"Custom value provided to fill in data gap is not valid. Only numeric "
|
|
"values are accepted. %s_key=\"%s\", "
|
|
"invalid_field=\"gap_custom_alert_value\""
|
|
msgstr ""
|
|
|
|
#: /Applications/Splunk/etc/apps/SA-ITOA/lib/itsi/objects/itsi_kpi.py:143
|
|
#, python-format
|
|
msgid ""
|
|
"Custom value to fill data gaps not provided. Provide a static value when "
|
|
"\"custom_value\" option is selected to fill data gaps. %s_key=\"%s\", "
|
|
"missing_field=\"gap_custom_alert_value\""
|
|
msgstr ""
|
|
|
|
#: /Applications/Splunk/etc/apps/SA-ITOA/lib/itsi/objects/itsi_entity.py:337
|
|
msgid "Data corruption: blank values are not permitted."
|
|
msgstr ""
|
|
|
|
#: /Applications/Splunk/etc/apps/SA-ITOA/lib/itsi/objects/itsi_entity.py:330
|
|
msgid "Data corruption: field names and attribute names do not match."
|
|
msgstr ""
|
|
|
|
#: /Applications/Splunk/etc/apps/SA-ITOA/lib/ITOA/event_management/notable_event_tag.py:85
|
|
#, python-format
|
|
msgid "Data does not contain either %s or %s."
|
|
msgstr ""
|
|
|
|
#: /Applications/Splunk/etc/apps/SA-ITOA/lib/ITOA/event_management/base_event_management.py:244
|
|
#: /Applications/Splunk/etc/apps/SA-ITOA/lib/ITOA/event_management/notable_event.py:271
|
|
#: /Applications/Splunk/etc/apps/SA-ITOA/lib/ITOA/event_management/notable_event_aggregation_policy.py:129
|
|
#: /Applications/Splunk/etc/apps/SA-ITOA/lib/ITOA/event_management/notable_event_aggregation_policy.py:172
|
|
#, python-format
|
|
msgid "Data is not a valid dictionary, data type=%s."
|
|
msgstr ""
|
|
|
|
#: /Applications/Splunk/etc/apps/SA-ITOA/lib/ITOA/event_management/notable_event_group.py:74
|
|
#: /Applications/Splunk/etc/apps/SA-ITOA/lib/ITOA/event_management/notable_event_tag.py:79
|
|
msgid "Data is not a valid dictionary."
|
|
msgstr ""
|
|
|
|
#: /Applications/Splunk/etc/apps/SA-ITOA/lib/ITOA/event_management/notable_event_kpi_alert.py:65
|
|
#: /Applications/Splunk/etc/apps/SA-ITOA/lib/ITOA/event_management/notable_event_mad.py:70
|
|
#, python-format
|
|
msgid "Data is not a valid dictonary, data type is %s."
|
|
msgstr ""
|
|
|
|
#: /Applications/Splunk/etc/apps/SA-ITOA/lib/ITOA/event_management/notable_event_tag.py:75
|
|
#, python-format
|
|
msgid "Data is not a valid list, actual type is %s."
|
|
msgstr ""
|
|
|
|
#: /Applications/Splunk/etc/apps/SA-ITOA/lib/ITOA/event_management/notable_event_aggregation_policy.py:168
|
|
#: /Applications/Splunk/etc/apps/SA-ITOA/lib/ITOA/event_management/notable_event_group.py:70
|
|
#, python-format
|
|
msgid "Data is not a valid list, data_list type is %s."
|
|
msgstr ""
|
|
|
|
#: /Applications/Splunk/etc/apps/SA-ITOA/lib/ITOA/event_management/notable_event.py:430
|
|
msgid "Data or fetched data is None."
|
|
msgstr ""
|
|
|
|
#: /Applications/Splunk/etc/apps/SA-ITOA/lib/itsi/event_management/event_management_services.py:462
|
|
msgid "Data should be valid dict"
|
|
msgstr ""
|
|
|
|
#: /Applications/Splunk/etc/apps/SA-ITOA/lib/ITOA/event_management/notable_event.py:133
|
|
#: /Applications/Splunk/etc/apps/SA-ITOA/lib/ITOA/event_management/notable_event.py:505
|
|
msgid "Data: {0} is not a valid dictionary, data type is {1}."
|
|
msgstr ""
|
|
|
|
#: /Applications/Splunk/etc/apps/SA-ITOA/lib/ITOA/event_management/notable_event.py:126
|
|
#: /Applications/Splunk/etc/apps/SA-ITOA/lib/ITOA/event_management/notable_event.py:578
|
|
#: /Applications/Splunk/etc/apps/SA-ITOA/lib/ITOA/event_management/notable_event.py:631
|
|
#: /Applications/Splunk/etc/apps/SA-ITOA/lib/ITOA/event_management/notable_event.py:818
|
|
msgid "Data_list: {0} is not a valid list, data_list type is {1}."
|
|
msgstr ""
|
|
|
|
#: /Applications/Splunk/etc/apps/SA-ITOA/lib/itsi/objects/itsi_kpi.py:599
|
|
msgid ""
|
|
"Datamodel filters must be an array of filters. Found a KPI with an "
|
|
"invalid specification for datamodel filters."
|
|
msgstr ""
|
|
|
|
#: /Applications/Splunk/etc/apps/SA-ITOA/lib/itsi/objects/itsi_kpi.py:590
|
|
msgid ""
|
|
"Datamodel search based KPI does not seem to have specified a valid "
|
|
"datamodel search. Specify a datamodel based search KPIs with all "
|
|
"mandatory fields: datamodel, object, field and owner_field."
|
|
msgstr ""
|
|
|
|
#: /Applications/Splunk/etc/apps/SA-ITOA/lib/itsi/objects/itsi_kpi.py:579
|
|
msgid ""
|
|
"Datamodel search based KPI does not seem to have specified a valid "
|
|
"datamodel search. Specify a datamodel based search for the KPI."
|
|
msgstr ""
|
|
|
|
#: /Applications/Splunk/etc/apps/SA-ITOA/lib/itsi/objects/itsi_kpi_threshold_template.py:138
|
|
msgid "Default policy cannot be removed from a KPI time policy specification."
|
|
msgstr ""
|
|
|
|
#: /Applications/Splunk/etc/apps/SA-ITOA/lib/ITOA/event_management/notable_event_utils.py:786
|
|
msgid "Default severity cannot be None."
|
|
msgstr ""
|
|
|
|
#: /Applications/Splunk/etc/apps/SA-ITOA/lib/ITOA/event_management/notable_event_utils.py:764
|
|
msgid "Default status cannot be None."
|
|
msgstr ""
|
|
|
|
#: /Applications/Splunk/etc/apps/SA-ITOA/default/itsi_team.conf:3
|
|
msgid "Default team for ITSI"
|
|
msgstr ""
|
|
|
|
#: /Applications/Splunk/etc/apps/SA-ITOA/bin/itsi_age_kpi_alert_value_cache.py:24
|
|
msgid "Deletes the aged KPI Summary entries from the KPI Alert Value Cache."
|
|
msgstr ""
|
|
|
|
#: /Applications/Splunk/etc/apps/SA-ITOA/lib/itsi/access_control/access_control_controller_utils.py:759
|
|
#, python-format
|
|
msgid ""
|
|
"Deleting permissions for object_id=`%s` object_app=`%s object_type=`%s` "
|
|
"object_store=`%s`"
|
|
msgstr ""
|
|
|
|
#: /Applications/Splunk/etc/apps/SA-ITOA/lib/itsi/objects/itsi_service.py:2085
|
|
#: /Applications/Splunk/etc/apps/SA-ITOA/lib/itsi/objects/itsi_service.py:2121
|
|
#, python-format
|
|
msgid ""
|
|
"Dependency being configured violates team membership rules. Services "
|
|
"could only depend on services from other teams if the depending service "
|
|
"is in the parent hierarchy of the service's team. Violating dependent "
|
|
"service is %s, for the service %s."
|
|
msgstr ""
|
|
|
|
#: /Applications/Splunk/etc/apps/SA-ITOA/lib/integrations/phantom/api.py:13
|
|
msgid "Derived class did not implement `create`."
|
|
msgstr ""
|
|
|
|
#: /Applications/Splunk/etc/apps/SA-ITOA/lib/integrations/phantom/api.py:25
|
|
msgid "Derived class did not implement `delete`."
|
|
msgstr ""
|
|
|
|
#: /Applications/Splunk/etc/apps/SA-ITOA/lib/integrations/commons/server.py:7
|
|
msgid "Derived class did not implement `get_rest_endpoint`."
|
|
msgstr ""
|
|
|
|
#: /Applications/Splunk/etc/apps/SA-ITOA/lib/integrations/commons/server.py:10
|
|
msgid "Derived class did not implement `get_rest_headers`."
|
|
msgstr ""
|
|
|
|
#: /Applications/Splunk/etc/apps/SA-ITOA/lib/integrations/phantom/api.py:17
|
|
msgid "Derived class did not implement `read`."
|
|
msgstr ""
|
|
|
|
#: /Applications/Splunk/etc/apps/SA-ITOA/lib/integrations/phantom/api.py:21
|
|
msgid "Derived class did not implement `update`."
|
|
msgstr ""
|
|
|
|
#: /Applications/Splunk/etc/apps/SA-ITOA/lib/ITOA/event_management/base_event_management.py:252
|
|
msgid "Derived class must implement this method"
|
|
msgstr ""
|
|
|
|
#: /Applications/Splunk/etc/apps/SA-ITOA/lib/itsi/event_management/sdk/custom_group_action_base.py:149
|
|
msgid "Derived class must implemented `execute`."
|
|
msgstr ""
|
|
|
|
#: /Applications/Splunk/etc/apps/SA-ITOA/bin/itsi_async_csv_loader.py:55
|
|
#: /Applications/Splunk/etc/apps/SA-ITOA/bin/itsi_csv_import.py:63
|
|
msgid "Do you wish to import from search ?"
|
|
msgstr ""
|
|
|
|
#: /Applications/Splunk/etc/apps/SA-ITOA/bin/command_get_kpi_search.py:69
|
|
#: /Applications/Splunk/etc/apps/SA-ITOA/bin/command_get_kpi_search.py:88
|
|
msgid "Double equal signs found. Must fix your query."
|
|
msgstr ""
|
|
|
|
#: /Applications/Splunk/etc/apps/SA-ITOA/lib/ITOA/event_management/notable_event_group.py:280
|
|
#: /Applications/Splunk/etc/apps/SA-ITOA/lib/ITOA/event_management/notable_event_group.py:320
|
|
#: /Applications/Splunk/etc/apps/SA-ITOA/lib/ITOA/event_management/notable_event_group.py:372
|
|
msgid "Drilldown data must have link and name"
|
|
msgstr ""
|
|
|
|
#: /Applications/Splunk/etc/apps/SA-ITOA/lib/ITOA/event_management/notable_event_group.py:294
|
|
msgid "Drilldown field is not of type list"
|
|
msgstr ""
|
|
|
|
#: /Applications/Splunk/etc/apps/SA-ITOA/lib/ITOA/event_management/notable_event_group.py:344
|
|
#: /Applications/Splunk/etc/apps/SA-ITOA/lib/ITOA/event_management/notable_event_group.py:393
|
|
msgid "Drilldown index given is not an integer."
|
|
msgstr ""
|
|
|
|
#: /Applications/Splunk/etc/apps/SA-ITOA/lib/ITOA/event_management/notable_event_group.py:340
|
|
#: /Applications/Splunk/etc/apps/SA-ITOA/lib/ITOA/event_management/notable_event_group.py:395
|
|
msgid "Drilldown index of: {0} out of bounds for drilldown list."
|
|
msgstr ""
|
|
|
|
#: /Applications/Splunk/etc/apps/SA-ITOA/lib/ITOA/event_management/notable_event_group.py:391
|
|
msgid "Drilldown list is not of type list."
|
|
msgstr ""
|
|
|
|
#: /Applications/Splunk/etc/apps/SA-ITOA/lib/ITOA/event_management/notable_event_group.py:346
|
|
msgid "Drilldown list item at index: {0} is not of type dict"
|
|
msgstr ""
|
|
|
|
#: /Applications/Splunk/etc/apps/SA-ITOA/lib/ITOA/event_management/notable_event_group.py:386
|
|
msgid "Drilldown with name: {0} not found."
|
|
msgstr ""
|
|
|
|
#: /Applications/Splunk/etc/apps/SA-ITOA/bin/command_check_for_dup_alias.py:18
|
|
msgid ""
|
|
"Duplicate entity aliases found. This may cause incorrect statistical "
|
|
"aggregation results for KPI base searches. [[{}|Show duplicates.]]"
|
|
msgstr ""
|
|
|
|
#: /Applications/Splunk/etc/apps/SA-ITOA/lib/itsi/csv_import/itoa_bulk_import.py:415
|
|
msgid "Duplicate fieldname in row assignment: {0}"
|
|
msgstr ""
|
|
|
|
#: /Applications/Splunk/etc/apps/SA-ITOA/lib/itsi/csv_import/itoa_bulk_import_specification.py:460
|
|
msgid "Duplicate fieldname role assignments in Bulk Import Specification: {}."
|
|
msgstr ""
|
|
|
|
#: /Applications/Splunk/etc/apps/SA-ITOA/lib/itsi/objects/itsi_entity_relationship.py:545
|
|
#, python-format
|
|
msgid "Duplicate identifiers with keys found among %s"
|
|
msgstr ""
|
|
|
|
#: /Applications/Splunk/etc/apps/SA-ITOA/lib/ITOA/itoa_object.py:240
|
|
msgid ""
|
|
"Duplicate object name(s) found: {}. Please rename the object(s) before "
|
|
"proceeding."
|
|
msgstr ""
|
|
|
|
#: /Applications/Splunk/etc/apps/SA-ITOA/bin/command_storeentities.py:48
|
|
#, python-format
|
|
msgid "Duplicate parameter found: %s."
|
|
msgstr ""
|
|
|
|
#: /Applications/Splunk/etc/apps/SA-ITOA/lib/itsi/objects/itsi_service.py:1820
|
|
msgid "Duplicated KPI title within the same {}."
|
|
msgstr ""
|
|
|
|
#: /Applications/Splunk/etc/apps/SA-ITOA/lib/itsi/objects/itsi_kpi_threshold_template.py:66
|
|
msgid ""
|
|
"Duplication of policy title is not allowed. Duplicate policy title: "
|
|
"\"{0}\""
|
|
msgstr ""
|
|
|
|
#: /Applications/Splunk/etc/apps/SA-ITOA/lib/itsi/objects/itsi_kpi.py:607
|
|
msgid ""
|
|
"Each datamodel filter must be a valid JSON filter specification. Found a "
|
|
"KPI with an invalid specification for a datamodel filter."
|
|
msgstr ""
|
|
|
|
#: /Applications/Splunk/etc/apps/SA-ITOA/lib/itsi/objects/itsi_kpi.py:615
|
|
msgid ""
|
|
"Each datamodel filter must specify a field and value. Found a KPI with no"
|
|
" field or value specified for a datamodel filter."
|
|
msgstr ""
|
|
|
|
#: /Applications/Splunk/etc/apps/SA-ITOA/lib/itsi/objects/itsi_kpi.py:623
|
|
msgid ""
|
|
"Each datamodel filter operator must be =, < or >. Found a KPI with "
|
|
"invalid operator specified for a datamodel filter."
|
|
msgstr ""
|
|
|
|
#: /Applications/Splunk/etc/apps/SA-ITOA/default/itsi_kpi_threshold_template.conf:77
|
|
#: /Applications/Splunk/etc/apps/SA-ITOA/default/itsi_kpi_threshold_template.conf:86
|
|
#: /Applications/Splunk/etc/apps/SA-ITOA/default/itsi_kpi_threshold_template.conf:95
|
|
#: /Applications/Splunk/etc/apps/SA-ITOA/default/itsi_kpi_threshold_template.conf:104
|
|
msgid "Each day of the week broken up into 1 hour chunks"
|
|
msgstr ""
|
|
|
|
#: /Applications/Splunk/etc/apps/SA-ITOA/default/itsi_kpi_threshold_template.conf:113
|
|
#: /Applications/Splunk/etc/apps/SA-ITOA/default/itsi_kpi_threshold_template.conf:122
|
|
#: /Applications/Splunk/etc/apps/SA-ITOA/default/itsi_kpi_threshold_template.conf:131
|
|
#: /Applications/Splunk/etc/apps/SA-ITOA/default/itsi_kpi_threshold_template.conf:140
|
|
msgid "Each day of the week broken up into 2 hour chunks"
|
|
msgstr ""
|
|
|
|
#: /Applications/Splunk/etc/apps/SA-ITOA/default/itsi_kpi_threshold_template.conf:149
|
|
#: /Applications/Splunk/etc/apps/SA-ITOA/default/itsi_kpi_threshold_template.conf:158
|
|
#: /Applications/Splunk/etc/apps/SA-ITOA/default/itsi_kpi_threshold_template.conf:167
|
|
#: /Applications/Splunk/etc/apps/SA-ITOA/default/itsi_kpi_threshold_template.conf:176
|
|
msgid "Each day of the week broken up into 3 hour chunks"
|
|
msgstr ""
|
|
|
|
#: /Applications/Splunk/etc/apps/SA-ITOA/bin/itsi_async_csv_loader.py:69
|
|
#: /Applications/Splunk/etc/apps/SA-ITOA/bin/itsi_csv_import.py:82
|
|
msgid "Earliest index time"
|
|
msgstr ""
|
|
|
|
#: /Applications/Splunk/etc/apps/SA-ITOA/bin/itsi_async_csv_loader.py:70
|
|
#: /Applications/Splunk/etc/apps/SA-ITOA/bin/itsi_csv_import.py:83
|
|
msgid ""
|
|
"Earliest index time you want to use to with your Splunk search to import "
|
|
"entities/services. If no value is provided, we will default to '-15m'"
|
|
msgstr ""
|
|
|
|
#: /Applications/Splunk/etc/apps/SA-ITOA/lib/ITOA/storage/itoa_generic_persistables.py:135
|
|
msgid "Either interface or session key/owner must be provided."
|
|
msgstr ""
|
|
|
|
#: /Applications/Splunk/etc/apps/SA-ITOA/lib/itsi_module/itsi_module_service_template.py:176
|
|
msgid ""
|
|
"Either the flag \"resolve_kpis\" or \"resolve_kpis_from_itsi\" can be "
|
|
"set, not both."
|
|
msgstr ""
|
|
|
|
#: /Applications/Splunk/etc/apps/SA-ITOA/lib/ITOA/itoa_common.py:194
|
|
#, python-format
|
|
msgid "Element `%s` is not an array"
|
|
msgstr ""
|
|
|
|
#: /Applications/Splunk/etc/apps/SA-ITOA/lib/ITOA/storage/statestore.py:283
|
|
#: /Applications/Splunk/etc/apps/SA-ITOA/lib/ITOA/storage/statestore.py:486
|
|
msgid "Empty field received - Rejecting filter."
|
|
msgstr ""
|
|
|
|
#: /Applications/Splunk/etc/apps/SA-ITOA/lib/itsi/csv_import/itoa_bulk_import_specification.py:277
|
|
msgid "Empty subject field for entity relationship in import specification"
|
|
msgstr ""
|
|
|
|
#: /Applications/Splunk/etc/apps/SA-ITOA/lib/itsi/csv_import/itoa_bulk_import_specification.py:267
|
|
msgid "Empty title field for entity in import specification."
|
|
msgstr ""
|
|
|
|
#: /Applications/Splunk/etc/apps/SA-ITOA/lib/itsi/csv_import/itoa_bulk_import_specification.py:286
|
|
msgid "Empty title field for service in import specification."
|
|
msgstr ""
|
|
|
|
#: /Applications/Splunk/etc/apps/SA-ITOA/lib/ITOA/event_management/notable_event_ticketing.py:240
|
|
msgid ""
|
|
"Empty/missing correlation_value_for_group in your "
|
|
"notable_event_actions.conf."
|
|
msgstr ""
|
|
|
|
#: /Applications/Splunk/etc/apps/SA-ITOA/bin/itsi_csv_import.py:206
|
|
msgid "Enable Backfill for All KPIs?"
|
|
msgstr ""
|
|
|
|
#: /Applications/Splunk/etc/apps/SA-ITOA/bin/itsi_csv_import.py:207
|
|
msgid ""
|
|
"Enable backfill on all KPIs in Services linked to Service Templates. "
|
|
"Service template field must be specified."
|
|
msgstr ""
|
|
|
|
#: /Applications/Splunk/etc/apps/SA-ITOA/bin/itsi_csv_import.py:190
|
|
msgid "Enable imported services?"
|
|
msgstr ""
|
|
|
|
#: /Applications/Splunk/etc/apps/SA-ITOA/bin/itsi_refresher.py:27
|
|
msgid ""
|
|
"Ensures data integrity and eventual consistency of ITSI configuration. "
|
|
"This runs as a single instance."
|
|
msgstr ""
|
|
|
|
#: /Applications/Splunk/etc/apps/SA-ITOA/lib/itsi/itoa_rest_interface_provider/itoa_rest_interface_provider.py:548
|
|
msgid ""
|
|
"Entities, Services, and KPI templates can only exist at app level "
|
|
"(user='nobody')."
|
|
msgstr ""
|
|
|
|
#: /Applications/Splunk/etc/apps/SA-ITOA/lib/itsi/itoa_rest_interface_provider/itoa_rest_interface_provider.py:424
|
|
#, python-format
|
|
msgid ""
|
|
"Entities, Services, and KPIs can only exist at app level (user='nobody') "
|
|
"- %s."
|
|
msgstr ""
|
|
|
|
#: /Applications/Splunk/etc/apps/SA-ITOA/bin/itsi_async_csv_loader.py:95
|
|
#: /Applications/Splunk/etc/apps/SA-ITOA/bin/itsi_csv_import.py:108
|
|
msgid "Entity Conflict Resolution Field Column"
|
|
msgstr ""
|
|
|
|
#: /Applications/Splunk/etc/apps/SA-ITOA/bin/itsi_async_csv_loader.py:101
|
|
#: /Applications/Splunk/etc/apps/SA-ITOA/bin/itsi_csv_import.py:114
|
|
msgid "Entity Description Column"
|
|
msgstr ""
|
|
|
|
#: /Applications/Splunk/etc/apps/SA-ITOA/bin/itsi_async_csv_loader.py:121
|
|
#: /Applications/Splunk/etc/apps/SA-ITOA/bin/itsi_csv_import.py:134
|
|
msgid "Entity Field Mappings"
|
|
msgstr ""
|
|
|
|
#: /Applications/Splunk/etc/apps/SA-ITOA/bin/itsi_async_csv_loader.py:107
|
|
#: /Applications/Splunk/etc/apps/SA-ITOA/bin/itsi_csv_import.py:120
|
|
msgid "Entity Identifier Fields"
|
|
msgstr ""
|
|
|
|
#: /Applications/Splunk/etc/apps/SA-ITOA/bin/itsi_async_csv_loader.py:114
|
|
#: /Applications/Splunk/etc/apps/SA-ITOA/bin/itsi_csv_import.py:127
|
|
msgid "Entity Informational Fields"
|
|
msgstr ""
|
|
|
|
#: /Applications/Splunk/etc/apps/SA-ITOA/bin/itsi_async_csv_loader.py:131
|
|
#: /Applications/Splunk/etc/apps/SA-ITOA/bin/itsi_csv_import.py:144
|
|
msgid "Entity Relationship Specification"
|
|
msgstr ""
|
|
|
|
#: /Applications/Splunk/etc/apps/SA-ITOA/bin/itsi_async_csv_loader.py:132
|
|
#: /Applications/Splunk/etc/apps/SA-ITOA/bin/itsi_csv_import.py:145
|
|
msgid ""
|
|
"Entity Relationship for Entity Import. A dictionary of relationships and "
|
|
"list of fields. For example, if your CSV contains 'foo' and 'bar' as "
|
|
"headers and you want to specify both of them relating to entity title "
|
|
"field in 'hosts' relationship, you should set entity relationship spec as"
|
|
" {\"hosts\": [\"foo\", \"bar\"]}."
|
|
msgstr ""
|
|
|
|
#: /Applications/Splunk/etc/apps/SA-ITOA/bin/itsi_csv_import.py:201
|
|
msgid "Entity Rules to Service Template mappings"
|
|
msgstr ""
|
|
|
|
#: /Applications/Splunk/etc/apps/SA-ITOA/bin/itsi_async_csv_loader.py:89
|
|
#: /Applications/Splunk/etc/apps/SA-ITOA/bin/itsi_csv_import.py:102
|
|
msgid "Entity Title Column"
|
|
msgstr ""
|
|
|
|
#: /Applications/Splunk/etc/apps/SA-ITOA/lib/itsi/csv_import/itoa_bulk_import_entity_parser.py:54
|
|
msgid ""
|
|
"Entity are specified in import rule but not present in source, will be "
|
|
"skipped: {}"
|
|
msgstr ""
|
|
|
|
#: /Applications/Splunk/etc/apps/SA-ITOA/lib/itsi/csv_import/itoa_bulk_import_entity_parser.py:66
|
|
msgid ""
|
|
"Entity fieldnames discovered as valid fieldname but not present in fields"
|
|
" to be imported, will be skipped: {}"
|
|
msgstr ""
|
|
|
|
#: /Applications/Splunk/etc/apps/SA-ITOA/bin/itsi_csv_import.py:202
|
|
msgid "Entity rules to Service Template mappings. Optional"
|
|
msgstr ""
|
|
|
|
#: /Applications/Splunk/etc/apps/SA-ITOA/lib/itsi/event_management/event_management_rest_provider.py:890
|
|
msgid ""
|
|
"Entity {0} in KPI {1} associated with service {2} was dropped from "
|
|
"cohesive analysis. Maximum entity limit is {3}."
|
|
msgstr ""
|
|
|
|
#: /Applications/Splunk/etc/apps/SA-ITOA/lib/itsi_module/itsi_module_common.py:716
|
|
#, python-format
|
|
msgid "Error getting %s id: %s."
|
|
msgstr ""
|
|
|
|
#: /Applications/Splunk/etc/apps/SA-ITOA/lib/itsi_module/itsi_module_common.py:666
|
|
#, python-format
|
|
msgid "Error getting content of conf file %s: %s."
|
|
msgstr ""
|
|
|
|
#: /Applications/Splunk/etc/apps/SA-ITOA/lib/itsi/objects/itsi_kpi_base_search.py:431
|
|
msgid "Error getting the appropriate id array for object array"
|
|
msgstr ""
|
|
|
|
#: /Applications/Splunk/etc/apps/SA-ITOA/lib/itsi/itoa_rest_interface_provider/itoa_rest_interface_provider.py:900
|
|
msgid "Error retrieving request data."
|
|
msgstr ""
|
|
|
|
#: /Applications/Splunk/etc/apps/SA-ITOA/lib/itsi_module/itsi_module_common.py:508
|
|
#, python-format
|
|
msgid "Error templatizing %s id: %s."
|
|
msgstr ""
|
|
|
|
#: /Applications/Splunk/etc/apps/SA-ITOA/lib/itsi_module/itsi_module_service_template.py:92
|
|
#, python-format
|
|
msgid "Error templatizing service: %s"
|
|
msgstr ""
|
|
|
|
#: /Applications/Splunk/etc/apps/SA-ITOA/lib/itsi_module/itsi_module_common.py:439
|
|
#: /Applications/Splunk/etc/apps/SA-ITOA/lib/itsi_module/itsi_module_common.py:474
|
|
#, python-format
|
|
msgid "Error updating %s: %s."
|
|
msgstr ""
|
|
|
|
#: /Applications/Splunk/etc/apps/SA-ITOA/lib/itsi/itoa_rest_interface_provider/itoa_rest_interface_provider.py:874
|
|
msgid "Error updating request data."
|
|
msgstr ""
|
|
|
|
#: /Applications/Splunk/etc/apps/SA-ITOA/lib/itsi/backup_restore/backup_restore_rest_provider.py:295
|
|
msgid ""
|
|
"Error while parsing the backup file to get counts of knowledge objects "
|
|
"for preview."
|
|
msgstr ""
|
|
|
|
#: /Applications/Splunk/etc/apps/SA-ITOA/lib/ITOA/itoa_common.py:1349
|
|
#, python-format
|
|
msgid ""
|
|
"Error while polling Splunkd for current user context. Response: \"%s\". "
|
|
"Content: \"%s\"."
|
|
msgstr ""
|
|
|
|
#: /Applications/Splunk/etc/apps/SA-ITOA/lib/ITOA/itoa_common.py:1237
|
|
#, python-format
|
|
msgid ""
|
|
"Error while polling Splunkd for role information. Response: \"%s\". "
|
|
"Content: \"%s\"."
|
|
msgstr ""
|
|
|
|
#: /Applications/Splunk/etc/apps/SA-ITOA/lib/ITOA/itoa_common.py:1193
|
|
#, python-format
|
|
msgid ""
|
|
"Error while polling Splunkd for user access information. Response: "
|
|
"\"%s\". Content: \"%s\"."
|
|
msgstr ""
|
|
|
|
#: /Applications/Splunk/etc/apps/SA-ITOA/lib/itsi/csv_import/itoa_bulk_import_rest_interface_provider.py:312
|
|
msgid ""
|
|
"Error while trying to fetch search results. The search may have failed. "
|
|
"If the problem persists, contact support."
|
|
msgstr ""
|
|
|
|
#: /Applications/Splunk/etc/apps/SA-ITOA/lib/itsi/objects/changehandlers/base_service_template_update_handler.py:216
|
|
#: /Applications/Splunk/etc/apps/SA-ITOA/lib/itsi/objects/changehandlers/base_service_template_update_handler.py:225
|
|
#, python-format
|
|
msgid ""
|
|
"Error while updating services linked to service_template=\"%s\". "
|
|
"Exception=\"%s\""
|
|
msgstr ""
|
|
|
|
#: /Applications/Splunk/etc/apps/SA-ITOA/lib/itsi/service_template/service_template_utils.py:602
|
|
msgid ""
|
|
"Error while updating {} services linked to service template {}. See "
|
|
"service template configuration page for more details. "
|
|
msgstr ""
|
|
|
|
#: /Applications/Splunk/etc/apps/SA-ITOA/lib/itsi_module/itsi_module_kpi_base_search.py:139
|
|
msgid "Error writing data into conf."
|
|
msgstr ""
|
|
|
|
#: /Applications/Splunk/etc/apps/SA-ITOA/lib/itsi_module/itsi_module_common.py:398
|
|
#, python-format
|
|
msgid "Error writing data into conf: %s."
|
|
msgstr ""
|
|
|
|
#: /Applications/Splunk/etc/apps/SA-ITOA/lib/itsi_module/itsi_module_kpi_group.py:140
|
|
#: /Applications/Splunk/etc/apps/SA-ITOA/lib/itsi_module/itsi_module_service_template.py:149
|
|
#, python-format
|
|
msgid "Error writing into conf file %s."
|
|
msgstr ""
|
|
|
|
#: /Applications/Splunk/etc/apps/SA-ITOA/lib/itsi_module/itsi_module_service_template.py:130
|
|
#, python-format
|
|
msgid "Error writing stanza %s into itsi_kpi_template file."
|
|
msgstr ""
|
|
|
|
#: /Applications/Splunk/etc/apps/SA-ITOA/lib/ITOA/itoa_common.py:262
|
|
#, python-format
|
|
msgid "Error. Captain is not ready even after 5 minutes. node=`%s`."
|
|
msgstr ""
|
|
|
|
#: /Applications/Splunk/etc/apps/SA-ITOA/lib/itsi/csv_import/itoa_csv_spec_transformer.py:90
|
|
#, python-format
|
|
msgid ""
|
|
"Error. Expected import_info to be type: dict. Actual import_info type is:"
|
|
" %s"
|
|
msgstr ""
|
|
|
|
#: /Applications/Splunk/etc/apps/SA-ITOA/lib/itsi/csv_import/itoa_csv_spec_transformer.py:96
|
|
msgid ""
|
|
"Error. Invalid import_info. Make sure at least one of service_title_field"
|
|
" and entity_title_field key exists in import_info."
|
|
msgstr ""
|
|
|
|
#: /Applications/Splunk/etc/apps/SA-ITOA/lib/itsi/csv_import/itoa_csv_spec_transformer.py:101
|
|
#: /Applications/Splunk/etc/apps/SA-ITOA/lib/itsi/csv_import/itoa_csv_spec_transformer.py:106
|
|
msgid ""
|
|
"Error. Invalid import_info. Make sure entity_title_field key exists when "
|
|
"entity_relationship_spec key exists in import_info"
|
|
msgstr ""
|
|
|
|
#: /Applications/Splunk/etc/apps/SA-ITOA/lib/itsi/csv_import/itoa_csv_spec_transformer.py:93
|
|
msgid "Error. import_info is empty."
|
|
msgstr ""
|
|
|
|
#: /Applications/Splunk/etc/apps/SA-ITOA/default/itsi_notable_event_status.conf:31
|
|
msgid "Event closure is pending some action"
|
|
msgstr ""
|
|
|
|
#: /Applications/Splunk/etc/apps/SA-ITOA/default/itsi_notable_event_status.conf:19
|
|
msgid "Event has not been reviewed"
|
|
msgstr ""
|
|
|
|
#: /Applications/Splunk/etc/apps/SA-ITOA/default/itsi_kpi_template.conf:3
|
|
msgid "Example KPIs"
|
|
msgstr ""
|
|
|
|
#: /Applications/Splunk/etc/apps/SA-ITOA/bin/itsi_notable_event_actions_queue_consumer.py:40
|
|
msgid "Execution delay time"
|
|
msgstr ""
|
|
|
|
#: /Applications/Splunk/etc/apps/SA-ITOA/bin/itsi_async_csv_loader.py:171
|
|
#: /Applications/Splunk/etc/apps/SA-ITOA/bin/itsi_csv_import.py:184
|
|
msgid "Existing services to apply"
|
|
msgstr ""
|
|
|
|
#: /Applications/Splunk/etc/apps/SA-ITOA/lib/itsi/searches/itsi_filter.py:73
|
|
msgid "Expected a dict for the filter expression, got something else"
|
|
msgstr ""
|
|
|
|
#: /Applications/Splunk/etc/apps/SA-ITOA/lib/itsi/objects/changehandlers/base_service_template_delete_handler.py:57
|
|
#: /Applications/Splunk/etc/apps/SA-ITOA/lib/itsi/objects/changehandlers/base_service_template_update_handler.py:89
|
|
msgid ""
|
|
"Expected change_detail to be an instance of dictionary. But, received "
|
|
"change_detail=`{0}`, of type {1}."
|
|
msgstr ""
|
|
|
|
#: /Applications/Splunk/etc/apps/SA-ITOA/lib/itsi/objects/changehandlers/service_dependency_handler.py:23
|
|
msgid "Expected change_type to be \"service_dependency_changed\""
|
|
msgstr ""
|
|
|
|
#: /Applications/Splunk/etc/apps/SA-ITOA/lib/itsi/objects/changehandlers/kpi_ad_update_handler.py:46
|
|
#: /Applications/Splunk/etc/apps/SA-ITOA/lib/itsi/objects/changehandlers/kpi_cohesive_ad_update_handler.py:51
|
|
msgid "Expected change_type to be \"service_kpi_ad\""
|
|
msgstr ""
|
|
|
|
#: /Applications/Splunk/etc/apps/SA-ITOA/lib/itsi/objects/changehandlers/kpi_at_ad_update_handler.py:58
|
|
msgid "Expected change_type to be \"service_kpi_at\""
|
|
msgstr ""
|
|
|
|
#: /Applications/Splunk/etc/apps/SA-ITOA/lib/itsi/objects/changehandlers/kpi_backfill_enabled_handler.py:32
|
|
msgid "Expected change_type to be \"service_kpi_backfill_enabled\""
|
|
msgstr ""
|
|
|
|
#: /Applications/Splunk/etc/apps/SA-ITOA/lib/itsi/objects/changehandlers/kpi_delete_handler.py:55
|
|
msgid "Expected change_type to be \"service_kpi_deletion\""
|
|
msgstr ""
|
|
|
|
#: /Applications/Splunk/etc/apps/SA-ITOA/lib/itsi/objects/changehandlers/kpi_thresholds_template_delete_handler.py:45
|
|
msgid "Expected change_type to be \"service_kpi_thresholds_template_delete\""
|
|
msgstr ""
|
|
|
|
#: /Applications/Splunk/etc/apps/SA-ITOA/lib/itsi/objects/changehandlers/kpi_thresholds_template_update_handler.py:49
|
|
msgid "Expected change_type to be \"service_kpi_thresholds_template_update\""
|
|
msgstr ""
|
|
|
|
#: /Applications/Splunk/etc/apps/SA-ITOA/lib/itsi/objects/changehandlers/kpi_alert_period_update_handler.py:59
|
|
msgid "Expected change_type to be \"service_kpi_update_alert_period\""
|
|
msgstr ""
|
|
|
|
#: /Applications/Splunk/etc/apps/SA-ITOA/lib/itsi/objects/changehandlers/base_service_template_update_handler.py:80
|
|
msgid ""
|
|
"Expected change_type to be `base_service_template_update`. But, received "
|
|
"`{}`."
|
|
msgstr ""
|
|
|
|
#: /Applications/Splunk/etc/apps/SA-ITOA/lib/itsi/objects/changehandlers/base_service_template_delete_handler.py:48
|
|
msgid ""
|
|
"Expected change_type to be `delete_base_service_template`. But, received "
|
|
"`{}`."
|
|
msgstr ""
|
|
|
|
#: /Applications/Splunk/etc/apps/SA-ITOA/lib/itsi/objects/changehandlers/base_service_template_delete_handler.py:63
|
|
#: /Applications/Splunk/etc/apps/SA-ITOA/lib/itsi/objects/changehandlers/base_service_template_update_handler.py:95
|
|
msgid ""
|
|
"Expected changed_object_key to be an instance of list. But, received "
|
|
"changed_object_key=`{0}`, of type {1}."
|
|
msgstr ""
|
|
|
|
#: /Applications/Splunk/etc/apps/SA-ITOA/lib/itsi/objects/changehandlers/kpi_ad_update_handler.py:42
|
|
#: /Applications/Splunk/etc/apps/SA-ITOA/lib/itsi/objects/changehandlers/kpi_alert_period_update_handler.py:55
|
|
#: /Applications/Splunk/etc/apps/SA-ITOA/lib/itsi/objects/changehandlers/kpi_at_ad_update_handler.py:54
|
|
#: /Applications/Splunk/etc/apps/SA-ITOA/lib/itsi/objects/changehandlers/kpi_cohesive_ad_update_handler.py:47
|
|
#: /Applications/Splunk/etc/apps/SA-ITOA/lib/itsi/objects/changehandlers/kpi_delete_handler.py:52
|
|
msgid "Expected changed_object_type to be \"kpi\""
|
|
msgstr ""
|
|
|
|
#: /Applications/Splunk/etc/apps/SA-ITOA/lib/itsi/objects/changehandlers/kpi_thresholds_template_delete_handler.py:42
|
|
#: /Applications/Splunk/etc/apps/SA-ITOA/lib/itsi/objects/changehandlers/kpi_thresholds_template_update_handler.py:46
|
|
msgid "Expected changed_object_type to be \"kpi_threshold_template\""
|
|
msgstr ""
|
|
|
|
#: /Applications/Splunk/etc/apps/SA-ITOA/lib/itsi/objects/changehandlers/kpi_backfill_enabled_handler.py:29
|
|
#: /Applications/Splunk/etc/apps/SA-ITOA/lib/itsi/objects/changehandlers/service_dependency_handler.py:20
|
|
msgid "Expected changed_object_type to be \"service\""
|
|
msgstr ""
|
|
|
|
#: /Applications/Splunk/etc/apps/SA-ITOA/lib/itsi/objects/changehandlers/base_service_template_delete_handler.py:52
|
|
#: /Applications/Splunk/etc/apps/SA-ITOA/lib/itsi/objects/changehandlers/base_service_template_update_handler.py:84
|
|
msgid ""
|
|
"Expected changed_object_type to be `base_service_template`. But, received"
|
|
" `{}`."
