You can not select more than 25 topics Topics must start with a letter or number, can include dashes ('-') and can be up to 35 characters long.

6682 lines
264 KiB

# Translations template for PROJECT.
# Copyright (C) 2019 ORGANIZATION
# This file is distributed under the same license as the PROJECT project.
# FIRST AUTHOR <EMAIL@ADDRESS>, 2019.
#
#, fuzzy
msgid ""
msgstr ""
"Project-Id-Version: PROJECT VERSION\n"
"Report-Msgid-Bugs-To: EMAIL@ADDRESS\n"
"POT-Creation-Date: 2019-10-07 14:22-0700\n"
"PO-Revision-Date: YEAR-MO-DA HO:MI+ZONE\n"
"Last-Translator: FULL NAME <EMAIL@ADDRESS>\n"
"Language-Team: LANGUAGE <LL@li.org>\n"
"MIME-Version: 1.0\n"
"Content-Type: text/plain; charset=utf-8\n"
"Content-Transfer-Encoding: 8bit\n"
"Generated-By: Babel 2.6.0\n"
#: /Applications/Splunk/etc/apps/SA-ITOA/lib/ITOA/event_management/notable_event_utils.py:313
msgid "\"{0}\" does not have the capability \"{1}\"."
msgstr ""
#: /Applications/Splunk/etc/apps/SA-ITOA/lib/ITOA/event_management/notable_event_utils.py:310
msgid "\"{0}\" has the capability \"{1}\"."
msgstr ""
#: /Applications/Splunk/etc/apps/SA-ITOA/lib/itsi/csv_import/itsi_csv_import_utils.py:289
msgid "\"{}\" is not a file."
msgstr ""
#: /Applications/Splunk/etc/apps/SA-ITOA/lib/itsi/searches/itsi_searches.py:683
#, python-format
msgid "%s Value of \"%s\" field cannot be empty string."
msgstr ""
#: /Applications/Splunk/etc/apps/SA-ITOA/lib/ITOA/event_management/notable_event_actions.py:499
#, python-format
msgid "%s does not have any config"
msgstr ""
#: /Applications/Splunk/etc/apps/SA-ITOA/lib/itsi/objects/itsi_entity.py:116
#, python-format
msgid ""
"%s field specified in %s.fields attribute, not found in entity object. "
"entity_title=\"%s\", %s_field=\"%s\""
msgstr ""
#: /Applications/Splunk/etc/apps/SA-ITOA/lib/itsi/access_control/access_control_controller_utils.py:307
#, python-format
msgid ""
"%s is not accessible. User may not have access to the object, the ACL "
"object might not exist, or it might be corrupted."
msgstr ""
#: /Applications/Splunk/etc/apps/SA-ITOA/lib/ITOA/event_management/base_event_management.py:138
#, python-format
msgid "%s is not list"
msgstr ""
#: /Applications/Splunk/etc/apps/SA-ITOA/lib/itsi/event_management/utils.py:80
#, python-format
msgid "%s key does not exist in the data=%s."
msgstr ""
#: /Applications/Splunk/etc/apps/SA-ITOA/lib/ITOA/event_management/notable_event_comment.py:262
#: /Applications/Splunk/etc/apps/SA-ITOA/lib/ITOA/event_management/notable_event_comment.py:266
#: /Applications/Splunk/etc/apps/SA-ITOA/lib/ITOA/event_management/notable_event_comment.py:270
#: /Applications/Splunk/etc/apps/SA-ITOA/lib/ITOA/event_management/notable_event_comment.py:274
#: /Applications/Splunk/etc/apps/SA-ITOA/lib/ITOA/event_management/notable_event_comment.py:278
#: /Applications/Splunk/etc/apps/SA-ITOA/lib/ITOA/event_management/notable_event_tag.py:197
#: /Applications/Splunk/etc/apps/SA-ITOA/lib/ITOA/event_management/notable_event_tag.py:201
#: /Applications/Splunk/etc/apps/SA-ITOA/lib/ITOA/event_management/notable_event_tag.py:205
#: /Applications/Splunk/etc/apps/SA-ITOA/lib/ITOA/event_management/notable_event_tag.py:209
#, python-format
msgid "%s operation is not supported for this %s object type"
msgstr ""
#: /Applications/Splunk/etc/apps/SA-ITOA/lib/ITOA/event_management/notable_event_utils.py:525
#, python-format
msgid "%s resource(s) was not found."