|
|
msgstr ""
|
|
|
|
#: /Applications/Splunk/etc/apps/SA-ITOA/lib/itsi/searches/itsi_filter.py:100
|
|
msgid "Expected value definition in the json"
|
|
msgstr ""
|
|
|
|
#: /Applications/Splunk/etc/apps/SA-ITOA/lib/itsi/csv_import/itoa_bulk_import_specification.py:403
|
|
msgid "Expecting \"{}\" in {} to be of type \"{}\". Received \"{}\" instead."
|
|
msgstr ""
|
|
|
|
#: /Applications/Splunk/etc/apps/SA-ITOA/lib/ITOA/event_management/rules_engine/actions.py:54
|
|
#, python-format
|
|
msgid "Expecting `actions` to be a dict. Received type=%s."
|
|
msgstr ""
|
|
|
|
#: /Applications/Splunk/etc/apps/SA-ITOA/lib/itsi/event_management/sdk/grouping.py:713
|
|
#, python-format
|
|
msgid "Expecting `blob` to be a dict/list. Received: %s"
|
|
msgstr ""
|
|
|
|
#: /Applications/Splunk/etc/apps/SA-ITOA/lib/itsi/event_management/sdk/grouping.py:717
|
|
msgid "Expecting `blob` to be non-empty."
|
|
msgstr ""
|
|
|
|
#: /Applications/Splunk/etc/apps/SA-ITOA/lib/itsi/event_management/sdk/grouping.py:499
|
|
#, python-format
|
|
msgid "Expecting `comment_id` to be non-empty basestring. Received: %s"
|
|
msgstr ""
|
|
|
|
#: /Applications/Splunk/etc/apps/SA-ITOA/lib/itsi/event_management/sdk/grouping.py:467
|
|
#, python-format
|
|
msgid "Expecting `comment` to be non-empty basestring. Received: %s"
|
|
msgstr ""
|
|
|
|
#: /Applications/Splunk/etc/apps/SA-ITOA/lib/itsi/event_management/sdk/grouping.py:321
|
|
#: /Applications/Splunk/etc/apps/SA-ITOA/lib/itsi/event_management/sdk/grouping.py:372
|
|
#: /Applications/Splunk/etc/apps/SA-ITOA/lib/itsi/event_management/sdk/grouping.py:397
|
|
#: /Applications/Splunk/etc/apps/SA-ITOA/lib/itsi/event_management/sdk/grouping.py:444
|
|
#: /Applications/Splunk/etc/apps/SA-ITOA/lib/itsi/event_management/sdk/grouping.py:464
|
|
#: /Applications/Splunk/etc/apps/SA-ITOA/lib/itsi/event_management/sdk/grouping.py:516
|
|
#, python-format
|
|
msgid "Expecting `group_id` to be non-empty basestring. Received: %s"
|
|
msgstr ""
|
|
|
|
#: /Applications/Splunk/etc/apps/SA-ITOA/lib/itsi/event_management/sdk/grouping.py:726
|
|
msgid "Expecting `group_ids` in your input."
|
|
msgstr ""
|
|
|
|
#: /Applications/Splunk/etc/apps/SA-ITOA/lib/itsi/event_management/sdk/grouping.py:866
|
|
#, python-format
|
|
msgid ""
|
|
"Expecting `group_ids` to be of type basestring/list. Received: %s. Type: "
|
|
"%s"
|
|
msgstr ""
|
|
|
|
#: /Applications/Splunk/etc/apps/SA-ITOA/lib/itsi/event_management/sdk/grouping.py:777
|
|
#: /Applications/Splunk/etc/apps/SA-ITOA/lib/itsi/event_management/sdk/grouping.py:822
|
|
msgid ""
|
|
"Expecting `group_ids` to be of type basestring/list. Received: {}. Type: "
|
|
"{}"
|
|
msgstr ""
|
|
|
|
#: /Applications/Splunk/etc/apps/SA-ITOA/lib/itsi/event_management/sdk/grouping.py:773
|
|
#: /Applications/Splunk/etc/apps/SA-ITOA/lib/itsi/event_management/sdk/grouping.py:862
|
|
#, python-format
|
|
msgid "Expecting `group_ids` to contain some value. Received: %s"
|
|
msgstr ""
|
|
|
|
#: /Applications/Splunk/etc/apps/SA-ITOA/lib/itsi/event_management/sdk/grouping.py:818
|
|
msgid "Expecting `group_ids` to contain some value. Received: {}"
|
|
msgstr ""
|
|
|
|
#: /Applications/Splunk/etc/apps/SA-ITOA/lib/itsi/event_management/sdk/grouping.py:172
|
|
#: /Applications/Splunk/etc/apps/SA-ITOA/lib/itsi/event_management/sdk/grouping.py:213
|
|
#: /Applications/Splunk/etc/apps/SA-ITOA/lib/itsi/event_management/sdk/grouping.py:254
|
|
msgid "Expecting `group_ids`."
|
|
msgstr ""
|
|
|
|
#: /Applications/Splunk/etc/apps/SA-ITOA/lib/ITOA/itoa_common.py:328
|
|
#, python-format
|
|
msgid "Expecting `objects` to be list/dict type and not `%s`"
|
|
msgstr ""
|
|
|
|
#: /Applications/Splunk/etc/apps/SA-ITOA/lib/itsi/event_management/sdk/grouping.py:375
|
|
#: /Applications/Splunk/etc/apps/SA-ITOA/lib/itsi/event_management/sdk/grouping.py:415
|
|
#: /Applications/Splunk/etc/apps/SA-ITOA/lib/itsi/event_management/sdk/grouping.py:430
|
|
#, python-format
|
|
msgid "Expecting `tag_id` to be non-empty basestring. Received: %s"
|
|
msgstr ""
|
|
|
|
#: /Applications/Splunk/etc/apps/SA-ITOA/lib/itsi/event_management/sdk/grouping.py:324
|
|
#, python-format
|
|
msgid "Expecting `tag_value` to be non-empty basestring. Received: %s"
|
|
msgstr ""
|
|
|
|
#: /Applications/Splunk/etc/apps/SA-ITOA/lib/itsi/event_management/sdk/custom_group_action_base.py:46
|
|
#, python-format
|
|
msgid "Expecting a JSON serializeable string. Received=`%s`. Type=`%s`"
|
|
msgstr ""
|
|
|
|
#: /Applications/Splunk/etc/apps/SA-ITOA/lib/ITOA/event_management/rules_engine/actions.py:27
|
|
#: /Applications/Splunk/etc/apps/SA-ITOA/lib/ITOA/event_management/rules_engine/item.py:32
|
|
#: /Applications/Splunk/etc/apps/SA-ITOA/lib/ITOA/event_management/rules_engine/item.py:70
|
|
#: /Applications/Splunk/etc/apps/SA-ITOA/lib/ITOA/event_management/rules_engine/rule.py:28
|
|
#, python-format
|
|
msgid "Expecting a dictionary for %s. Received type=%s"
|
|
msgstr ""
|
|
|
|
#: /Applications/Splunk/etc/apps/SA-ITOA/lib/itsi/event_management/sdk/grouping.py:723
|
|
#, python-format
|
|
msgid "Expecting a dictionary. Received: `%s`. Type: `%s`"
|
|
msgstr ""
|
|
|
|
#: /Applications/Splunk/etc/apps/SA-ITOA/lib/ITOA/event_management/notable_event_aggregation_policy.py:146
|
|
#, python-format
|
|
msgid "Expecting a list of rules. Received=%s Type=%s."
|
|
msgstr ""
|
|
|
|
#: /Applications/Splunk/etc/apps/SA-ITOA/bin/itsi_user_access_init.py:111
|
|
msgid "Expecting a non-None dict for capability_matrix_maintenance_services"
|
|
msgstr ""
|
|
|
|
#: /Applications/Splunk/etc/apps/SA-ITOA/bin/itsi_user_access_init.py:105
|
|
msgid "Expecting a non-None dict for capability_matrix_notable_events"
|
|
msgstr ""
|
|
|
|
#: /Applications/Splunk/etc/apps/SA-ITOA/bin/itsi_user_access_init.py:97
|
|
msgid ""
|
|
"Expecting a non-None string for app_name and a non-None dict for "
|
|
"capability_matrix"
|
|
msgstr ""
|
|
|
|
#: /Applications/Splunk/etc/apps/SA-ITOA/lib/ITOA/event_management/notable_event_actions.py:257
|
|
#, python-format
|
|
msgid "Expecting a valid dict for data. Received=%s. Type=%s."
|
|
msgstr ""
|
|
|
|
#: /Applications/Splunk/etc/apps/SA-ITOA/lib/itsi/event_management/sdk/custom_group_action_base.py:100
|
|
#, python-format
|
|
msgid "Expecting a valid file path. Received: `%s`."
|
|
msgstr ""
|
|
|
|
#: /Applications/Splunk/etc/apps/SA-ITOA/lib/ITOA/itoa_common.py:1178
|
|
#: /Applications/Splunk/etc/apps/SA-ITOA/lib/ITOA/itoa_common.py:1221
|
|
#, python-format
|
|
msgid "Expecting a valid session_key, \"%s\" is invalid"
|
|
msgstr ""
|
|
|
|
#: /Applications/Splunk/etc/apps/SA-ITOA/lib/ITOA/itoa_common.py:1176
|
|
#: /Applications/Splunk/etc/apps/SA-ITOA/lib/ITOA/itoa_common.py:1219
|
|
msgid "Expecting a valid username, \"{0}\" is invalid"
|
|
msgstr ""
|
|
|
|
#: /Applications/Splunk/etc/apps/SA-ITOA/lib/ITOA/event_management/rules_engine/rule.py:38
|
|
#, python-format
|
|
msgid "Expecting actions to be list. Received=%s type=%s"
|
|
msgstr ""
|
|
|
|
#: /Applications/Splunk/etc/apps/SA-ITOA/lib/itsi/objects/changehandlers/itoa_change_handler.py:56
|
|
msgid "Expecting changed_object_key to be of type list"
|
|
msgstr ""
|
|
|
|
#: /Applications/Splunk/etc/apps/SA-ITOA/lib/ITOA/controller_utils.py:568
|
|
#, python-format
|
|
msgid "Expecting data to be a dict/list. Bad format %s."
|
|
msgstr ""
|
|
|
|
#: /Applications/Splunk/etc/apps/SA-ITOA/lib/itsi/event_management/sdk/eventing.py:236
|
|
#: /Applications/Splunk/etc/apps/SA-ITOA/lib/itsi/event_management/sdk/eventing.py:296
|
|
#: /Applications/Splunk/etc/apps/SA-ITOA/lib/itsi/event_management/sdk/eventing.py:356
|
|
msgid "Expecting either `events` or `event_ids`. Both are None."
|
|
msgstr ""
|
|
|
|
#: /Applications/Splunk/etc/apps/SA-ITOA/lib/itsi/event_management/sdk/eventing.py:173
|
|
msgid "Expecting event_ids to be a string or list"
|
|
msgstr ""
|
|
|
|
#: /Applications/Splunk/etc/apps/SA-ITOA/lib/itsi/event_management/sdk/grouping.py:601
|
|
#: /Applications/Splunk/etc/apps/SA-ITOA/lib/itsi/event_management/sdk/grouping.py:650
|
|
#, python-format
|
|
msgid "Expecting group_ids to be a list type. Received=%s."
|
|
msgstr ""
|
|
|
|
#: /Applications/Splunk/etc/apps/SA-ITOA/lib/itsi/event_management/sdk/grouping.py:115
|
|
msgid "Expecting group_ids to be a string or list"
|
|
msgstr ""
|
|
|
|
#: /Applications/Splunk/etc/apps/SA-ITOA/lib/itsi/event_management/sdk/grouping.py:603
|
|
#: /Applications/Splunk/etc/apps/SA-ITOA/lib/itsi/event_management/sdk/grouping.py:652
|
|
#, python-format
|
|
msgid "Expecting group_ids to have at least 1 id. Received=%s."
|
|
msgstr ""
|
|
|
|
#: /Applications/Splunk/etc/apps/SA-ITOA/lib/itsi/event_management/sdk/grouping.py:869
|
|
msgid "Expecting non-empty list of `group_ids`. and valid owner string"
|
|
msgstr ""
|
|
|
|
#: /Applications/Splunk/etc/apps/SA-ITOA/lib/itsi/event_management/sdk/grouping.py:781
|
|
msgid "Expecting non-empty list of `group_ids`. and valid severity string"
|
|
msgstr ""
|
|
|
|
#: /Applications/Splunk/etc/apps/SA-ITOA/lib/itsi/event_management/sdk/grouping.py:826
|
|
msgid "Expecting non-empty list of `group_ids`. and valid status string"
|
|
msgstr ""
|
|
|
|
#: /Applications/Splunk/etc/apps/SA-ITOA/lib/itsi/objects/changehandlers/itoa_change_handler.py:60
|
|
msgid "Expecting object_type to equal \"refresh_job\""
|
|
msgstr ""
|
|
|
|
#: /Applications/Splunk/etc/apps/SA-ITOA/lib/ITOA/event_management/notable_event_ticketing.py:397
|
|
#, python-format
|
|
msgid "Expecting str for uri. Received: %s."
|
|
msgstr ""
|
|
|
|
#: /Applications/Splunk/etc/apps/SA-ITOA/lib/ITOA/event_management/notable_event_ticketing.py:277
|
|
#, python-format
|
|
msgid "Expecting string type for params. Received=`%s`."
|
|
msgstr ""
|
|
|
|
#: /Applications/Splunk/etc/apps/SA-ITOA/lib/ITOA/event_management/notable_event_ticketing.py:583
|
|
msgid "Expecting ticket_id to be non-zero length str. Received={}."
|
|
msgstr ""
|
|
|
|
#: /Applications/Splunk/etc/apps/SA-ITOA/lib/ITOA/event_management/notable_event_ticketing.py:580
|
|
msgid "Expecting ticket_id to be str type. Received={}."
|
|
msgstr ""
|
|
|
|
#: /Applications/Splunk/etc/apps/SA-ITOA/lib/ITOA/event_management/notable_event_ticketing.py:578
|
|
msgid "Expecting ticket_system to be non-zero length str."
|
|
msgstr ""
|
|
|
|
#: /Applications/Splunk/etc/apps/SA-ITOA/lib/ITOA/event_management/notable_event_ticketing.py:576
|
|
msgid "Expecting ticket_system to be str type."
|
|
msgstr ""
|
|
|
|
#: /Applications/Splunk/etc/apps/SA-ITOA/lib/itsi/event_management/itsi_notable_event_queue_consumer.py:85
|
|
msgid "Expecting valid logger."
|
|
msgstr ""
|
|
|
|
#: /Applications/Splunk/etc/apps/SA-ITOA/lib/itsi/csv_import/itoa_bulk_import_specification.py:252
|
|
msgid "Expecting valid update type. Received \"{}\"."
|
|
msgstr ""
|
|
|
|
#: /Applications/Splunk/etc/apps/SA-ITOA/lib/itsi_module/itsi_module_kpi_base_search.py:189
|
|
#: /Applications/Splunk/etc/apps/SA-ITOA/lib/itsi_module/itsi_module_kpi_group.py:238
|
|
#: /Applications/Splunk/etc/apps/SA-ITOA/lib/itsi_module/itsi_module_service_template.py:311
|
|
#, python-format
|
|
msgid "Failed deleting object id %s: %s."
|
|
msgstr ""
|
|
|
|
#: /Applications/Splunk/etc/apps/SA-ITOA/lib/itsi_module/itsi_module_kpi_base_search.py:85
|
|
#, python-format
|
|
msgid "Failed templatizing %s."
|
|
msgstr ""
|
|
|
|
#: /Applications/Splunk/etc/apps/SA-ITOA/lib/ITOA/event_management/notable_event.py:250
|
|
msgid "Failed to add key {0} to data: {1}."
|
|
msgstr ""
|
|
|
|
#: /Applications/Splunk/etc/apps/SA-ITOA/lib/ITOA/event_management/hec_utils.py:145
|
|
msgid ""
|
|
"Failed to collect HTTP event listener global settings, response={0}, "
|
|
"content={1}."
|
|
msgstr ""
|
|
|
|
#: /Applications/Splunk/etc/apps/SA-ITOA/lib/itsi/upgrade/kvstore_backup_restore.py:584
|
|
#: /Applications/Splunk/etc/apps/SA-ITOA/lib/migration/object_interface/filesave_migration_interface.py:34
|
|
#: /Applications/Splunk/etc/apps/SA-ITOA/lib/migration/object_interface/iconcollection_migration_interface.py:34
|
|
#: /Applications/Splunk/etc/apps/SA-ITOA/lib/migration/object_interface/useraccess_migration_interface.py:38
|
|
msgid "Failed to convert object contents to JSON format."
|
|
msgstr ""
|
|
|
|
#: /Applications/Splunk/etc/apps/SA-ITOA/lib/ITOA/storage/itoa_generic_persistables.py:277
|
|
msgid "Failed to create model."
|
|
msgstr ""
|
|
|
|
#: /Applications/Splunk/etc/apps/SA-ITOA/lib/ITOA/storage/itoa_generic_persistables.py:268
|
|
msgid "Failed to create model: data validation failed."
|
|
msgstr ""
|
|
|
|
#: /Applications/Splunk/etc/apps/SA-ITOA/lib/itsi/searches/itsi_shared_base_search.py:266
|
|
#: /Applications/Splunk/etc/apps/SA-ITOA/lib/itsi/upgrade/migration_handlers_3_1_1.py:234
|
|
#, python-format
|
|
msgid "Failed to create saved search %s."
|
|
msgstr ""
|
|
|
|
#: /Applications/Splunk/etc/apps/SA-ITOA/lib/itsi/objects/itsi_service.py:1086
|
|
msgid "Failed to create saved search={0} for KPI={1}."
|
|
msgstr ""
|
|
|
|
#: /Applications/Splunk/etc/apps/SA-ITOA/lib/ITOA/event_management/hec_utils.py:248
|
|
#, python-format
|
|
msgid "Failed to create token=`%s`, response=%s, content=%s."
|
|
msgstr ""
|
|
|
|
#: /Applications/Splunk/etc/apps/SA-ITOA/lib/ITOA/storage/itoa_generic_persistables.py:365
|
|
msgid "Failed to delete model."
|
|
msgstr ""
|
|
|
|
#: /Applications/Splunk/etc/apps/SA-ITOA/lib/ITOA/event_management/notable_event_utils.py:514
|
|
msgid "Failed to delete one or more event(s)={0}."
|
|
msgstr ""
|
|
|
|
#: /Applications/Splunk/etc/apps/SA-ITOA/lib/itsi/upgrade/migration_handlers_2_6_0.py:534
|
|
msgid ""
|
|
"Failed to delete the HEC token {0} during upgrade. To proceed, you must "
|
|
"delete this token manually."
|
|
msgstr ""
|
|
|
|
#: /Applications/Splunk/etc/apps/SA-ITOA/lib/ITOA/event_management/notable_event_ticketing.py:735
|
|
msgid ""
|
|
"Failed to delete ticket. Ticket does not exist or has been deleted "
|
|
"already."
|
|
msgstr ""
|
|
|
|
#: /Applications/Splunk/etc/apps/SA-ITOA/lib/ITOA/event_management/notable_event_ticketing.py:727
|
|
msgid ""
|
|
"Failed to delete ticket. Ticketing system does not exist or has been "
|
|
"deleted already."
|
|
msgstr ""
|
|
|
|
#: /Applications/Splunk/etc/apps/SA-ITOA/lib/ITOA/event_management/notable_event_ticketing.py:749
|
|
msgid "Failed to delete ticket. Unable to find ticket with ID {}."
|
|
msgstr ""
|
|
|
|
#: /Applications/Splunk/etc/apps/SA-ITOA/bin/itsi_sample_event_action_ping.py:276
|
|
msgid "Failed to execute one or more ping actions."
|
|
msgstr ""
|
|
|
|
#: /Applications/Splunk/etc/apps/SA-ITOA/lib/itsi_module/itsi_module_kpi_base_search.py:319
|
|
#, python-format
|
|
msgid "Failed to fetch %s."
|
|
msgstr ""
|
|
|
|
#: /Applications/Splunk/etc/apps/SA-ITOA/lib/ITOA/storage/itoa_generic_persistables.py:416
|
|
#, python-format
|
|
msgid "Failed to fetch collection: %s."
|
|
msgstr ""
|
|
|
|
#: /Applications/Splunk/etc/apps/SA-ITOA/lib/itsi/event_management/itsi_notable_event_queue_consumer.py:485
|
|
#, python-format
|
|
msgid "Failed to fetch consumer_registration object %s."
|
|
msgstr ""
|
|
|
|
#: /Applications/Splunk/etc/apps/SA-ITOA/lib/ITOA/event_management/notable_event_actions.py:111
|
|
#, python-format
|
|
msgid "Failed to fetch data using url=`%s`."
|
|
msgstr ""
|
|
|
|
#: /Applications/Splunk/etc/apps/SA-ITOA/lib/ITOA/storage/itoa_generic_persistables.py:344
|
|
#, python-format
|
|
msgid "Failed to fetch model: %s."
|
|
msgstr ""
|
|
|
|
#: /Applications/Splunk/etc/apps/SA-ITOA/bin/backfill_services.py:78
|
|
#: /Applications/Splunk/etc/apps/SA-ITOA/bin/backfill_services.py:137
|
|
msgid "Failed to fetch resource with id {}."
|
|
msgstr ""
|
|
|
|
#: /Applications/Splunk/etc/apps/SA-ITOA/lib/itsi/event_management/itsi_notable_event_queue_consumer.py:547
|
|
msgid ""
|
|
"Failed to get associated events of group (notable_event_change action), "
|
|
"ret={}."
|
|
msgstr ""
|
|
|
|
#: /Applications/Splunk/etc/apps/SA-ITOA/lib/itsi_module/itsi_module_modules.py:273
|
|
msgid "Failed to get contents of SPL file."
|
|
msgstr ""
|
|
|
|
#: /Applications/Splunk/etc/apps/SA-ITOA/lib/ITOA/event_management/notable_event_retention_policy.py:133
|
|
#, python-format
|
|
msgid "Failed to get data from uri=\"%s\""
|
|
msgstr ""
|
|
|
|
#: /Applications/Splunk/etc/apps/SA-ITOA/lib/itsi_module/itsi_module_kpi_base_search.py:302
|
|
msgid "Failed to get existing base search ids."
|
|
msgstr ""
|
|
|
|
#: /Applications/Splunk/etc/apps/SA-ITOA/lib/itsi/health_services/health_services_provider.py:159
|
|
msgid ""
|
|
"Failed to get minimum and maximum value of given status={0}. It may be an"
|
|
" invalid status."
|
|
msgstr ""
|
|
|
|
#: /Applications/Splunk/etc/apps/SA-ITOA/lib/migration/object_interface/notable_migration_interface.py:100
|
|
#: /Applications/Splunk/etc/apps/SA-ITOA/lib/migration/object_interface/notable_migration_interface.py:129
|
|
#, python-format
|
|
msgid "Failed to get notable event collection from object type: %s."
|
|
msgstr ""
|
|
|
|
#: /Applications/Splunk/etc/apps/SA-ITOA/lib/ITOA/event_management/base_event_management.py:410
|
|
#, python-format
|
|
msgid "Failed to get object ID=%s from KV store."
|
|
msgstr ""
|
|
|
|
#: /Applications/Splunk/etc/apps/SA-ITOA/lib/itsi/upgrade/kvstore_backup_restore.py:580
|
|
#: /Applications/Splunk/etc/apps/SA-ITOA/lib/migration/object_interface/useraccess_migration_interface.py:34
|
|
msgid "Failed to get object content."
|
|
msgstr ""
|
|
|
|
#: /Applications/Splunk/etc/apps/SA-ITOA/lib/ITOA/event_management/notable_event_utils.py:807
|
|
#, python-format
|
|
msgid "Failed to get severity from itsi_notable_event_severity, response=\"%s\"."
|
|
msgstr ""
|
|
|
|
#: /Applications/Splunk/etc/apps/SA-ITOA/lib/ITOA/itoa_common.py:839
|
|
msgid "Failed to get size of object={0}."
|
|
msgstr ""
|
|
|
|
#: /Applications/Splunk/etc/apps/SA-ITOA/lib/ITOA/event_management/notable_event.py:745
|
|
msgid "Failed to get state for event: {0} from KV store."
|
|
msgstr ""
|
|
|
|
#: /Applications/Splunk/etc/apps/SA-ITOA/lib/ITOA/event_management/notable_event.py:704
|
|
msgid "Failed to get state for events: {0} from KV store."
|
|
msgstr ""
|
|
|
|
#: /Applications/Splunk/etc/apps/SA-ITOA/lib/ITOA/event_management/hec_utils.py:351
|
|
msgid "Failed to get token={0} settings. response={1}, content={2}."
|
|
msgstr ""
|
|
|
|
#: /Applications/Splunk/etc/apps/SA-ITOA/lib/ITOA/event_management/notable_event_utils.py:867
|
|
#, python-format
|
|
msgid "Failed to get users from uri=%s."
|
|
msgstr ""
|
|
|
|
#: /Applications/Splunk/etc/apps/SA-ITOA/lib/itsi/upgrade/itsi_migration.py:3682
|
|
msgid ""
|
|
"Failed to import Team settings. ITSI will not work properly until the "
|
|
"Team settings are imported. See [{} this documentation page] for "
|
|
"instructions on how to resolve this issue."
|
|
msgstr ""
|
|
|
|
#: /Applications/Splunk/etc/apps/SA-ITOA/lib/itsi/upgrade/migration_handlers_2_5_0.py:388
|
|
msgid ""
|
|
"Failed to migrate backup restore jobs to 2.5.0. Unable to save. Check the"
|
|
" logs for details."
|
|
msgstr ""
|
|
|
|
#: /Applications/Splunk/etc/apps/SA-ITOA/lib/itsi/upgrade/itsi_migration.py:1201
|
|
msgid ""
|
|
"Failed to migrate deep dives to 2.3.0. Unable to save. Check the logs for"
|
|
" details."
|
|
msgstr ""
|
|
|
|
#: /Applications/Splunk/etc/apps/SA-ITOA/lib/itsi/upgrade/migration_handlers_2_5_0.py:327
|
|
msgid ""
|
|
"Failed to migrate maintenance calendars to 2.5.0. Unable to save. Check "
|
|
"the logs for details."
|
|
msgstr ""
|
|
|
|
#: /Applications/Splunk/etc/apps/SA-ITOA/lib/itsi/upgrade/migration_handlers_4_4_0.py:159
|
|
msgid "Failed to migrate notable event comments."
|
|
msgstr ""
|
|
|
|
#: /Applications/Splunk/etc/apps/SA-ITOA/lib/itsi/upgrade/migration_handlers_2_5_0.py:260
|
|
msgid ""
|
|
"Failed to migrate service schema to 2.5.0. Unable to save. Check the logs"
|
|
" for details."
|
|
msgstr ""
|
|
|
|
#: /Applications/Splunk/etc/apps/SA-ITOA/lib/itsi/upgrade/migration_handlers_2_6_0.py:395
|
|
#: /Applications/Splunk/etc/apps/SA-ITOA/lib/itsi/upgrade/migration_handlers_2_6_0.py:413
|
|
msgid ""
|
|
"Failed to migrate service schema to 2.6.0. Unable to save. Check the logs"
|
|
" for details."
|
|
msgstr ""
|
|
|
|
#: /Applications/Splunk/etc/apps/SA-ITOA/lib/itsi/csv_import/itoa_bulk_import_rest_interface_provider.py:400
|
|
msgid "Failed to preview CSV data. Check the logs for details. {}"
|
|
msgstr ""
|
|
|
|
#: /Applications/Splunk/etc/apps/SA-ITOA/lib/itsi/csv_import/itoa_bulk_import_modinput_interface_provider.py:342
|
|
#, python-format
|
|
msgid "Failed to read meta file: %s"
|
|
msgstr ""
|
|
|
|
#: /Applications/Splunk/etc/apps/SA-ITOA/lib/ITOA/event_management/notable_event_ticketing.py:422
|
|
#, python-format
|
|
msgid "Failed to refresh notable event=%s."
|
|
msgstr ""
|
|
|
|
#: /Applications/Splunk/etc/apps/SA-ITOA/lib/itsi/event_management/itsi_notable_event_queue_consumer.py:648
|
|
msgid "Failed to run action on instance_id={0}, exception={1}."
|
|
msgstr ""
|
|
|
|
#: /Applications/Splunk/etc/apps/SA-ITOA/lib/ITOA/storage/itoa_generic_persistables.py:313
|
|
msgid "Failed to save model."
|
|
msgstr ""
|
|
|
|
#: /Applications/Splunk/etc/apps/SA-ITOA/lib/itsi/event_management/itsi_notable_event_queue_consumer.py:495
|
|
msgid "Failed to save modular input ID to KV Store."
|
|
msgstr ""
|
|
|
|
#: /Applications/Splunk/etc/apps/SA-ITOA/lib/ITOA/event_management/correlation_search.py:288
|
|
msgid "Failed to save search {0}."
|
|
msgstr ""
|
|
|
|
#: /Applications/Splunk/etc/apps/SA-ITOA/lib/itsi/objects/itsi_service.py:1077
|
|
msgid ""
|
|
"Failed to update ACL settings for savedsearch: \"{}\"; KPI: \"{}\". Do "
|
|
"this manually."
|
|
msgstr ""
|
|
|
|
#: /Applications/Splunk/etc/apps/SA-ITOA/lib/itsi/upgrade/migration_handlers_3_0_0.py:84
|
|
msgid "Failed to update Aggregation Policies to include GROUP execute_on criteria"
|
|
msgstr ""
|
|
|
|
#: /Applications/Splunk/etc/apps/SA-ITOA/lib/itsi/upgrade/migration_handlers_4_0_0.py:275
|
|
msgid ""
|
|
"Failed to update Aggregation Policies to migrate to GROUP execute_on "
|
|
"criteria"
|
|
msgstr ""
|
|
|
|
#: /Applications/Splunk/etc/apps/SA-ITOA/lib/itsi/upgrade/migration_handlers_4_2_0.py:340
|
|
msgid "Failed to update Correlation Searches to use new entity filtering macros."
|
|
msgstr ""
|
|
|
|
#: /Applications/Splunk/etc/apps/SA-ITOA/lib/itsi/upgrade/migration_handlers_3_1_0.py:90
|
|
msgid ""
|
|
"Failed to update Glass Tables set any default drilldowns that were OFF to"
|
|
" ON - Default"
|
|
msgstr ""
|
|
|
|
#: /Applications/Splunk/etc/apps/SA-ITOA/lib/ITOA/event_management/hec_utils.py:122
|
|
#, python-format
|
|
msgid "Failed to update HTTP event listener global settings, response=`%s`."
|
|
msgstr ""
|
|
|
|
#: /Applications/Splunk/etc/apps/SA-ITOA/lib/ITOA/event_management/hec_utils.py:390
|
|
msgid "Failed to update acl settings of token={0}. response={1}, content={2}."
|
|
msgstr ""
|
|
|
|
#: /Applications/Splunk/etc/apps/SA-ITOA/lib/itsi/upgrade/migration_handlers_4_4_0.py:88
|
|
msgid "Failed to update beta Glass Tables include time range picker."
|
|
msgstr ""
|
|
|
|
#: /Applications/Splunk/etc/apps/SA-ITOA/lib/itsi/event_management/itsi_correlation_search.py:401
|
|
#: /Applications/Splunk/etc/apps/SA-ITOA/lib/itsi/event_management/itsi_correlation_search.py:428
|
|
msgid "Failed to update correlation search={0}, with data=\"{1}\"."
|
|
msgstr ""
|
|
|
|
#: /Applications/Splunk/etc/apps/SA-ITOA/lib/itsi/upgrade/migration_handlers_4_3_1.py:41
|
|
msgid "Failed to update correlation searches."
|
|
msgstr ""
|
|
|
|
#: /Applications/Splunk/etc/apps/SA-ITOA/lib/itsi/upgrade/migration_handlers_4_4_0.py:215
|
|
msgid "Failed to update episodes."
|
|
msgstr ""
|
|
|
|
#: /Applications/Splunk/etc/apps/SA-ITOA/lib/itsi/upgrade/migration_handlers_3_0_0.py:271
|
|
msgid "Failed to update external tickets to have mod_time added"
|
|
msgstr ""
|
|
|
|
#: /Applications/Splunk/etc/apps/SA-ITOA/lib/ITOA/storage/itoa_generic_persistables.py:282
|
|
msgid "Failed to update model."
|
|
msgstr ""
|
|
|
|
#: /Applications/Splunk/etc/apps/SA-ITOA/lib/itsi/event_management/event_management_rest_provider.py:172
|
|
#: /Applications/Splunk/etc/apps/SA-ITOA/lib/itsi/itoa_rest_interface_provider/itoa_rest_interface_provider.py:268
|
|
#: /Applications/Splunk/etc/apps/SA-ITOA/lib/itsi/itoa_rest_interface_provider/itoa_rest_interface_provider.py:382
|
|
#, python-format
|
|
msgid "Failed to update permissions. %s. Check the logs for details."
|
|
msgstr ""
|
|
|
|
#: /Applications/Splunk/etc/apps/SA-ITOA/lib/itsi/event_management/event_management_rest_provider.py:268
|
|
#, python-format
|
|
msgid "Failed to update perms. %s. Check the logs for details."
|
|
msgstr ""
|
|
|
|
#: /Applications/Splunk/etc/apps/SA-ITOA/lib/ITOA/event_management/hec_utils.py:329
|
|
msgid "Failed to update token={0} settings. response={1}, content={2}."
|
|
msgstr ""
|
|
|
|
#: /Applications/Splunk/etc/apps/SA-ITOA/lib/itsi/upgrade/itsi_migration.py:2834
|
|
msgid "Failed to upgrade IT Service Intelligence."
|
|
msgstr ""
|
|
|
|
#: /Applications/Splunk/etc/apps/SA-ITOA/lib/ITOA/event_management/base_event_generation.py:178
|
|
msgid "Failed to validate arguments. Please make sure arguments are correct"
|
|
msgstr ""
|
|
|
|
#: /Applications/Splunk/etc/apps/SA-ITOA/lib/itsi_module/itsi_module_kpi_base_search.py:168
|
|
#: /Applications/Splunk/etc/apps/SA-ITOA/lib/itsi_module/itsi_module_kpi_group.py:217
|
|
#: /Applications/Splunk/etc/apps/SA-ITOA/lib/itsi_module/itsi_module_service_template.py:270
|
|
#, python-format
|
|
msgid "Failed updating object id %s: %s."
|
|
msgstr ""
|
|
|
|
#: /Applications/Splunk/etc/apps/SA-ITOA/lib/ITOA/event_management/notable_event_kpi_alert.py:58
|
|
#: /Applications/Splunk/etc/apps/SA-ITOA/lib/ITOA/event_management/notable_event_mad.py:63
|
|
msgid "Failure parsing string data into json"
|
|
msgstr ""
|
|
|
|
#: /Applications/Splunk/etc/apps/SA-ITOA/bin/configure_itsi.py:72
|
|
#: /Applications/Splunk/etc/apps/SA-ITOA/lib/itsi/upgrade/itsi_migration.py:2920
|
|
msgid ""
|
|
"Failures occurred while attempting to import some IT Service Intelligence"
|
|
" settings from configuration files for apps and modules. Check the logs "
|
|
"to get information about which settings failed to be imported."
|
|
msgstr ""
|
|
|
|
#: /Applications/Splunk/etc/apps/SA-ITOA/lib/itsi/backup_restore/backup_restore_rest_provider.py:379
|
|
#, python-format
|
|
msgid "File `%s` is a path, not a file name. Paths are not supported."
|
|
msgstr ""
|
|
|
|
#: /Applications/Splunk/etc/apps/SA-ITOA/lib/itsi/backup_restore/backup_restore_rest_provider.py:398
|
|
msgid "File already exists."
|
|
msgstr ""
|
|
|
|
#: /Applications/Splunk/etc/apps/SA-ITOA/lib/itsi/backup_restore/backup_restore_rest_provider.py:387
|
|
msgid "File name provided contains characters not supported."
|
|
msgstr ""
|
|
|
|
#: /Applications/Splunk/etc/apps/SA-ITOA/lib/itsi/backup_restore/itsi_backup_restore_utils.py:680
|
|
msgid "File not found."
|
|
msgstr ""
|
|
|
|
#: /Applications/Splunk/etc/apps/SA-ITOA/lib/itsi/upgrade/kvstore_backup_restore.py:1110
|
|
msgid ""
|
|
"File not found. Ensure ZIP file contains JSON files contained within a "
|
|
"\"backup\" folder."
|
|
msgstr ""
|
|
|
|
#: /Applications/Splunk/etc/apps/SA-ITOA/lib/itsi/csv_import/itsi_csv_import_utils.py:286
|
|
msgid "File {} does not exist."
|
|
msgstr ""
|
|
|
|
#: /Applications/Splunk/etc/apps/SA-ITOA/lib/itsi/event_management/sdk/custom_group_action_base.py:103
|
|
#, python-format
|
|
msgid "File=`%s` does not exist."
|
|
msgstr ""
|
|
|
|
#: /Applications/Splunk/etc/apps/SA-ITOA/lib/ITOA/event_management/notable_event_actions.py:822
|
|
msgid "Filename is missing in the request."
|
|
msgstr ""
|
|
|
|
#: /Applications/Splunk/etc/apps/SA-ITOA/lib/itsi/searches/itsi_shared_base_search.py:797
|
|
#: /Applications/Splunk/etc/apps/SA-ITOA/lib/itsi/searches/itsi_shared_base_search.py:864
|
|
msgid "For an entity search, valid entity breakdown id field is required."
|
|
msgstr ""
|
|
|
|
#: /Applications/Splunk/etc/apps/SA-ITOA/lib/itsi/searches/itsi_shared_base_search.py:799
|
|
#: /Applications/Splunk/etc/apps/SA-ITOA/lib/itsi/searches/itsi_shared_base_search.py:866
|
|
msgid "For an entity search, valid entity id field is required."
|
|
msgstr ""
|
|
|
|
#: /Applications/Splunk/etc/apps/SA-ITOA/lib/itsi/upgrade/itsi_migration.py:947
|
|
msgid ""
|
|
"Found one or more KPIs with stale datamodel specification. These KPIs "
|
|
"were auto converted to adhoc search type to prevent service failures."
|
|
msgstr ""
|
|
|
|
#: /Applications/Splunk/etc/apps/SA-ITOA/lib/ITOA/event_management/notable_event_retention_policy.py:60
|
|
#: /Applications/Splunk/etc/apps/SA-ITOA/lib/ITOA/event_management/notable_event_retention_policy.py:76
|
|
msgid "Function has not been implemented by inherit class"
|
|
msgstr ""
|
|
|
|
#: /Applications/Splunk/etc/apps/SA-ITOA/lib/ITOA/event_management/base_event_generation.py:198
|
|
#: /Applications/Splunk/etc/apps/SA-ITOA/lib/ITOA/event_management/base_event_generation.py:207
|
|
msgid "Function is not implemented"
|
|
msgstr ""
|
|
|
|
#: /Applications/Splunk/etc/apps/SA-ITOA/lib/SA_ITOA_app_common/solnlib/packages/schematics/types/base.py:1046
|
|
msgid "GeoPointType can only accept tuples, lists, or dicts"
|
|
msgstr ""
|
|
|
|
#: /Applications/Splunk/etc/apps/SA-ITOA/default/savedsearches.conf:82
|
|
msgid ""
|
|
"Get a list of all known IP addresses from the CIM Inventory and Network "
|
|
"Traffic data models"
|
|
msgstr ""
|
|
|
|
#: /Applications/Splunk/etc/apps/SA-ITOA/default/savedsearches.conf:86
|
|
msgid ""
|
|
"Get a list of all known MAC addresses and their associated IP addresses "
|
|
"in a multivalue field"
|
|
msgstr ""
|
|
|
|
#: /Applications/Splunk/etc/apps/SA-ITOA/default/savedsearches.conf:21
|
|
msgid ""
|
|
"Get a list of splunk forwarders, which can later be used to populate the "
|
|
"IT Service Intelligence splunk service"
|
|
msgstr ""
|
|
|
|
#: /Applications/Splunk/etc/apps/SA-ITOA/default/savedsearches.conf:3
|
|
msgid ""
|
|
"Get a list of splunk indexers, which can later be used to populate the IT"
|
|
" Service Intelligence splunk service"
|
|
msgstr ""
|
|
|
|
#: /Applications/Splunk/etc/apps/SA-ITOA/default/savedsearches.conf:9
|
|
msgid ""
|
|
"Get a list of splunk search heads, which can later be used to populate "
|
|
"the IT Service Intelligence splunk service"
|
|
msgstr ""
|
|
|
|
#: /Applications/Splunk/etc/apps/SA-ITOA/default/savedsearches.conf:15
|
|
msgid ""
|
|
"Get a list of splunk search peers, which can later be used to populate "
|
|
"the IT Service Intelligence splunk service"
|
|
msgstr ""
|
|
|
|
#: /Applications/Splunk/etc/apps/SA-ITOA/default/savedsearches.conf:60
|
|
#: /Applications/Splunk/etc/apps/SA-ITOA/default/savedsearches.conf:90
|
|
msgid ""
|
|
"Get the VMWware Datacenters and format them in a way that is appropriate "
|
|
"for IT Service Intelligence"
|
|
msgstr ""
|
|
|
|
#: /Applications/Splunk/etc/apps/SA-ITOA/default/savedsearches.conf:65
|
|
#: /Applications/Splunk/etc/apps/SA-ITOA/default/savedsearches.conf:94
|
|
msgid ""
|
|
"Get the VMWware ESX\\ESXi host systems and format them in a way that is "
|
|
"appropriate for IT Service Intelligence"
|
|
msgstr ""
|
|
|
|
#: /Applications/Splunk/etc/apps/SA-ITOA/default/savedsearches.conf:70
|
|
#: /Applications/Splunk/etc/apps/SA-ITOA/default/savedsearches.conf:98
|
|
msgid ""
|
|
"Get the VMWware Virtual Machines and format them in a way that is "
|
|
"appropriate for IT Service Intelligence"
|
|
msgstr ""
|
|
|
|
#: /Applications/Splunk/etc/apps/SA-ITOA/default/searchbnf.conf:33
|
|
msgid ""
|
|
"Get the value for the search_alert field for the provided serviceId and "
|
|
"kpiId"
|
|
msgstr ""
|
|
|
|
#: /Applications/Splunk/etc/apps/SA-ITOA/lib/ITOA/splunk_search_chunk_protocol.py:124
|
|
msgid "Getinfo exchanges does not contain meta data"
|
|
msgstr ""
|
|
|
|
#: /Applications/Splunk/etc/apps/SA-ITOA/default/searchbnf.conf:32
|
|
msgid "Gets the value for a kpi search field."
|
|
msgstr ""
|
|
|
|
#: /Applications/Splunk/etc/apps/SA-ITOA/default/searchbnf.conf:31
|
|
msgid ""
|
|
"Gets the value for a kpi search field. Must specify service id, kpi id, "
|
|
"and search field."
|
|
msgstr ""
|
|
|
|
#: /Applications/Splunk/etc/apps/SA-ITOA/default/alert_actions.conf:35
|
|
msgid ""
|
|
"Given a ITSI Notable Event, link a ticket of your choice of Ticketing "
|
|
"System."
|
|
msgstr ""
|
|
|
|
#: /Applications/Splunk/etc/apps/SA-ITOA/default/alert_actions.conf:23
|
|
msgid "Given one or more ITSI Notable Event, ping the `host` in it."
|
|
msgstr ""
|
|
|
|
#: /Applications/Splunk/etc/apps/SA-ITOA/default/itsi_team.conf:2
|
|
msgid "Global"
|
|
msgstr ""
|
|
|
|
#: /Applications/Splunk/etc/apps/SA-ITOA/lib/itsi/objects/itsi_security_group.py:348
|
|
msgid "Global group does not seem to exist. Cannot create private groups"
|
|
msgstr ""
|
|
|
|
#: /Applications/Splunk/etc/apps/SA-ITOA/lib/itsi/objects/itsi_security_group.py:63
|
|
msgid "Global team cannot be deleted."
|
|
msgstr ""
|
|
|
|
#: /Applications/Splunk/etc/apps/SA-ITOA/lib/itsi/itsi_utils.py:792
|
|
#, python-format
|
|
msgid "Got bad status code %s - Aborting."
|
|
msgstr ""
|
|
|
|
#: /Applications/Splunk/etc/apps/SA-ITOA/lib/itsi/backfill/itsi_backfill_requests.py:131
|
|
#, python-format
|
|
msgid "Got the following for data: %s"
|
|
msgstr ""
|
|
|
|
#: /Applications/Splunk/etc/apps/SA-ITOA/lib/ITOA/event_management/notable_event_group.py:289
|
|
#: /Applications/Splunk/etc/apps/SA-ITOA/lib/ITOA/event_management/notable_event_group.py:329
|
|
#: /Applications/Splunk/etc/apps/SA-ITOA/lib/ITOA/event_management/notable_event_group.py:381
|
|
msgid "Group is not of type dict"
|
|
msgstr ""
|
|
|
|
#: /Applications/Splunk/etc/apps/SA-ITOA/lib/SA_ITOA_app_common/solnlib/packages/schematics/types/base.py:556
|
|
msgid "Hash value is not hexadecimal."
|
|
msgstr ""
|
|
|
|
#: /Applications/Splunk/etc/apps/SA-ITOA/lib/SA_ITOA_app_common/solnlib/packages/schematics/types/base.py:555
|
|
msgid "Hash value is wrong length."
|
|
msgstr ""
|
|
|
|
#: /Applications/Splunk/etc/apps/SA-ITOA/bin/itsi_async_csv_loader.py:32
|
|
msgid ""
|
|
"Helps to load your entities, services, and their relationships into the "
|
|
"KV store."
|
|
msgstr ""
|
|
|
|
#: /Applications/Splunk/etc/apps/SA-ITOA/bin/itsi_csv_import.py:43
|
|
msgid ""
|
|
"Helps to populate your entities, services, and their relationships into "
|
|
"the KV store."
|
|
msgstr ""
|
|
|
|
#: /Applications/Splunk/etc/apps/SA-ITOA/default/itsi_notable_event_severity.conf:33
|
|
msgid "High"
|
|
msgstr ""
|
|
|
|
#: /Applications/Splunk/etc/apps/SA-ITOA/lib/itsi_module/itsi_module_kpi_group.py:31
|
|
msgid "ID for KPI {} needs to be prefixed with module ID."
|
|
msgstr ""
|
|
|
|
#: /Applications/Splunk/etc/apps/SA-ITOA/lib/ITOA/event_management/notable_event_utils.py:414
|
|
msgid "IDs are not a valid list."
|
|
msgstr ""
|
|
|
|
#: /Applications/Splunk/etc/apps/SA-ITOA/bin/itsi_user_access_init.py:34
|
|
msgid "IT Service Intelligence Access Control Registration"
|
|
msgstr ""
|
|
|
|
#: /Applications/Splunk/etc/apps/SA-ITOA/bin/itsi_notable_event_actions_queue_consumer.py:28
|
|
msgid "IT Service Intelligence Actions Queue Consumer"
|
|
msgstr ""
|
|
|
|
#: /Applications/Splunk/etc/apps/SA-ITOA/bin/itsi_async_csv_loader.py:31
|
|
msgid "IT Service Intelligence Asynchronous CSV Loader"
|
|
msgstr ""
|
|
|
|
#: /Applications/Splunk/etc/apps/SA-ITOA/bin/itsi_backfill.py:36
|
|
msgid "IT Service Intelligence Backfill Manager"
|
|
msgstr ""
|
|
|
|
#: /Applications/Splunk/etc/apps/SA-ITOA/bin/itsi_backup_restore.py:20
|
|
msgid "IT Service Intelligence Backup Restore Jobs Processor"
|
|
msgstr ""
|
|
|
|
#: /Applications/Splunk/etc/apps/SA-ITOA/bin/itsi_csv_import.py:42
|
|
msgid "IT Service Intelligence CSV Import"
|
|
msgstr ""
|
|
|
|
#: /Applications/Splunk/etc/apps/SA-ITOA/bin/configure_itsi.py:27
|
|
msgid "IT Service Intelligence Configurator"
|
|
msgstr ""
|
|
|
|
#: /Applications/Splunk/etc/apps/SA-ITOA/bin/itsi_default_correlation_search_acl_loader.py:27
|
|
msgid "IT Service Intelligence Default Correlation Search ACL loader"
|
|
msgstr ""
|
|
|
|
#: /Applications/Splunk/etc/apps/SA-ITOA/bin/itsi_default_aggregation_policy_loader.py:28
|
|
msgid "IT Service Intelligence Default Policies Loader"
|
|
msgstr ""
|
|
|
|
#: /Applications/Splunk/etc/apps/SA-ITOA/bin/itsi_entity_exchange_consumer.py:27
|
|
msgid "IT Service Intelligence Entity Exchange Consumer Modular Input"
|
|
msgstr ""
|
|
|
|
#: /Applications/Splunk/etc/apps/SA-ITOA/bin/itsi_notable_event_hec_init.py:26
|
|
msgid "IT Service Intelligence HEC Initializer"
|
|
msgstr ""
|
|
|
|
#: /Applications/Splunk/etc/apps/SA-ITOA/bin/itsi_age_kpi_alert_value_cache.py:23
|
|
msgid "IT Service Intelligence KPI Summary Cache Cleaner"
|
|
msgstr ""
|
|
|
|
#: /Applications/Splunk/etc/apps/SA-ITOA/bin/itsi_upgrade.py:31
|
|
msgid "IT Service Intelligence Migration Modular Input"
|
|
msgstr ""
|
|
|
|
#: /Applications/Splunk/etc/apps/SA-ITOA/bin/itsi_refresher.py:26
|
|
msgid "IT Service Intelligence Refresher"
|
|
msgstr ""
|
|
|
|
#: /Applications/Splunk/etc/apps/SA-ITOA/bin/itsi_scheduled_backup_caller.py:27
|
|
msgid "IT Service Intelligence Scheduled Backup Modular Input"
|
|
msgstr ""
|
|
|
|
#: /Applications/Splunk/etc/apps/SA-ITOA/bin/itsi_service_template_update_scheduler.py:27
|
|
msgid "IT Service Intelligence Service Template Update Scheduler"
|
|
msgstr ""
|
|
|
|
#: /Applications/Splunk/etc/apps/SA-ITOA/lib/itsi/upgrade/itsi_migration.py:2832
|
|
msgid ""
|
|
"IT Service Intelligence minor version upgrade from {} to {} has completed"
|
|
" successfully."
|
|
msgstr ""
|
|
|
|
#: /Applications/Splunk/etc/apps/SA-ITOA/bin/itsi_notable_event_archive.py:26
|
|
msgid "IT Service Intelligence notable event archiver"
|
|
msgstr ""
|
|
|
|
#: /Applications/Splunk/etc/apps/SA-ITOA/lib/itsi/upgrade/itsi_migration.py:2833
|
|
msgid "IT Service Intelligence upgrade has completed successfully."
|
|
msgstr ""
|
|
|
|
#: /Applications/Splunk/etc/apps/SA-ITOA/lib/itsi/upgrade/itsi_migration.py:3080
|
|
msgid ""
|
|
"IT Service Intelligence version 2.2.0+ does not require the SA-"
|
|
"ThreatIntelligence. With the following 2 exceptions, you can safely "
|
|
"remove SA-ThreatIntelligence from $SPLUNK_HOME/etc/apps. Exception 1. The"
|
|
" Splunk Enterprise Security app requires SA-ThreatIntelligence. If you "
|
|
"are running Splunk Enterprise Security, do not remove SA-"
|
|
"ThreatIntelligence. Exception 2. If you want to migrate old notable "
|
|
"events to the new index: First, follow the steps as specified in the "
|
|
"documentation. Once the migration is complete, you can safely remove SA-"
|
|
"ThreatIntelligence from $SPLUNK_HOME/etc/apps."
|
|
msgstr ""
|
|
|
|
#: /Applications/Splunk/etc/apps/SA-ITOA/lib/itsi/upgrade/itsi_migration.py:3089
|
|
msgid ""
|
|
"IT Service Intelligence version 2.2.0+ does not require the SA-Ticketing."
|
|
" You can safely remove SA-Ticketing from $SPLUNK_HOME/etc/apps."
|
|
msgstr ""
|
|
|
|
#: /Applications/Splunk/etc/apps/SA-ITOA/lib/itsi/upgrade/itsi_migration.py:3133
|
|
msgid ""
|
|
"IT Service Intelligence version 2.3.0+ does not require SA-Utils. With "
|
|
"the following exception, you can safely remove SA-Utils from "
|
|
"$SPLUNK_HOME/etc/apps : The Splunk Enterprise Security App, Splunk App "
|
|
"for VMware and Splunk App for Netapp Data Ontap require SA-Utils. If you "
|
|
"are using either of these Apps, do not remove SA-Utils."
|
|
msgstr ""
|
|
|
|
#: /Applications/Splunk/etc/apps/SA-ITOA/default/app.conf:9
|
|
msgid "ITOA Backend"
|
|
msgstr ""
|
|
|
|
#: /Applications/Splunk/etc/apps/SA-ITOA/default/alert_actions.conf:4
|
|
msgid "ITSI Alert Generator"
|
|
msgstr ""
|
|
|
|
#: /Applications/Splunk/etc/apps/SA-ITOA/default/props.conf:14
|
|
msgid "ITSI Internal Log"
|
|
msgstr ""
|
|
|
|
#: /Applications/Splunk/etc/apps/SA-ITOA/bin/itsi_consumer.py:145
|
|
msgid "ITSI Multiple Job Queue Processor"
|
|
msgstr ""
|
|
|
|
#: /Applications/Splunk/etc/apps/SA-ITOA/lib/ITOA/event_management/notable_event_actions.py:585
|
|
msgid ""
|
|
"ITSI episode action {} was dispatched to the executor, but the action has"
|
|
" not been configured on the executor host."
|
|
msgstr ""
|
|
|
|
#: /Applications/Splunk/etc/apps/SA-ITOA/lib/itsi_module/itsi_module_modules.py:178
|
|
msgid "ITSI module action is not supported: {}."
|
|
msgstr ""
|
|
|
|
#: /Applications/Splunk/etc/apps/SA-ITOA/lib/itsi_module/itsi_module_modules.py:176
|
|
msgid "ITSI module action is not valid."
|
|
msgstr ""
|
|
|
|
#: /Applications/Splunk/etc/apps/SA-ITOA/lib/itsi_module/itsi_module_interface_provider_base.py:583
|
|
msgid "ITSI module name is invalid. It should start with DA-ITSI-"
|
|
msgstr ""
|
|
|
|
#: /Applications/Splunk/etc/apps/SA-ITOA/lib/itsi_module/itsi_module_modules.py:165
|
|
msgid "ITSI module name is not valid."
|
|
msgstr ""
|
|
|
|
#: /Applications/Splunk/etc/apps/SA-ITOA/lib/ITOA/event_management/base_event_management.py:544
|
|
#, python-format
|
|
msgid "Id cannot be empty or invalid id=%s."
|
|
msgstr ""
|
|
|
|
#: /Applications/Splunk/etc/apps/SA-ITOA/lib/itsi/searches/itsi_filter.py:55
|
|
#, python-format
|
|
msgid "Illegal character %s in value %s."
|
|
msgstr ""
|
|
|
|
#: /Applications/Splunk/etc/apps/SA-ITOA/bin/itsi_csv_import.py:191
|
|
msgid "Import services as enabled by default."
|
|
msgstr ""
|
|
|
|
#: /Applications/Splunk/etc/apps/SA-ITOA/bin/configure_itsi.py:78
|
|
#: /Applications/Splunk/etc/apps/SA-ITOA/lib/itsi/upgrade/itsi_migration.py:2926
|
|
msgid ""
|
|
"Importing IT Service Intelligence settings from conf files for apps and "
|
|
"modules failed with: {}"
|
|
msgstr ""
|
|
|
|
#: /Applications/Splunk/etc/apps/SA-ITOA/default/itsi_notable_event_status.conf:24
|
|
msgid "In Progress"
|
|
msgstr ""
|
|
|
|
#: /Applications/Splunk/etc/apps/SA-ITOA/lib/itsi/event_management/sdk/eventing_base.py:34
|
|
msgid ""
|
|
"In the absence of session_key, expecting a valid non-empty string, for "
|
|
"both your username and password."
|
|
msgstr ""
|
|
|
|
#: /Applications/Splunk/etc/apps/SA-ITOA/lib/itsi/objects/changehandlers/kpi_thresholds_template_delete_handler.py:52
|
|
#: /Applications/Splunk/etc/apps/SA-ITOA/lib/itsi/objects/changehandlers/kpi_thresholds_template_update_handler.py:56
|
|
msgid "Incoming kpi_thresholds_template is not a valid JSON object"
|
|
msgstr ""
|
|
|
|
#: /Applications/Splunk/etc/apps/SA-ITOA/bin/command_get_kpi_search.py:96
|
|
msgid "Incomplete key-value pair found. Must fix your query."
|
|
msgstr ""
|
|
|
|
#: /Applications/Splunk/etc/apps/SA-ITOA/bin/command_get_kpi_search.py:67
|
|
msgid "Incomplete key-value pair found. Must specify a key."
|
|
msgstr ""
|
|
|
|
#: /Applications/Splunk/etc/apps/SA-ITOA/lib/itsi/objects/itsi_entity.py:124
|
|
#, python-format
|
|
msgid ""
|
|
"Incorrect format of %s field, in entity object. Expected list, found %s, "
|
|
"entity_title=\"%s\", %s_field=\"%s\""
|
|
msgstr ""
|
|
|
|
#: /Applications/Splunk/etc/apps/SA-ITOA/bin/itsi_notable_event_actions_queue_consumer.py:41
|
|
msgid ""
|
|
"Induce some delay (in seconds) in execution after reading from queue. "
|
|
"Defaults to 0 seconds"
|
|
msgstr ""
|
|
|
|
#: /Applications/Splunk/etc/apps/SA-ITOA/default/itsi_notable_event_severity.conf:12
|
|
msgid "Info"
|
|
msgstr ""
|
|
|
|
#: /Applications/Splunk/etc/apps/SA-ITOA/bin/itsi_notable_event_hec_init.py:27
|
|
msgid ""
|
|
"Initializes Splunk HEC, creates and sets the right ACL values for HEC "
|
|
"tokens consumed by ITSI Episode Review."
|
|
msgstr ""
|
|
|
|
#: /Applications/Splunk/etc/apps/SA-ITOA/lib/SA_ITOA_app_common/solnlib/packages/schematics/types/compound.py:155
|
|
#, python-format
|
|
msgid "Input must be a mapping or '%s' instance"
|
|
msgstr ""
|
|
|
|
#: /Applications/Splunk/etc/apps/SA-ITOA/bin/kvstore_to_json.py:343
|
|
msgid ""
|
|
"Input not specified for the service KPI operation. Must provide a valid "
|
|
"directory path containing input.json."
|
|
msgstr ""
|
|
|
|
#: /Applications/Splunk/etc/apps/SA-ITOA/lib/itsi/mad/itsi_mad_searches.py:168
|
|
#: /Applications/Splunk/etc/apps/SA-ITOA/lib/itsi/mad/itsi_mad_searches.py:355
|
|
msgid "Instance data must be in the format of a valid dictionary."
|
|
msgstr ""
|
|
|
|
#: /Applications/Splunk/etc/apps/SA-ITOA/lib/itsi/mad/itsi_mad_searches.py:281
|
|
#: /Applications/Splunk/etc/apps/SA-ITOA/lib/itsi/mad/itsi_mad_searches.py:349
|
|
msgid "Instance id must be in the format of a valid string."
|
|
msgstr ""
|
|
|
|
#: /Applications/Splunk/etc/apps/SA-ITOA/bin/itsi_async_csv_loader.py:178
|
|
#: /Applications/Splunk/etc/apps/SA-ITOA/bin/itsi_csv_import.py:212
|
|
msgid ""
|
|
"Instructions on how to update existing records. If APPEND, all records "
|
|
"are treated as new records. If UPSERT, new information is added to "
|
|
"records with matching title fields. If REPLACE, new records will replace "
|
|
"old records when an existing match on the title field is found."
|
|
msgstr ""
|
|
|
|
#: /Applications/Splunk/etc/apps/SA-ITOA/bin/deep_dive_services.py:49
|
|
msgid "Insufficient arguments provided."
|
|
msgstr ""
|
|
|
|
#: /Applications/Splunk/etc/apps/SA-ITOA/lib/itsi/objects/itsi_entity.py:333
|
|
msgid "Integrity failure: Attempt to overwrite reserved word."
|
|
msgstr ""
|
|
|
|
#: /Applications/Splunk/etc/apps/SA-ITOA/lib/itsi/objects/itsi_entity.py:327
|
|
msgid "Integrity failure: Duplicate field names."
|
|
msgstr ""
|
|
|
|
#: /Applications/Splunk/etc/apps/SA-ITOA/lib/itsi/objects/itsi_entity.py:340
|
|
msgid "Integrity failure: Values collections are not congruent."
|
|
msgstr ""
|
|
|
|
#: /Applications/Splunk/etc/apps/SA-ITOA/lib/itsi/event_management/event_management_rest_provider.py:162
|
|
#: /Applications/Splunk/etc/apps/SA-ITOA/lib/itsi/event_management/event_management_rest_provider.py:258
|
|
#: /Applications/Splunk/etc/apps/SA-ITOA/lib/itsi/event_management/event_management_rest_provider.py:278
|
|
#: /Applications/Splunk/etc/apps/SA-ITOA/lib/itsi/itoa_rest_interface_provider/itoa_rest_interface_provider.py:258
|
|
#: /Applications/Splunk/etc/apps/SA-ITOA/lib/itsi/itoa_rest_interface_provider/itoa_rest_interface_provider.py:372
|
|
#: /Applications/Splunk/etc/apps/SA-ITOA/lib/itsi/itoa_rest_interface_provider/itoa_rest_interface_provider.py:392
|
|
msgid ""
|
|
"Internal Exception. Input: `{0}` Method: `{1}`. Check the logs for "
|
|
"details."
|
|
msgstr ""
|
|
|
|
#: /Applications/Splunk/etc/apps/SA-ITOA/lib/itsi/searches/itsi_searches.py:651
|
|
msgid "Invalid \"kpi\". Expecting a dictionary."
|
|
msgstr ""
|
|
|
|
#: /Applications/Splunk/etc/apps/SA-ITOA/lib/itsi/objects/itsi_service.py:1888
|
|
#, python-format
|
|
msgid "Invalid %s anomaly detection sensitivity specified, must be integer."
|
|
msgstr ""
|
|
|
|
#: /Applications/Splunk/etc/apps/SA-ITOA/lib/itsi/objects/itsi_service.py:1876
|
|
#, python-format
|
|
msgid "Invalid %s anomaly detection settings specified."
|
|
msgstr ""
|
|
|
|
#: /Applications/Splunk/etc/apps/SA-ITOA/lib/itsi/objects/itsi_security_group.py:297
|
|
msgid "Invalid ACLs in the team. Team cannot be created."
|
|
msgstr ""
|
|
|
|
#: /Applications/Splunk/etc/apps/SA-ITOA/lib/SA_ITOA_app_common/solnlib/packages/schematics/types/net.py:65
|
|
#, python-format
|
|
msgid "Invalid IP%s address"
|
|
msgstr ""
|
|
|
|
#: /Applications/Splunk/etc/apps/SA-ITOA/lib/ITOA/event_management/base_event_management.py:269
|
|
msgid "Invalid JSON list to do bulk create."
|
|
msgstr ""
|
|
|
|
#: /Applications/Splunk/etc/apps/SA-ITOA/lib/itsi/objects/itsi_kpi_base_search.py:506
|
|
#, python-format
|
|
msgid ""
|
|
"Invalid KPI base search entity_breakdown_id_fields for %s. Cannot contain"
|
|
" more than one value."
|
|
msgstr ""
|
|
|
|
#: /Applications/Splunk/etc/apps/SA-ITOA/lib/itsi/objects/itsi_kpi_base_search.py:489
|
|
#, python-format
|
|
msgid ""
|
|
"Invalid KPI base search entity_id_fields for %s. Cannot contain more than"
|
|
" one value."
|
|
msgstr ""
|
|
|
|
#: /Applications/Splunk/etc/apps/SA-ITOA/lib/itsi/itsi_time_block_utils.py:79
|
|
#: /Applications/Splunk/etc/apps/SA-ITOA/lib/itsi/set_severity_fields.py:408
|
|
msgid "Invalid KPI policies: {0}. Expected dict to not be empty."
|
|
msgstr ""
|
|
|
|
#: /Applications/Splunk/etc/apps/SA-ITOA/lib/itsi/itsi_time_block_utils.py:74
|
|
#: /Applications/Splunk/etc/apps/SA-ITOA/lib/itsi/set_severity_fields.py:403
|
|
msgid "Invalid KPI policies: {0}. Expected dict."
|
|
msgstr ""
|
|
|
|
#: /Applications/Splunk/etc/apps/SA-ITOA/lib/itsi/objects/itsi_kpi_threshold_template.py:58
|
|
msgid ""
|
|
"Invalid KPI threshold template policy title specified. Specified invalid "
|
|
"title: \"{0}\""
|
|
msgstr ""
|
|
|
|
#: /Applications/Splunk/etc/apps/SA-ITOA/lib/itsi/objects/itsi_kpi_threshold_template.py:163
|
|
msgid ""
|
|
"Invalid KPI threshold template specified. KPI threshold templates must be"
|
|
" dictionaries."
|
|
msgstr ""
|
|
|
|
#: /Applications/Splunk/etc/apps/SA-ITOA/lib/itsi/itsi_time_block_utils.py:68
|
|
#: /Applications/Splunk/etc/apps/SA-ITOA/lib/itsi/set_severity_fields.py:397
|
|
msgid "Invalid KPI threshold_spec: {0}. Expected dict."
|
|
msgstr ""
|
|
|
|
#: /Applications/Splunk/etc/apps/SA-ITOA/lib/SA_ITOA_app_common/solnlib/packages/schematics/types/net.py:113
|
|
msgid "Invalid MAC address"
|
|
msgstr ""
|
|
|
|
#: /Applications/Splunk/etc/apps/SA-ITOA/bin/itoa_rest_interface_splunkd.py:751
|
|
msgid "Invalid REST args received by ITOA interface - {}"
|
|
msgstr ""
|
|
|
|
#: /Applications/Splunk/etc/apps/SA-ITOA/bin/itsi_module_interface_splunkd.py:356
|
|
msgid "Invalid REST args received by ITSI module interface - {}"
|
|
msgstr ""
|
|
|
|
#: /Applications/Splunk/etc/apps/SA-ITOA/bin/backup_restore_interface_splunkd.py:221
|
|
msgid "Invalid REST args received by backup restore interface - {}"
|
|
msgstr ""
|
|
|
|
#: /Applications/Splunk/etc/apps/SA-ITOA/bin/event_management_interface_splunkd.py:460
|
|
msgid "Invalid REST args received by event management interface - {}"
|
|
msgstr ""
|
|
|
|
#: /Applications/Splunk/etc/apps/SA-ITOA/bin/maintenance_services_interface_splunkd.py:205
|
|
msgid "Invalid REST args received by maintenance services interface - {}"
|
|
msgstr ""
|
|
|
|
#: /Applications/Splunk/etc/apps/SA-ITOA/bin/notable_event_ace_interface_splunkd.py:59
|
|
msgid "Invalid REST method and path"
|
|
msgstr ""
|
|
|
|
#: /Applications/Splunk/etc/apps/SA-ITOA/bin/itoa_rest_interface_splunkd.py:770
|
|
msgid "Invalid REST path received by ITOA interface - {}"
|
|
msgstr ""
|
|
|
|
#: /Applications/Splunk/etc/apps/SA-ITOA/bin/itsi_module_interface_splunkd.py:362
|
|
msgid "Invalid REST path received by ITSI module interface - {}"
|
|
msgstr ""
|
|
|
|
#: /Applications/Splunk/etc/apps/SA-ITOA/bin/backup_restore_interface_splunkd.py:235
|
|
msgid "Invalid REST path received by backup restore interface - {}"
|
|
msgstr ""
|
|
|
|
#: /Applications/Splunk/etc/apps/SA-ITOA/bin/event_management_interface_splunkd.py:476
|
|
msgid "Invalid REST path received by event management interface - {}"
|
|
msgstr ""
|
|
|
|
#: /Applications/Splunk/etc/apps/SA-ITOA/bin/maintenance_services_interface_splunkd.py:221
|
|
msgid "Invalid REST path received by maintenance services interface - {}"
|
|
msgstr ""
|
|
|
|
#: /Applications/Splunk/etc/apps/SA-ITOA/lib/itsi/objects/itsi_service.py:1899
|
|
msgid "Invalid Service Health KPI count. Expecting 1. Found {0}."
|
|
msgstr ""
|
|
|
|
#: /Applications/Splunk/etc/apps/SA-ITOA/lib/SA_ITOA_app_common/solnlib/packages/schematics/types/base.py:386
|
|
msgid "Invalid UTF-8 data."
|
|
msgstr ""
|
|
|
|
#: /Applications/Splunk/etc/apps/SA-ITOA/lib/itsi/objects/itsi_service.py:984
|
|
#, python-format
|
|
msgid "Invalid `change_type` argument: %s."
|
|
msgstr ""
|
|
|
|
#: /Applications/Splunk/etc/apps/SA-ITOA/lib/ITOA/event_management/notable_event_actions.py:141
|
|
msgid "Invalid action name"
|
|
msgstr ""
|
|
|
|
#: /Applications/Splunk/etc/apps/SA-ITOA/lib/ITOA/event_management/notable_event_actions.py:987
|
|
#, python-format
|
|
msgid "Invalid action. This action: `%s` is not allowed for notable event."
|
|
msgstr ""
|
|
|
|
#: /Applications/Splunk/etc/apps/SA-ITOA/lib/ITOA/event_management/notable_event_ticketing.py:384
|
|
msgid "Invalid action_name"
|
|
msgstr ""
|
|
|
|
#: /Applications/Splunk/etc/apps/SA-ITOA/lib/ITOA/event_management/notable_event_actions.py:492
|
|
#, python-format
|
|
msgid "Invalid action_name %s"
|
|
msgstr ""
|
|
|
|
#: /Applications/Splunk/etc/apps/SA-ITOA/lib/itsi/searches/compute_health_score.py:712
|
|
msgid "Invalid alert ret_value={0}, for level={1}."
|
|
msgstr ""
|
|
|
|
#: /Applications/Splunk/etc/apps/SA-ITOA/lib/itsi/objects/itsi_kpi.py:401
|
|
#: /Applications/Splunk/etc/apps/SA-ITOA/lib/itsi/searches/itsi_shared_base_search.py:191
|
|
msgid ""
|
|
"Invalid alert_lag passed to saved search management, must be below 30 "
|
|
"minutes"
|
|
msgstr ""
|
|
|
|
#: /Applications/Splunk/etc/apps/SA-ITOA/lib/itsi/objects/itsi_kpi.py:657
|
|
msgid ""
|
|
"Invalid alert_lag, must be a positive integer less than 1800 (in s = 30 "
|
|
"minutes)."
|
|
msgstr ""
|
|
|
|
#: /Applications/Splunk/etc/apps/SA-ITOA/lib/itsi/objects/itsi_kpi.py:664
|
|
msgid ""
|
|
"Invalid alert_lag, must be a positive integer less than 1800 (in s = 30 "
|
|
"minutes). Specified: {0}"
|
|
msgstr ""
|
|
|
|
#: /Applications/Splunk/etc/apps/SA-ITOA/lib/ITOA/event_management/hec_utils.py:72
|
|
msgid "Invalid app value."
|
|
msgstr ""
|
|
|
|
#: /Applications/Splunk/etc/apps/SA-ITOA/lib/ITOA/event_management/hec_utils.py:70
|
|
msgid "Invalid app. Expecting string."
|
|
msgstr ""
|
|
|
|
#: /Applications/Splunk/etc/apps/SA-ITOA/lib/ITOA/rest_interface_provider_base.py:270
|
|
msgid "Invalid args received by extract_rest_args. args: {}, field: {}"
|
|
msgstr ""
|
|
|
|
#: /Applications/Splunk/etc/apps/SA-ITOA/bin/command_getservice.py:37
|
|
#: /Applications/Splunk/etc/apps/SA-ITOA/bin/command_health_monitor.py:31
|
|
#: /Applications/Splunk/etc/apps/SA-ITOA/bin/command_token_replacement.py:37
|
|
#: /Applications/Splunk/etc/apps/SA-ITOA/bin/command_token_replacement.py:49
|
|
#: /Applications/Splunk/etc/apps/SA-ITOA/lib/itsi/suppress_alert.py:35
|
|
#: /Applications/Splunk/etc/apps/SA-ITOA/lib/itsi/suppress_alert.py:51
|
|
#, python-format
|
|
msgid "Invalid argument '%s'."
|
|
msgstr ""
|
|
|
|
#: /Applications/Splunk/etc/apps/SA-ITOA/bin/command_token_replacement.py:42
|
|
#: /Applications/Splunk/etc/apps/SA-ITOA/lib/itsi/suppress_alert.py:40
|
|
#, python-format
|
|
msgid "Invalid argument value '%s', it should be a valid value."
|
|
msgstr ""
|
|
|
|
#: /Applications/Splunk/etc/apps/SA-ITOA/lib/itsi/suppress_alert.py:47
|
|
#, python-format
|
|
msgid "Invalid argument value '%s', it should not be non-zero value."
|
|
msgstr ""
|
|
|
|
#: /Applications/Splunk/etc/apps/SA-ITOA/lib/itsi/objects/itsi_service.py:1447
|
|
#, python-format
|
|
msgid ""
|
|
"Invalid base_service_template_id provided for KPI. A service can be "
|
|
"linked to only one service template. service_id=\"%s\", kpi_id=\"%s\", "
|
|
"service_base_template_id=\"%s\", kpi_base_template_id=\"%s\""
|
|
msgstr ""
|
|
|
|
#: /Applications/Splunk/etc/apps/SA-ITOA/lib/itsi/itsi_time_block_utils.py:650
|
|
msgid ""
|
|
"Invalid character in cron element: {0}. Expected int, \"*\", \",\", or "
|
|
"\"-\"."
|
|
msgstr ""
|
|
|
|
#: /Applications/Splunk/etc/apps/SA-ITOA/lib/ITOA/event_management/base_event_management.py:100
|
|
msgid "Invalid collection name"
|
|
msgstr ""
|
|
|
|
#: /Applications/Splunk/etc/apps/SA-ITOA/lib/itsi/event_management/correlation_search_generation.py:57
|
|
msgid "Invalid correlation search type:{0}"
|
|
msgstr ""
|
|
|
|
#: /Applications/Splunk/etc/apps/SA-ITOA/lib/ITOA/itoa_object.py:259
|
|
msgid "Invalid create payload found, must be a valid JSON dictionary."
|
|
msgstr ""
|
|
|
|
#: /Applications/Splunk/etc/apps/SA-ITOA/lib/itsi/itsi_time_block_utils.py:722
|
|
msgid "Invalid cron element number: {0}. Expected positive int."
|
|
msgstr ""
|
|
|
|
#: /Applications/Splunk/etc/apps/SA-ITOA/lib/itsi/itsi_time_block_utils.py:571
|
|
#: /Applications/Splunk/etc/apps/SA-ITOA/lib/itsi/itsi_time_block_utils.py:639
|
|
msgid "Invalid cron element type: {0}. Expected value in list: {1}."
|
|
msgstr ""
|
|
|
|
#: /Applications/Splunk/etc/apps/SA-ITOA/lib/itsi/itsi_time_block_utils.py:661
|
|
msgid "Invalid cron element: {0} for cron element type: {1}. Expected int."
|
|
msgstr ""
|
|
|
|
#: /Applications/Splunk/etc/apps/SA-ITOA/lib/itsi/itsi_time_block_utils.py:680
|
|
msgid "Invalid cron element: {0}. Unable to parse range for: {1}."
|
|
msgstr ""
|
|
|
|
#: /Applications/Splunk/etc/apps/SA-ITOA/lib/itsi/itsi_time_block_utils.py:608
|
|
msgid ""
|
|
"Invalid cron number: {0}, for cron element type: {1}. Expected value in "
|
|
"range: {2} - {3}."
|
|
msgstr ""
|
|
|
|
#: /Applications/Splunk/etc/apps/SA-ITOA/lib/itsi/itsi_time_block_utils.py:598
|
|
msgid "Invalid cron number: {0}. Expected int."
|
|
msgstr ""
|
|
|
|
#: /Applications/Splunk/etc/apps/SA-ITOA/lib/itsi/objects/itsi_service_template.py:88
|
|
msgid ""
|
|
"Invalid data for creating service template from service. Expected a JSON "
|
|
"object, received {}."
|
|
msgstr ""
|
|
|
|
#: /Applications/Splunk/etc/apps/SA-ITOA/lib/itsi/objects/itsi_service_template.py:82
|
|
msgid ""
|
|
"Invalid data for creating the service template. Expected a list of JSON "
|
|
"objects, received {}."