msgstr ""
#: /Applications/Splunk/etc/apps/SA-ITOA/lib/ITOA/event_management/notable_event_actions.py:854
#, python-format
msgid "%s search failed. Refer search.log at \"%s\"."
msgstr ""
#: /Applications/Splunk/etc/apps/SA-ITOA/lib/itsi/searches/get_kpi_search.py:53
msgid "'searchField' attribute does not exist in args"
msgstr ""
#: /Applications/Splunk/etc/apps/SA-ITOA/lib/itsi/searches/get_kpi_search.py:44
msgid "'serviceId' attribute does not exist in args"
msgstr ""
#: /Applications/Splunk/etc/apps/SA-ITOA/lib/itsi/objects/itsi_kpi_base_search.py:396
#, python-format
msgid ", metric_name=\"%s\""
msgstr ""
#: /Applications/Splunk/etc/apps/SA-ITOA/bin/kvstore_to_json.py:631
msgid "-s(--splunkdport) must be a valid splunkd port number"
msgstr ""
#: /Applications/Splunk/etc/apps/SA-ITOA/default/itsi_kpi_threshold_template.conf:98
msgid "1-hour blocks every day (adaptive/quantile)"
msgstr ""
#: /Applications/Splunk/etc/apps/SA-ITOA/default/itsi_kpi_threshold_template.conf:107
msgid "1-hour blocks every day (adaptive/range)"
msgstr ""
#: /Applications/Splunk/etc/apps/SA-ITOA/default/itsi_kpi_threshold_template.conf:89
msgid "1-hour blocks every day (adaptive/stdev)"
msgstr ""
#: /Applications/Splunk/etc/apps/SA-ITOA/default/itsi_kpi_threshold_template.conf:80
msgid "1-hour blocks every day (static)"
msgstr ""
#: /Applications/Splunk/etc/apps/SA-ITOA/default/itsi_kpi_threshold_template.conf:206
msgid "1-hour blocks work week (adaptive/quantile)"
msgstr ""
#: /Applications/Splunk/etc/apps/SA-ITOA/default/itsi_kpi_threshold_template.conf:215
msgid "1-hour blocks work week (adaptive/range)"
msgstr ""
#: /Applications/Splunk/etc/apps/SA-ITOA/default/itsi_kpi_threshold_template.conf:197
msgid "1-hour blocks work week (adaptive/stdev)"
msgstr ""
#: /Applications/Splunk/etc/apps/SA-ITOA/default/itsi_kpi_threshold_template.conf:188
msgid "1-hour blocks work week (static)"
msgstr ""
#: /Applications/Splunk/etc/apps/SA-ITOA/default/itsi_kpi_threshold_template.conf:134
msgid "2-hour blocks every day (adaptive/quantile)"
msgstr ""
#: /Applications/Splunk/etc/apps/SA-ITOA/default/itsi_kpi_threshold_template.conf:143
msgid "2-hour blocks every day (adaptive/range)"
msgstr ""
#: /Applications/Splunk/etc/apps/SA-ITOA/default/itsi_kpi_threshold_template.conf:125
msgid "2-hour blocks every day (adaptive/stdev)"
msgstr ""
#: /Applications/Splunk/etc/apps/SA-ITOA/default/itsi_kpi_threshold_template.conf:116
msgid "2-hour blocks every day (static)"
msgstr ""
#: /Applications/Splunk/etc/apps/SA-ITOA/default/itsi_kpi_threshold_template.conf:242
msgid "2-hour blocks work week (adaptive/quantile)"
msgstr ""
#: /Applications/Splunk/etc/apps/SA-ITOA/default/itsi_kpi_threshold_template.conf:251
msgid "2-hour blocks work week (adaptive/range)"
msgstr ""
#: /Applications/Splunk/etc/apps/SA-ITOA/default/itsi_kpi_threshold_template.conf:233
msgid "2-hour blocks work week (adaptive/stdev)"
msgstr ""
#: /Applications/Splunk/etc/apps/SA-ITOA/default/itsi_kpi_threshold_template.conf:224
msgid "2-hour blocks work week (static)"
msgstr ""
#: /Applications/Splunk/etc/apps/SA-ITOA/default/itsi_kpi_threshold_template.conf:170
msgid "3-hour blocks every day (adaptive/quantile)"
msgstr ""
#: /Applications/Splunk/etc/apps/SA-ITOA/default/itsi_kpi_threshold_template.conf:179
msgid "3-hour blocks every day (adaptive/range)"
msgstr ""
#: /Applications/Splunk/etc/apps/SA-ITOA/default/itsi_kpi_threshold_template.conf:161
msgid "3-hour blocks every day (adaptive/stdev)"
msgstr ""
#: /Applications/Splunk/etc/apps/SA-ITOA/default/itsi_kpi_threshold_template.conf:152
msgid "3-hour blocks every day (static)"