|
|
msgstr ""
|
|
|
|
#: /Applications/Splunk/etc/apps/SA-ITOA/lib/ITOA/event_management/notable_event_actions.py:524
|
|
msgid "Invalid data for refresh."
|
|
msgstr ""
|
|
|
|
#: /Applications/Splunk/etc/apps/SA-ITOA/lib/ITOA/event_management/notable_event_seed_group.py:58
|
|
msgid "Invalid data for search data conversion to seed group"
|
|
msgstr ""
|
|
|
|
#: /Applications/Splunk/etc/apps/SA-ITOA/lib/itsi/event_management/event_management_services.py:500
|
|
msgid "Invalid data format, data can be either dict or list. {}"
|
|
msgstr ""
|
|
|
|
#: /Applications/Splunk/etc/apps/SA-ITOA/lib/ITOA/event_management/correlation_search.py:311
|
|
msgid "Invalid data list, type={0}."
|
|
msgstr ""
|
|
|
|
#: /Applications/Splunk/etc/apps/SA-ITOA/lib/ITOA/event_management/notable_event_actions.py:393
|
|
#: /Applications/Splunk/etc/apps/SA-ITOA/lib/ITOA/event_management/notable_event_actions.py:576
|
|
msgid "Invalid data so cannot perform actions."
|
|
msgstr ""
|
|
|
|
#: /Applications/Splunk/etc/apps/SA-ITOA/lib/itsi/event_management/itsi_correlation_search.py:100
|
|
msgid "Invalid data, type {0}"
|
|
msgstr ""
|
|
|
|
#: /Applications/Splunk/etc/apps/SA-ITOA/lib/ITOA/event_management/notable_event_actions.py:486
|
|
msgid "Invalid data."
|
|
msgstr ""
|
|
|
|
#: /Applications/Splunk/etc/apps/SA-ITOA/lib/itsi/objects/itsi_service_template.py:345
|
|
msgid "Invalid datamodel defined for KPI {}"
|
|
msgstr ""
|
|
|
|
#: /Applications/Splunk/etc/apps/SA-ITOA/lib/itsi/objects/itsi_service.py:1835
|
|
msgid ""
|
|
"Invalid datamodel specification in {0} \"{1}\" for kpi \"{2}\". Datamodel"
|
|
" info: {3}"
|
|
msgstr ""
|
|
|
|
#: /Applications/Splunk/etc/apps/SA-ITOA/lib/itsi/itsi_time_block_utils.py:179
|
|
msgid "Invalid duration: {0}. Expected value in range: {1} - {2}."
|
|
msgstr ""
|
|
|
|
#: /Applications/Splunk/etc/apps/SA-ITOA/lib/itsi/event_management/event_management_rest_provider.py:838
|
|
#, python-format
|
|
msgid "Invalid entity ID received from MAD: %s."
|
|
msgstr ""
|
|
|
|
#: /Applications/Splunk/etc/apps/SA-ITOA/lib/ITOA/event_management/notable_event_seed_group.py:72
|
|
msgid "Invalid factor for seed group"
|
|
msgstr ""
|
|
|
|
#: /Applications/Splunk/etc/apps/SA-ITOA/lib/itsi/csv_import/itoa_bulk_import_specification.py:425
|
|
msgid "Invalid field mapping \"{}\"; reserved word."
|
|
msgstr ""
|
|
|
|
#: /Applications/Splunk/etc/apps/SA-ITOA/lib/itsi/objects/itsi_entity.py:69
|
|
msgid "Invalid field name specified, field is required."
|
|
msgstr ""
|
|
|
|
#: /Applications/Splunk/etc/apps/SA-ITOA/lib/itsi/objects/itsi_entity.py:80
|
|
msgid ""
|
|
"Invalid field names specified; {0}. Fields cannot be an internal "
|
|
"keywords: {1}."
|
|
msgstr ""
|
|
|
|
#: /Applications/Splunk/etc/apps/SA-ITOA/lib/itsi/objects/itsi_entity.py:74
|
|
msgid ""
|
|
"Invalid field names specified; {}. Fields cannot contain special "
|
|
"characters not supported by SPL."
|
|
msgstr ""
|
|
|
|
#: /Applications/Splunk/etc/apps/SA-ITOA/lib/itsi/csv_import/itoa_bulk_import_specification.py:467
|
|
msgid ""
|
|
"Invalid fieldnames in Bulk Import Specification. Fieldnames cannot "
|
|
"contain quotes or equals: {}."
|
|
msgstr ""
|
|
|
|
#: /Applications/Splunk/etc/apps/SA-ITOA/lib/ITOA/event_management/base_event_management.py:154
|
|
msgid "Invalid filter data to merge"
|
|
msgstr ""
|
|
|
|
#: /Applications/Splunk/etc/apps/SA-ITOA/lib/itsi/objects/itsi_event_management_state.py:53
|
|
msgid ""
|
|
"Invalid filterCollection list specified. Specify a valid filterCollection"
|
|
" list."
|
|
msgstr ""
|
|
|
|
#: /Applications/Splunk/etc/apps/SA-ITOA/lib/ITOA/version_check.py:63
|
|
#, python-format
|
|
msgid "Invalid format for `dest_version`:%s."
|
|
msgstr ""
|
|
|
|
#: /Applications/Splunk/etc/apps/SA-ITOA/lib/ITOA/version_check.py:65
|
|
#, python-format
|
|
msgid "Invalid format for `src_version`:%s."
|
|
msgstr ""
|
|
|
|
#: /Applications/Splunk/etc/apps/SA-ITOA/lib/ITOA/event_management/notable_event.py:916
|
|
msgid "Invalid group_id=\"{}\" or fields_to_update=\"{}\" or filter=\"{}\"."
|
|
msgstr ""
|
|
|
|
#: /Applications/Splunk/etc/apps/SA-ITOA/bin/itsi_sample_event_action_ping.py:153
|
|
#, python-format
|
|
msgid "Invalid host to ping. Received=`%s`. Type=`%s`"
|
|
msgstr ""
|
|
|
|
#: /Applications/Splunk/etc/apps/SA-ITOA/lib/ITOA/event_management/notable_event_ticketing.py:214
|
|
#, python-format
|
|
msgid "Invalid ids list. Received=`%s`. Type=`%s`."
|
|
msgstr ""
|
|
|
|
#: /Applications/Splunk/etc/apps/SA-ITOA/lib/ITOA/event_management/notable_event_actions.py:777
|
|
#, python-format
|
|
msgid "Invalid ids. Expecting valid list. Received=`%s`."
|
|
msgstr ""
|
|
|
|
#: /Applications/Splunk/etc/apps/SA-ITOA/lib/ITOA/event_management/notable_event_actions.py:682
|
|
msgid ""
|
|
"Invalid ids={0} to perform action. List must have at-leastone action to "
|
|
"perform action."
|
|
msgstr ""
|
|
|
|
#: /Applications/Splunk/etc/apps/SA-ITOA/lib/itsi/objects/itsi_entity.py:172
|
|
#, python-format
|
|
msgid ""
|
|
"Invalid informational field(s) specified for entity . Some of the info "
|
|
"fields conflict with identifier fields. entity_title=\"%s\". "
|
|
"conflicting_info_fields=\"%s\""
|
|
msgstr ""
|
|
|
|
#: /Applications/Splunk/etc/apps/SA-ITOA/lib/migration/object_interface/base_migration_interface.py:123
|
|
#, python-format
|
|
msgid "Invalid input data, expected list but received %s."
|
|
msgstr ""
|
|
|
|
#: /Applications/Splunk/etc/apps/SA-ITOA/lib/itsi/upgrade/itsi_migration.py:1523
|
|
msgid "Invalid instance type for metadata. Must be a valid dictionary."
|
|
msgstr ""
|
|
|
|
#: /Applications/Splunk/etc/apps/SA-ITOA/lib/itsi/objects/itsi_service.py:1808
|
|
msgid ""
|
|
"Invalid key specified for KPI, Eg. {}. Key cannot contain special "
|
|
"characters not supported by SPL. Key could also not be reserved words "
|
|
"like service_aggregate or N/A."
|
|
msgstr ""
|
|
|
|
#: /Applications/Splunk/etc/apps/SA-ITOA/bin/command_storeentities.py:53
|
|
#, python-format
|
|
msgid "Invalid key specified: %s."
|
|
msgstr ""
|
|
|
|
#: /Applications/Splunk/etc/apps/SA-ITOA/lib/ITOA/event_management/base_event_management.py:307
|
|
#: /Applications/Splunk/etc/apps/SA-ITOA/lib/ITOA/event_management/notable_event.py:355
|
|
#, python-format
|
|
msgid "Invalid key to get object, value=%s."
|
|
msgstr ""
|
|
|
|
#: /Applications/Splunk/etc/apps/SA-ITOA/lib/itsi/objects/itsi_service_template.py:71
|
|
msgid ""
|
|
"Invalid kpi type for {} service template. Expected only shared base "
|
|
"search kpis, received {}."
|
|
msgstr ""
|
|
|
|
#: /Applications/Splunk/etc/apps/SA-ITOA/bin/command_set_severity_fields.py:128
|
|
msgid "Invalid kpiid argument"
|
|
msgstr ""
|
|
|
|
#: /Applications/Splunk/etc/apps/SA-ITOA/lib/itsi/itsi_time_block_utils.py:711
|
|
msgid "Invalid list of CRON element numbers: {0}. Expected at least one number."
|
|
msgstr ""
|
|
|
|
#: /Applications/Splunk/etc/apps/SA-ITOA/lib/ITOA/event_management/notable_event_actions.py:527
|
|
msgid "Invalid list of ids for refresh."
|
|
msgstr ""
|
|
|
|
#: /Applications/Splunk/etc/apps/SA-ITOA/lib/ITOA/event_management/notable_event_utils.py:725
|
|
msgid "Invalid logger object"
|
|
msgstr ""
|
|
|
|
#: /Applications/Splunk/etc/apps/SA-ITOA/lib/itsi/event_management/event_management_rest_provider.py:634
|
|
#, python-format
|
|
msgid "Invalid method \"%s\". Only DELETE method is valid."
|
|
msgstr ""
|
|
|
|
#: /Applications/Splunk/etc/apps/SA-ITOA/lib/itsi/event_management/event_management_rest_provider.py:540
|
|
#, python-format
|
|
msgid "Invalid method \"%s\". Valid method is GET."
|
|
msgstr ""
|
|
|
|
#: /Applications/Splunk/etc/apps/SA-ITOA/lib/itsi/event_management/event_management_rest_provider.py:474
|
|
#: /Applications/Splunk/etc/apps/SA-ITOA/lib/itsi/event_management/event_management_rest_provider.py:557
|
|
#, python-format
|
|
msgid "Invalid method \"%s\". Valid methods are GET and POST."
|
|
msgstr ""
|
|
|
|
#: /Applications/Splunk/etc/apps/SA-ITOA/lib/itsi/event_management/event_management_rest_provider.py:606
|
|
#, python-format
|
|
msgid "Invalid method \"%s\". Valid methods are GET, POST and PUT."
|
|
msgstr ""
|
|
|
|
#: /Applications/Splunk/etc/apps/SA-ITOA/lib/itsi/event_management/event_management_rest_provider.py:639
|
|
#: /Applications/Splunk/etc/apps/SA-ITOA/lib/itsi/event_management/event_management_rest_provider.py:703
|
|
#: /Applications/Splunk/etc/apps/SA-ITOA/lib/itsi/event_management/event_management_rest_provider.py:767
|
|
#: /Applications/Splunk/etc/apps/SA-ITOA/lib/itsi/event_management/event_management_rest_provider.py:876
|
|
#, python-format
|
|
msgid "Invalid method \"%s\". Valid methods are POST and PUT."
|
|
msgstr ""
|
|
|
|
#: /Applications/Splunk/etc/apps/SA-ITOA/lib/itsi/event_management/event_management_rest_provider.py:434
|
|
msgid "Invalid method \"{}\". Valid methods are GET, POST, PUT and DELETE."
|
|
msgstr ""
|
|
|
|
#: /Applications/Splunk/etc/apps/SA-ITOA/lib/itsi/objects/itsi_entity.py:269
|
|
msgid "Invalid method name {0} received"
|
|
msgstr ""
|
|
|
|
#: /Applications/Splunk/etc/apps/SA-ITOA/lib/itsi/backup_restore/backup_restore_rest_provider.py:456
|
|
msgid "Invalid method. Valid methods are GET, POST and DELETE."
|
|
msgstr ""
|
|
|
|
#: /Applications/Splunk/etc/apps/SA-ITOA/lib/itsi/backup_restore/backup_restore_rest_provider.py:232
|
|
#: /Applications/Splunk/etc/apps/SA-ITOA/lib/itsi/backup_restore/backup_restore_rest_provider.py:352
|
|
msgid "Invalid method. Valid methods are GET, POST, PUT and DELETE."
|
|
msgstr ""
|
|
|
|
#: /Applications/Splunk/etc/apps/SA-ITOA/lib/ITOA/event_management/correlation_search.py:260
|
|
msgid "Invalid object list, type is {0}."
|
|
msgstr ""
|
|
|
|
#: /Applications/Splunk/etc/apps/SA-ITOA/lib/itsi/event_management/event_management_rest_provider.py:329
|
|
#: /Applications/Splunk/etc/apps/SA-ITOA/lib/itsi/event_management/event_management_rest_provider.py:426
|
|
msgid "Invalid object type \"{}\", does not support DELETE."
|
|
msgstr ""
|
|
|
|
#: /Applications/Splunk/etc/apps/SA-ITOA/lib/itsi/event_management/event_management_rest_provider.py:310
|
|
msgid "Invalid object type \"{}\", supported object types are {}."
|
|
msgstr ""
|
|
|
|
#: /Applications/Splunk/etc/apps/SA-ITOA/lib/itsi/backup_restore/backup_restore_rest_provider.py:209
|
|
#: /Applications/Splunk/etc/apps/SA-ITOA/lib/itsi/backup_restore/backup_restore_rest_provider.py:262
|
|
#: /Applications/Splunk/etc/apps/SA-ITOA/lib/itsi/backup_restore/backup_restore_rest_provider.py:329
|
|
#, python-format
|
|
msgid "Invalid object type, supported object types are %s."
|
|
msgstr ""
|
|
|
|
#: /Applications/Splunk/etc/apps/SA-ITOA/lib/maintenance_services/objects/maintenance_calendar.py:642
|
|
msgid "Invalid object types specified. Supported object types are: "
|
|
msgstr ""
|
|
|
|
#: /Applications/Splunk/etc/apps/SA-ITOA/lib/itsi/objects/itsi_kpi.py:136
|
|
#, python-format
|
|
msgid ""
|
|
"Invalid option provided to fill data gaps for object \"%s\". "
|
|
"option_provided=\"%s\", supported_options=\"%s\", %s_key=\"%s\""
|
|
msgstr ""
|
|
|
|
#: /Applications/Splunk/etc/apps/SA-ITOA/bin/command_fill_gaps_backfill.py:64
|
|
msgid ""
|
|
"Invalid options passed to \"fillgapsbackfill\" command; must have alert "
|
|
"period and kpi type or entity split field."
|
|
msgstr ""
|
|
|
|
#: /Applications/Splunk/etc/apps/SA-ITOA/bin/command_set_severity_fields.py:121
|
|
msgid ""
|
|
"Invalid options passed to command; must have service and kpi or kpi base "
|
|
"search"
|
|
msgstr ""
|
|
|
|
#: /Applications/Splunk/etc/apps/SA-ITOA/lib/itsi/itoa_rest_interface_provider/itoa_rest_interface_provider.py:1401
|
|
msgid ""
|
|
"Invalid or missing query param \"entity_identifier\" or \"entity_key\". "
|
|
"Expecting non-empty string for entity_identifier or entity_key."
|
|
msgstr ""
|
|
|
|
#: /Applications/Splunk/etc/apps/SA-ITOA/lib/itsi/itoa_rest_interface_provider/itoa_rest_interface_provider.py:1057
|
|
msgid ""
|
|
"Invalid or missing query param \"service_id\". Expecting non-empty string"
|
|
" for service identifier."
|
|
msgstr ""
|
|
|
|
#: /Applications/Splunk/etc/apps/SA-ITOA/lib/itsi/itoa_rest_interface_provider/itoa_rest_interface_provider.py:776
|
|
msgid "Invalid or missing service link map. Payload received: {}"
|
|
msgstr ""
|
|
|
|
#: /Applications/Splunk/etc/apps/SA-ITOA/lib/itsi/itoa_rest_interface_provider/itoa_rest_interface_provider.py:786
|
|
msgid "Invalid overwrite_entity_rules. Payload received: {}."
|
|
msgstr ""
|
|
|
|
#: /Applications/Splunk/etc/apps/SA-ITOA/lib/itsi/event_management/utils.py:94
|
|
msgid ""
|
|
"Invalid owner={0} for event title={1}. Unable to find owner in valid "
|
|
"Splunk user list, hence setting to default owner={2}."
|
|
msgstr ""
|
|
|
|
#: /Applications/Splunk/etc/apps/SA-ITOA/bin/notable_event_ace_interface_splunkd.py:53
|
|
msgid "Invalid parameters recieved from splunkd rest request"
|
|
msgstr ""
|
|
|
|
#: /Applications/Splunk/etc/apps/SA-ITOA/lib/itsi/upgrade/kvstore_backup_restore.py:1214
|
|
msgid "Invalid partial backup rule. Must provide a valid rule."
|
|
msgstr ""
|
|
|
|
#: /Applications/Splunk/etc/apps/SA-ITOA/lib/ITOA/itoa_common.py:168
|
|
#, python-format
|
|
msgid "Invalid path element. %s"
|
|
msgstr ""
|
|
|
|
#: /Applications/Splunk/etc/apps/SA-ITOA/lib/itsi/objects/itsi_kpi.py:443
|
|
msgid ""
|
|
"Invalid percentile value enter, the value must be a whole number between "
|
|
"1 and 99."
|
|
msgstr ""
|
|
|
|
#: /Applications/Splunk/etc/apps/SA-ITOA/lib/itsi/access_control/access_control_controller_utils.py:283
|
|
msgid "Invalid r_data: {} type: {}"
|
|
msgstr ""
|
|
|
|
#: /Applications/Splunk/etc/apps/SA-ITOA/lib/itsi/itsi_time_block_utils.py:577
|
|
msgid ""
|
|
"Invalid range for cron element type: {0}. Expected [<int>, <int>], found:"
|
|
" {1}."
|
|
msgstr ""
|
|
|
|
#: /Applications/Splunk/etc/apps/SA-ITOA/lib/itsi/searches/itsi_filter.py:330
|
|
msgid "Invalid range requested. offset: {0}, count: {1}, result set count: {2}"
|
|
msgstr ""
|
|
|
|
#: /Applications/Splunk/etc/apps/SA-ITOA/lib/ITOA/storage/itoa_generic_persistables.py:76
|
|
msgid "Invalid response received from the backend."
|
|
msgstr ""
|
|
|
|
#: /Applications/Splunk/etc/apps/SA-ITOA/lib/itsi/event_management/itsi_notable_event_retention_policy.py:76
|
|
msgid "Invalid retention object count={0}, expected key={1}."
|
|
msgstr ""
|
|
|
|
#: /Applications/Splunk/etc/apps/SA-ITOA/lib/itsi/searches/kpi_summary_cache_retention_policy.py:46
|
|
#, python-format
|
|
msgid "Invalid retention time provided. retention_time=\"%s\""
|
|
msgstr ""
|
|
|
|
#: /Applications/Splunk/etc/apps/SA-ITOA/lib/itsi/event_management/itsi_notable_event_retention_policy.py:50
|
|
msgid "Invalid retention time={0}, expected key={1}."
|
|
msgstr ""
|
|
|
|
#: /Applications/Splunk/etc/apps/SA-ITOA/lib/ITOA/event_management/correlation_search.py:434
|
|
msgid "Invalid search list. Provided type={0}."
|
|
msgstr ""
|
|
|
|
#: /Applications/Splunk/etc/apps/SA-ITOA/lib/ITOA/event_management/correlation_search.py:458
|
|
msgid "Invalid search name. Search name is required."
|
|
msgstr ""
|
|
|
|
#: /Applications/Splunk/etc/apps/SA-ITOA/lib/itsi/objects/itsi_service.py:582
|
|
#, python-format
|
|
msgid "Invalid service in service list %s."
|
|
msgstr ""
|
|
|
|
#: /Applications/Splunk/etc/apps/SA-ITOA/lib/itsi/objects/changehandlers/kpi_thresholds_template_delete_handler.py:68
|
|
#: /Applications/Splunk/etc/apps/SA-ITOA/lib/itsi/objects/changehandlers/kpi_thresholds_template_update_handler.py:81
|
|
msgid "Invalid service list"
|
|
msgstr ""
|
|
|
|
#: /Applications/Splunk/etc/apps/SA-ITOA/lib/itsi/objects/itsi_service.py:1292
|
|
msgid ""
|
|
"Invalid service template id provided while updating service `{0}`. Cannot"
|
|
" re-link service to another service template through this endpoint, check"
|
|
" ITSI API docs to find API for re-linking of service to another service "
|
|
"template. Expected service template id `{1}`, found `{2}`"
|
|
msgstr ""
|
|
|
|
#: /Applications/Splunk/etc/apps/SA-ITOA/lib/itsi/itoa_rest_interface_provider/itoa_rest_interface_provider.py:779
|
|
msgid "Invalid service template key. Payload received: {}"
|
|
msgstr ""
|
|
|
|
#: /Applications/Splunk/etc/apps/SA-ITOA/lib/itsi/objects/changehandlers/kpi_thresholds_template_update_handler.py:83
|
|
msgid "Invalid service templates list"
|
|
msgstr ""
|
|
|
|
#: /Applications/Splunk/etc/apps/SA-ITOA/bin/command_set_severity_fields.py:133
|
|
msgid "Invalid serviceid argument"
|
|
msgstr ""
|
|
|
|
#: /Applications/Splunk/etc/apps/SA-ITOA/lib/ITOA/event_management/hec_utils.py:60
|
|
msgid "Invalid session key type. Expecting string."
|
|
msgstr ""
|
|
|
|
#: /Applications/Splunk/etc/apps/SA-ITOA/lib/ITOA/event_management/base_event_management.py:84
|
|
#: /Applications/Splunk/etc/apps/SA-ITOA/lib/ITOA/event_management/correlation_search.py:60
|
|
#: /Applications/Splunk/etc/apps/SA-ITOA/lib/ITOA/event_management/hec_utils.py:62
|
|
#: /Applications/Splunk/etc/apps/SA-ITOA/lib/ITOA/event_management/notable_event_utils.py:277
|
|
#: /Applications/Splunk/etc/apps/SA-ITOA/lib/ITOA/event_management/notable_event_utils.py:545
|
|
#: /Applications/Splunk/etc/apps/SA-ITOA/lib/ITOA/event_management/notable_event_utils.py:723
|
|
#: /Applications/Splunk/etc/apps/SA-ITOA/lib/ITOA/itoa_common.py:216
|
|
#: /Applications/Splunk/etc/apps/SA-ITOA/lib/ITOA/itoa_common.py:236
|
|
#: /Applications/Splunk/etc/apps/SA-ITOA/lib/itsi/event_management/utils.py:504
|
|
#: /Applications/Splunk/etc/apps/SA-ITOA/lib/itsi/event_management/utils.py:579
|
|
msgid "Invalid session key."
|
|
msgstr ""
|
|
|
|
#: /Applications/Splunk/etc/apps/SA-ITOA/lib/itsi/event_management/utils.py:114
|
|
msgid ""
|
|
"Invalid severity={0} for event title={1}. Unable to find severity in "
|
|
"itsi_notable_event_severity.conf, hence setting to default severity={2}."
|
|
msgstr ""
|
|
|
|
#: /Applications/Splunk/etc/apps/SA-ITOA/lib/itsi/csv_import/itoa_bulk_import_specification.py:135
|
|
msgid ""
|
|
"Invalid specification - No object specification found in input. Received "
|
|
"- {0}."
|
|
msgstr ""
|
|
|
|
#: /Applications/Splunk/etc/apps/SA-ITOA/lib/itsi/csv_import/itoa_bulk_import_specification.py:496
|
|
msgid "Invalid specification: The title field is specified as a duplicate of {}."
|
|
msgstr ""
|
|
|
|
#: /Applications/Splunk/etc/apps/SA-ITOA/lib/itsi/csv_import/itoa_bulk_import_specification.py:483
|
|
msgid "Invalid specification: The title field is specified multiple times."
|
|
msgstr ""
|
|
|
|
#: /Applications/Splunk/etc/apps/SA-ITOA/lib/itsi/event_management/utils.py:104
|
|
msgid ""
|
|
"Invalid status={0} for event title={1}. Unable to find status in "
|
|
"itsi_notable_event_status.conf, hence setting to default status={2}."
|
|
msgstr ""
|
|
|
|
#: /Applications/Splunk/etc/apps/SA-ITOA/lib/itsi/itsi_time_block_utils.py:206
|
|
msgid "Invalid time block cron: {0}. Expected {1} elements, received {2}."
|
|
msgstr ""
|
|
|
|
#: /Applications/Splunk/etc/apps/SA-ITOA/lib/ITOA/itoa_object.py:151
|
|
#: /Applications/Splunk/etc/apps/SA-ITOA/lib/itsi/objects/itsi_entity.py:43
|
|
#, python-format
|
|
msgid ""
|
|
"Invalid title specified for the object_type: %s. Cannot be empty and "
|
|
"cannot contain = \" or '."
|
|
msgstr ""
|
|
|
|
#: /Applications/Splunk/etc/apps/SA-ITOA/lib/ITOA/event_management/hec_utils.py:65
|
|
msgid "Invalid token name type. Expecting string."
|
|
msgstr ""
|
|
|
|
#: /Applications/Splunk/etc/apps/SA-ITOA/lib/ITOA/event_management/hec_utils.py:67
|
|
msgid "Invalid token name value."
|
|
msgstr ""
|
|
|
|
#: /Applications/Splunk/etc/apps/SA-ITOA/lib/itsi/itsi_time_block_utils.py:706
|
|
msgid "Invalid type \"{0}\" for CRON element numbers: {1}. Expected list."
|
|
msgstr ""
|
|
|
|
#: /Applications/Splunk/etc/apps/SA-ITOA/lib/itsi/itsi_time_block_utils.py:634
|
|
msgid "Invalid type \"{0}\" for cron element: {1}. Expected basestring."
|
|
msgstr ""
|
|
|
|
#: /Applications/Splunk/etc/apps/SA-ITOA/lib/itsi/itsi_time_block_utils.py:171
|
|
msgid "Invalid type \"{0}\" for duration: {1}. Expected int."
|
|
msgstr ""
|
|
|
|
#: /Applications/Splunk/etc/apps/SA-ITOA/lib/itsi/itsi_time_block_utils.py:200
|
|
msgid "Invalid type \"{0}\" for time block cron: {1}. Expected basestring."
|
|
msgstr ""
|
|
|
|
#: /Applications/Splunk/etc/apps/SA-ITOA/lib/ITOA/event_management/notable_event_ticketing.py:145
|
|
msgid "Invalid type `app`."
|
|
msgstr ""
|
|
|
|
#: /Applications/Splunk/etc/apps/SA-ITOA/lib/ITOA/event_management/notable_event_ticketing.py:137
|
|
msgid "Invalid type `collection`."
|
|
msgstr ""
|
|
|
|
#: /Applications/Splunk/etc/apps/SA-ITOA/lib/ITOA/event_management/notable_event_ticketing.py:129
|
|
msgid "Invalid type `event_id`."
|
|
msgstr ""
|
|
|
|
#: /Applications/Splunk/etc/apps/SA-ITOA/lib/ITOA/event_management/notable_event_ticketing.py:141
|
|
msgid "Invalid type `ns`."
|
|
msgstr ""
|
|
|
|
#: /Applications/Splunk/etc/apps/SA-ITOA/lib/ITOA/event_management/notable_event_ticketing.py:133
|
|
msgid "Invalid type `session_key`."
|
|
msgstr ""
|
|
|
|
#: /Applications/Splunk/etc/apps/SA-ITOA/lib/ITOA/event_management/notable_event_ticketing.py:530
|
|
#: /Applications/Splunk/etc/apps/SA-ITOA/lib/ITOA/event_management/notable_event_ticketing.py:656
|
|
#, python-format
|
|
msgid "Invalid type event_ids. Received=%s."
|
|
msgstr ""
|
|
|
|
#: /Applications/Splunk/etc/apps/SA-ITOA/lib/itsi/searches/itsi_searches.py:253
|
|
msgid "Invalid type for \"kpi_id\". Expecting non-empty string."
|
|
msgstr ""
|
|
|
|
#: /Applications/Splunk/etc/apps/SA-ITOA/lib/itsi/event_management/itsi_notable_event_queue_consumer.py:90
|
|
msgid ""
|
|
"Invalid type for \"{}\". Expecting string type. Received value=\"{}\" "
|
|
"type=\"{}\""
|
|
msgstr ""
|
|
|
|
#: /Applications/Splunk/etc/apps/SA-ITOA/lib/itsi/objects/itsi_service.py:1755
|
|
#, python-format
|
|
msgid "Invalid type for KPI. Expected JSON, received %s."
|
|
msgstr ""
|
|
|
|
#: /Applications/Splunk/etc/apps/SA-ITOA/lib/itsi/objects/itsi_kpi.py:325
|
|
msgid "Invalid type for KPI. Expecting a dictionary."
|
|
msgstr ""
|
|
|
|
#: /Applications/Splunk/etc/apps/SA-ITOA/lib/itsi/objects/itsi_service.py:1748
|
|
#, python-format
|
|
msgid "Invalid type for KPIs. Expected list, received %s."
|
|
msgstr ""
|
|
|
|
#: /Applications/Splunk/etc/apps/SA-ITOA/lib/ITOA/event_management/rules_engine/clause.py:33
|
|
#, python-format
|
|
msgid "Invalid type for `clause`. expecting: dict received type=%s."
|
|
msgstr ""
|
|
|
|
#: /Applications/Splunk/etc/apps/SA-ITOA/lib/itsi/event_management/sdk/eventing.py:241
|
|
#: /Applications/Splunk/etc/apps/SA-ITOA/lib/itsi/event_management/sdk/eventing.py:301
|
|
#: /Applications/Splunk/etc/apps/SA-ITOA/lib/itsi/event_management/sdk/eventing.py:361
|
|
msgid "Invalid type for `events`. Expecting list. Received type: {}"
|
|
msgstr ""
|
|
|
|
#: /Applications/Splunk/etc/apps/SA-ITOA/lib/ITOA/event_management/rules_engine/criterion.py:35
|
|
#: /Applications/Splunk/etc/apps/SA-ITOA/lib/ITOA/event_management/rules_engine/criterion.py:59
|
|
#: /Applications/Splunk/etc/apps/SA-ITOA/lib/ITOA/event_management/rules_engine/criterion.py:85
|
|
#: /Applications/Splunk/etc/apps/SA-ITOA/lib/ITOA/event_management/rules_engine/criterion.py:113
|
|
#, python-format
|
|
msgid "Invalid type for criteria. Expecting a dictionary.Received type=%s"
|
|
msgstr ""
|
|
|
|
#: /Applications/Splunk/etc/apps/SA-ITOA/lib/itsi/upgrade/itsi_migration.py:1174
|
|
#, python-format
|
|
msgid "Invalid type for deep dive. Expecting a dictionary. Received=%s. type=%s."
|
|
msgstr ""
|
|
|
|
#: /Applications/Splunk/etc/apps/SA-ITOA/lib/ITOA/event_management/notable_event_utils.py:856
|
|
msgid "Invalid type for owner_collection_uri."
|
|
msgstr ""
|
|
|
|
#: /Applications/Splunk/etc/apps/SA-ITOA/lib/itsi/objects/itsi_service.py:1526
|
|
msgid "Invalid type for service(s). Expected list, received {}."
|
|
msgstr ""
|
|
|
|
#: /Applications/Splunk/etc/apps/SA-ITOA/lib/itsi/objects/itsi_service.py:1256
|
|
msgid "Invalid type for service. Expected JSON, received {}."
|
|
msgstr ""
|
|
|
|
#: /Applications/Splunk/etc/apps/SA-ITOA/lib/itsi/objects/itsi_kpi.py:331
|
|
msgid "Invalid type for service_entity_rules. Expecting valid list"
|
|
msgstr ""
|
|
|
|
#: /Applications/Splunk/etc/apps/SA-ITOA/lib/itsi/objects/itsi_kpi.py:333
|
|
msgid "Invalid type for service_id. Expecting valid string."
|
|
msgstr ""
|
|
|
|
#: /Applications/Splunk/etc/apps/SA-ITOA/lib/itsi/objects/itsi_kpi.py:337
|
|
msgid "Invalid type for service_is_enabled. Expecting int."
|
|
msgstr ""
|
|
|
|
#: /Applications/Splunk/etc/apps/SA-ITOA/lib/itsi/objects/itsi_kpi.py:335
|
|
msgid "Invalid type for service_title. Expecting valid string."
|
|
msgstr ""
|
|
|
|
#: /Applications/Splunk/etc/apps/SA-ITOA/lib/itsi/event_management/itsi_notable_event_queue_consumer.py:80
|
|
msgid "Invalid type for session_key. Received type=\"{}\"."
|
|
msgstr ""
|
|
|
|
#: /Applications/Splunk/etc/apps/SA-ITOA/lib/itsi/objects/itsi_service.py:1743
|
|
msgid "Invalid type for {0}. Expected JSON, received {1}."
|
|
msgstr ""
|
|
|
|
#: /Applications/Splunk/etc/apps/SA-ITOA/lib/itsi/objects/itsi_service.py:1641
|
|
#, python-format
|
|
msgid ""
|
|
"Invalid type of AND entity rule term specified for service %s. Expected "
|
|
"JSON, received %s."
|
|
msgstr ""
|
|
|
|
#: /Applications/Splunk/etc/apps/SA-ITOA/lib/itsi/objects/itsi_service.py:1632
|
|
#, python-format
|
|
msgid ""
|
|
"Invalid type of OR entity rule term specified for service %s. Expected "
|
|
"JSON, received %s."
|
|
msgstr ""
|
|
|
|
#: /Applications/Splunk/etc/apps/SA-ITOA/lib/ITOA/splunk_search_chunk_protocol.py:115
|
|
msgid "Invalid type value"
|
|
msgstr ""
|
|
|
|
#: /Applications/Splunk/etc/apps/SA-ITOA/lib/itsi/objects/itsi_kpi.py:208
|
|
#, python-format
|
|
msgid "Invalid type=\"%s\" for KPI. Expecting a dictionary."
|
|
msgstr ""
|
|
|
|
#: /Applications/Splunk/etc/apps/SA-ITOA/lib/itsi/objects/itsi_kpi.py:189
|
|
#, python-format
|
|
msgid "Invalid type=\"%s\" for kpi_id. Expecting string type."
|
|
msgstr ""
|
|
|
|
#: /Applications/Splunk/etc/apps/SA-ITOA/lib/itsi/upgrade/itsi_migration.py:1073
|
|
#: /Applications/Splunk/etc/apps/SA-ITOA/lib/itsi/upgrade/itsi_migration.py:1109
|
|
#: /Applications/Splunk/etc/apps/SA-ITOA/lib/itsi/upgrade/itsi_migration.py:1145
|
|
#, python-format
|
|
msgid "Invalid type=%s for `lane_settings_collection`. Expecting list."
|
|
msgstr ""
|
|
|
|
#: /Applications/Splunk/etc/apps/SA-ITOA/lib/ITOA/event_management/notable_event_ticketing.py:209
|
|
#, python-format
|
|
msgid "Invalid type=`%s` for `%s`. Expecting string."
|
|
msgstr ""
|
|
|
|
#: /Applications/Splunk/etc/apps/SA-ITOA/lib/ITOA/itoa_object.py:463
|
|
#: /Applications/Splunk/etc/apps/SA-ITOA/lib/itsi/objects/itsi_security_group.py:213
|
|
msgid "Invalid update payload found, must be a valid JSON dictionary."
|
|
msgstr ""
|
|
|
|
#: /Applications/Splunk/etc/apps/SA-ITOA/lib/itsi/objects/itsi_service.py:1488
|
|
#, python-format
|
|
msgid ""
|
|
"Invalid update request. Cannot add a new KPI with a link to service "
|
|
"template, through service update request. To add a new KPI with a link to"
|
|
" service template, add the KPI to the service template, then push out the"
|
|
" changes to linked services. service_id=\"%s\", kpi_id=\"%s\""
|
|
msgstr ""
|
|
|
|
#: /Applications/Splunk/etc/apps/SA-ITOA/lib/itsi/objects/itsi_service.py:1462
|
|
#, python-format
|
|
msgid ""
|
|
"Invalid update request. Cannot update search attributes for KPI linked to"
|
|
" service template. To update KPI search attributes, update the "
|
|
"corresponding KPI in service template and then push out changes to linked"
|
|
" services. service_id=\"%s\", kpi_id=\"%s\", service_template_id=\"%s\", "
|
|
"attribute_update_requested=\"%s\""
|
|
msgstr ""
|
|
|
|
#: /Applications/Splunk/etc/apps/SA-ITOA/lib/ITOA/itoa_object.py:359
|
|
msgid "Invalid upsert payload found, must be a valid JSON list."
|
|
msgstr ""
|
|
|
|
#: /Applications/Splunk/etc/apps/SA-ITOA/lib/ITOA/event_management/notable_event_ticketing.py:147
|
|
msgid "Invalid value `app`."
|
|
msgstr ""
|
|
|
|
#: /Applications/Splunk/etc/apps/SA-ITOA/lib/ITOA/event_management/notable_event_ticketing.py:139
|
|
msgid "Invalid value `collection`."
|
|
msgstr ""
|
|
|
|
#: /Applications/Splunk/etc/apps/SA-ITOA/lib/ITOA/event_management/notable_event_ticketing.py:131
|
|
msgid "Invalid value `event_id`."
|
|
msgstr ""
|
|
|
|
#: /Applications/Splunk/etc/apps/SA-ITOA/lib/ITOA/event_management/notable_event_ticketing.py:143
|
|
msgid "Invalid value `ns`."
|
|
msgstr ""
|
|
|
|
#: /Applications/Splunk/etc/apps/SA-ITOA/lib/ITOA/event_management/notable_event_ticketing.py:135
|
|
msgid "Invalid value `session_key`."
|
|
msgstr ""
|
|
|
|
#: /Applications/Splunk/etc/apps/SA-ITOA/bin/command_suppress_alert.py:43
|
|
msgid "Invalid value for `count` field."
|
|
msgstr ""
|
|
|
|
#: /Applications/Splunk/etc/apps/SA-ITOA/bin/command_suppress_alert.py:46
|
|
msgid "Invalid value for `is_consecutive` field."
|
|
msgstr ""
|
|
|
|
#: /Applications/Splunk/etc/apps/SA-ITOA/lib/ITOA/event_management/notable_event_utils.py:859
|
|
msgid "Invalid value for owner_collection_uri."
|
|
msgstr ""
|
|
|
|
#: /Applications/Splunk/etc/apps/SA-ITOA/lib/migration/migration.py:222
|
|
#: /Applications/Splunk/etc/apps/SA-ITOA/lib/migration/migration.py:224
|
|
msgid "Invalid version:{0}."
|
|
msgstr ""
|
|
|
|
#: /Applications/Splunk/etc/apps/SA-ITOA/lib/itsi/event_management/event_management_rest_provider.py:643
|
|
msgid "Invalid/Missing data."
|
|
msgstr ""
|
|
|
|
#: /Applications/Splunk/etc/apps/SA-ITOA/lib/itsi/event_management/event_management_rest_provider.py:652
|
|
msgid "Invalid/Missing event IDs."
|
|
msgstr ""
|
|
|
|
#: /Applications/Splunk/etc/apps/SA-ITOA/lib/itsi/csv_import/itoa_bulk_import_specification.py:244
|
|
msgid "Invalid/empty specification as input. Received - {0}."
|
|
msgstr ""
|
|
|
|
#: /Applications/Splunk/etc/apps/SA-ITOA/default/itsi_notable_event_status.conf:25
|
|
msgid "Investigation or response is in-process"
|
|
msgstr ""
|
|
|
|
#: /Applications/Splunk/etc/apps/SA-ITOA/lib/ITOA/event_management/base_event_generation.py:108
|
|
msgid "Invoking modular alert action"
|
|
msgstr ""
|
|
|
|
#: /Applications/Splunk/etc/apps/SA-ITOA/default/itsi_notable_event_status.conf:43
|
|
msgid "Issue has been resolved and verified"
|
|
msgstr ""
|
|
|
|
#: /Applications/Splunk/etc/apps/SA-ITOA/lib/ITOA/storage/statestore.py:93
|
|
msgid "JSON payload is invalid."
|
|
msgstr ""
|
|
|
|
#: /Applications/Splunk/etc/apps/SA-ITOA/lib/itsi/backup_restore/itsi_backup_restore_utils.py:406
|
|
msgid ""
|
|
"Job {}'s owning host with search head id {} seems to be unavailable. "
|
|
"Cannot process job. Retry once host is up."
|
|
msgstr ""
|
|
|
|
#: /Applications/Splunk/etc/apps/SA-ITOA/lib/itsi/backup_restore/itsi_backup_restore_utils.py:401
|
|
msgid ""
|
|
"Job {}'s owning host {} seems to be unavailable. Cannot process job. "
|
|
"Retry once host is up."
|
|
msgstr ""
|
|
|
|
#: /Applications/Splunk/etc/apps/SA-ITOA/lib/itsi/upgrade/itsi_migration.py:417
|
|
#, python-format
|
|
msgid "KPI %s has no 'isadhoc' field, analyzing KPI to determine search type."
|
|
msgstr ""
|
|
|
|
#: /Applications/Splunk/etc/apps/SA-ITOA/lib/itsi/event_management/itsi_correlation_search.py:232
|
|
msgid "KPI ID is not a list."
|
|
msgstr ""
|
|
|
|
#: /Applications/Splunk/etc/apps/SA-ITOA/lib/itsi/mad/itsi_mad_searches.py:397
|
|
msgid "KPI ID must be in the format of a valid string."
|
|
msgstr ""
|
|
|
|
#: /Applications/Splunk/etc/apps/SA-ITOA/lib/itsi/searches/itsi_shared_base_search.py:46
|
|
msgid "KPI base search ID must be a valid string."
|
|
msgstr ""
|
|
|
|
#: /Applications/Splunk/etc/apps/SA-ITOA/lib/itsi_module/itsi_module_kpi_base_search.py:27
|
|
msgid "KPI base search ID needs to be prefixed with module ID."
|
|
msgstr ""
|
|
|
|
#: /Applications/Splunk/etc/apps/SA-ITOA/lib/itsi/objects/itsi_kpi_base_search.py:517
|
|
msgid ""
|
|
"KPI base search cannot be deleted because it is being used by one or more"
|
|
" service templates."
|
|
msgstr ""
|
|
|
|
#: /Applications/Splunk/etc/apps/SA-ITOA/default/itsi_kpi_base_search.conf:461
|
|
msgid "KPI base search for Cloud Performance of AWS EBS entities."
|
|
msgstr ""
|
|
|
|
#: /Applications/Splunk/etc/apps/SA-ITOA/default/itsi_kpi_base_search.conf:563
|
|
msgid "KPI base search for Cloud Performance of AWS EC2 entities."
|
|
msgstr ""
|
|
|
|
#: /Applications/Splunk/etc/apps/SA-ITOA/default/itsi_kpi_base_search.conf:193
|
|
msgid "KPI base search for Disk Device Performance of *Nix entities."
|
|
msgstr ""
|
|
|
|
#: /Applications/Splunk/etc/apps/SA-ITOA/default/itsi_kpi_base_search.conf:119
|
|
msgid "KPI base search for Disk Performance of *Nix entities."
|
|
msgstr ""
|
|
|
|
#: /Applications/Splunk/etc/apps/SA-ITOA/default/itsi_kpi_base_search.conf:239
|
|
msgid "KPI base search for Network Performance of *Nix entities."
|
|
msgstr ""
|
|
|
|
#: /Applications/Splunk/etc/apps/SA-ITOA/default/itsi_kpi_base_search.conf:387
|
|
msgid "KPI base search for OS Instance Performance of Windows entities."
|
|
msgstr ""
|
|
|
|
#: /Applications/Splunk/etc/apps/SA-ITOA/default/itsi_kpi_base_search.conf:3
|
|
msgid "KPI base search for OS Performance of *Nix entities."
|
|
msgstr ""
|
|
|
|
#: /Applications/Splunk/etc/apps/SA-ITOA/default/itsi_kpi_base_search.conf:327
|
|
msgid "KPI base search for OS Performance of Windows entities."
|
|
msgstr ""
|
|
|
|
#: /Applications/Splunk/etc/apps/SA-ITOA/lib/itsi/objects/itsi_kpi_base_search.py:472
|
|
msgid ""
|
|
"KPI base search metric cannot be deleted because it is being used by one "
|
|
"or more service templates."
|
|
msgstr ""
|
|
|
|
#: /Applications/Splunk/etc/apps/SA-ITOA/lib/itsi_module/itsi_module_kpi_base_search.py:30
|
|
msgid "KPI base search metric {} must have an ID."
|
|
msgstr ""
|
|
|
|
#: /Applications/Splunk/etc/apps/SA-ITOA/lib/itsi_module/itsi_module_kpi_base_search.py:29
|
|
msgid "KPI base search needs to contain at least one metric."
|
|
msgstr ""
|
|
|
|
#: /Applications/Splunk/etc/apps/SA-ITOA/lib/itsi/searches/itsi_shared_base_search.py:50
|
|
msgid "KPI base search passed in does not match key passed in."
|
|
msgstr ""
|
|
|
|
#: /Applications/Splunk/etc/apps/SA-ITOA/lib/itsi_module/itsi_module_kpi_base_search.py:28
|
|
msgid "KPI base search title needs to be prefixed with module ID."
|
|
msgstr ""
|
|
|
|
#: /Applications/Splunk/etc/apps/SA-ITOA/lib/itsi_module/itsi_module_kpi_group.py:85
|
|
msgid "KPI group title is missing from the payload."
|
|
msgstr ""
|
|
|
|
#: /Applications/Splunk/etc/apps/SA-ITOA/lib/itsi/objects/itsi_service.py:1771
|
|
msgid ""
|
|
"KPI keys are not unique within the same {0}. KPIs must have unique keys. "
|
|
"Duplicate _key = {1}"
|
|
msgstr ""
|
|
|
|
#: /Applications/Splunk/etc/apps/SA-ITOA/lib/itsi/objects/itsi_service.py:1788
|
|
msgid "KPI keys are not unique. KPIs must have unique keys. Eg. _key: "
|
|
msgstr ""
|
|
|
|
#: /Applications/Splunk/etc/apps/SA-ITOA/lib/itsi/objects/itsi_service.py:1936
|
|
msgid ""
|
|
"KPI keys are not unique. KPIs must have unique keys. Eg: existing service"
|
|
" duplicating key for KPIs that you are trying to save are: "
|
|
msgstr ""
|
|
|
|
#: /Applications/Splunk/etc/apps/SA-ITOA/lib/itsi/objects/itsi_service.py:1943
|
|
msgid "KPI keys specified for update do not exist. Example: "
|
|
msgstr ""
|
|
|
|
#: /Applications/Splunk/etc/apps/SA-ITOA/lib/itsi_module/itsi_module_kpi_group.py:27
|
|
msgid "KPI template ID needs to be prefixed with module ID."
|
|
msgstr ""
|
|
|
|
#: /Applications/Splunk/etc/apps/SA-ITOA/lib/itsi_module/itsi_module_kpi_group.py:29
|
|
msgid "KPI template requires a description."
|
|
msgstr ""
|
|
|
|
#: /Applications/Splunk/etc/apps/SA-ITOA/lib/itsi_module/itsi_module_kpi_group.py:28
|
|
msgid "KPI template requires a title."
|
|
msgstr ""
|
|
|
|
#: /Applications/Splunk/etc/apps/SA-ITOA/lib/itsi_module/itsi_module_kpi_group.py:30
|
|
msgid "KPI template requires at least one KPI."
|
|
msgstr ""
|
|
|
|
#: /Applications/Splunk/etc/apps/SA-ITOA/lib/itsi/objects/itsi_kpi_threshold_template.py:228
|
|
msgid ""
|
|
"KPI threshold template cannot be deleted because it is being used by one "
|
|
"or more service templates."
|
|
msgstr ""
|
|
|
|
#: /Applications/Splunk/etc/apps/SA-ITOA/lib/itsi_module/itsi_module_kpi_group.py:33
|
|
msgid ""
|
|
"KPI {} refers to base search ID {} and base search metric {} that is not "
|
|
"part of an exported KPI base search."
|
|
msgstr ""
|
|
|
|
#: /Applications/Splunk/etc/apps/SA-ITOA/lib/itsi_module/itsi_module_kpi_group.py:32
|
|
msgid ""
|
|
"KPI {} refers to base search ID {} that is not part of an exported KPI "
|
|
"base search."
|
|
msgstr ""
|
|
|
|
#: /Applications/Splunk/etc/apps/SA-ITOA/lib/itsi/objects/itsi_kpi.py:475
|
|
msgid "KPIs must have a valid title."
|
|
msgstr ""
|
|
|
|
#: /Applications/Splunk/etc/apps/SA-ITOA/lib/itsi/objects/itsi_kpi_template.py:61
|
|
msgid "KPIs seem invalid. Expected list, found {0}."
|
|
msgstr ""
|
|
|
|
#: /Applications/Splunk/etc/apps/SA-ITOA/lib/ITOA/storage/itoa_generic_persistables.py:122
|
|
msgid "KV store collection name must be supplied as a class variable."
|
|
msgstr ""
|
|
|
|
#: /Applications/Splunk/etc/apps/SA-ITOA/lib/itsi/event_management/utils.py:532
|
|
msgid "KV store failed to initialize in time"
|
|
msgstr ""
|
|
|
|
#: /Applications/Splunk/etc/apps/SA-ITOA/bin/kvstore_to_json.py:674
|
|
msgid ""
|
|
"KV store has not been initialized yet. Make sure Splunk is running. If it"
|
|
" is, check for startup errors."
|
|
msgstr ""
|
|
|
|
#: /Applications/Splunk/etc/apps/SA-ITOA/lib/itsi/event_management/itsi_notable_event_queue_consumer.py:133
|
|
msgid "KV store is not initialized."
|
|
msgstr ""
|
|
|
|
#: /Applications/Splunk/etc/apps/SA-ITOA/lib/itsi/itsi_utils.py:1345
|
|
msgid ""
|
|
"KV store is not initialized. We have tried for 5 minutes but KV store "
|
|
"still not available."
|
|
msgstr ""
|
|
|
|
#: /Applications/Splunk/etc/apps/SA-ITOA/lib/ITOA/storage/itoa_generic_persistables.py:40
|
|
msgid "KV store is unavailable."
|
|
msgstr ""
|
|
|
|
#: /Applications/Splunk/etc/apps/SA-ITOA/lib/itsi/csv_import/itoa_bulk_import_common.py:232
|
|
#, python-format
|
|
msgid "Key %s not found."
|
|
msgstr ""
|
|
|
|
#: /Applications/Splunk/etc/apps/SA-ITOA/bin/itsi_async_csv_loader.py:76
|
|
#: /Applications/Splunk/etc/apps/SA-ITOA/bin/itsi_csv_import.py:89
|
|
msgid "Latest index time"
|
|
msgstr ""
|
|
|
|
#: /Applications/Splunk/etc/apps/SA-ITOA/bin/itsi_async_csv_loader.py:77
|
|
#: /Applications/Splunk/etc/apps/SA-ITOA/bin/itsi_csv_import.py:90
|
|
msgid ""
|
|
"Latest index time you want to use with your Splunk search to import "
|
|
"entities/services. If no value is provided, we will default to 'now'"
|
|
msgstr ""
|
|
|
|
#: /Applications/Splunk/etc/apps/SA-ITOA/default/alert_actions.conf:34
|
|
msgid "Link Ticket"
|
|
msgstr ""
|
|
|
|
#: /Applications/Splunk/etc/apps/SA-ITOA/bin/itsi_default_aggregation_policy_loader.py:29
|
|
msgid "Loads the default aggregation policies."
|
|
msgstr ""
|
|
|
|
#: /Applications/Splunk/etc/apps/SA-ITOA/bin/itsi_default_correlation_search_acl_loader.py:28
|
|
msgid "Loads the default correlation search ACL."
|
|
msgstr ""
|
|
|
|
#: /Applications/Splunk/etc/apps/SA-ITOA/bin/configure_itsi.py:44
|
|
#: /Applications/Splunk/etc/apps/SA-ITOA/bin/itsi_age_kpi_alert_value_cache.py:36
|
|
#: /Applications/Splunk/etc/apps/SA-ITOA/bin/itsi_async_csv_loader.py:49
|
|
#: /Applications/Splunk/etc/apps/SA-ITOA/bin/itsi_backfill.py:51
|
|
#: /Applications/Splunk/etc/apps/SA-ITOA/bin/itsi_backup_restore.py:33
|
|
#: /Applications/Splunk/etc/apps/SA-ITOA/bin/itsi_consumer.py:168
|
|
#: /Applications/Splunk/etc/apps/SA-ITOA/bin/itsi_csv_import.py:57
|
|
#: /Applications/Splunk/etc/apps/SA-ITOA/bin/itsi_default_aggregation_policy_loader.py:40
|
|
#: /Applications/Splunk/etc/apps/SA-ITOA/bin/itsi_default_correlation_search_acl_loader.py:39
|
|
#: /Applications/Splunk/etc/apps/SA-ITOA/bin/itsi_notable_event_hec_init.py:38
|
|
#: /Applications/Splunk/etc/apps/SA-ITOA/bin/itsi_refresher.py:41
|
|
#: /Applications/Splunk/etc/apps/SA-ITOA/bin/itsi_scheduled_backup_caller.py:39
|
|
#: /Applications/Splunk/etc/apps/SA-ITOA/bin/itsi_service_template_update_scheduler.py:39
|
|
#: /Applications/Splunk/etc/apps/SA-ITOA/bin/itsi_upgrade.py:43
|
|
#: /Applications/Splunk/etc/apps/SA-ITOA/bin/itsi_user_access_init.py:46
|
|
#: /Applications/Splunk/etc/apps/SA-ITOA/bin/maintenance_minder.py:35
|
|
msgid "Logging Level"
|
|
msgstr ""
|
|
|
|
#: /Applications/Splunk/etc/apps/SA-ITOA/bin/itsi_consumer.py:169
|
|
msgid "Logging level to use for logging errors (ERROR, WARNING, INFO, DEBUG)"
|
|
msgstr ""
|
|
|
|
#: /Applications/Splunk/etc/apps/SA-ITOA/lib/itsi/event_management/sdk/eventing_base.py:38
|
|
msgid "Login failed. Check your credentials and try again."
|
|
msgstr ""
|
|
|
|
#: /Applications/Splunk/etc/apps/SA-ITOA/default/itsi_notable_event_severity.conf:23
|
|
msgid "Low"
|
|
msgstr ""
|
|
|
|
#: /Applications/Splunk/etc/apps/SA-ITOA/bin/maintenance_minder.py:22
|
|
msgid "Maintenance Minder Modular Input"
|
|
msgstr ""
|
|
|
|
#: /Applications/Splunk/etc/apps/SA-ITOA/bin/maintenance_minder.py:23
|
|
msgid ""
|
|
"Maintenance minder to populate operative maintenance log for maintenance "
|
|
"services."
|
|
msgstr ""
|
|
|
|
#: /Applications/Splunk/etc/apps/SA-ITOA/lib/maintenance_services/maintenance_services_rest_provider/maintenance_services_rest_provider.py:77
|
|
msgid "Maintenance objects can only exist at app level (owner='nobody')."
|
|
msgstr ""
|
|
|
|
#: /Applications/Splunk/etc/apps/SA-ITOA/lib/itsi/csv_import/itoa_bulk_import_modinput_interface_provider.py:127
|
|
msgid "Maximum number of restart attempts reached {}, therefore terminating."
|
|
msgstr ""
|
|
|
|
#: /Applications/Splunk/etc/apps/SA-ITOA/default/itsi_notable_event_severity.conf:28
|
|
msgid "Medium"
|
|
msgstr ""
|
|
|
|
#: /Applications/Splunk/etc/apps/SA-ITOA/lib/itsi/csv_import/itoa_bulk_import_entity.py:263
|
|
#: /Applications/Splunk/etc/apps/SA-ITOA/lib/itsi/csv_import/itoa_bulk_import_entity_relationship.py:106
|
|
msgid "Merge update called when strategy is append, cannot handle."
|
|
msgstr ""
|
|
|
|
#: /Applications/Splunk/etc/apps/SA-ITOA/lib/itsi/csv_import/itoa_bulk_import_rest_interface_provider.py:288
|
|
msgid "Message from splunkd: {}"
|
|
msgstr ""
|
|
|
|
#: /Applications/Splunk/etc/apps/SA-ITOA/lib/itsi/upgrade/kvstore_backup_restore.py:717
|
|
#: /Applications/Splunk/etc/apps/SA-ITOA/lib/itsi/upgrade/kvstore_backup_restore.py:727
|
|
msgid "Method not supported on backup paths of type files."
|
|
msgstr ""
|
|
|
|
#: /Applications/Splunk/etc/apps/SA-ITOA/lib/itsi/objects/itsi_kpi.py:562
|
|
msgid ""
|
|
"Metric search KPIs do not seem to have specified a metric search. Specify"
|
|
" a metric based search for the KPI."
|
|
msgstr ""
|
|
|
|
#: /Applications/Splunk/etc/apps/SA-ITOA/lib/itsi/objects/itsi_kpi.py:569
|
|
msgid ""
|
|
"Metric search based KPI does not seem to have specified a valid metric "
|
|
"search. Specify metric based search KPIs with all mandatory fields: "
|
|
"metric_index, metric_name."
|
|
msgstr ""
|
|
|
|
#: /Applications/Splunk/etc/apps/SA-ITOA/bin/itsi_upgrade.py:32
|
|
msgid "Migrates the schemas from the old version to the new version."
|
|
msgstr ""
|
|
|
|
#: /Applications/Splunk/etc/apps/SA-ITOA/lib/itsi/upgrade/itsi_migration.py:391
|
|
msgid ""
|
|
"Migration could not delete some KPI saved searches named with the old "
|
|
"convention. Delete them manually as soon as possible. Name them in the "
|
|
"format: \"Indicator - <KPI key> - Rule.\""
|
|
msgstr ""
|
|
|
|
#: /Applications/Splunk/etc/apps/SA-ITOA/lib/migration/migration.py:269
|
|
msgid "Migration function: {} is not instance of MigrationFunctionAbstract."
|
|
msgstr ""
|
|
|
|
#: /Applications/Splunk/etc/apps/SA-ITOA/lib/itsi/itoa_rest_interface_provider/itoa_rest_interface_provider.py:1141
|
|
msgid "Missing 'data' parameter in request for search clause."
|
|
msgstr ""
|
|
|
|
#: /Applications/Splunk/etc/apps/SA-ITOA/lib/ITOA/event_management/notable_event_ticketing.py:388
|
|
msgid "Missing `ids` in data"
|
|
msgstr ""
|
|
|
|
#: /Applications/Splunk/etc/apps/SA-ITOA/lib/itsi/csv_import/itoa_bulk_import_specification.py:257
|
|
msgid ""
|
|
"Missing both - \"{}\" & \"{}\" from your request. At least one is "
|
|
"expected."
|
|
msgstr ""
|
|
|
|
#: /Applications/Splunk/etc/apps/SA-ITOA/lib/itsi/mad/itsi_mad_searches.py:117
|
|
#: /Applications/Splunk/etc/apps/SA-ITOA/lib/itsi/mad/itsi_mad_searches.py:242
|
|
msgid "Missing context name. A context name is required to create new context."
|
|
msgstr ""
|
|
|
|
#: /Applications/Splunk/etc/apps/SA-ITOA/lib/itsi/mad/itsi_mad_searches.py:208
|
|
msgid "Missing context name. A context name is required to delete a context."
|
|
msgstr ""
|
|
|
|
#: /Applications/Splunk/etc/apps/SA-ITOA/lib/ITOA/rest_interface_provider_base.py:124
|
|
msgid "Missing field"
|
|
msgstr ""
|
|
|
|
#: /Applications/Splunk/etc/apps/SA-ITOA/lib/ITOA/controller_utils.py:232
|
|
#: /Applications/Splunk/etc/apps/SA-ITOA/lib/itsi/backup_restore/backup_restore_rest_provider.py:100
|
|
msgid "Missing identifier"
|
|
msgstr ""
|
|
|
|
#: /Applications/Splunk/etc/apps/SA-ITOA/lib/ITOA/controller_utils.py:1135
|
|
msgid "Missing json_data"
|
|
msgstr ""
|
|
|
|
#: /Applications/Splunk/etc/apps/SA-ITOA/lib/ITOA/event_management/rules_engine/rule.py:36
|
|
msgid "Missing key `actions` in rule"
|
|
msgstr ""
|
|
|
|
#: /Applications/Splunk/etc/apps/SA-ITOA/lib/ITOA/event_management/rules_engine/rule.py:34
|
|
msgid "Missing key `activation_criteria` in rule"
|
|
msgstr ""
|
|
|
|
#: /Applications/Splunk/etc/apps/SA-ITOA/lib/ITOA/event_management/rules_engine/actions.py:33
|
|
#: /Applications/Splunk/etc/apps/SA-ITOA/lib/ITOA/event_management/rules_engine/item.py:41
|
|
msgid "Missing key `config`"
|
|
msgstr ""
|
|
|
|
#: /Applications/Splunk/etc/apps/SA-ITOA/lib/ITOA/event_management/rules_engine/criterion.py:117
|
|
msgid "Missing key `execute_on`."
|
|
msgstr ""
|
|
|
|
#: /Applications/Splunk/etc/apps/SA-ITOA/lib/ITOA/event_management/rules_engine/actions.py:35
|
|
msgid "Missing key `execution_criteria`"
|
|
msgstr ""
|
|
|
|
#: /Applications/Splunk/etc/apps/SA-ITOA/lib/itsi/upgrade/itsi_migration.py:1065
|
|
#: /Applications/Splunk/etc/apps/SA-ITOA/lib/itsi/upgrade/itsi_migration.py:1101
|
|
#: /Applications/Splunk/etc/apps/SA-ITOA/lib/itsi/upgrade/itsi_migration.py:1137
|
|
#, python-format
|
|
msgid "Missing key `lane_settings_collection` in deep dive=%s."
|
|
msgstr ""
|
|
|
|
#: /Applications/Splunk/etc/apps/SA-ITOA/lib/ITOA/event_management/rules_engine/rule.py:32
|
|
msgid "Missing key `title` in rule"
|
|
msgstr ""
|
|
|
|
#: /Applications/Splunk/etc/apps/SA-ITOA/lib/ITOA/event_management/rules_engine/actions.py:31
|
|
#: /Applications/Splunk/etc/apps/SA-ITOA/lib/ITOA/event_management/rules_engine/item.py:36
|
|
msgid "Missing key `type`"
|
|
msgstr ""
|
|
|
|
#: /Applications/Splunk/etc/apps/SA-ITOA/lib/itsi/event_management/event_management_rest_provider.py:221
|
|
#: /Applications/Splunk/etc/apps/SA-ITOA/lib/itsi/itoa_rest_interface_provider/itoa_rest_interface_provider.py:321
|
|
msgid "Missing key in data. `acl` on POST is mandatory. Received: `{}`"
|
|
msgstr ""
|
|
|
|
#: /Applications/Splunk/etc/apps/SA-ITOA/lib/itsi/csv_import/itoa_bulk_import_specification.py:264
|
|
msgid "Missing key(s) \"{}\" from required entity fields - {}."
|
|
msgstr ""
|
|
|
|
#: /Applications/Splunk/etc/apps/SA-ITOA/lib/itsi/csv_import/itoa_bulk_import_specification.py:274
|
|
msgid "Missing key(s) \"{}\" from required entity relationship fields - {}."
|
|
msgstr ""
|
|
|
|
#: /Applications/Splunk/etc/apps/SA-ITOA/lib/itsi/csv_import/itoa_bulk_import_specification.py:283
|
|
msgid "Missing key(s) \"{}\" from required service fields - {}."
|
|
msgstr ""
|
|
|
|
#: /Applications/Splunk/etc/apps/SA-ITOA/lib/itsi/csv_import/itoa_bulk_import_rest_interface_provider.py:170
|
|
msgid "Missing key(s) in data sent to server \"{}\""
|
|
msgstr ""
|
|
|
|
#: /Applications/Splunk/etc/apps/SA-ITOA/lib/itsi/objects/itsi_service.py:1759
|
|
msgid "Missing key. KPI must have a \"_key\" populated."
|
|
msgstr ""
|
|
|
|
#: /Applications/Splunk/etc/apps/SA-ITOA/lib/ITOA/event_management/rules_engine/clause.py:36
|
|
msgid "Missing key. Required: `condition`, `items`"
|
|
msgstr ""
|
|
|
|
#: /Applications/Splunk/etc/apps/SA-ITOA/lib/itsi/searches/itsi_at_search.py:50
|
|
msgid "Missing parameters to search template"
|
|
msgstr ""
|
|
|
|
#: /Applications/Splunk/etc/apps/SA-ITOA/bin/command_storeentities.py:61
|
|
#, python-format
|
|
msgid "Missing required key(s): %s."
|
|
msgstr ""
|
|
|
|
#: /Applications/Splunk/etc/apps/SA-ITOA/lib/ITOA/event_management/notable_event_aggregation_policy.py:136
|
|
#, python-format
|
|
msgid "Missing required key. Received=%s. Required=%s."
|
|
msgstr ""
|
|
|
|
#: /Applications/Splunk/etc/apps/SA-ITOA/lib/itsi/itoa_rest_interface_provider/itoa_rest_interface_provider.py:1281
|
|
#: /Applications/Splunk/etc/apps/SA-ITOA/lib/itsi/itoa_rest_interface_provider/itoa_rest_interface_provider.py:1318
|
|
msgid "Missing required parameter 'entity_filter'."
|
|
msgstr ""
|
|
|
|
#: /Applications/Splunk/etc/apps/SA-ITOA/lib/itsi/objects/changehandlers/itoa_change_handler.py:52
|
|
#, python-format
|
|
msgid "Missing the following required attributes: %s"
|
|
msgstr ""
|
|
|
|
#: /Applications/Splunk/etc/apps/SA-ITOA/lib/SA_ITOA_app_common/solnlib/packages/schematics/types/compound.py:143
|
|
msgid "Model conversion requires a model or dict"
|
|
msgstr ""
|
|
|
|
#: /Applications/Splunk/etc/apps/SA-ITOA/lib/itsi_module/itsi_module_modules.py:35
|
|
msgid "Module package name must start with DA-ITSI-."
|
|
msgstr ""
|
|
|
|
#: /Applications/Splunk/etc/apps/SA-ITOA/lib/itsi_module/itsi_module_modules.py:37
|
|
msgid "Module requires a description."
|
|
msgstr ""
|
|
|
|
#: /Applications/Splunk/etc/apps/SA-ITOA/lib/itsi_module/itsi_module_modules.py:36
|
|
msgid "Module requires a label."
|
|
msgstr ""
|
|
|
|
#: /Applications/Splunk/etc/apps/SA-ITOA/lib/itsi_module/itsi_module_modules.py:38
|
|
msgid "Module requires a version."
|
|
msgstr ""
|
|
|
|
#: /Applications/Splunk/etc/apps/SA-ITOA/lib/itsi_module/itsi_module_modules.py:39
|
|
msgid "Module requires an author."
|
|
msgstr ""
|
|
|
|
#: /Applications/Splunk/etc/apps/SA-ITOA/bin/itsi_notable_event_archive.py:27
|
|
msgid ""
|
|
"Moves notable events from the KV store to the index based upon retention "
|
|
"policy."
|
|
msgstr ""
|
|
|
|
#: /Applications/Splunk/etc/apps/SA-ITOA/lib/SA_ITOA_app_common/solnlib/packages/schematics/types/base.py:624
|
|
msgid "Must be either true or false."
|
|
msgstr ""
|
|
|
|
#: /Applications/Splunk/etc/apps/SA-ITOA/lib/itsi/upgrade/itsi_migration.py:3073
|
|
msgid ""
|
|
"Must delete correlationsearches.conf file from "
|
|
"$SPLUNK_HOME/etc/apps/itsi/default and $SPLUNK_HOME/etc/apps/itsi/local. "
|
|
"Note: If you want to migrate old notable events to the new index: First "
|
|
"follow the steps as specified in the documentation, then delete the "
|
|
"correlationsearches.conf files as described above."
|
|
msgstr ""
|
|
|
|
#: /Applications/Splunk/etc/apps/SA-ITOA/bin/kvstore_to_json.py:52
|
|
msgid ""
|
|
"Must enter the correct response value or contact your Splunk "
|
|
"administrator."
|
|
msgstr ""
|
|
|
|
#: /Applications/Splunk/etc/apps/SA-ITOA/lib/itsi/mad/itsi_mad_searches.py:402
|
|
msgid "Must have context name or kpi_id to get the instance."
|
|
msgstr ""
|
|
|
|
#: /Applications/Splunk/etc/apps/SA-ITOA/lib/itsi/mad/itsi_mad_searches.py:316
|
|
msgid "Must have context name to get the instance list."
|
|
msgstr ""
|
|
|
|
#: /Applications/Splunk/etc/apps/SA-ITOA/lib/itsi/mad/itsi_mad_searches.py:173
|
|
msgid "Must have context or instance data to create an instance"
|
|
msgstr ""
|
|
|
|
#: /Applications/Splunk/etc/apps/SA-ITOA/lib/itsi/mad/itsi_mad_searches.py:286
|
|
msgid "Must have context or instance id to delete an instance."
|
|
msgstr ""
|
|
|
|
#: /Applications/Splunk/etc/apps/SA-ITOA/lib/itsi/objects/itsi_entity_relationship.py:348
|
|
msgid ""
|
|
"Must provide entity identifier or key in order to resolve to a unique "
|
|
"existing entity"
|
|
msgstr ""
|
|
|
|
#: /Applications/Splunk/etc/apps/SA-ITOA/lib/itsi/itoa_rest_interface_provider/itoa_rest_interface_provider.py:1146
|
|
msgid "Must specify KPI for search generation."
|
|
msgstr ""
|
|
|
|
#: /Applications/Splunk/etc/apps/SA-ITOA/bin/command_set_severity_fields.py:255
|
|
#: /Applications/Splunk/etc/apps/SA-ITOA/bin/command_set_severity_fields.py:311
|
|
#: /Applications/Splunk/etc/apps/SA-ITOA/bin/command_set_severity_fields.py:321
|
|
#: /Applications/Splunk/etc/apps/SA-ITOA/lib/itsi/set_severity_fields.py:218
|
|
#: /Applications/Splunk/etc/apps/SA-ITOA/lib/itsi/set_severity_fields.py:219
|
|
msgid "N/A"
|
|
msgstr ""
|
|
|
|
#: /Applications/Splunk/etc/apps/SA-ITOA/lib/SA_ITOA_app_common/solnlib/packages/schematics/types/base.py:1097
|
|
msgid "Name of locale {0} did not match validation regex."
|
|
msgstr ""
|
|
|
|
#: /Applications/Splunk/etc/apps/SA-ITOA/lib/ITOA/itoa_object.py:210
|
|
#, python-format
|
|
msgid ""
|
|
"Names cannot contain equal and quote characters. List of invalid names: "
|
|
"%s."
|
|
msgstr ""
|
|
|
|
#: /Applications/Splunk/etc/apps/SA-ITOA/lib/itsi/objects/itsi_entity_relationship.py:205
|
|
msgid ""
|
|
"Names cannot contain equal and quote characters. List of triples with "
|
|
"invalid names: {0}"
|
|
msgstr ""
|
|
|
|
#: /Applications/Splunk/etc/apps/SA-ITOA/bin/itsi_notable_event_archive.py:39
|
|
msgid "Namespace"
|
|
msgstr ""
|
|
|
|
#: /Applications/Splunk/etc/apps/SA-ITOA/bin/itsi_notable_event_archive.py:40
|
|
msgid ""
|
|
"Namespace under which the KV store operation is called. Default is "
|
|
"'nobody'."
|
|
msgstr ""
|
|
|
|
#: /Applications/Splunk/etc/apps/SA-ITOA/lib/itsi/objects/itsi_kpi_template.py:65
|
|
msgid "Need at least one KPI defined in the KPI template."
|
|
msgstr ""
|
|
|
|
#: /Applications/Splunk/etc/apps/SA-ITOA/lib/itsi/objects/itsi_entity_relationship_rule.py:53
|
|
msgid ""
|
|
"Need specify either subject_entity_search, object_entity_search and "
|
|
"predicate_rules, or entity_relationship_search."
|
|
msgstr ""
|
|
|
|
#: /Applications/Splunk/etc/apps/SA-ITOA/lib/itsi/objects/itsi_entity_relationship_rule.py:42
|
|
msgid "Need specify subject_identifier_field, object_identifier_field, predicate."
|
|
msgstr ""
|
|
|
|
#: /Applications/Splunk/etc/apps/SA-ITOA/default/itsi_notable_event_status.conf:18
|
|
msgid "New"
|
|
msgstr ""
|
|
|
|
#: /Applications/Splunk/etc/apps/SA-ITOA/lib/itsi/objects/itsi_entity_relationship.py:251
|
|
msgid ""
|
|
"New triple specified already exist. Must use new unique triple. Duplicate"
|
|
" triple found: {0}"
|
|
msgstr ""
|
|
|
|
#: /Applications/Splunk/etc/apps/SA-ITOA/lib/itsi/objects/changehandlers/kpi_alert_period_update_handler.py:31
|
|
msgid "No MAD instance to update"
|
|
msgstr ""
|
|
|
|
#: /Applications/Splunk/etc/apps/SA-ITOA/bin/command_set_severity_fields.py:252
|
|
#: /Applications/Splunk/etc/apps/SA-ITOA/bin/command_set_severity_fields.py:256
|
|
#, python-format
|
|
msgid "No alert_value found for metric %s."
|
|
msgstr ""
|
|
|
|
#: /Applications/Splunk/etc/apps/SA-ITOA/lib/itsi/itoa_rest_interface_provider/itoa_rest_interface_provider.py:1194
|
|
msgid "No data field input got keys: {}."
|
|
msgstr ""
|
|
|
|
#: /Applications/Splunk/etc/apps/SA-ITOA/lib/itsi/event_management/event_management_rest_provider.py:219
|
|
#: /Applications/Splunk/etc/apps/SA-ITOA/lib/itsi/itoa_rest_interface_provider/itoa_rest_interface_provider.py:319
|
|
#: /Applications/Splunk/etc/apps/SA-ITOA/lib/itsi/itoa_rest_interface_provider/itoa_rest_interface_provider.py:983
|
|
#: /Applications/Splunk/etc/apps/SA-ITOA/lib/itsi/objects/itsi_entity.py:421
|
|
msgid "No data received."
|
|
msgstr ""
|
|
|
|
#: /Applications/Splunk/etc/apps/SA-ITOA/lib/itsi/event_management/event_management_rest_provider.py:127
|
|
#: /Applications/Splunk/etc/apps/SA-ITOA/lib/itsi/itoa_rest_interface_provider/itoa_rest_interface_provider.py:223
|
|
#, python-format
|
|
msgid "No data received. `data` is a mandatory key. Received: %s."
|
|
msgstr ""
|
|
|
|
#: /Applications/Splunk/etc/apps/SA-ITOA/lib/SA_ITOA_app_common/solnlib/packages/schematics/types/base.py:1096
|
|
msgid "No default or explicit locales were given."
|
|
msgstr ""
|
|
|
|
#: /Applications/Splunk/etc/apps/SA-ITOA/lib/itsi/objects/itsi_entity.py:426
|
|
msgid "No entities supplied for editing."
|
|
msgstr ""
|
|
|
|
#: /Applications/Splunk/etc/apps/SA-ITOA/lib/itsi/itoa_rest_interface_provider/itoa_rest_interface_provider.py:946
|
|
msgid "No entries created/updated"
|
|
msgstr ""
|
|
|
|
#: /Applications/Splunk/etc/apps/SA-ITOA/bin/command_storeentities.py:182
|
|
msgid "No fields to automatically extract from results set."
|
|
msgstr ""
|
|
|
|
#: /Applications/Splunk/etc/apps/SA-ITOA/lib/itsi_module/itsi_module_modules.py:40
|
|
msgid "No filename specified. Must specify a filename to download."
|
|
msgstr ""
|
|
|
|
#: /Applications/Splunk/etc/apps/SA-ITOA/bin/itsi_consumer.py:129
|
|
#, python-format
|
|
msgid "No handler manifest could be found selector=%s, key=%s, tid=%s"
|
|
msgstr ""
|
|
|
|
#: /Applications/Splunk/etc/apps/SA-ITOA/bin/itsi_sample_event_action_ping.py:201
|
|
msgid "No host to ping."
|
|
msgstr ""
|
|
|
|
#: /Applications/Splunk/etc/apps/SA-ITOA/bin/command_set_severity_fields.py:322
|
|
msgid "No matching services found for entity."
|
|
msgstr ""
|
|
|
|
#: /Applications/Splunk/etc/apps/SA-ITOA/lib/itsi/event_management/sdk/custom_group_action_base.py:121
|
|
msgid "No notable_data received"
|
|
msgstr ""
|
|
|
|
#: /Applications/Splunk/etc/apps/SA-ITOA/lib/itsi/csv_import/itoa_bulk_import_rest_interface_provider.py:49
|
|
msgid "No or insufficient data found. Check {} and try again."
|
|
msgstr ""
|
|
|
|
#: /Applications/Splunk/etc/apps/SA-ITOA/lib/ITOA/event_management/notable_event_ticketing.py:392
|
|
#, python-format
|
|
msgid "No refresh config found for %s."
|
|
msgstr ""
|
|
|
|
#: /Applications/Splunk/etc/apps/SA-ITOA/lib/SA_ITOA_app_common/solnlib/packages/schematics/types/base.py:1095
|
|
msgid "No requested locale was available."