msgstr ""
#: /Applications/Splunk/etc/apps/SA-ITOA/default/itsi_kpi_threshold_template.conf:278
msgid "3-hour blocks work week (adaptive/quantile)"
msgstr ""
#: /Applications/Splunk/etc/apps/SA-ITOA/default/itsi_kpi_threshold_template.conf:287
msgid "3-hour blocks work week (adaptive/range)"
msgstr ""
#: /Applications/Splunk/etc/apps/SA-ITOA/default/itsi_kpi_threshold_template.conf:269
msgid "3-hour blocks work week (adaptive/stdev)"
msgstr ""
#: /Applications/Splunk/etc/apps/SA-ITOA/default/itsi_kpi_threshold_template.conf:260
msgid "3-hour blocks work week (static)"
msgstr ""
#: /Applications/Splunk/etc/apps/SA-ITOA/default/data/ui/alerts/itsi_event_generator.html
msgid ""
"<form class=\"form-horizontal form-complex\">\n"
" <div class=\"alert alert-warn\">\n"
" <i class=\"icon-alert\" style=\"color:#d99f0d;\"></i>\n"
" It is not recommended to create notable events directly with "
"modular alerts. It is better to use the\n"
" <a href=\"../itsi/correlation_search_edit\">\n"
" ITSI Advanced Correlation Search Builder\n"
" </a>\n"
" </div>\n"
" <div class=\"control-group\">\n"
" <label class=\"control-label\" "
"for=\"action.itsi_event_generator.param.title\" style=\"width: 100px"
";padding-right: 10px;\">Title\n"
" <span class=\"required\">*</span>\n"
" </label>\n"
"\n"
" <div class=\"controls\">\n"
" <input type=\"text\" "
"name=\"action.itsi_event_generator.param.title\" "
"id=\"event_generator_title_id\" />\n"
" <span class=\"help-block\">\n"
" Notable events created by this search will have this "
"title.\n"
" </span>\n"
" </div>\n"
" </div>\n"
" <div class=\"control-group\">\n"
" <label class=\"control-label\" "
"for=\"action.itsi_event_generator.param.description\" style=\"width: "
"100px;padding-right: 10px;\">Description</label>\n"
" <div class=\"controls\">\n"
" <input type=\"text\" "
"name=\"action.itsi_event_generator.param.description\" "
"id=\"event_generator_desc_id\" />\n"
" <span class=\"help-block\">\n"
" Notable events created by this search will have this "
"description.\n"
" </span>\n"
" </div>\n"
" </div>\n"
" <div class=\"control-group\">\n"
" <label class=\"control-label\" "
"for=\"action.itsi_event_generator.param.owner\" style=\"width: 100px"
";padding-right: 10px;\">Default Owner\n"
" <span class=\"required\">*</span>\n"
" </label>\n"
" <div class=\"controls\">\n"
" <input type=\"text\" "
"name=\"action.itsi_event_generator.param.owner\" "
"id=\"event_generator_owner\"\n"
" value=\"unassigned\"/>\n"
" <span class=\"help-block\">\n"
" Username of the user assigned to the event.\n"
" </span>\n"
" </div>\n"
" </div>\n"
" <div class=\"control-group\">\n"
" <label class=\"control-label\" "
"for=\"action.itsi_event_generator.param.status\" style=\"width: 100px"
";padding-right: 10px;\">Default Status\n"
" <span class=\"required\">*</span>\n"
" </label>\n"
" <div class=\"controls\">\n"
" <input type=\"text\" "
"name=\"action.itsi_event_generator.param.status\" "
"id=\"event_generator_status\" value=\"1\"/>\n"
" <span class=\"help-block\">\n"
" Default status and severity of the event must match "
"integer values in itsi_notable_event_status.conf.\n"
" </span>\n"
" </div>\n"
" </div>\n"
" <div class=\"control-group\">\n"
" <label class=\"control-label\" "
"for=\"action.itsi_event_generator.param.severity\" style=\"width: 100px"
";padding-right: 10px;\">Default Severity\n"
" <span class=\"required\">*</span>\n"
" </label>\n"
" <div class=\"controls\">\n"
" <input type=\"text\" "
"name=\"action.itsi_event_generator.param.severity\" "
"id=\"event_generator_severity\" value=\"2\"/>\n"
" </div>\n"
" </div>\n"