|
|
msgstr ""
|
|
|
|
#: /Applications/Splunk/etc/apps/SA-ITOA/lib/itsi/event_management/sdk/custom_group_action_base.py:81
|
|
msgid "No results_file found in settings"
|
|
msgstr ""
|
|
|
|
#: /Applications/Splunk/etc/apps/SA-ITOA/bin/itsi_consumer.py:125
|
|
#, python-format
|
|
msgid "No selector found in data field=%s, key=%s, tid=%s"
|
|
msgstr ""
|
|
|
|
#: /Applications/Splunk/etc/apps/SA-ITOA/bin/kvstore_to_json.py:365
|
|
msgid "No service KPI operation specified."
|
|
msgstr ""
|
|
|
|
#: /Applications/Splunk/etc/apps/SA-ITOA/lib/itsi_module/itsi_module_service_template.py:40
|
|
msgid "No service template defined."
|
|
msgstr ""
|
|
|
|
#: /Applications/Splunk/etc/apps/SA-ITOA/lib/itsi/event_management/sdk/custom_group_action_base.py:68
|
|
msgid "No session key found in settings"
|
|
msgstr ""
|
|
|
|
#: /Applications/Splunk/etc/apps/SA-ITOA/lib/itsi/csv_import/itoa_bulk_import_modinput_interface_provider.py:346
|
|
#, python-format
|
|
msgid "No stanza exists in meta file: %s"
|
|
msgstr ""
|
|
|
|
#: /Applications/Splunk/etc/apps/SA-ITOA/lib/itsi/csv_import/itoa_bulk_import_entity_relationship_parser.py:61
|
|
msgid "No subject field for entity relationships found in source data."
|
|
msgstr ""
|
|
|
|
#: /Applications/Splunk/etc/apps/SA-ITOA/lib/itsi/itoa_rest_interface_provider/itoa_rest_interface_provider.py:1079
|
|
#, python-format
|
|
msgid "No such service for identifier=%s."
|
|
msgstr ""
|
|
|
|
#: /Applications/Splunk/etc/apps/SA-ITOA/lib/itsi/csv_import/itoa_bulk_import_service_parser.py:68
|
|
msgid "No title column \"{}\" found for services in source data."
|
|
msgstr ""
|
|
|
|
#: /Applications/Splunk/etc/apps/SA-ITOA/lib/itsi/csv_import/itoa_bulk_import_entity_parser.py:48
|
|
msgid "No title field for entities found in source data."
|
|
msgstr ""
|
|
|
|
#: /Applications/Splunk/etc/apps/SA-ITOA/lib/ITOA/itoa_refresh_queue_utils.py:175
|
|
msgid "No valid handler found for job: {0}."
|
|
msgstr ""
|
|
|
|
#: /Applications/Splunk/etc/apps/SA-ITOA/lib/migration/migration.py:112
|
|
msgid "No valid handler found for object_type: {0}, grab a noop handler."
|
|
msgstr ""
|
|
|
|
#: /Applications/Splunk/etc/apps/SA-ITOA/lib/ITOA/event_management/notable_event_group.py:342
|
|
msgid "Non dictionary type given for drilldown."
|
|
msgstr ""
|
|
|
|
#: /Applications/Splunk/etc/apps/SA-ITOA/lib/itsi/csv_import/itoa_bulk_import_entity.py:75
|
|
msgid "Non-iterable passed as metadata value."
|
|
msgstr ""
|
|
|
|
#: /Applications/Splunk/etc/apps/SA-ITOA/lib/itsi/searches/compute_health_score.py:759
|
|
msgid "None of fields:{0} exist in to get data"
|
|
msgstr ""
|
|
|
|
#: /Applications/Splunk/etc/apps/SA-ITOA/default/itsi_notable_event_severity.conf:18
|
|
msgid "Normal"
|
|
msgstr ""
|
|
|
|
#: /Applications/Splunk/etc/apps/SA-ITOA/lib/SA_ITOA_app_common/solnlib/packages/schematics/types/net.py:265
|
|
msgid "Not a well-formed email address."
|
|
msgstr ""
|
|
|
|
#: /Applications/Splunk/etc/apps/SA-ITOA/lib/ITOA/event_management/correlation_search.py:143
|
|
#: /Applications/Splunk/etc/apps/SA-ITOA/lib/ITOA/event_management/notable_event.py:162
|
|
msgid "Not implemented"
|
|
msgstr ""
|
|
|
|
#: /Applications/Splunk/etc/apps/SA-ITOA/lib/ITOA/event_management/notable_event.py:887
|
|
msgid "Notable event bulk update failed."
|
|
msgstr ""
|
|
|
|
#: /Applications/Splunk/etc/apps/SA-ITOA/lib/ITOA/event_management/notable_event_kpi_alert.py:74
|
|
#: /Applications/Splunk/etc/apps/SA-ITOA/lib/ITOA/event_management/notable_event_kpi_alert.py:95
|
|
#: /Applications/Splunk/etc/apps/SA-ITOA/lib/ITOA/event_management/notable_event_mad.py:79
|
|
msgid "Notable event creation failed."
|
|
msgstr ""
|
|
|
|
#: /Applications/Splunk/etc/apps/SA-ITOA/bin/itsi_notable_event_actions_queue_consumer.py:54
|
|
msgid "Number of jobs to be claimed in one request. Default value is 5."
|
|
msgstr ""
|
|
|
|
#: /Applications/Splunk/etc/apps/SA-ITOA/default/itsi_base_service_template.conf:2
|
|
msgid "OS KPIs - *nix (SAI)"
|
|
msgstr ""
|
|
|
|
#: /Applications/Splunk/etc/apps/SA-ITOA/default/itsi_base_service_template.conf:1548
|
|
msgid "OS KPIs - Windows (SAI)"
|
|
msgstr ""
|
|
|
|
#: /Applications/Splunk/etc/apps/SA-ITOA/lib/ITOA/event_management/notable_event_aggregation_policy.py:288
|
|
#, python-format
|
|
msgid "Object %s does not exist."
|
|
msgstr ""
|
|
|
|
#: /Applications/Splunk/etc/apps/SA-ITOA/lib/ITOA/event_management/base_event_management.py:479
|
|
#, python-format
|
|
msgid "Object ID is not a valid string, value=%s."
|
|
msgstr ""
|
|
|
|
#: /Applications/Splunk/etc/apps/SA-ITOA/lib/ITOA/event_management/base_event_management.py:515
|
|
#: /Applications/Splunk/etc/apps/SA-ITOA/lib/ITOA/event_management/notable_event.py:385
|
|
#, python-format
|
|
msgid "Object IDs is not a valid list, value=%s."
|
|
msgstr ""
|
|
|
|
#: /Applications/Splunk/etc/apps/SA-ITOA/lib/maintenance_services/objects/maintenance_calendar.py:119
|
|
#: /Applications/Splunk/etc/apps/SA-ITOA/lib/maintenance_services/objects/maintenance_calendar.py:380
|
|
#: /Applications/Splunk/etc/apps/SA-ITOA/lib/maintenance_services/objects/maintenance_calendar.py:496
|
|
msgid "Object does not exist."
|
|
msgstr ""
|
|
|
|
#: /Applications/Splunk/etc/apps/SA-ITOA/lib/ITOA/event_management/correlation_search.py:186
|
|
msgid "Object is not a valid splunk entity object."
|
|
msgstr ""
|
|
|
|
#: /Applications/Splunk/etc/apps/SA-ITOA/lib/ITOA/itoa_object.py:217
|
|
#, python-format
|
|
msgid ""
|
|
"Object names must be unique for object type: %s. List of duplicate names:"
|
|
" %s."
|
|
msgstr ""
|
|
|
|
#: /Applications/Splunk/etc/apps/SA-ITOA/lib/itsi/backup_restore/backup_restore_rest_provider.py:341
|
|
#: /Applications/Splunk/etc/apps/SA-ITOA/lib/itsi/itoa_rest_interface_provider/itoa_rest_interface_provider.py:636
|
|
#: /Applications/Splunk/etc/apps/SA-ITOA/lib/maintenance_services/maintenance_services_rest_provider/maintenance_services_rest_provider.py:182
|
|
msgid "Object not found."
|
|
msgstr ""
|
|
|
|
#: /Applications/Splunk/etc/apps/SA-ITOA/lib/itsi_module/itsi_module_common.py:525
|
|
msgid "Object title cannot be empty or none."
|
|
msgstr ""
|
|
|
|
#: /Applications/Splunk/etc/apps/SA-ITOA/lib/itsi_module/itsi_module_interface_provider_base.py:603
|
|
#, python-format
|
|
msgid "Object type is invalid. It should be: %s"
|
|
msgstr ""
|
|
|
|
#: /Applications/Splunk/etc/apps/SA-ITOA/lib/ITOA/storage/statestore.py:415
|
|
#, python-format
|
|
msgid "Object with ID: %s does not exist in statestore."
|
|
msgstr ""
|
|
|
|
#: /Applications/Splunk/etc/apps/SA-ITOA/lib/ITOA/storage/statestore.py:105
|
|
#, python-format
|
|
msgid ""
|
|
"Object you are trying to save is too large (%s bytes). KV store only "
|
|
"supports documents within 16MB sizes."
|
|
msgstr ""
|
|
|
|
#: /Applications/Splunk/etc/apps/SA-ITOA/lib/ITOA/event_management/notable_event.py:769
|
|
msgid "Object_id: {0} is not a valid string, object_id type is {1}."
|
|
msgstr ""
|
|
|
|
#: /Applications/Splunk/etc/apps/SA-ITOA/lib/ITOA/event_management/notable_event.py:814
|
|
msgid "Object_ids: {0} is not a valid list, object_ids type is {1}."
|
|
msgstr ""
|
|
|
|
#: /Applications/Splunk/etc/apps/SA-ITOA/lib/ITOA/event_management/notable_event.py:822
|
|
msgid "Object_ids: {0} to update don't match up with data_list: {1}."
|
|
msgstr ""
|
|
|
|
#: /Applications/Splunk/etc/apps/SA-ITOA/lib/maintenance_services/objects/maintenance_calendar.py:614
|
|
msgid ""
|
|
"Objects specified must be a valid non-empty list. Must specify at least "
|
|
"one object."
|
|
msgstr ""
|
|
|
|
#: /Applications/Splunk/etc/apps/SA-ITOA/bin/configure_itsi.py:50
|
|
msgid "Old configuration"
|
|
msgstr ""
|
|
|
|
#: /Applications/Splunk/etc/apps/SA-ITOA/lib/itsi/upgrade/itsi_migration.py:2471
|
|
#: /Applications/Splunk/etc/apps/SA-ITOA/lib/itsi/upgrade/itsi_migration.py:2644
|
|
msgid "Old glass table data is in invalid format."
|
|
msgstr ""
|
|
|
|
#: /Applications/Splunk/etc/apps/SA-ITOA/default/itsi_kpi_threshold_template.conf:41
|
|
#: /Applications/Splunk/etc/apps/SA-ITOA/default/itsi_kpi_threshold_template.conf:50
|
|
#: /Applications/Splunk/etc/apps/SA-ITOA/default/itsi_kpi_threshold_template.conf:59
|
|
#: /Applications/Splunk/etc/apps/SA-ITOA/default/itsi_kpi_threshold_template.conf:68
|
|
msgid "One chunk for 12AM-12PM, another chunk for 12PM-12AM"
|
|
msgstr ""
|
|
|
|
#: /Applications/Splunk/etc/apps/SA-ITOA/lib/itsi/upgrade/migration_handlers_4_2_0.py:50
|
|
msgid ""
|
|
"One or more KPIs may contain inconsistent entity configurations. [!{} "
|
|
"Click here for details.]"
|
|
msgstr ""
|
|
|
|
#: /Applications/Splunk/etc/apps/SA-ITOA/lib/SA_ITOA_app_common/solnlib/packages/schematics/types/compound.py:299
|
|
msgid "Only mappings may be used in a DictType"
|
|
msgstr ""
|
|
|
|
#: /Applications/Splunk/etc/apps/SA-ITOA/lib/itsi/backup_restore/backup_restore_rest_provider.py:78
|
|
msgid "Only one default scheduled backup is allowed."
|
|
msgstr ""
|
|
|
|
#: /Applications/Splunk/etc/apps/SA-ITOA/lib/itsi/objects/itsi_kpi.py:155
|
|
#, python-format
|
|
msgid ""
|
|
"Only positive numeric values are accepted to fill data gaps for object "
|
|
"\"%s\". Negative value provided. %s_key=\"%s\""
|
|
msgstr ""
|
|
|
|
#: /Applications/Splunk/etc/apps/SA-ITOA/lib/itsi_module/itsi_module_service_template.py:36
|
|
msgid ""
|
|
"Optional KPI refers to KPI ID {} that is not part of an exported KPI "
|
|
"group."
|
|
msgstr ""
|
|
|
|
#: /Applications/Splunk/etc/apps/SA-ITOA/lib/itsi/objects/itsi_kpi_threshold_template.py:109
|
|
msgid "Overlapping time blocks across multiple policies are not allowed."
|
|
msgstr ""
|
|
|
|
#: /Applications/Splunk/etc/apps/SA-ITOA/lib/itsi/objects/itsi_kpi_threshold_template.py:102
|
|
msgid "Overlapping time blocks within same policy are not allowed."
|
|
msgstr ""
|
|
|
|
#: /Applications/Splunk/etc/apps/SA-ITOA/bin/backfill_services.py:96
|
|
msgid ""
|
|
"PUT request requires the ID_ parameter, consider POST if you don't wish "
|
|
"to pass one"
|
|
msgstr ""
|
|
|
|
#: /Applications/Splunk/etc/apps/SA-ITOA/lib/itsi/event_management/event_management_rest_provider.py:771
|
|
#: /Applications/Splunk/etc/apps/SA-ITOA/lib/itsi/event_management/event_management_rest_provider.py:880
|
|
msgid "Payload is not a valid string."
|
|
msgstr ""
|
|
|
|
#: /Applications/Splunk/etc/apps/SA-ITOA/default/itsi_notable_event_status.conf:30
|
|
msgid "Pending"
|
|
msgstr ""
|
|
|
|
#: /Applications/Splunk/etc/apps/SA-ITOA/bin/itsi_scheduled_backup_caller.py:28
|
|
msgid "Performs auto backup on a regular basis."
|
|
msgstr ""
|
|
|
|
#: /Applications/Splunk/etc/apps/SA-ITOA/bin/itsi_service_template_update_scheduler.py:28
|
|
msgid "Performs scheduled sync from service templates to services."
|
|
msgstr ""
|
|
|
|
#: /Applications/Splunk/etc/apps/SA-ITOA/lib/maintenance_services/objects/maintenance_calendar.py:517
|
|
#: /Applications/Splunk/etc/apps/SA-ITOA/lib/maintenance_services/objects/maintenance_calendar.py:520
|
|
#: /Applications/Splunk/etc/apps/SA-ITOA/lib/maintenance_services/objects/maintenance_calendar.py:532
|
|
#: /Applications/Splunk/etc/apps/SA-ITOA/lib/maintenance_services/objects/maintenance_calendar.py:534
|
|
#: /Applications/Splunk/etc/apps/SA-ITOA/lib/maintenance_services/objects/maintenance_calendar.py:663
|
|
#: /Applications/Splunk/etc/apps/SA-ITOA/lib/maintenance_services/objects/maintenance_calendar.py:668
|
|
#: /Applications/Splunk/etc/apps/SA-ITOA/lib/maintenance_services/objects/maintenance_calendar.py:679
|
|
#: /Applications/Splunk/etc/apps/SA-ITOA/lib/maintenance_services/objects/maintenance_calendar.py:683
|
|
msgid "Permission denied."
|
|
msgstr ""
|
|
|
|
#: /Applications/Splunk/etc/apps/SA-ITOA/lib/itsi/itoa_rest_interface_provider/itoa_rest_interface_provider.py:305
|
|
#, python-format
|
|
msgid "Permissions can only be set for `%s`. Received: %s"
|
|
msgstr ""
|
|
|
|
#: /Applications/Splunk/etc/apps/SA-ITOA/lib/itsi/event_management/event_management_rest_provider.py:283
|
|
#: /Applications/Splunk/etc/apps/SA-ITOA/lib/itsi/itoa_rest_interface_provider/itoa_rest_interface_provider.py:397
|
|
msgid "Permissions found."
|
|
msgstr ""
|
|
|
|
#: /Applications/Splunk/etc/apps/SA-ITOA/lib/itsi/event_management/event_management_rest_provider.py:273
|
|
#: /Applications/Splunk/etc/apps/SA-ITOA/lib/itsi/itoa_rest_interface_provider/itoa_rest_interface_provider.py:387
|
|
msgid "Permissions not found."
|
|
msgstr ""
|
|
|
|
#: /Applications/Splunk/etc/apps/SA-ITOA/lib/itsi/event_management/event_management_rest_provider.py:120
|
|
#: /Applications/Splunk/etc/apps/SA-ITOA/lib/itsi/event_management/event_management_rest_provider.py:209
|
|
#: /Applications/Splunk/etc/apps/SA-ITOA/lib/itsi/itoa_rest_interface_provider/itoa_rest_interface_provider.py:216
|
|
#, python-format
|
|
msgid "Perms can only be set for `%s`. Received: %s."
|
|
msgstr ""
|
|
|
|
#: /Applications/Splunk/etc/apps/SA-ITOA/bin/kvstore_to_json.py:333
|
|
msgid ""
|
|
"Pick exactly one service KPI operation among: get, create, update and "
|
|
"delete."
|
|
msgstr ""
|
|
|
|
#: /Applications/Splunk/etc/apps/SA-ITOA/default/alert_actions.conf:22
|
|
msgid "Ping host"
|
|
msgstr ""
|
|
|
|
#: /Applications/Splunk/etc/apps/SA-ITOA/lib/SA_ITOA_app_common/solnlib/packages/schematics/types/compound.py:236
|
|
#, python-format
|
|
msgid "Please provide at least %d item."
|
|
msgstr ""
|
|
|
|
#: /Applications/Splunk/etc/apps/SA-ITOA/lib/SA_ITOA_app_common/solnlib/packages/schematics/types/compound.py:237
|
|
#, python-format
|
|
msgid "Please provide at least %d items."
|
|
msgstr ""
|
|
|
|
#: /Applications/Splunk/etc/apps/SA-ITOA/lib/SA_ITOA_app_common/solnlib/packages/schematics/types/compound.py:243
|
|
#, python-format
|
|
msgid "Please provide no more than %d item."
|
|
msgstr ""
|
|
|
|
#: /Applications/Splunk/etc/apps/SA-ITOA/lib/SA_ITOA_app_common/solnlib/packages/schematics/types/compound.py:244
|
|
#, python-format
|
|
msgid "Please provide no more than %d items."
|
|
msgstr ""
|
|
|
|
#: /Applications/Splunk/etc/apps/SA-ITOA/lib/SA_ITOA_app_common/solnlib/packages/schematics/types/compound.py:393
|
|
msgid "Please use a mapping for this field or an instance of {}"
|
|
msgstr ""
|
|
|
|
#: /Applications/Splunk/etc/apps/SA-ITOA/lib/itsi/objects/itsi_kpi_threshold_template.py:95
|
|
msgid "Policies with more than one time block definition are not supported."
|
|
msgstr ""
|
|
|
|
#: /Applications/Splunk/etc/apps/SA-ITOA/lib/ITOA/event_management/notable_event_aggregation_policy.py:126
|
|
#, python-format
|
|
msgid "Policy_id is not a string. Data type=%s."
|
|
msgstr ""
|
|
|
|
#: /Applications/Splunk/etc/apps/SA-ITOA/lib/ITOA/event_management/base_event_generation.py:379
|
|
msgid "Pre-processing step failed while creating notable event"
|
|
msgstr ""
|
|
|
|
#: /Applications/Splunk/etc/apps/SA-ITOA/lib/ITOA/itoa_refresh_queue_utils.py:77
|
|
msgid "Problem with input to create_refresh_job"
|
|
msgstr ""
|
|
|
|
#: /Applications/Splunk/etc/apps/SA-ITOA/lib/itsi/csv_import/itoa_bulk_import_modinput_interface_provider.py:262
|
|
msgid ""
|
|
"Processing completed. {} Entities created/updated. {} Services "
|
|
"created/updated. {} Entity relationships created/updated."
|
|
msgstr ""
|
|
|
|
#: /Applications/Splunk/etc/apps/SA-ITOA/lib/itsi/csv_import/itoa_bulk_import_modinput_interface_provider.py:252
|
|
msgid ""
|
|
"Processing import. Handled {} of {} rows ({}%). Entities written {}. "
|
|
"Services written {}. Entity Relationships written {}. Entities skipped "
|
|
"{}. Services skipped {}. Entity Relationships skipped {}. Import status: "
|
|
"{}."
|
|
msgstr ""
|
|
|
|
#: /Applications/Splunk/etc/apps/SA-ITOA/lib/itsi/upgrade/kvstore_backup_restore.py:195
|
|
#, python-format
|
|
msgid "Provided path=%s is neither a file nor a directory. Provide a valid path."
|
|
msgstr ""
|
|
|
|
#: /Applications/Splunk/etc/apps/SA-ITOA/lib/itsi/service_template/service_template_utils.py:357
|
|
msgid "Re-link operation is not supported through bulk import."
|
|
msgstr ""
|
|
|
|
#: /Applications/Splunk/etc/apps/SA-ITOA/lib/itsi/itoa_rest_interface_provider/itoa_rest_interface_provider.py:1204
|
|
msgid "Received a preview merge request with no entities."
|
|
msgstr ""
|
|
|
|
#: /Applications/Splunk/etc/apps/SA-ITOA/lib/itsi/event_management/itsi_notable_event_queue_consumer.py:82
|
|
msgid "Received empty session_key."
|
|
msgstr ""
|
|
|
|
#: /Applications/Splunk/etc/apps/SA-ITOA/lib/itsi/event_management/itsi_notable_event_queue_consumer.py:104
|
|
msgid "Received empty value for `audit_source`."
|
|
msgstr ""
|
|
|
|
#: /Applications/Splunk/etc/apps/SA-ITOA/lib/itsi/event_management/itsi_notable_event_queue_consumer.py:109
|
|
msgid "Received empty value for `audit_sourcetype`."
|
|
msgstr ""
|
|
|
|
#: /Applications/Splunk/etc/apps/SA-ITOA/lib/itsi/event_management/itsi_notable_event_queue_consumer.py:99
|
|
msgid "Received empty value for `audit_token_name`."
|
|
msgstr ""
|
|
|
|
#: /Applications/Splunk/etc/apps/SA-ITOA/lib/itsi/event_management/itsi_notable_event_queue_consumer.py:114
|
|
msgid "Received empty value for `instance_id`."
|
|
msgstr ""
|
|
|
|
#: /Applications/Splunk/etc/apps/SA-ITOA/lib/itsi/event_management/itsi_notable_event_queue_consumer.py:94
|
|
msgid "Received empty value for collection name."
|
|
msgstr ""
|
|
|
|
#: /Applications/Splunk/etc/apps/SA-ITOA/lib/itsi_module/itsi_module_interface_provider_base.py:645
|
|
msgid "Received unexpected results from dispatcher: {}."
|
|
msgstr ""
|
|
|
|
#: /Applications/Splunk/etc/apps/SA-ITOA/lib/itsi_module/itsi_module_service_template.py:35
|
|
msgid ""
|
|
"Recommended KPI refers to KPI ID {} that is not part of an exported KPI "
|
|
"group."
|
|
msgstr ""
|
|
|
|
#: /Applications/Splunk/etc/apps/SA-ITOA/bin/itsi_user_access_init.py:35
|
|
msgid "Registers ITSI's capabilities with SA-UserAccess."
|
|
msgstr ""
|
|
|
|
#: /Applications/Splunk/etc/apps/SA-ITOA/lib/itsi/backfill/__init__.py:431
|
|
#, python-format
|
|
msgid "RequestProcessor: Attempted to adopt a non-running request %s"
|
|
msgstr ""
|
|
|
|
#: /Applications/Splunk/etc/apps/SA-ITOA/lib/itsi/access_control/access_control_controller_utils.py:755
|
|
msgid "Requested IDs: {} are accessible."
|
|
msgstr ""
|
|
|
|
#: /Applications/Splunk/etc/apps/SA-ITOA/lib/itsi_module/itsi_module_common.py:394
|
|
#: /Applications/Splunk/etc/apps/SA-ITOA/lib/itsi_module/itsi_module_common.py:437
|
|
#: /Applications/Splunk/etc/apps/SA-ITOA/lib/itsi_module/itsi_module_common.py:472
|
|
msgid "Requested itsi_module does not exist."
|
|
msgstr ""
|
|
|
|
#: /Applications/Splunk/etc/apps/SA-ITOA/lib/itsi_module/itsi_module_common.py:506
|
|
#: /Applications/Splunk/etc/apps/SA-ITOA/lib/itsi_module/itsi_module_common.py:714
|
|
#, python-format
|
|
msgid "Requested itsi_object: %s / object_id=%s does not exist."
|
|
msgstr ""
|
|
|
|
#: /Applications/Splunk/etc/apps/SA-ITOA/lib/itsi_module/itsi_module_common.py:663
|
|
msgid "Requested module/conf file does not exist."
|
|
msgstr ""
|
|
|
|
#: /Applications/Splunk/etc/apps/SA-ITOA/lib/itsi_module/itsi_module_modules.py:43
|
|
msgid ""
|
|
"Requested package does not exist. Either module was not created, or not "
|
|
"exported yet."
|
|
msgstr ""
|
|
|
|
#: /Applications/Splunk/etc/apps/SA-ITOA/bin/command_suppress_alert.py:36
|
|
msgid "Required field `count` is missing."
|
|
msgstr ""
|
|
|
|
#: /Applications/Splunk/etc/apps/SA-ITOA/bin/command_suppress_alert.py:39
|
|
msgid "Required field `is_consecutive` is missing."
|
|
msgstr ""
|
|
|
|
#: /Applications/Splunk/etc/apps/SA-ITOA/lib/ITOA/event_management/base_event_generation.py:224
|
|
msgid "Required field={0} does not exist"
|
|
msgstr ""
|
|
|
|
#: /Applications/Splunk/etc/apps/SA-ITOA/lib/itsi/csv_import/itoa_csv_spec_transformer.py:112
|
|
msgid ""
|
|
"Required fields not found. Make sure both \"transaction_id\" and "
|
|
"\"uploaded_by\" are included in meta file."
|
|
msgstr ""
|
|
|
|
#: /Applications/Splunk/etc/apps/SA-ITOA/lib/itsi/backfill/itsi_backfill_requests.py:130
|
|
#, python-format
|
|
msgid "Required keys %s are missing from model data"
|
|
msgstr ""
|
|
|
|
#: /Applications/Splunk/etc/apps/SA-ITOA/bin/deep_dive_services.py:225
|
|
msgid "Required parameter drilldowns missing."
|
|
msgstr ""
|
|
|
|
#: /Applications/Splunk/etc/apps/SA-ITOA/bin/itsi_async_csv_loader.py:56
|
|
#: /Applications/Splunk/etc/apps/SA-ITOA/bin/itsi_csv_import.py:64
|
|
msgid "Required. Do you wish to import further via a search or from disk on file?"
|
|
msgstr ""
|
|
|
|
#: /Applications/Splunk/etc/apps/SA-ITOA/lib/itsi/objects/itsi_service.py:1852
|
|
msgid ""
|
|
"Requires a valid entity alias mapping to be set to generate searches when"
|
|
" filtering on entities in {}."
|
|
msgstr ""
|
|
|
|
#: /Applications/Splunk/etc/apps/SA-ITOA/lib/itsi/objects/itsi_service.py:1862
|
|
msgid ""
|
|
"Requires a valid entity breakdown id field in order to split KPI by "
|
|
"entities."
|
|
msgstr ""
|
|
|
|
#: /Applications/Splunk/etc/apps/SA-ITOA/default/itsi_notable_event_status.conf:36
|
|
msgid "Resolved"
|
|
msgstr ""
|
|
|
|
#: /Applications/Splunk/etc/apps/SA-ITOA/lib/ITOA/event_management/base_event_generation.py:104
|
|
msgid "Result must have an ID"
|
|
msgstr ""
|
|
|
|
#: /Applications/Splunk/etc/apps/SA-ITOA/bin/itsi_age_kpi_alert_value_cache.py:41
|
|
msgid "Retention Time"
|
|
msgstr ""
|
|
|
|
#: /Applications/Splunk/etc/apps/SA-ITOA/default/savedsearches.conf:33
|
|
msgid ""
|
|
"Retrieves a list of Netapp Vservers from the Netapp App, for use for "
|
|
"importing into IT Service Intelligence as entities"
|
|
msgstr ""
|
|
|
|
#: /Applications/Splunk/etc/apps/SA-ITOA/default/savedsearches.conf:28
|
|
msgid ""
|
|
"Retrieves a list of Netapp controllers, for use importing into IT Service"
|
|
" Intelligence as entities"
|
|
msgstr ""
|
|
|
|
#: /Applications/Splunk/etc/apps/SA-ITOA/default/savedsearches.conf:43
|
|
msgid ""
|
|
"Retrieves a list of aggregates from the Netapp App, for use into "
|
|
"importing into IT Service Intelligence as entities."
|
|
msgstr ""
|
|
|
|
#: /Applications/Splunk/etc/apps/SA-ITOA/default/savedsearches.conf:48
|
|
msgid ""
|
|
"Retrieves a list of disks from the Netapp App, for use into importing "
|
|
"into IT Service Intelligence as entities."
|
|
msgstr ""
|
|
|
|
#: /Applications/Splunk/etc/apps/SA-ITOA/default/savedsearches.conf:76
|
|
msgid "Retrieves a list of hosts generating Windows host data"
|
|
msgstr ""
|
|
|
|
#: /Applications/Splunk/etc/apps/SA-ITOA/default/savedsearches.conf:38
|
|
msgid ""
|
|
"Retrieves a list of volumes from the Netapp App, for use importing into "
|
|
"IT Service Intelligence as entities"
|
|
msgstr ""
|
|
|
|
#: /Applications/Splunk/etc/apps/SA-ITOA/bin/itsi_backup_restore.py:21
|
|
msgid "Runs backup and restore jobs."
|
|
msgstr ""
|
|
|
|
#: /Applications/Splunk/etc/apps/SA-ITOA/bin/itsi_consumer.py:146
|
|
msgid "Runs deferred operations to ensure consistency for ITSI knowledge objects."
|
|
msgstr ""
|
|
|
|
#: /Applications/Splunk/etc/apps/SA-ITOA/default/itsi_kpi_base_search.conf:460
|
|
msgid "SAI:Cloud.Performance.AWS-EBS"
|
|
msgstr ""
|
|
|
|
#: /Applications/Splunk/etc/apps/SA-ITOA/default/itsi_kpi_base_search.conf:562
|
|
msgid "SAI:Cloud.Performance.AWS-EC2"
|
|
msgstr ""
|
|
|
|
#: /Applications/Splunk/etc/apps/SA-ITOA/default/itsi_kpi_base_search.conf:326
|
|
msgid "SAI:OS.Performance.Windows"
|
|
msgstr ""
|
|
|
|
#: /Applications/Splunk/etc/apps/SA-ITOA/default/itsi_kpi_base_search.conf:386
|
|
msgid "SAI:OS.Performance.Windows.instance"
|
|
msgstr ""
|
|
|
|
#: /Applications/Splunk/etc/apps/SA-ITOA/default/itsi_kpi_base_search.conf:2
|
|
msgid "SAI:OS.Performance.nix"
|
|
msgstr ""
|
|
|
|
#: /Applications/Splunk/etc/apps/SA-ITOA/default/itsi_kpi_base_search.conf:118
|
|
msgid "SAI:OS.Performance.nix.disk"
|
|
msgstr ""
|
|
|
|
#: /Applications/Splunk/etc/apps/SA-ITOA/default/itsi_kpi_base_search.conf:192
|
|
msgid "SAI:OS.Performance.nix.disk_device"
|
|
msgstr ""
|
|
|
|
#: /Applications/Splunk/etc/apps/SA-ITOA/default/itsi_kpi_base_search.conf:238
|
|
msgid "SAI:OS.Performance.nix.network"
|
|
msgstr ""
|
|
|
|
#: /Applications/Splunk/etc/apps/SA-ITOA/lib/itsi/scheduled_backup/backup_scheduler.py:272
|
|
msgid ""
|
|
"Scheduled backup job failed. The next scheduled backup job will run in an"
|
|
" hour."
|
|
msgstr ""
|
|
|
|
#: /Applications/Splunk/etc/apps/SA-ITOA/lib/itsi/scheduled_backup/backup_scheduler.py:259
|
|
#, python-format
|
|
msgid ""
|
|
"Scheduled backup job updated successfully. The next scheduled backup job "
|
|
"will run at %s."
|
|
msgstr ""
|
|
|
|
#: /Applications/Splunk/etc/apps/SA-ITOA/lib/itsi/upgrade/kvstore_backup_restore.py:1128
|
|
msgid ""
|
|
"Scheduled sync of service template is in progress, cannot create backup "
|
|
"at this time. Try again a little later. To see the status of sync "
|
|
"operations, check the service template lister page."
|
|
msgstr ""
|
|
|
|
#: /Applications/Splunk/etc/apps/SA-ITOA/lib/ITOA/event_management/notable_event_utils.py:461
|
|
#, python-format
|
|
msgid "Search String=%s is not a valid string, type=%s."
|
|
msgstr ""
|
|
|
|
#: /Applications/Splunk/etc/apps/SA-ITOA/lib/ITOA/event_management/correlation_search.py:103
|
|
msgid "Search data is not defined, type={0}."
|
|
msgstr ""
|
|
|
|
#: /Applications/Splunk/etc/apps/SA-ITOA/lib/ITOA/event_management/notable_event_utils.py:482
|
|
#, python-format
|
|
msgid "Search failed to clean up event(s), messages=\"%s\"."
|
|
msgstr ""
|
|
|
|
#: /Applications/Splunk/etc/apps/SA-ITOA/lib/ITOA/event_management/notable_event_actions.py:867
|
|
#, python-format
|
|
msgid "Search failed with message=%s"
|
|
msgstr ""
|
|
|
|
#: /Applications/Splunk/etc/apps/SA-ITOA/lib/ITOA/event_management/correlation_search.py:216
|
|
msgid "Search name is not valid, type={0}."
|
|
msgstr ""
|
|
|
|
#: /Applications/Splunk/etc/apps/SA-ITOA/lib/ITOA/event_management/correlation_search.py:107
|
|
#: /Applications/Splunk/etc/apps/SA-ITOA/lib/ITOA/event_management/correlation_search.py:283
|
|
msgid "Search name={0} is not defined."
|
|
msgstr ""
|
|
|
|
#: /Applications/Splunk/etc/apps/SA-ITOA/lib/ITOA/event_management/correlation_search.py:112
|
|
msgid "Search string is not defined, value={0}."
|
|
msgstr ""
|
|
|
|
#: /Applications/Splunk/etc/apps/SA-ITOA/bin/itsi_async_csv_loader.py:64
|
|
#: /Applications/Splunk/etc/apps/SA-ITOA/bin/itsi_csv_import.py:72
|
|
msgid "Search string that would become a saved search for importing purposes"
|
|
msgstr ""
|
|
|
|
#: /Applications/Splunk/etc/apps/SA-ITOA/bin/itsi_async_csv_loader.py:63
|
|
#: /Applications/Splunk/etc/apps/SA-ITOA/bin/itsi_csv_import.py:71
|
|
msgid "Search string to execute for importing"
|
|
msgstr ""
|
|
|
|
#: /Applications/Splunk/etc/apps/SA-ITOA/default/alert_actions.conf:51
|
|
msgid "Send Episode to Phantom"
|
|
msgstr ""
|
|
|
|
#: /Applications/Splunk/etc/apps/SA-ITOA/default/alert_actions.conf:5
|
|
msgid "Send ITSI alert to summary index"
|
|
msgstr ""
|
|
|
|
#: /Applications/Splunk/etc/apps/SA-ITOA/default/alert_actions.conf:50
|
|
msgid "Send to Phantom"
|
|
msgstr ""
|
|
|
|
#: /Applications/Splunk/etc/apps/SA-ITOA/bin/itsi_async_csv_loader.py:163
|
|
#: /Applications/Splunk/etc/apps/SA-ITOA/bin/itsi_csv_import.py:176
|
|
msgid "Service Dependencies Specification"
|
|
msgstr ""
|
|
|
|
#: /Applications/Splunk/etc/apps/SA-ITOA/bin/itsi_async_csv_loader.py:164
|
|
#: /Applications/Splunk/etc/apps/SA-ITOA/bin/itsi_csv_import.py:177
|
|
msgid ""
|
|
"Service Dependencies for Service Import. A comma-separate list of field "
|
|
"names. Objects in these fields will be made child objects of the service"
|
|
" specified in the service_title_field column. Search "
|
|
"'sourcetype=itsi_internal_log' in Splunk for any errors"
|
|
msgstr ""
|
|
|
|
#: /Applications/Splunk/etc/apps/SA-ITOA/bin/itsi_async_csv_loader.py:146
|
|
#: /Applications/Splunk/etc/apps/SA-ITOA/bin/itsi_csv_import.py:159
|
|
msgid "Service Description Column"
|
|
msgstr ""
|
|
|
|
#: /Applications/Splunk/etc/apps/SA-ITOA/lib/itsi/event_management/itsi_correlation_search.py:228
|
|
msgid "Service ID is not valid."
|
|
msgstr ""
|
|
|
|
#: /Applications/Splunk/etc/apps/SA-ITOA/lib/itsi/event_management/itsi_correlation_search.py:224
|
|
msgid "Service ID or KPI ID are not provided."
|
|
msgstr ""
|
|
|
|
#: /Applications/Splunk/etc/apps/SA-ITOA/lib/itsi/event_management/itsi_correlation_search.py:178
|
|
msgid "Service IDs are not set, service_ids=\"{0}\"."
|
|
msgstr ""
|
|
|
|
#: /Applications/Splunk/etc/apps/SA-ITOA/bin/itsi_async_csv_loader.py:153
|
|
#: /Applications/Splunk/etc/apps/SA-ITOA/bin/itsi_csv_import.py:166
|
|
msgid ""
|
|
"Service Relationship for Service Import/Entity Import. A comma separated "
|
|
"list of strings. For example, 'service1,service2,service3' implies "
|
|
"'service1 depends on service2' 'service2 depends on service3'. All "
|
|
"services in the line are related to one another. Adding it in this "
|
|
"fashion would tie up the 'Service Health KPIs' for each of the services "
|
|
"with each other. Search 'sourcetype=itsi_internal_log' in Splunk for any "
|
|
"errors"
|
|
msgstr ""
|
|
|
|
#: /Applications/Splunk/etc/apps/SA-ITOA/bin/itsi_async_csv_loader.py:152
|
|
#: /Applications/Splunk/etc/apps/SA-ITOA/bin/itsi_csv_import.py:165
|
|
msgid "Service Relationships Specification"
|
|
msgstr ""
|
|
|
|
#: /Applications/Splunk/etc/apps/SA-ITOA/bin/itsi_csv_import.py:195
|
|
msgid "Service Template Column"
|
|
msgstr ""
|
|
|
|
#: /Applications/Splunk/etc/apps/SA-ITOA/bin/itsi_async_csv_loader.py:187
|
|
#: /Applications/Splunk/etc/apps/SA-ITOA/bin/itsi_csv_import.py:221
|
|
msgid "Service Title Associating Service To Entity"
|
|
msgstr ""
|
|
|
|
#: /Applications/Splunk/etc/apps/SA-ITOA/bin/itsi_async_csv_loader.py:140
|
|
#: /Applications/Splunk/etc/apps/SA-ITOA/bin/itsi_csv_import.py:153
|
|
msgid "Service Title Column"
|
|
msgstr ""
|
|
|
|
#: /Applications/Splunk/etc/apps/SA-ITOA/lib/itsi/objects/itsi_service.py:2091
|
|
#: /Applications/Splunk/etc/apps/SA-ITOA/lib/itsi/objects/itsi_service.py:2127
|
|
#, python-format
|
|
msgid ""
|
|
"Service dependency was broken by this action. Service %s no longer "
|
|
"depends on service %s."