" <div class=\"control-group\">\n"
" <label class=\"control-label\" "
"for=\"action.itsi_event_generator.param.drilldown_search_title\" "
"style=\"width: 100px;padding-right: 10px;\">Drilldown search "
"title</label>\n"
" <div class=\"controls\">\n"
" <input type=\"text\" "
"name=\"action.itsi_event_generator.param.drilldown_search_title\" "
"id=\"event_generator_drilldown_search_title\" />\n"
" <span class=\"help-block\">\n"
" The display name of the drilldown search link. \n"
" </span>\n"
" </div>\n"
" </div>\n"
" <div class=\"control-group\">\n"
" <label class=\"control-label\" "
"for=\"action.itsi_event_generator.param.drilldown_search_search\" "
"style=\"width: 100px;padding-right: 10px;\">Drilldown search</label>\n"
" <div class=\"controls\">\n"
" <textarea "
"name=\"action.itsi_event_generator.param.drilldown_search_search\" "
"id=\"event_generator_drilldown_search_search\" />\n"
" <span class=\"help-block\">\n"
" The Splunk search you drill down to.\n"
" </span>\n"
" </div>\n"
" </div>\n"
" <div class=\"control-group\">\n"
" <label class=\"control-label\" "
"for=\"action.itsi_event_generator.param.drilldown_search_earliest_offset\""
" style=\"width: 100px;padding-right: 10px;\">Drilldown earliest "
"offset</label>\n"
" <div class=\"controls\">\n"
" <select "
"name=\"action.itsi_event_generator.param.drilldown_search_earliest_offset\""
"\n"
" id=\"event_generator_dd_search_earliest_offset\">\n"
" <option selected=\"selected\" value=\"-60\">Last "
"minute</option>\n"
" <option value=\"-300\">Last 5 minute</option>\n"
" <option value=\"-900\">Last 15 minute</option>\n"
" <option value=\"-1800\">Last 30 minute</option>\n"
" <option value=\"-3600\">Last 60 minutes</option>\n"
" <option value=\"-14400\">Last 4 hours</option>\n"
" <option value=\"-86400\">Last 24 hours</option>\n"
" <option value=\"-604800\">Last 7 days</option>\n"
" <option value=\"-2592000\">Last 30 days</option>\n"
" <option value=\"-7776000\">Last 90 days</option>\n"
" </select>\n"
" </div>\n"
" </div>\n"
" <div class=\"control-group\">\n"
" <label class=\"control-label\" "
"for=\"action.itsi_event_generator.param.drilldown_search_latest_offset\" "
"style=\"width: 100px;padding-right: 10px;\">Drilldown latest "
"offset</label>\n"
" <div class=\"controls\">\n"
" <select "
"name=\"action.itsi_event_generator.param.drilldown_search_latest_offset\""
"\n"
" id=\"event_generator_dd_earliest_search\">\n"
" <option selected=\"selected\" value=\"60\">Next "
"minute</option>\n"
" <option value=\"300\">Next 5 minute</option>\n"
" <option value=\"900\">Next 15 minute</option>\n"
" <option value=\"1800\">Next 30 minute</option>\n"
" <option value=\"3600\">Next 60 minutes</option>\n"
" <option value=\"14400\">Next 4 hours</option>\n"
" <option value=\"86400\">Next 24 hours</option>\n"
" <option value=\"604800\">Next 7 days</option>\n"
" <option value=\"2592000\">Next 30 days</option>\n"
" <option value=\"7776000\">Next 90 days</option>\n"
" </select>\n"
" </div>\n"
" </div>\n"
" <div class=\"control-group\">\n"
" <label class=\"control-label\" "
"for=\"action.itsi_event_generator.param.drilldown_title\" style=\"width: "
"100px;padding-right: 10px;\">Drilldown webpage title</label>\n"
" <div class=\"controls\">\n"
" <input type=\"text\" "
"name=\"action.itsi_event_generator.param.drilldown_title\" "
"id=\"event_generator_drilldown_title\" />\n"
" <span class=\"help-block\">\n"
" The display name of the drilldown link.\n"
" </span>\n"
" </div>\n"
" </div>\n"
" <div class=\"control-group\">\n"
" <label class=\"control-label\" "
"for=\"event_generator_drilldown_uri\" style=\"width: 100px;padding-right:"