|
|
msgstr ""
|
|
|
|
#: /Applications/Splunk/etc/apps/SA-ITOA/lib/itsi/upgrade/migration_handlers_2_5_0.py:155
|
|
#, python-format
|
|
msgid ""
|
|
"Service is not a valid dictionary, found type %s. Cannot apply timezone "
|
|
"offset."
|
|
msgstr ""
|
|
|
|
#: /Applications/Splunk/etc/apps/SA-ITOA/lib/itsi_module/itsi_module_service_template.py:32
|
|
msgid "Service template ID needs to be prefixed with module ID."
|
|
msgstr ""
|
|
|
|
#: /Applications/Splunk/etc/apps/SA-ITOA/lib/itsi/objects/itsi_service_template.py:666
|
|
msgid ""
|
|
"Service template changes cannot be pushed now because a backup/restore is"
|
|
" currently in progress. The service template sync has been scheduled for "
|
|
"a later time."
|
|
msgstr ""
|
|
|
|
#: /Applications/Splunk/etc/apps/SA-ITOA/lib/itsi_module/itsi_module_service_template.py:41
|
|
msgid "Service template does not contain a description."
|
|
msgstr ""
|
|
|
|
#: /Applications/Splunk/etc/apps/SA-ITOA/lib/itsi_module/itsi_module_service_template.py:33
|
|
msgid "Service template requires a title."
|
|
msgstr ""
|
|
|
|
#: /Applications/Splunk/etc/apps/SA-ITOA/lib/itsi_module/itsi_module_service_template.py:34
|
|
msgid "Service template requires at least one recommended KPI."
|
|
msgstr ""
|
|
|
|
#: /Applications/Splunk/etc/apps/SA-ITOA/lib/itsi/service_template/service_template_utils.py:86
|
|
msgid "Service with ID: {} does not exist."
|
|
msgstr ""
|
|
|
|
#: /Applications/Splunk/etc/apps/SA-ITOA/lib/ITOA/event_management/notable_event_retention_policy.py:31
|
|
#: /Applications/Splunk/etc/apps/SA-ITOA/lib/itsi/searches/kpi_summary_cache_retention_policy.py:20
|
|
#, python-format
|
|
msgid "Session key is not defined, session_key=%s"
|
|
msgstr ""
|
|
|
|
#: /Applications/Splunk/etc/apps/SA-ITOA/default/searchbnf.conf:53
|
|
msgid "Sets alert_* fields for a KPI."
|
|
msgstr ""
|
|
|
|
#: /Applications/Splunk/etc/apps/SA-ITOA/default/searchbnf.conf:52
|
|
msgid ""
|
|
"Sets alert_severity, alert_level, alert_color, alert_value, alert_entity "
|
|
"fields; serviceid and kpiid fields must be passed as argument."
|
|
msgstr ""
|
|
|
|
#: /Applications/Splunk/etc/apps/SA-ITOA/lib/itsi/objects/itsi_kpi.py:529
|
|
msgid ""
|
|
"Shared base KPIs does not seem to have populated a base search. Specify a"
|
|
" base search for the KPI."
|
|
msgstr ""
|
|
|
|
#: /Applications/Splunk/etc/apps/SA-ITOA/lib/itsi/objects/itsi_kpi.py:226
|
|
#, python-format
|
|
msgid ""
|
|
"Shared base search configured on KPI \"%s\" does not match security group"
|
|
" of KPI/Service. Check the team on the service."
|
|
msgstr ""
|
|
|
|
#: /Applications/Splunk/etc/apps/SA-ITOA/lib/ITOA/itoa_common.py:892
|
|
msgid "Size of one object={0} is more than 50 MB, splunk can't handle that size."
|
|
msgstr ""
|
|
|
|
#: /Applications/Splunk/etc/apps/SA-ITOA/lib/itsi/objects/itsi_service.py:2028
|
|
msgid "Some or all services are being configured with invalid teams."
|
|
msgstr ""
|
|
|
|
#: /Applications/Splunk/etc/apps/SA-ITOA/lib/itsi/searches/itsi_filter.py:42
|
|
#, python-format
|
|
msgid ""
|
|
"Source data could not be recognized as a string or parsed json. Data "
|
|
"passed in: %s"
|
|
msgstr ""
|
|
|
|
#: /Applications/Splunk/etc/apps/SA-ITOA/lib/itsi/csv_import/itoa_bulk_import_specification.py:312
|
|
msgid "Specification expects {} to be a {}, but it was not."
|
|
msgstr ""
|
|
|
|
#: /Applications/Splunk/etc/apps/SA-ITOA/bin/backup_restore_interface_splunkd.py:241
|
|
#: /Applications/Splunk/etc/apps/SA-ITOA/bin/backup_restore_interface_splunkd.py:249
|
|
#: /Applications/Splunk/etc/apps/SA-ITOA/bin/backup_restore_interface_splunkd.py:255
|
|
#: /Applications/Splunk/etc/apps/SA-ITOA/bin/backup_restore_interface_splunkd.py:284
|
|
#: /Applications/Splunk/etc/apps/SA-ITOA/bin/event_management_interface_splunkd.py:482
|
|
#: /Applications/Splunk/etc/apps/SA-ITOA/bin/event_management_interface_splunkd.py:490
|
|
#: /Applications/Splunk/etc/apps/SA-ITOA/bin/event_management_interface_splunkd.py:496
|
|
#: /Applications/Splunk/etc/apps/SA-ITOA/bin/event_management_interface_splunkd.py:538
|
|
#: /Applications/Splunk/etc/apps/SA-ITOA/bin/event_management_interface_splunkd.py:576
|
|
#: /Applications/Splunk/etc/apps/SA-ITOA/bin/itoa_rest_interface_splunkd.py:776
|
|
#: /Applications/Splunk/etc/apps/SA-ITOA/bin/itoa_rest_interface_splunkd.py:784
|
|
#: /Applications/Splunk/etc/apps/SA-ITOA/bin/itoa_rest_interface_splunkd.py:790
|
|
#: /Applications/Splunk/etc/apps/SA-ITOA/bin/itoa_rest_interface_splunkd.py:805
|
|
#: /Applications/Splunk/etc/apps/SA-ITOA/bin/itoa_rest_interface_splunkd.py:850
|
|
#: /Applications/Splunk/etc/apps/SA-ITOA/bin/itsi_module_interface_splunkd.py:369
|
|
#: /Applications/Splunk/etc/apps/SA-ITOA/bin/itsi_module_interface_splunkd.py:380
|
|
#: /Applications/Splunk/etc/apps/SA-ITOA/bin/itsi_module_interface_splunkd.py:411
|
|
#: /Applications/Splunk/etc/apps/SA-ITOA/bin/maintenance_services_interface_splunkd.py:227
|
|
#: /Applications/Splunk/etc/apps/SA-ITOA/bin/maintenance_services_interface_splunkd.py:235
|
|
#: /Applications/Splunk/etc/apps/SA-ITOA/bin/maintenance_services_interface_splunkd.py:243
|
|
#: /Applications/Splunk/etc/apps/SA-ITOA/bin/maintenance_services_interface_splunkd.py:266
|
|
msgid "Specified REST url/path is invalid - {}."
|
|
msgstr ""
|
|
|
|
#: /Applications/Splunk/etc/apps/SA-ITOA/bin/kvstore_to_json.py:336
|
|
msgid ""
|
|
"Specified file path is invalid. It must be a directory containing "
|
|
"input.jsonwith the input to the specified service KPI operation. On exit,"
|
|
" it will contain output.json with the results."
|
|
msgstr ""
|
|
|
|
#: /Applications/Splunk/etc/apps/SA-ITOA/lib/itsi/upgrade/migration_handlers_2_5_0.py:488
|
|
#: /Applications/Splunk/etc/apps/SA-ITOA/lib/itsi/upgrade/migration_handlers_2_6_0.py:457
|
|
#, python-format
|
|
msgid "Specified object type \"%s\" is invalid."
|
|
msgstr ""
|
|
|
|
#: /Applications/Splunk/etc/apps/SA-ITOA/lib/itsi/upgrade/migration_handlers_2_5_0.py:511
|
|
#: /Applications/Splunk/etc/apps/SA-ITOA/lib/itsi/upgrade/migration_handlers_2_6_0.py:480
|
|
msgid "Specified timezone offset to apply is invalid. Must pick a number."
|
|
msgstr ""
|
|
|
|
#: /Applications/Splunk/etc/apps/SA-ITOA/lib/maintenance_services/objects/maintenance_calendar.py:583
|
|
msgid "Start time and end time are mandatory fields. Must specify both."
|
|
msgstr ""
|
|
|
|
#: /Applications/Splunk/etc/apps/SA-ITOA/lib/maintenance_services/objects/maintenance_calendar.py:600
|
|
msgid "Start time and end time must be valid epoch time. Check the values."
|
|
msgstr ""
|
|
|
|
#: /Applications/Splunk/etc/apps/SA-ITOA/lib/maintenance_services/objects/maintenance_calendar.py:606
|
|
msgid "Start time must be earlier than end time. Check the values."
|
|
msgstr ""
|
|
|
|
#: /Applications/Splunk/etc/apps/SA-ITOA/bin/command_storeentities.py:229
|
|
msgid ""
|
|
"Storeentities error - identifying field {0} must be non-Null for all "
|
|
"entities"
|
|
msgstr ""
|
|
|
|
#: /Applications/Splunk/etc/apps/SA-ITOA/bin/command_storeentities.py:333
|
|
#, python-format
|
|
msgid "Storeentities exception: %s"
|
|
msgstr ""
|
|
|
|
#: /Applications/Splunk/etc/apps/SA-ITOA/bin/itsi_user_access_init.py:58
|
|
msgid ""
|
|
"String indicating the name of the app that wants to register its "
|
|
"capabilities."
|
|
msgstr ""
|
|
|
|
#: /Applications/Splunk/etc/apps/SA-ITOA/lib/SA_ITOA_app_common/solnlib/packages/schematics/types/base.py:389
|
|
msgid "String value did not match validation regex."
|
|
msgstr ""
|
|
|
|
#: /Applications/Splunk/etc/apps/SA-ITOA/lib/SA_ITOA_app_common/solnlib/packages/schematics/types/base.py:1098
|
|
msgid "String value in locale {0} did not match validation regex."
|
|
msgstr ""
|
|
|
|
#: /Applications/Splunk/etc/apps/SA-ITOA/lib/SA_ITOA_app_common/solnlib/packages/schematics/types/base.py:1093
|
|
msgid "String value in locale {0} is too long."
|
|
msgstr ""
|
|
|
|
#: /Applications/Splunk/etc/apps/SA-ITOA/lib/SA_ITOA_app_common/solnlib/packages/schematics/types/base.py:1094
|
|
msgid "String value in locale {0} is too short."
|
|
msgstr ""
|
|
|
|
#: /Applications/Splunk/etc/apps/SA-ITOA/lib/SA_ITOA_app_common/solnlib/packages/schematics/types/base.py:387
|
|
msgid "String value is too long."
|
|
msgstr ""
|
|
|
|
#: /Applications/Splunk/etc/apps/SA-ITOA/lib/SA_ITOA_app_common/solnlib/packages/schematics/types/base.py:388
|
|
msgid "String value is too short."
|
|
msgstr ""
|
|
|
|
#: /Applications/Splunk/etc/apps/SA-ITOA/lib/itsi/event_management/itsi_notable_event_queue_consumer.py:519
|
|
msgid "Successfully action=executed notable_event_action, ret_data={}."
|
|
msgstr ""
|
|
|
|
#: /Applications/Splunk/etc/apps/SA-ITOA/lib/ITOA/event_management/hec_utils.py:252
|
|
#, python-format
|
|
msgid "Successfully created token=`%s`, response=%s, content=%s."
|
|
msgstr ""
|
|
|
|
#: /Applications/Splunk/etc/apps/SA-ITOA/lib/itsi/event_management/itsi_notable_event_queue_consumer.py:545
|
|
msgid "Successfully executed action=notable_event_change, ret={}."
|
|
msgstr ""
|
|
|
|
#: /Applications/Splunk/etc/apps/SA-ITOA/lib/itsi/event_management/itsi_notable_event_queue_consumer.py:461
|
|
msgid ""
|
|
"Successfully executed action=notable_event_group_state_change, "
|
|
"updated/create group state={}."
|
|
msgstr ""
|
|
|
|
#: /Applications/Splunk/etc/apps/SA-ITOA/lib/itsi/event_management/itsi_notable_event_queue_consumer.py:591
|
|
msgid "Successfully executed action={0}, ret_data={1}."
|
|
msgstr ""
|
|
|
|
#: /Applications/Splunk/etc/apps/SA-ITOA/lib/itsi/event_management/itsi_notable_event_queue_consumer.py:629
|
|
msgid "Successfully executed action={0}."
|
|
msgstr ""
|
|
|
|
#: /Applications/Splunk/etc/apps/SA-ITOA/lib/itsi/event_management/itsi_notable_event_queue_consumer.py:434
|
|
msgid "Successfully executed actions={}."
|
|
msgstr ""
|
|
|
|
#: /Applications/Splunk/etc/apps/SA-ITOA/lib/ITOA/event_management/base_event_generation.py:74
|
|
msgid "Successfully retrieved search job info."
|
|
msgstr ""
|
|
|
|
#: /Applications/Splunk/etc/apps/SA-ITOA/lib/itsi/event_management/event_management_rest_provider.py:168
|
|
#: /Applications/Splunk/etc/apps/SA-ITOA/lib/itsi/event_management/event_management_rest_provider.py:264
|
|
#: /Applications/Splunk/etc/apps/SA-ITOA/lib/itsi/itoa_rest_interface_provider/itoa_rest_interface_provider.py:264
|
|
#: /Applications/Splunk/etc/apps/SA-ITOA/lib/itsi/itoa_rest_interface_provider/itoa_rest_interface_provider.py:378
|
|
msgid "Successfully updated permissions."
|
|
msgstr ""
|
|
|
|
#: /Applications/Splunk/etc/apps/SA-ITOA/lib/itsi/service_template/service_template_utils.py:597
|
|
msgid "Successfully updated {} services linked to service template {}. "
|
|
msgstr ""
|
|
|
|
#: /Applications/Splunk/etc/apps/SA-ITOA/bin/itsi_backfill.py:37
|
|
msgid ""
|
|
"Supervises long-running backfill jobs that generate summarized KPI "
|
|
"metrics from raw data."
|
|
msgstr ""
|
|
|
|
#: /Applications/Splunk/etc/apps/SA-ITOA/bin/itsi_csv_import.py:77
|
|
msgid "Team"
|
|
msgstr ""
|
|
|
|
#: /Applications/Splunk/etc/apps/SA-ITOA/lib/itsi/objects/itsi_security_group.py:393
|
|
#, python-format
|
|
msgid "Team \"%s\" cannot be deleted since it has objects inheriting from it."
|
|
msgstr ""
|
|
|
|
#: /Applications/Splunk/etc/apps/SA-ITOA/lib/itsi/objects/itsi_service.py:2077
|
|
msgid "Team is incorrectly configured for the service."
|
|
msgstr ""
|
|
|
|
#: /Applications/Splunk/etc/apps/SA-ITOA/bin/itsi_csv_import.py:78
|
|
msgid "Team that the imported service(s) object should be associated with."
|
|
msgstr ""
|
|
|
|
#: /Applications/Splunk/etc/apps/SA-ITOA/lib/itsi/objects/itsi_security_group.py:463
|
|
#, python-format
|
|
msgid ""
|
|
"Team with name: \"%s\" cannot be deleted because it contains services. "
|
|
"Move or delete the services first."
|
|
msgstr ""
|
|
|
|
#: /Applications/Splunk/etc/apps/SA-ITOA/default/itsi_kpi_template.conf:2
|
|
msgid "Templates"
|
|
msgstr ""
|
|
|
|
#: /Applications/Splunk/etc/apps/SA-ITOA/default/searchbnf.conf:44
|
|
msgid "The ID of the KPI that the search field belongs to."
|
|
msgstr ""
|
|
|
|
#: /Applications/Splunk/etc/apps/SA-ITOA/default/searchbnf.conf:40
|
|
msgid "The ID of the service that KPI belongs to."
|
|
msgstr ""
|
|
|
|
#: /Applications/Splunk/etc/apps/SA-ITOA/lib/itsi/objects/itsi_service_template.py:106
|
|
msgid ""
|
|
"The `service_id` or the `base_service_template_id` field is required to "
|
|
"create a service template."
|
|
msgstr ""
|
|
|
|
#: /Applications/Splunk/etc/apps/SA-ITOA/lib/itsi/objects/itsi_service.py:1440
|
|
#, python-format
|
|
msgid ""
|
|
"The base_service_template_id must be provided. A KPI cannot be unlinked "
|
|
"from a service template, only a service can be unlinked from a service "
|
|
"template. service_id=\"%s\", kpi_id=\"%s\""
|
|
msgstr ""
|
|
|
|
#: /Applications/Splunk/etc/apps/SA-ITOA/lib/itsi/csv_import/itoa_bulk_import_rest_interface_provider.py:228
|
|
msgid ""
|
|
"The file is not in ASCII or UTF format. Encoding not detected. Check the "
|
|
"CSV file."
|
|
msgstr ""
|
|
|
|
#: /Applications/Splunk/etc/apps/SA-ITOA/lib/itsi_module/itsi_module_modules.py:41
|
|
msgid "The filename you are requesting is an invalid SPL package."
|
|
msgstr ""
|
|
|
|
#: /Applications/Splunk/etc/apps/SA-ITOA/lib/itsi_module/itsi_module_service_template.py:189
|
|
msgid "The filter provided is invalid JSON."
|
|
msgstr ""
|
|
|
|
#: /Applications/Splunk/etc/apps/SA-ITOA/lib/itsi/csv_import/itoa_bulk_import_rest_interface_provider.py:216
|
|
msgid ""
|
|
"The following column names are duplicated: {}. Change the column names "
|
|
"and try again."
|
|
msgstr ""
|
|
|
|
#: /Applications/Splunk/etc/apps/SA-ITOA/default/itsi_notable_event_status.conf:37
|
|
msgid "The issue has been resolved and awaits verification"
|
|
msgstr ""
|
|
|
|
#: /Applications/Splunk/etc/apps/SA-ITOA/bin/command_check_for_kvstore_size.py:83
|
|
msgid ""
|
|
"The itsi_services collection size is {0}mb which is larger than the KV "
|
|
"store get limit. Increase the max_size_per_result_mb setting in "
|
|
"SA_ITOA/local/limits.conf to more than {0}mb."
|
|
msgstr ""
|
|
|
|
#: /Applications/Splunk/etc/apps/SA-ITOA/lib/itsi/objects/itsi_backup_restore.py:63
|
|
msgid ""
|
|
"The keep_max_time value is too low ({}). Setting it to {} for {} "
|
|
"scheduled backup."
|
|
msgstr ""
|
|
|
|
#: /Applications/Splunk/etc/apps/SA-ITOA/bin/itsi_async_csv_loader.py:84
|
|
#: /Applications/Splunk/etc/apps/SA-ITOA/bin/itsi_csv_import.py:97
|
|
msgid ""
|
|
"The path to the CSV File. Please note that if it is stored remotely it "
|
|
"must be accessible to this machine"
|
|
msgstr ""
|
|
|
|
#: /Applications/Splunk/etc/apps/SA-ITOA/lib/kvstore_queue/kvstore_queue_consumer.py:199
|
|
#, python-format
|
|
msgid "The processing object is not callable method=%s uid=%s."
|
|
msgstr ""
|
|
|
|
#: /Applications/Splunk/etc/apps/SA-ITOA/lib/itsi_module/itsi_module_common.py:96
|
|
msgid "The requested module or ID was not found."
|
|
msgstr ""
|
|
|
|
#: /Applications/Splunk/etc/apps/SA-ITOA/lib/itsi/csv_import/itoa_bulk_import_rest_interface_provider.py:305
|
|
msgid ""
|
|
"The search failed. If the problem persists, contact support. Search Error"
|
|
" - {}"
|
|
msgstr ""
|
|
|
|
#: /Applications/Splunk/etc/apps/SA-ITOA/default/searchbnf.conf:48
|
|
msgid "The search field to get the value of from the provided KPI."
|
|
msgstr ""
|
|
|
|
#: /Applications/Splunk/etc/apps/SA-ITOA/lib/itsi/csv_import/itoa_bulk_import_rest_interface_provider.py:291
|
|
msgid "The search job was not started. {}"
|
|
msgstr ""
|
|
|
|
#: /Applications/Splunk/etc/apps/SA-ITOA/lib/itsi/objects/itsi_entity_relationship.py:145
|
|
msgid "The triple ({0}) is not completely specified in {1}"
|
|
msgstr ""
|
|
|
|
#: /Applications/Splunk/etc/apps/SA-ITOA/lib/itsi/objects/itsi_entity_relationship.py:354
|
|
msgid "There are more than one matching entity. {}"
|
|
msgstr ""
|
|
|
|
#: /Applications/Splunk/etc/apps/SA-ITOA/lib/itsi/objects/itsi_kpi_template.py:49
|
|
#, python-format
|
|
msgid ""
|
|
"There is no description specified for object_type: %s. Provide some "
|
|
"description for this KPI template."
|
|
msgstr ""
|
|
|
|
#: /Applications/Splunk/etc/apps/SA-ITOA/lib/itsi/objects/itsi_entity_relationship.py:350
|
|
msgid "There is no matching entity. {}"
|
|
msgstr ""
|
|
|
|
#: /Applications/Splunk/etc/apps/SA-ITOA/lib/itsi/objects/itsi_entity_relationship.py:213
|
|
msgid "There is no triple ({0}) with valid names"
|
|
msgstr ""
|
|
|
|
#: /Applications/Splunk/etc/apps/SA-ITOA/lib/itsi/csv_import/itoa_bulk_import.py:189
|
|
msgid "This class cannot be called directly."
|
|
msgstr ""
|
|
|
|
#: /Applications/Splunk/etc/apps/SA-ITOA/lib/SA_ITOA_app_common/solnlib/packages/schematics/types/base.py:167
|
|
msgid "This field is required."
|
|
msgstr ""
|
|
|
|
#: /Applications/Splunk/etc/apps/SA-ITOA/bin/itsi_user_access_init.py:52
|
|
msgid ""
|
|
"This flag indicates whether or not the application has previously "
|
|
"registered its capabilities."
|
|
msgstr ""
|
|
|
|
#: /Applications/Splunk/etc/apps/SA-ITOA/bin/configure_itsi.py:45
|
|
#: /Applications/Splunk/etc/apps/SA-ITOA/bin/itsi_age_kpi_alert_value_cache.py:37
|
|
#: /Applications/Splunk/etc/apps/SA-ITOA/bin/itsi_backfill.py:52
|
|
#: /Applications/Splunk/etc/apps/SA-ITOA/bin/itsi_backup_restore.py:34
|
|
#: /Applications/Splunk/etc/apps/SA-ITOA/bin/itsi_default_aggregation_policy_loader.py:41
|
|
#: /Applications/Splunk/etc/apps/SA-ITOA/bin/itsi_default_correlation_search_acl_loader.py:40
|
|
#: /Applications/Splunk/etc/apps/SA-ITOA/bin/itsi_refresher.py:42
|
|
#: /Applications/Splunk/etc/apps/SA-ITOA/bin/itsi_scheduled_backup_caller.py:40
|
|
#: /Applications/Splunk/etc/apps/SA-ITOA/bin/itsi_service_template_update_scheduler.py:40
|
|
#: /Applications/Splunk/etc/apps/SA-ITOA/bin/itsi_upgrade.py:44
|
|
#: /Applications/Splunk/etc/apps/SA-ITOA/bin/itsi_user_access_init.py:47
|
|
#: /Applications/Splunk/etc/apps/SA-ITOA/bin/maintenance_minder.py:36
|
|
msgid "This is the level at which the modular input will log data."
|
|
msgstr ""
|
|
|
|
#: /Applications/Splunk/etc/apps/SA-ITOA/bin/itsi_async_csv_loader.py:50
|
|
#: /Applications/Splunk/etc/apps/SA-ITOA/bin/itsi_csv_import.py:58
|
|
#: /Applications/Splunk/etc/apps/SA-ITOA/bin/itsi_notable_event_hec_init.py:39
|
|
msgid ""
|
|
"This is the level at which the modular input will log data; DEBUG, INFO, "
|
|
"WARN, ERROR. Defaults to WARN."
|
|
msgstr ""
|
|
|
|
#: /Applications/Splunk/etc/apps/SA-ITOA/lib/ITOA/controller_utils.py:125
|
|
msgid ""
|
|
"This object is provided as a template and cannot be edited. Clone the "
|
|
"object to customize its settings."
|
|
msgstr ""
|
|
|
|
#: /Applications/Splunk/etc/apps/SA-ITOA/lib/itsi/event_management/correlation_search_generation.py:96
|
|
msgid "Threshold score is not set, for id={0}"
|
|
msgstr ""
|
|
|
|
#: /Applications/Splunk/etc/apps/SA-ITOA/lib/itsi/event_management/event_management_rest_provider.py:590
|
|
msgid "Ticket ID must be defined to create or update ticket."
|
|
msgstr ""
|
|
|
|
#: /Applications/Splunk/etc/apps/SA-ITOA/lib/itsi/event_management/event_management_rest_provider.py:588
|
|
msgid "Ticket System must be defined to create or update ticket."
|
|
msgstr ""
|
|
|
|
#: /Applications/Splunk/etc/apps/SA-ITOA/lib/itsi/event_management/event_management_rest_provider.py:592
|
|
msgid "Ticket URL must be defined to create or update ticket."
|
|
msgstr ""
|
|
|
|
#: /Applications/Splunk/etc/apps/SA-ITOA/lib/itsi/event_management/event_management_rest_provider.py:661
|
|
msgid "Ticket system/ID/URL must be specified to create or update ticket."
|
|
msgstr ""
|
|
|
|
#: /Applications/Splunk/etc/apps/SA-ITOA/lib/SA_ITOA_app_common/solnlib/packages/schematics/types/base.py:743
|
|
msgid "Time zone information not allowed."
|
|
msgstr ""
|
|
|
|
#: /Applications/Splunk/etc/apps/SA-ITOA/lib/SA_ITOA_app_common/solnlib/packages/schematics/types/base.py:742
|
|
msgid "Time zone information required but not found."
|
|
msgstr ""
|
|
|
|
#: /Applications/Splunk/etc/apps/SA-ITOA/lib/SA_ITOA_app_common/solnlib/packages/schematics/types/base.py:744
|
|
msgid "Time zone must be UTC but was None."
|
|
msgstr ""
|
|
|
|
#: /Applications/Splunk/etc/apps/SA-ITOA/lib/SA_ITOA_app_common/solnlib/packages/schematics/types/base.py:745
|
|
msgid "Time zone must be UTC."
|
|
msgstr ""
|
|
|
|
#: /Applications/Splunk/etc/apps/SA-ITOA/bin/itsi_notable_event_actions_queue_consumer.py:46
|
|
msgid "Timeout for given action"
|
|
msgstr ""
|
|
|
|
#: /Applications/Splunk/etc/apps/SA-ITOA/bin/itsi_notable_event_actions_queue_consumer.py:47
|
|
msgid "Timeout value for action queue. Default timeout is 30 minutes."
|
|
msgstr ""
|
|
|
|
#: /Applications/Splunk/etc/apps/SA-ITOA/lib/itsi/upgrade/migration_handlers_2_5_0.py:149
|
|
#: /Applications/Splunk/etc/apps/SA-ITOA/lib/itsi/upgrade/migration_handlers_2_6_0.py:196
|
|
#: /Applications/Splunk/etc/apps/SA-ITOA/lib/itsi/upgrade/migration_handlers_2_6_0.py:276
|
|
#, python-format
|
|
msgid ""
|
|
"Timezone offset specified is invalid. Must be within a 24-hour (1440 "
|
|
"minute) range. Specified value: %s "
|
|
msgstr ""
|
|
|
|
#: /Applications/Splunk/etc/apps/SA-ITOA/lib/itsi/objects/itsi_service.py:2281
|
|
msgid ""
|
|
"To change KPIs, pass in a non-empty list of service keys with their KPIs "
|
|
"list. Expected format: [{_key: <service key>, kpis: [{_key: <KPI key>, "
|
|
"<rest of KPI structure>}]]. Duplicate service entries (keys) received. "
|
|
"Check services specified."
|
|
msgstr ""
|
|
|
|
#: /Applications/Splunk/etc/apps/SA-ITOA/lib/itsi/objects/itsi_service.py:2258
|
|
msgid ""
|
|
"To change KPIs, pass in a non-empty list of service keys with their KPIs "
|
|
"list. Expected format: [{_key: <service key>, kpis: [{_key: <KPI key>, "
|
|
"<rest of KPI structure>}]]. Invalid input received."
|
|
msgstr ""
|
|
|
|
#: /Applications/Splunk/etc/apps/SA-ITOA/lib/itsi/objects/itsi_service.py:2272
|
|
msgid ""
|
|
"To change KPIs, pass in a non-empty list of service keys with their KPIs "
|
|
"list. Expected format: [{_key: <service key>, kpis: [{_key: <KPI key>, "
|
|
"<rest of KPI structure>}]]. Invalid service keys received."
|
|
msgstr ""
|
|
|
|
#: /Applications/Splunk/etc/apps/SA-ITOA/lib/itsi/objects/itsi_service.py:2317
|
|
msgid ""
|
|
"To change KPIs, pass in a non-empty list of service keys with their KPIs "
|
|
"list. Expected format: [{_key: <service key>, kpis: [{_key: <KPI key>, "
|
|
"<rest of KPI structure>}]]. No KPIs received for some services. Check the"
|
|
" KPIs."
|
|
msgstr ""
|
|
|
|
#: /Applications/Splunk/etc/apps/SA-ITOA/lib/itsi/objects/itsi_service.py:2297
|
|
msgid ""
|
|
"To change KPIs, pass in a non-empty list of service keys with their KPIs "
|
|
"list. Expected format: [{_key: <service key>, kpis: [{_key: <KPI key>, "
|
|
"<rest of KPI structure>}]]. No service keys received."
|
|
msgstr ""
|
|
|
|
#: /Applications/Splunk/etc/apps/SA-ITOA/lib/itsi/objects/itsi_service.py:2336
|
|
msgid ""
|
|
"To change KPIs, pass in a non-empty list of service keys with their KPIs "
|
|
"list. Expected format: [{_key: <service key>, kpis: [{_key: <KPI key>, "
|
|
"<rest of KPI structure>}]]. Some KPIs are specified with invalid key."
|
|
msgstr ""
|
|
|
|
#: /Applications/Splunk/etc/apps/SA-ITOA/lib/itsi/objects/itsi_service.py:2414
|
|
msgid ""
|
|
"To delete KPIs, pass in a list of service keys with the keys for the KPIs"
|
|
" to delete. Expected format: [{_key: <service key>, kpis: [{_key: <KPI "
|
|
"key>}]]. Duplicate service key received. Must specify all KPIs for a "
|
|
"service in one entry."
|
|
msgstr ""
|
|
|
|
#: /Applications/Splunk/etc/apps/SA-ITOA/lib/itsi/objects/itsi_service.py:2390
|
|
msgid ""
|
|
"To delete KPIs, pass in a list of service keys with the keys for the KPIs"
|
|
" to delete. Expected format: [{_key: <service key>, kpis: [{_key: <KPI "
|
|
"key>}]]. Invalid input received."
|
|
msgstr ""
|
|
|
|
#: /Applications/Splunk/etc/apps/SA-ITOA/lib/itsi/objects/itsi_service.py:2406
|
|
msgid ""
|
|
"To delete KPIs, pass in a list of service keys with the keys for the KPIs"
|
|
" to delete. Expected format: [{_key: <service key>, kpis: [{_key: <KPI "
|
|
"key>}]]. Specify at least one KPI per service."
|
|
msgstr ""
|
|
|
|
#: /Applications/Splunk/etc/apps/SA-ITOA/lib/itsi/objects/itsi_service.py:2194
|
|
msgid ""
|
|
"To get KPIs, pass in a list of service keys with their KPI keys. Expected"
|
|
" format: [{_key: <service key>, kpis: [{_key: <KPI key>}]]. Duplicate "
|
|
"service key entries received."
|
|
msgstr ""
|
|
|
|
#: /Applications/Splunk/etc/apps/SA-ITOA/lib/itsi/objects/itsi_service.py:2177
|
|
#: /Applications/Splunk/etc/apps/SA-ITOA/lib/itsi/objects/itsi_service.py:2202
|
|
msgid ""
|
|
"To get KPIs, pass in a list of service keys with their KPI keys. Expected"
|
|
" format: [{_key: <service key>, kpis: [{_key: <KPI key>}]]. Invalid input"
|
|
" received."
|
|
msgstr ""
|
|
|
|
#: /Applications/Splunk/etc/apps/SA-ITOA/lib/ITOA/event_management/notable_event_actions.py:617
|
|
msgid ""
|
|
"Too many episodes selected to perform this action. Select {} or fewer "
|
|
"episodes and try again."
|
|
msgstr ""
|
|
|
|
#: /Applications/Splunk/etc/apps/SA-ITOA/lib/itsi/csv_import/itoa_bulk_import_rest_interface_provider.py:193
|
|
#: /Applications/Splunk/etc/apps/SA-ITOA/lib/itsi/csv_import/itoa_bulk_import_rest_interface_provider.py:248
|
|
#: /Applications/Splunk/etc/apps/SA-ITOA/lib/itsi/csv_import/itoa_bulk_import_rest_interface_provider.py:368
|
|
msgid "Transaction id provided contains characters not supported."
|
|
msgstr ""
|
|
|
|
#: /Applications/Splunk/etc/apps/SA-ITOA/lib/itsi/objects/itsi_entity_relationship.py:220
|
|
msgid "Triple must be unique. There are duplicate triples in {0}"
|
|
msgstr ""
|
|
|
|
#: /Applications/Splunk/etc/apps/SA-ITOA/lib/ITOA/splunk_search_chunk_protocol.py:112
|
|
msgid "Type is not defined in out_meta_data to do get-exchange phase."
|
|
msgstr ""
|
|
|
|
#: /Applications/Splunk/etc/apps/SA-ITOA/lib/ITOA/itoa_common.py:365
|
|
msgid "Unable to convert string_array - passed in a {0}"
|
|
msgstr ""
|
|
|
|
#: /Applications/Splunk/etc/apps/SA-ITOA/lib/itsi/csv_import/itoa_bulk_import_specification.py:366
|
|
msgid "Unable to create entity info for invalid import_info- {0}."
|
|
msgstr ""
|
|
|
|
#: /Applications/Splunk/etc/apps/SA-ITOA/lib/ITOA/event_management/notable_event_kpi_alert.py:191
|
|
#: /Applications/Splunk/etc/apps/SA-ITOA/lib/ITOA/event_management/notable_event_kpi_alert.py:207
|
|
#: /Applications/Splunk/etc/apps/SA-ITOA/lib/ITOA/event_management/notable_event_mad.py:248
|
|
#, python-format
|
|
msgid "Unable to create notable event, %s"
|
|
msgstr ""
|
|
|
|
#: /Applications/Splunk/etc/apps/SA-ITOA/lib/itsi/csv_import/itoa_bulk_import_specification.py:338
|
|
msgid "Unable to create service info for invalid import_info- {0}."
|
|
msgstr ""
|
|
|
|
#: /Applications/Splunk/etc/apps/SA-ITOA/lib/ITOA/storage/statestore.py:368
|
|
msgid "Unable to decode response from statestore for {0} {1}."
|
|
msgstr ""
|
|
|
|
#: /Applications/Splunk/etc/apps/SA-ITOA/lib/itsi/upgrade/itsi_migration.py:987
|
|
#, python-format
|
|
msgid ""
|
|
"Unable to delete search: %s, disable it now. User will need to delete "
|
|
"this search manually."
|
|
msgstr ""
|
|
|
|
#: /Applications/Splunk/etc/apps/SA-ITOA/lib/itsi/backup_restore/backup_restore_rest_provider.py:109
|
|
msgid ""
|
|
"Unable to delete this job since it is currently in progress. Try again "
|
|
"later."
|
|
msgstr ""
|
|
|
|
#: /Applications/Splunk/etc/apps/SA-ITOA/lib/ITOA/storage/statestore.py:469
|
|
msgid "Unable to delete {0} {1}."
|
|
msgstr ""
|
|
|
|
#: /Applications/Splunk/etc/apps/SA-ITOA/lib/itsi/upgrade/itsi_migration.py:990
|
|
#, python-format
|
|
msgid ""
|
|
"Unable to disable search: %s, delete the search manually if it is not "
|
|
"done so."
|
|
msgstr ""
|
|
|
|
#: /Applications/Splunk/etc/apps/SA-ITOA/lib/ITOA/storage/statestore.py:433
|
|
msgid "Unable to edit {0} {1}."
|
|
msgstr ""
|
|
|
|
#: /Applications/Splunk/etc/apps/SA-ITOA/lib/itsi/backup_restore/backup_restore_rest_provider.py:445
|
|
msgid "Unable to find backup file on the current host."
|
|
msgstr ""
|
|
|
|
#: /Applications/Splunk/etc/apps/SA-ITOA/lib/itsi/backup_restore/backup_restore_rest_provider.py:448
|
|
msgid "Unable to find backup file."
|
|
msgstr ""
|
|
|
|
#: /Applications/Splunk/etc/apps/SA-ITOA/lib/itsi/backup_restore/backup_restore_rest_provider.py:441
|
|
msgid ""
|
|
"Unable to locate the backup file on this host. The backup is possibly "
|
|
"resident on another host in the search head cluster. Please try to "
|
|
"download the backup from other search head hosts."
|
|
msgstr ""
|
|
|
|
#: /Applications/Splunk/etc/apps/SA-ITOA/lib/itsi/backup_restore/backup_restore_rest_provider.py:432
|
|
#, python-format
|
|
msgid ""
|
|
"Unable to locate the backup file on this host. The backup is possibly "
|
|
"resident on the host: %s in the search head cluster. Please try to "
|
|
"download the backup from this host."
|
|
msgstr ""
|
|
|
|
#: /Applications/Splunk/etc/apps/SA-ITOA/lib/ITOA/storage/statestore.py:634
|
|
msgid "Unable to parse batch response from statestore for batch_edit"
|
|
msgstr ""
|
|
|
|
#: /Applications/Splunk/etc/apps/SA-ITOA/lib/ITOA/controller_utils.py:1142
|
|
msgid "Unable to parse expected JSON data {0}"
|
|
msgstr ""
|
|
|
|
#: /Applications/Splunk/etc/apps/SA-ITOA/lib/ITOA/storage/statestore.py:237
|
|
#: /Applications/Splunk/etc/apps/SA-ITOA/lib/ITOA/storage/statestore.py:364
|
|
msgid "Unable to parse response from statestore for {0} {1}."
|
|
msgstr ""
|
|
|
|
#: /Applications/Splunk/etc/apps/SA-ITOA/lib/itsi/csv_import/itoa_bulk_import_rest_interface_provider.py:282
|
|
msgid "Unable to reach Splunkd."
|
|
msgstr ""
|
|
|
|
#: /Applications/Splunk/etc/apps/SA-ITOA/lib/ITOA/event_management/push_event_manager.py:35
|
|
#: /Applications/Splunk/etc/apps/SA-ITOA/lib/ITOA/event_management/push_event_manager.py:57
|
|
msgid "Unable to reach the data inputs endpoint, failed with status code=\"{0}\"."
|
|
msgstr ""
|
|
|
|
#: /Applications/Splunk/etc/apps/SA-ITOA/lib/ITOA/storage/statestore.py:229
|
|
msgid "Unable to save {0}, request failed. "
|
|
msgstr ""
|
|
|
|
#: /Applications/Splunk/etc/apps/SA-ITOA/default/itsi_notable_event_status.conf:10
|
|
msgid "Unassigned"
|
|
msgstr ""
|
|
|
|
#: /Applications/Splunk/etc/apps/SA-ITOA/lib/itsi/backup_restore/backup_restore_rest_provider.py:219
|
|
#: /Applications/Splunk/etc/apps/SA-ITOA/lib/itsi/backup_restore/backup_restore_rest_provider.py:226
|
|
#: /Applications/Splunk/etc/apps/SA-ITOA/lib/itsi/backup_restore/backup_restore_rest_provider.py:337
|
|
#: /Applications/Splunk/etc/apps/SA-ITOA/lib/itsi/backup_restore/backup_restore_rest_provider.py:346
|
|
#: /Applications/Splunk/etc/apps/SA-ITOA/lib/itsi/itoa_rest_interface_provider/itoa_rest_interface_provider.py:689
|
|
#: /Applications/Splunk/etc/apps/SA-ITOA/lib/itsi/itoa_rest_interface_provider/itoa_rest_interface_provider.py:699
|
|
#: /Applications/Splunk/etc/apps/SA-ITOA/lib/maintenance_services/maintenance_services_rest_provider/maintenance_services_rest_provider.py:85
|
|
#: /Applications/Splunk/etc/apps/SA-ITOA/lib/maintenance_services/maintenance_services_rest_provider/maintenance_services_rest_provider.py:92
|
|
#: /Applications/Splunk/etc/apps/SA-ITOA/lib/maintenance_services/maintenance_services_rest_provider/maintenance_services_rest_provider.py:187
|
|
#: /Applications/Splunk/etc/apps/SA-ITOA/lib/maintenance_services/maintenance_services_rest_provider/maintenance_services_rest_provider.py:194
|
|
msgid "Unexpected server error occurred. Check the logs for details."
|
|
msgstr ""
|
|
|
|
#: /Applications/Splunk/etc/apps/SA-ITOA/lib/itsi/searches/itsi_filter.py:86
|
|
msgid "Unexpected value='{0}' specified for field type, with type='{1}'."
|
|
msgstr ""
|
|
|
|
#: /Applications/Splunk/etc/apps/SA-ITOA/lib/itsi/itoa_rest_interface_provider/itoa_rest_interface_provider.py:1200
|
|
msgid "Unrecognized preview type passed in: {}."
|
|
msgstr ""
|
|
|
|
#: /Applications/Splunk/etc/apps/SA-ITOA/lib/itsi/csv_import/itoa_bulk_import_rest_interface_provider.py:157
|
|
msgid "Unsupported HTTP action"
|
|
msgstr ""
|
|
|
|
#: /Applications/Splunk/etc/apps/SA-ITOA/lib/itsi/event_management/event_management_rest_provider.py:114
|
|
#: /Applications/Splunk/etc/apps/SA-ITOA/lib/itsi/event_management/event_management_rest_provider.py:200
|
|
#: /Applications/Splunk/etc/apps/SA-ITOA/lib/itsi/itoa_rest_interface_provider/itoa_rest_interface_provider.py:211
|
|
#: /Applications/Splunk/etc/apps/SA-ITOA/lib/itsi/itoa_rest_interface_provider/itoa_rest_interface_provider.py:296
|
|
#: /Applications/Splunk/etc/apps/SA-ITOA/lib/itsi/itoa_rest_interface_provider/itoa_rest_interface_provider.py:415
|
|
#: /Applications/Splunk/etc/apps/SA-ITOA/lib/itsi/itoa_rest_interface_provider/itoa_rest_interface_provider.py:477
|
|
#: /Applications/Splunk/etc/apps/SA-ITOA/lib/itsi/itoa_rest_interface_provider/itoa_rest_interface_provider.py:1052
|
|
#: /Applications/Splunk/etc/apps/SA-ITOA/lib/maintenance_services/maintenance_services_rest_provider/maintenance_services_rest_provider.py:47
|
|
#: /Applications/Splunk/etc/apps/SA-ITOA/lib/maintenance_services/maintenance_services_rest_provider/maintenance_services_rest_provider.py:96
|
|
#: /Applications/Splunk/etc/apps/SA-ITOA/lib/maintenance_services/maintenance_services_rest_provider/maintenance_services_rest_provider.py:123
|
|
msgid "Unsupported HTTP method"
|
|
msgstr ""
|
|
|
|
#: /Applications/Splunk/etc/apps/SA-ITOA/bin/itoa_rest_interface_splunkd.py:466
|
|
#: /Applications/Splunk/etc/apps/SA-ITOA/bin/itoa_rest_interface_splunkd.py:500
|
|
#: /Applications/Splunk/etc/apps/SA-ITOA/lib/itsi/backup_restore/backup_restore_rest_provider.py:257
|
|
#: /Applications/Splunk/etc/apps/SA-ITOA/lib/itsi/csv_import/itoa_bulk_import_rest_interface_provider.py:162
|
|
#: /Applications/Splunk/etc/apps/SA-ITOA/lib/itsi/event_management/event_management_rest_provider.py:335
|
|
#: /Applications/Splunk/etc/apps/SA-ITOA/lib/itsi/event_management/event_management_rest_provider.py:379
|
|
#: /Applications/Splunk/etc/apps/SA-ITOA/lib/itsi/itoa_rest_interface_provider/itoa_rest_interface_provider.py:507
|
|
#: /Applications/Splunk/etc/apps/SA-ITOA/lib/itsi/itoa_rest_interface_provider/itoa_rest_interface_provider.py:538
|
|
#: /Applications/Splunk/etc/apps/SA-ITOA/lib/itsi/itoa_rest_interface_provider/itoa_rest_interface_provider.py:582
|
|
#: /Applications/Splunk/etc/apps/SA-ITOA/lib/itsi/itoa_rest_interface_provider/itoa_rest_interface_provider.py:625
|
|
#: /Applications/Splunk/etc/apps/SA-ITOA/lib/itsi/itoa_rest_interface_provider/itoa_rest_interface_provider.py:675
|
|
#: /Applications/Splunk/etc/apps/SA-ITOA/lib/itsi/itoa_rest_interface_provider/itoa_rest_interface_provider.py:728
|
|
#: /Applications/Splunk/etc/apps/SA-ITOA/lib/itsi/itoa_rest_interface_provider/itoa_rest_interface_provider.py:795
|
|
#: /Applications/Splunk/etc/apps/SA-ITOA/lib/itsi/itoa_rest_interface_provider/itoa_rest_interface_provider.py:822
|
|
#: /Applications/Splunk/etc/apps/SA-ITOA/lib/itsi/itoa_rest_interface_provider/itoa_rest_interface_provider.py:923
|
|
#: /Applications/Splunk/etc/apps/SA-ITOA/lib/itsi/itoa_rest_interface_provider/itoa_rest_interface_provider.py:975
|
|
#: /Applications/Splunk/etc/apps/SA-ITOA/lib/itsi/itoa_rest_interface_provider/itoa_rest_interface_provider.py:1012
|
|
#: /Applications/Splunk/etc/apps/SA-ITOA/lib/itsi/itoa_rest_interface_provider/itoa_rest_interface_provider.py:1135
|
|
#: /Applications/Splunk/etc/apps/SA-ITOA/lib/itsi/itoa_rest_interface_provider/itoa_rest_interface_provider.py:1184
|
|
#: /Applications/Splunk/etc/apps/SA-ITOA/lib/itsi/itoa_rest_interface_provider/itoa_rest_interface_provider.py:1230
|
|
#: /Applications/Splunk/etc/apps/SA-ITOA/lib/itsi/itoa_rest_interface_provider/itoa_rest_interface_provider.py:1254
|
|
#: /Applications/Splunk/etc/apps/SA-ITOA/lib/itsi/itoa_rest_interface_provider/itoa_rest_interface_provider.py:1277
|
|
#: /Applications/Splunk/etc/apps/SA-ITOA/lib/itsi/itoa_rest_interface_provider/itoa_rest_interface_provider.py:1314
|
|
#: /Applications/Splunk/etc/apps/SA-ITOA/lib/itsi/itoa_rest_interface_provider/itoa_rest_interface_provider.py:1353
|
|
#: /Applications/Splunk/etc/apps/SA-ITOA/lib/itsi/itoa_rest_interface_provider/itoa_rest_interface_provider.py:1387
|
|
#: /Applications/Splunk/etc/apps/SA-ITOA/lib/itsi/itoa_rest_interface_provider/itoa_rest_interface_provider.py:1429
|
|
#: /Applications/Splunk/etc/apps/SA-ITOA/lib/maintenance_services/maintenance_services_rest_provider/maintenance_services_rest_provider.py:198
|
|
#, python-format
|
|
msgid "Unsupported HTTP method %s."
|
|
msgstr ""
|
|
|
|
#: /Applications/Splunk/etc/apps/SA-ITOA/lib/ITOA/event_management/rules_engine/item.py:77
|
|
#, python-format
|
|
msgid "Unsupported Item Type. Received: %s. Supported=%s"
|
|
msgstr ""
|
|
|
|
#: /Applications/Splunk/etc/apps/SA-ITOA/lib/ITOA/event_management/rules_engine/item.py:87
|
|
#, python-format
|
|
msgid "Unsupported `type`=%s. Supported types=%s"
|
|
msgstr ""
|
|
|
|
#: /Applications/Splunk/etc/apps/SA-ITOA/lib/itsi/event_management/event_management_rest_provider.py:411
|
|
#: /Applications/Splunk/etc/apps/SA-ITOA/lib/itsi/itoa_rest_interface_provider/itoa_rest_interface_provider.py:421
|
|
#: /Applications/Splunk/etc/apps/SA-ITOA/lib/itsi/itoa_rest_interface_provider/itoa_rest_interface_provider.py:545
|
|
#: /Applications/Splunk/etc/apps/SA-ITOA/lib/itsi/itoa_rest_interface_provider/itoa_rest_interface_provider.py:594
|
|
#: /Applications/Splunk/etc/apps/SA-ITOA/lib/itsi/itoa_rest_interface_provider/itoa_rest_interface_provider.py:764
|
|
#: /Applications/Splunk/etc/apps/SA-ITOA/lib/itsi/itoa_rest_interface_provider/itoa_rest_interface_provider.py:828
|
|
#: /Applications/Splunk/etc/apps/SA-ITOA/lib/itsi/itoa_rest_interface_provider/itoa_rest_interface_provider.py:978
|
|
#: /Applications/Splunk/etc/apps/SA-ITOA/lib/itsi/itoa_rest_interface_provider/itoa_rest_interface_provider.py:1357
|
|
#: /Applications/Splunk/etc/apps/SA-ITOA/lib/itsi/itoa_rest_interface_provider/itoa_rest_interface_provider.py:1390
|
|
#: /Applications/Splunk/etc/apps/SA-ITOA/lib/maintenance_services/maintenance_services_rest_provider/maintenance_services_rest_provider.py:74
|
|
#: /Applications/Splunk/etc/apps/SA-ITOA/lib/maintenance_services/maintenance_services_rest_provider/maintenance_services_rest_provider.py:177
|
|
#, python-format
|
|
msgid "Unsupported object type %s."
|
|
msgstr ""
|
|
|
|
#: /Applications/Splunk/etc/apps/SA-ITOA/bin/backup_restore_interface_splunkd.py:174
|
|
#: /Applications/Splunk/etc/apps/SA-ITOA/bin/event_management_interface_splunkd.py:413
|
|
#: /Applications/Splunk/etc/apps/SA-ITOA/bin/itoa_rest_interface_splunkd.py:687
|
|
#: /Applications/Splunk/etc/apps/SA-ITOA/bin/itsi_module_interface_splunkd.py:104
|
|
#: /Applications/Splunk/etc/apps/SA-ITOA/bin/itsi_module_interface_splunkd.py:198
|
|
#: /Applications/Splunk/etc/apps/SA-ITOA/bin/itsi_module_interface_splunkd.py:271
|
|
#: /Applications/Splunk/etc/apps/SA-ITOA/bin/maintenance_services_interface_splunkd.py:158
|
|
#: /Applications/Splunk/etc/apps/SA-ITOA/lib/ITOA/controller_utils.py:448
|
|
msgid "Unsupported operation - {0}."
|
|
msgstr ""
|
|
|
|
#: /Applications/Splunk/etc/apps/SA-ITOA/lib/ITOA/event_management/rules_engine/criterion.py:122
|
|
#, python-format
|
|
msgid "Unsupported value for `execute_on`. Received=%s Supported=%s"
|
|
msgstr ""
|
|
|
|
#: /Applications/Splunk/etc/apps/SA-ITOA/lib/ITOA/controller_utils.py:466
|
|
msgid "Unsupported. Received: No operation."
|
|
msgstr ""
|
|
|
|
#: /Applications/Splunk/etc/apps/SA-ITOA/bin/itsi_async_csv_loader.py:177
|
|
#: /Applications/Splunk/etc/apps/SA-ITOA/bin/itsi_csv_import.py:211
|
|
msgid "Update Type"
|
|
msgstr ""
|
|
|
|
#: /Applications/Splunk/etc/apps/SA-ITOA/lib/itsi/objects/itsi_entity.py:439
|
|
msgid ""
|
|
"Update race: One or more entities changed during editing. Try refreshing "
|
|
"the page."
|
|
msgstr ""
|
|
|
|
#: /Applications/Splunk/etc/apps/SA-ITOA/lib/itsi/objects/itsi_entity.py:435
|
|
msgid ""
|
|
"Update race: One or more entities deleted during editing. Try refreshing "
|
|
"the page."
|
|
msgstr ""
|
|
|
|
#: /Applications/Splunk/etc/apps/SA-ITOA/lib/itsi/csv_import/itoa_bulk_import_rest_interface_provider.py:375
|
|
#: /Applications/Splunk/etc/apps/SA-ITOA/lib/itsi/csv_import/itoa_bulk_import_rest_interface_provider.py:422
|
|
#: /Applications/Splunk/etc/apps/SA-ITOA/lib/itsi/csv_import/itoa_bulk_import_rest_interface_provider.py:434
|
|
msgid "Uploaded data was not found."
|
|
msgstr ""
|
|
|
|
#: /Applications/Splunk/etc/apps/SA-ITOA/lib/itsi/upgrade/itsi_migration.py:2830
|
|
msgid ""
|
|
"Validating IT Service Intelligence configuration. While validation is in "
|
|
"process, the application is not accessible."
|
|
msgstr ""
|
|
|
|
#: /Applications/Splunk/etc/apps/SA-ITOA/lib/ITOA/event_management/correlation_search.py:324
|
|
msgid "Validation failed, for data=\"{0}\"."
|
|
msgstr ""
|
|
|
|
#: /Applications/Splunk/etc/apps/SA-ITOA/lib/SA_ITOA_app_common/solnlib/packages/schematics/types/base.py:442
|
|
msgid "Value '{0}' is not {1}."
|
|
msgstr ""
|
|
|
|
#: /Applications/Splunk/etc/apps/SA-ITOA/lib/SA_ITOA_app_common/solnlib/packages/schematics/types/base.py:1120
|
|
msgid "Value must be a dict or None"
|
|
msgstr ""
|
|
|
|
#: /Applications/Splunk/etc/apps/SA-ITOA/lib/SA_ITOA_app_common/solnlib/packages/schematics/types/base.py:1049
|
|
msgid "Value must be a two-dimensional point"
|
|
msgstr ""
|
|
|
|
#: /Applications/Splunk/etc/apps/SA-ITOA/lib/SA_ITOA_app_common/solnlib/packages/schematics/types/base.py:168
|
|
msgid "Value must be one of {0}."
|
|
msgstr ""
|
|
|
|
#: /Applications/Splunk/etc/apps/SA-ITOA/lib/itsi/event_management/sdk/custom_group_action_base.py:129
|
|
msgid "We will only work with JSON type data. Received: {}. Type: {}"
|
|
msgstr ""
|
|
|
|
#: /Applications/Splunk/etc/apps/SA-ITOA/lib/itsi_module/itsi_module_interface_provider_base.py:580
|
|
msgid "Wildcard is not supported for ITSI module name in this REST path."
|
|
msgstr ""
|
|
|
|
#: /Applications/Splunk/etc/apps/SA-ITOA/lib/itsi_module/itsi_module_interface_provider_base.py:600
|
|
msgid "Wildcard is not supported for object type in this REST path."
|
|
msgstr ""
|
|
|
|
#: /Applications/Splunk/etc/apps/SA-ITOA/lib/ITOA/event_management/notable_event_ticketing.py:462
|
|
#, python-format
|
|
msgid ""
|
|
"Will only work with list of ticket id and url. Received type id=%s "
|
|
"url=%s. message=%s"
|
|
msgstr ""
|
|
|
|
#: /Applications/Splunk/etc/apps/SA-ITOA/default/itsi_kpi_threshold_template.conf:5
|
|
#: /Applications/Splunk/etc/apps/SA-ITOA/default/itsi_kpi_threshold_template.conf:14
|
|
#: /Applications/Splunk/etc/apps/SA-ITOA/default/itsi_kpi_threshold_template.conf:23
|
|
#: /Applications/Splunk/etc/apps/SA-ITOA/default/itsi_kpi_threshold_template.conf:32
|
|
msgid "Work hours (M-F 8am-6pm, 6pm-8am; Sat Sun 1 chunk)"
|
|
msgstr ""
|
|
|
|
#: /Applications/Splunk/etc/apps/SA-ITOA/default/itsi_kpi_threshold_template.conf:26
|
|
msgid "Work hours, off hours, weekends (adaptive/quantile)"
|
|
msgstr ""
|
|
|
|
#: /Applications/Splunk/etc/apps/SA-ITOA/default/itsi_kpi_threshold_template.conf:35
|
|
msgid "Work hours, off hours, weekends (adaptive/range)"
|
|
msgstr ""
|
|
|
|
#: /Applications/Splunk/etc/apps/SA-ITOA/default/itsi_kpi_threshold_template.conf:17
|
|
msgid "Work hours, off hours, weekends (adaptive/stdev)"
|
|
msgstr ""
|
|
|
|
#: /Applications/Splunk/etc/apps/SA-ITOA/default/itsi_kpi_threshold_template.conf:8
|
|
msgid "Work hours, off hours, weekends (static)"
|
|
msgstr ""
|
|
|
|
#: /Applications/Splunk/etc/apps/SA-ITOA/default/itsi_kpi_threshold_template.conf:185
|
|
#: /Applications/Splunk/etc/apps/SA-ITOA/default/itsi_kpi_threshold_template.conf:194
|
|
#: /Applications/Splunk/etc/apps/SA-ITOA/default/itsi_kpi_threshold_template.conf:203
|
|
#: /Applications/Splunk/etc/apps/SA-ITOA/default/itsi_kpi_threshold_template.conf:212
|
|
msgid "Work week 1hr. Monday to Friday 1 hour chunks. Sat Sun 1 chunk"
|
|
msgstr ""
|
|
|
|
#: /Applications/Splunk/etc/apps/SA-ITOA/default/itsi_kpi_threshold_template.conf:221
|
|
#: /Applications/Splunk/etc/apps/SA-ITOA/default/itsi_kpi_threshold_template.conf:230
|
|
#: /Applications/Splunk/etc/apps/SA-ITOA/default/itsi_kpi_threshold_template.conf:239
|
|
#: /Applications/Splunk/etc/apps/SA-ITOA/default/itsi_kpi_threshold_template.conf:248
|
|
msgid "Work week 2hr. Monday to Friday 2 hour chunks. Sat Sun 1 chunk"
|
|
msgstr ""
|
|
|
|
#: /Applications/Splunk/etc/apps/SA-ITOA/default/itsi_kpi_threshold_template.conf:257
|
|
#: /Applications/Splunk/etc/apps/SA-ITOA/default/itsi_kpi_threshold_template.conf:266
|
|
#: /Applications/Splunk/etc/apps/SA-ITOA/default/itsi_kpi_threshold_template.conf:275
|
|
#: /Applications/Splunk/etc/apps/SA-ITOA/default/itsi_kpi_threshold_template.conf:284
|
|
msgid "Work week 3hr. Monday to Friday 3 hour chunks. Sat Sun 1 chunk"
|
|
msgstr ""
|
|
|
|
#: /Applications/Splunk/etc/apps/SA-ITOA/lib/itsi/access_control/access_control_controller_utils.py:747
|
|
msgid ""
|
|
"You do not have permission to delete the following correlation search(es)"
|
|
" or cannot delete the pre-defined correlation search(es): {}."
|
|
msgstr ""
|
|
|
|
#: /Applications/Splunk/etc/apps/SA-ITOA/lib/itsi/access_control/access_control_controller_utils.py:751
|
|
msgid "You do not have permission to delete the following object(s): {}."
|
|
msgstr ""
|
|
|
|
#: /Applications/Splunk/etc/apps/SA-ITOA/lib/itsi/access_control/access_control_controller_utils.py:645
|
|
msgid ""
|
|
"You do not have permission to write the following correlation search(es):"
|
|
" {}."
|
|
msgstr ""
|
|
|
|
#: /Applications/Splunk/etc/apps/SA-ITOA/lib/itsi/access_control/access_control_controller_utils.py:649
|
|
msgid "You do not have permission to write the following object(s): {}."
|
|
msgstr ""
|
|
|
|
#: /Applications/Splunk/etc/apps/SA-ITOA/lib/itsi/access_control/access_control_controller_utils.py:647
|
|
msgid "You may want to clone the correlation search(es) before editing them."
|
|
msgstr ""
|
|
|
|
#: /Applications/Splunk/etc/apps/SA-ITOA/lib/itsi/csv_import/itoa_bulk_import_itoa_handle.py:98
|
|
msgid "[itoa_bulk_import:ItoaHandle] called with unrecognized object type: {)"
|
|
msgstr ""
|
|
|
|
#: /Applications/Splunk/etc/apps/SA-ITOA/lib/ITOA/event_management/notable_event_actions.py:455
|
|
#, python-format
|
|
msgid "`%s` must have some configuration. Received None"
|
|
msgstr ""
|
|
|
|
#: /Applications/Splunk/etc/apps/SA-ITOA/lib/itsi/event_management/event_management_rest_provider.py:132
|
|
#: /Applications/Splunk/etc/apps/SA-ITOA/lib/itsi/itoa_rest_interface_provider/itoa_rest_interface_provider.py:228
|
|
#, python-format
|
|
msgid "`acl` & `objects` are mandatory keys in data. Received: %s."
|
|
msgstr ""
|
|
|
|
#: /Applications/Splunk/etc/apps/SA-ITOA/lib/itsi/event_management/event_management_rest_provider.py:139
|
|
#: /Applications/Splunk/etc/apps/SA-ITOA/lib/itsi/event_management/event_management_rest_provider.py:228
|
|
#: /Applications/Splunk/etc/apps/SA-ITOA/lib/itsi/itoa_rest_interface_provider/itoa_rest_interface_provider.py:235
|
|
#: /Applications/Splunk/etc/apps/SA-ITOA/lib/itsi/itoa_rest_interface_provider/itoa_rest_interface_provider.py:328
|
|
#, python-format
|
|
msgid "`acl` is missing mandatory keys `read`/`write`. Received: %s."
|
|
msgstr ""
|
|
|
|
#: /Applications/Splunk/etc/apps/SA-ITOA/lib/ITOA/event_management/notable_event_actions.py:429
|
|
#, python-format
|
|
msgid "`action_config` invalid type. Received=%s"
|
|
msgstr ""
|
|
|
|
#: /Applications/Splunk/etc/apps/SA-ITOA/bin/command_fill_gaps_backfill.py:77
|
|
msgid ""
|
|
"`alert_period` argument not provided to \"fillgapsbackfill\" search "
|
|
"command."
|
|
msgstr ""
|
|
|
|
#: /Applications/Splunk/etc/apps/SA-ITOA/bin/command_fill_gaps_backfill.py:84
|
|
msgid ""
|
|
"`alert_period` argument provided to \"fillgapsbackfill\" search command, "
|
|
"is not integer."
|
|
msgstr ""
|
|
|
|
#: /Applications/Splunk/etc/apps/SA-ITOA/lib/ITOA/saved_search_utility.py:63
|
|
msgid "`alert_period` must be one of 1440, 60, 15, 5, 1."
|
|
msgstr ""
|
|
|
|
#: /Applications/Splunk/etc/apps/SA-ITOA/lib/itsi/searches/itsi_searches.py:398
|
|
msgid "`datamodel` argument requires `datamodel_object_name`"
|
|
msgstr ""
|
|
|
|
#: /Applications/Splunk/etc/apps/SA-ITOA/lib/itsi/searches/itsi_searches.py:677
|
|
#: /Applications/Splunk/etc/apps/SA-ITOA/lib/itsi/searches/itsi_searches.py:699
|
|
msgid "`datamodel` model must be a dictionary."
|
|
msgstr ""
|
|
|
|
#: /Applications/Splunk/etc/apps/SA-ITOA/lib/itsi/searches/itsi_searches.py:680
|
|
msgid "`datamodel` model of KPI is invalid."
|
|
msgstr ""
|
|
|
|
#: /Applications/Splunk/etc/apps/SA-ITOA/bin/command_fill_gaps_backfill.py:73
|
|
msgid ""
|
|
"`entity_split_field` argument not provided to \"fillgapsbackfill\" search"
|
|
" command."
|
|
msgstr ""
|
|
|
|
#: /Applications/Splunk/etc/apps/SA-ITOA/lib/ITOA/event_management/push_event_manager.py:132
|
|
#, python-format
|
|
msgid "`events` is not a valid list. Received type=`%s`."
|
|
msgstr ""
|
|
|
|
#: /Applications/Splunk/etc/apps/SA-ITOA/lib/itsi/event_management/itsi_notable_event_queue_consumer.py:88
|
|
msgid "`exec_delay` must be a float, not \"{}\"."
|
|
msgstr ""
|
|
|
|
#: /Applications/Splunk/etc/apps/SA-ITOA/lib/itsi/objects/changehandlers/kpi_ad_update_handler.py:57
|
|
#: /Applications/Splunk/etc/apps/SA-ITOA/lib/itsi/objects/changehandlers/kpi_alert_period_update_handler.py:69
|
|
#: /Applications/Splunk/etc/apps/SA-ITOA/lib/itsi/objects/changehandlers/kpi_cohesive_ad_update_handler.py:66
|
|
#: /Applications/Splunk/etc/apps/SA-ITOA/lib/itsi/objects/changehandlers/kpi_thresholds_template_update_handler.py:74
|
|
msgid "`impacted_objects` is not a valid JSON object."
|
|
msgstr ""
|
|
|
|
#: /Applications/Splunk/etc/apps/SA-ITOA/lib/ITOA/storage/itoa_storage.py:148
|
|
msgid "`is_available` method can only be run on the KV store backend."
|
|
msgstr ""
|
|
|
|
#: /Applications/Splunk/etc/apps/SA-ITOA/lib/itsi/upgrade/migration_handlers_2_5_0.py:82
|
|
#: /Applications/Splunk/etc/apps/SA-ITOA/lib/itsi/upgrade/migration_handlers_2_6_0.py:83
|
|
#, python-format
|
|
msgid ""
|
|
"`json_data` is not a valid dictionary, found type %s. Cannot apply "
|
|
"timezone offset."
|
|
msgstr ""
|
|
|
|
#: /Applications/Splunk/etc/apps/SA-ITOA/lib/itsi/upgrade/migration_handlers_2_5_0.py:88
|
|
#: /Applications/Splunk/etc/apps/SA-ITOA/lib/itsi/upgrade/migration_handlers_2_6_0.py:89
|
|
#, python-format
|
|
msgid ""
|
|
"`json_field` is not a valid string, found type %s. Cannot apply timezone "
|
|
"offset."
|
|
msgstr ""
|
|
|
|
#: /Applications/Splunk/etc/apps/SA-ITOA/lib/itsi/upgrade/migration_handlers_2_6_0.py:201
|
|
#, python-format
|
|
msgid ""
|
|
"`kpi_threshold_template` is not a valid dictionary, found type %s. Cannot"
|
|
" apply timezone offset."
|
|
msgstr ""
|
|
|
|
#: /Applications/Splunk/etc/apps/SA-ITOA/lib/itsi/event_management/utils.py:42
|
|
msgid "`logger` is not provided."
|
|
msgstr ""
|
|
|
|
#: /Applications/Splunk/etc/apps/SA-ITOA/lib/ITOA/event_management/notable_event_comment.py:140
|
|
#: /Applications/Splunk/etc/apps/SA-ITOA/lib/ITOA/event_management/notable_event_tag.py:130
|
|
#: /Applications/Splunk/etc/apps/SA-ITOA/lib/ITOA/event_management/notable_event_tag.py:180
|
|
#, python-format
|
|
msgid "`object_id`=%s is not a valid string."
|
|
msgstr ""
|
|
|
|
#: /Applications/Splunk/etc/apps/SA-ITOA/lib/ITOA/itoa_object.py:1367
|
|
msgid "`object_ids` is invalid: {0}."
|
|
msgstr ""
|
|
|
|
#: /Applications/Splunk/etc/apps/SA-ITOA/lib/itsi/upgrade/migration_handlers_2_5_0.py:161
|
|
#, python-format
|
|
msgid ""
|
|
"`offset_in_hours` is not a valid int, found type %s. Cannot apply "
|
|
"timezone offset."
|
|
msgstr ""
|
|
|
|
#: /Applications/Splunk/etc/apps/SA-ITOA/lib/itsi/upgrade/migration_handlers_2_6_0.py:206
|
|
#: /Applications/Splunk/etc/apps/SA-ITOA/lib/itsi/upgrade/migration_handlers_2_6_0.py:286
|
|
#, python-format
|
|
msgid ""
|
|
"`offset_in_min` is not a valid int, found type %s. Cannot apply timezone "
|
|
"offset."
|
|
msgstr ""
|
|
|
|
#: /Applications/Splunk/etc/apps/SA-ITOA/lib/itsi/upgrade/migration_handlers_2_5_0.py:94
|
|
#: /Applications/Splunk/etc/apps/SA-ITOA/lib/itsi/upgrade/migration_handlers_2_6_0.py:95
|
|
#, python-format
|
|
msgid ""
|
|
"`offset_in_sec` is not a valid number, found type %s. Cannot apply "
|
|
"timezone offset."
|
|
msgstr ""
|
|
|
|
#: /Applications/Splunk/etc/apps/SA-ITOA/lib/itsi/upgrade/migration_handlers_2_6_0.py:281
|
|
#, python-format
|
|
msgid ""
|
|
"`service` is not a valid dictionary, found type %s. Cannot apply timezone"
|
|
" offset."
|
|
msgstr ""
|
|
|
|
#: /Applications/Splunk/etc/apps/SA-ITOA/lib/itsi/event_management/sdk/eventing_base.py:23
|
|
#: /Applications/Splunk/etc/apps/SA-ITOA/lib/itsi/event_management/sdk/eventing_base.py:25
|
|
msgid "`session_key` must be a string with length equals at least one character."
|
|
msgstr ""
|
|
|
|
#: /Applications/Splunk/etc/apps/SA-ITOA/lib/ITOA/event_management/notable_event_tag.py:114
|
|
#, python-format
|
|
msgid "`tag_name`=%s already exists."
|
|
msgstr ""
|
|
|
|
#: /Applications/Splunk/etc/apps/SA-ITOA/lib/itsi/event_management/sdk/grouping.py:545
|
|
msgid "delete_all_comments operation is not supported"
|
|
msgstr ""
|
|
|
|
#: /Applications/Splunk/etc/apps/SA-ITOA/lib/itsi/event_management/sdk/grouping.py:533
|
|
msgid "delete_comment operation is not supported"
|
|
msgstr ""
|
|
|
|
#: /Applications/Splunk/etc/apps/SA-ITOA/lib/itsi/upgrade/migration_handlers_4_2_0.py:62
|
|
msgid ""
|
|
"entity_title=\"{entity_title}\" (entity_id=\"{entity_id}\") has "
|
|
"potentially missing_alias_values=\"{missing_alias_values}\" for the "
|
|
"entity_filter_field=\"{field}\" of kpi_title=\"{kpi_title}\" "
|
|
"(kpi_id=\"{kpi_id}\") in service_title=\"{service_title}\" "
|
|
"(service_id=\"{service_id}\"). The entity might not be included in this "
|
|
"KPI's results due to the removal of the previous KPI "
|
|
"entity_alias_filtering_fields=\"{alias_filtering_fields}\"."
|
|
msgstr ""
|
|
|
|
#: /Applications/Splunk/etc/apps/SA-ITOA/lib/itsi/upgrade/migration_handlers_4_2_0.py:52
|
|
msgid ""
|
|
"entity_title=\"{entity_title}\" (entity_id=\"{entity_id}\") is missing an"
|
|
" alias for the entity_filter_field=\"{field}\" of "
|
|
"kpi_title=\"{kpi_title}\" (kpi_id=\"{kpi_id}\"\") in "
|
|
"service_title=\"{service_title}\" (service_id=\"{service_id}\"). The "
|
|
"entity might not be included in this KPI's results."
|
|
msgstr ""
|
|
|
|
#: /Applications/Splunk/etc/apps/SA-ITOA/lib/itsi/upgrade/migration_handlers_4_2_0.py:57
|
|
msgid ""
|
|
"entity_title=\"{entity_title}\" (entity_id=\"{entity_id}\") is missing an"
|
|
" alias for the entity_split_field=\"{field}\" of "
|
|
"kpi_title=\"{kpi_title}\" (kpi_id=\"{kpi_id}\") in "
|
|
"service_title=\"{service_title}\" (service_id=\"{service_id}\"). The "
|
|
"entity will not be included in this KPI's results."
|
|
msgstr ""
|
|
|
|
#: /Applications/Splunk/etc/apps/SA-ITOA/lib/itsi/objects/itsi_entity_relationship.py:757
|
|
msgid "limited by level"
|
|
msgstr ""
|
|
|
|
#: /Applications/Splunk/etc/apps/SA-ITOA/lib/itsi/objects/itsi_entity_relationship.py:761
|
|
msgid "limited by level and max count"
|
|
msgstr ""
|
|
|
|
#: /Applications/Splunk/etc/apps/SA-ITOA/lib/itsi/objects/itsi_entity_relationship.py:759
|
|
msgid "limited by max count"
|
|
msgstr ""
|
|
|
|
#: /Applications/Splunk/etc/apps/SA-ITOA/lib/ITOA/event_management/base_event_generation.py:44
|
|
#, python-format
|
|
msgid ""
|
|
"sendmodalert - signature=\"%s\" action_name=\"%s\" search_name=\"%s\" "
|
|
"sid=\"%s\" orig_sid=\"%s\" rid=\"%s\" orig_rid=\"%s\" app=\"%s\" "
|
|
"owner=\"%s\" action_mode=\"%s\" action_status=\"%s\""
|
|
msgstr ""
|
|
|
|
#: /Applications/Splunk/etc/apps/SA-ITOA/lib/itsi_py23.py:57
|
|
msgid "test"
|
|
msgstr ""
|
|
|
|
#: /Applications/Splunk/etc/apps/SA-ITOA/bin/itsi_notable_event_hec_init.py:129
|
|
#, python-format
|
|
msgid ""
|
|
"token: `%s`, index: `%s`, host: `%s`, source: `%s`, sourcetype: `%s` app:"
|
|
" `%s`"
|
|
msgstr ""
|
|
|
|
#: /Applications/Splunk/etc/apps/SA-ITOA/lib/itsi/event_management/sdk/grouping.py:568
|
|
msgid "update_comment operation is not supported"
|
|
msgstr ""
|
|
|
|
#: /Applications/Splunk/etc/apps/SA-ITOA/lib/itsi/searches/compute_health_score.py:393
|
|
msgid "{0} does not exist in conf file"
|
|
msgstr ""
|
|
|
|
#: /Applications/Splunk/etc/apps/SA-ITOA/lib/itsi/health_services/health_services_provider.py:93
|
|
msgid "{0} field is required in each field."
|
|
msgstr ""
|
|
|
|
#: /Applications/Splunk/etc/apps/SA-ITOA/lib/itsi/health_services/health_services_provider.py:90
|
|
msgid "{0} or {1} one of field needs to be provided."
|
|
msgstr ""
|
|
|
|
#: /Applications/Splunk/etc/apps/SA-ITOA/lib/SA_ITOA_app_common/solnlib/packages/schematics/types/base.py:443
|
|
msgid "{0} value should be greater than or equal to {1}."
|
|
msgstr ""
|
|
|
|
#: /Applications/Splunk/etc/apps/SA-ITOA/lib/SA_ITOA_app_common/solnlib/packages/schematics/types/base.py:444
|
|
msgid "{0} value should be less than or equal to {1}."
|
|
msgstr ""
|
|
|
|
#: /Applications/Splunk/etc/apps/SA-ITOA/lib/SA_ITOA_app_common/solnlib/packages/schematics/types/base.py:1027
|
|
msgid "{0} value {1} should be greater than or equal to {2}."
|
|
msgstr ""
|
|
|
|
#: /Applications/Splunk/etc/apps/SA-ITOA/lib/SA_ITOA_app_common/solnlib/packages/schematics/types/base.py:1028
|
|
msgid "{0} value {1} should be less than or equal to {2}."
|
|
msgstr ""
|
|
|
|
#: /Applications/Splunk/etc/apps/SA-ITOA/lib/itsi/backup_restore/itsi_backup_restore_utils.py:503
|
|
msgid "{} job \"{}\" has completed successfully."
|
|
msgstr ""
|
|
|
|
#: /Applications/Splunk/etc/apps/SA-ITOA/lib/itsi/backup_restore/itsi_backup_restore_utils.py:519
|
|
msgid "{} job \"{}\" has failed. Error: {}"
|
|
msgstr ""
|
|
|