" 10px;\">Drilldown URI</label>\n"
" <div class=\"controls\">\n"
" <input type=\"text\" "
"name=\"action.itsi_event_generator.param.drilldown_uri\" "
"id=\"event_generator_drilldown_uri\" />\n"
" <span class=\"help-block\">\n"
" The link to the webpage you drill down to.\n"
" </span>\n"
" </div>\n"
" </div>\n"
" <div class=\"control-group\">\n"
" <label class=\"control-label\" for=\"itsi_notable_event_fields\" "
"style=\"width: 100px;padding-right: 10px;\">Notable Event Identifier "
"Fields</label>\n"
" <div class=\"controls\">\n"
" <input type=\"text\" "
"name=\"action.itsi_event_generator.param.event_identifier_fields\"\n"
" "
"id=\"itsi_event_generator.param.event_identifier_fields\"\n"
" placeholder=\"source\"\n"
" value=\"source,title,description\"\n"
" />\n"
" <span class=\"help-block\">\n"
" A comma-separated list of fields used to identify if a "
"notable event is unique.\n"
" </span>\n"
" </div>\n"
" </div>\n"
"</form>\n"
msgstr ""
#: /Applications/Splunk/etc/apps/SA-ITOA/default/data/ui/alerts/itsi_sample_event_action_ping.html
#, python-format
msgid ""
"<form class=\"form-horizontal form-complex\">\n"
" <div class=\"control-group\">\n"
" <label class=\"control-label\"\n"
" "
"for=\"action.itsi_sample_event_action_ping.param.host_to_ping\" "
"style=\"width: 100px;padding-right: 10px;\">Host\n"
" <span class=\"required\">*</span>\n"
" </label>\n"
"\n"
" <div class=\"controls\">\n"
" <input type=\"text\"\n"
" "
"name=\"action.itsi_sample_event_action_ping.param.host_to_ping\" "
"id=\"itsi_sample_event_action_ping_host_id\" value=\"%orig_host%\"/>\n"
" <span class=\"help-block\">\n"
" Field from the notable event representing the host to "
"ping. \n"
" If your event has `server`, set to `%server%`.\n"
" </span>\n"
" </div>\n"
" </div>\n"
"</form>\n"
msgstr ""
#: /Applications/Splunk/etc/apps/SA-ITOA/default/data/ui/alerts/itsi_event_action_link_ticket.html
msgid ""
"<form class=\"form-horizontal form-complex\">\n"
" <div class=\"control-group\">\n"
" <label class=\"control-label\"\n"
" for=\"itsi_event_action_link_ticket_ticket_system\" "
"style=\"width: 100px;padding-right: 10px;\">Ticket System\n"
" <span class=\"required\"></span>\n"
" </label>\n"
"\n"
" <div class=\"controls\">\n"
" <input type=\"text\"\n"
" "
"name=\"action.itsi_event_action_link_ticket.param.ticket_system\" "
"id=\"itsi_event_action_link_ticket_ticket_system\" value=\"\"/>\n"
" <span class=\"help-block\">\n"
" Name of the ticketing system. Used for display purposes in most cases, but must be "Service Now" to enable bidirectional ticketing.\n"
" </span>\n"
" </div>\n"
" </div>\n"
" <div class=\"control-group\">\n"
" <label class=\"control-label\"\n"
" for=\"itsi_event_action_link_ticket_ticket_id\" "
"style=\"width: 100px;padding-right: 10px;\">Ticket ID\n"
" <span class=\"required\"></span>\n"
" </label>\n"
"\n"
" <div class=\"controls\">\n"
" <input type=\"text\"\n"
" "
"name=\"action.itsi_event_action_link_ticket.param.ticket_id\" "
"id=\"itsi_event_action_link_ticket_ticket_id\" value=\"\"/>\n"
" <span class=\"help-block\">\n"
" ID of the specific ticket.\n"
" </span>\n"
" </div>\n"
" </div>\n"
" <div class=\"control-group\">\n"
" <label class=\"control-label\"\n"
" for=\"itsi_event_action_ticket_url\" style=\"width: 100px"
";padding-right: 10px;\">Ticket URL\n"
" <span class=\"required\"></span>\n"
" </label>\n"
"\n"
" <div class=\"controls\">\n"
" <input type=\"url\" pattern=\"https?://.+\"\n"
" "
"name=\"action.itsi_event_action_link_ticket.param.ticket_url\" "
"id=\"itsi_event_action_link_ticket_ticket_url\" value=\"\"/>\n"
" <span class=\"help-block\">\n"
" Drilldown link to the ticket in the external ticketing "
"system. Include http:// or https://. Otherwise the URL is interpreted as "
"a relative URI.\n"
" </span>\n"
" </div>\n"
" </div>\n"
"</form>\n"
msgstr ""
#: /Applications/Splunk/etc/apps/SA-ITOA/default/data/ui/alerts/itsi_event_action_send_to_phantom.html
msgid ""
"<form class=\"form-horizontal form-complex\">\n"
" <div class=\"control-group\">\n"
" <label class=\"send_to_phantom_action control-label\"\n"
" "
"for=\"action.itsi_event_action_send_to_phantom.param.ph_server\">Phantom "
"Server\n"
" <span class=\"required\">*</span>\n"
" </label>\n"
"\n"
" <div class=\"controls\">\n"
" <splunk-search-dropdown\n"
" "
"name=\"action.itsi_event_action_send_to_phantom.param.ph_server\" "
"id=\"itsi_event_action_send_to_phantom_ph_server\"\n"
" search=\"| rest /servicesNS/nobody/phantom/target_list\"\n"
" label-field=\"title\" value-field=\"title\">\n"
" </splunk-search-dropdown>\n"
" <span class=\"send_to_phantom_action help-block\" "
"name=\"ph_server\">\n"
" The Phantom server to which to send the ITSI episode.\n"
" </span>\n"
" </div>\n"
" </div>\n"
" <div class=\"control-group\">\n"
" <label class=\"send_to_phantom_action control-label\"\n"
" "
"for=\"action.itsi_event_action_send_to_phantom.param.ph_label\">Phantom "
"Label\n"
" </label>\n"
"\n"
" <div class=\"controls\">\n"
" <input type=\"text\"\n"
" "
"name=\"action.itsi_event_action_send_to_phantom.param.ph_label\" "
"id=\"itsi_event_action_send_to_phantom_ph_label\" value=\"events\"/>\n"
" <span class=\"send_to_phantom_action help-block\" "
"name=\"label\">\n"
" Label which determines which playbooks to trigger.\n"
" </span>\n"
" </div>\n"
" </div>\n"
"</form>\n"
"<style>\n"
".send_to_phantom_action.help-block {\n"
" padding-left: 20px;\n"
"}\n"
"\n"
".send_to_phantom_action.control-label {\n"
" text-align: left;\n"
"}\n"
"\n"
"input#itsi_event_action_send_to_phantom_ph_label {\n"
" width: 100%;\n"
"}\n"
"</style>\n"
msgstr ""
#: /Applications/Splunk/etc/apps/SA-ITOA/bin/kvstore_to_json.py:175
msgid ""
">> Enter full path of backup or restore directory. Note: It could be a "
"file, if you are importing from ITSI 1.2.0\n"
" Press enter to use your current working directory {} > "
msgstr ""
#: /Applications/Splunk/etc/apps/SA-ITOA/bin/kvstore_to_json.py:299
msgid ""
">> The ITSI version on which the backup data was collected is "
"unavailable. Enter the ITSI version on which the backup data was "
"collected, to restore to. Ex: '2.3.0', '2.3.1', '2.4.0' >"
msgstr ""
#: /Applications/Splunk/etc/apps/SA-ITOA/bin/itsi_async_csv_loader.py:188
#: /Applications/Splunk/etc/apps/SA-ITOA/bin/itsi_csv_import.py:222
msgid ""
"A comma separated list of services found in the CSV file itself that are "
"to be associated with the entity for the row. Optional"
msgstr ""
#: /Applications/Splunk/etc/apps/SA-ITOA/bin/itsi_async_csv_loader.py:122
#: /Applications/Splunk/etc/apps/SA-ITOA/bin/itsi_csv_import.py:135
msgid ""
"A mapping specification for the CSV (input) fields to ones that match "
"Splunk fields (output). Optional. It needs to be a comma separated list"
" of key=value pairs where the key is the field found in the CSV. For "
"example, if your CSV contains 'foo' and 'bar' as headers and you want to "
"map both of them to the Splunk field 'dest', you should set field "
"mappings as 'foo=dest,bar=dest'"
msgstr ""
#: /Applications/Splunk/etc/apps/SA-ITOA/lib/itsi/upgrade/itsi_migration.py:1233
#, python-format
msgid ""
"A problem occurred when updating adaptive threshold search %s. To resolve"
" this issue, refer to the documentation."
msgstr ""
#: /Applications/Splunk/etc/apps/SA-ITOA/lib/itsi/csv_import/itoa_bulk_import_specification.py:435
msgid ""
"A reserved word is being used as column title for either \"Entity "
"Title\", \"Entity Alias\" or \"Entity Informational\" column. Rename the "
"following column titles: {0}.\n"
" Alternatively, field map them to non-reserved words.\n"
" Reserved words are: {1}"
msgstr ""
#: /Applications/Splunk/etc/apps/SA-ITOA/lib/itsi/objects/itsi_service.py:2306
msgid ""
"A service key specified does not exist. Cannot change KPIs for non-"
"existing services."
msgstr ""
#: /Applications/Splunk/etc/apps/SA-ITOA/default/itsi_base_service_template.conf:3
msgid ""
"A service template that contains out-of-box KPIs for *nix based services "
"imported from SAI."
msgstr ""
#: /Applications/Splunk/etc/apps/SA-ITOA/default/itsi_base_service_template.conf:2536
msgid ""
"A service template that contains out-of-box KPIs for AWS EC2 based "
"services imported from SAI."
msgstr ""
#: /Applications/Splunk/etc/apps/SA-ITOA/default/itsi_base_service_template.conf:1549
msgid ""
"A service template that contains out-of-box KPIs for Windows based "
"services imported from SAI."
msgstr ""
#: /Applications/Splunk/etc/apps/SA-ITOA/default/itsi_base_service_template.conf:3330
msgid ""
"A service template that contains performance KPIs for AWS EBS Volumes "
"from metrics collected by AWS CloudWatch."
msgstr ""
#: /Applications/Splunk/etc/apps/SA-ITOA/lib/itsi/upgrade/itsi_migration.py:3656
msgid ""
"A service template was syncing when Splunk restarted. All ongoing syncs "
"may be stopped and marked as \"Sync failed\". Manually re-initiate all "
"failed service template syncs after the upgrade has completed."
msgstr ""
#: /Applications/Splunk/etc/apps/SA-ITOA/lib/itsi/objects/itsi_kpi.py:640
msgid ""
"A valid aggregation operator is not specified for a KPI. Aggregate "
"operator must be specified."
msgstr ""
#: /Applications/Splunk/etc/apps/SA-ITOA/lib/itsi/objects/itsi_kpi.py:552
msgid ""
"A valid threshold field is not specified for a KPI with ad hoc search. "
"Threshold fields must be specified for ad hoc search based KPIs."
msgstr ""
#: /Applications/Splunk/etc/apps/SA-ITOA/lib/itsi/objects/itsi_kpi.py:546
msgid ""
"A valid threshold field is not specified for a KPI with shared base "
"search. Threshold fields must be specified for shared base search KPIs."
msgstr ""
#: /Applications/Splunk/etc/apps/SA-ITOA/lib/itsi/searches/itsi_shared_base_search.py:262
#: /Applications/Splunk/etc/apps/SA-ITOA/lib/itsi/upgrade/migration_handlers_3_1_1.py:228
#, python-format
msgid "ACL update failed for saved search %s. Manual update required."
msgstr ""
#: /Applications/Splunk/etc/apps/SA-ITOA/default/itsi_kpi_threshold_template.conf:62
msgid "AM, PM (adaptive/quantile)"
msgstr ""
#: /Applications/Splunk/etc/apps/SA-ITOA/default/itsi_kpi_threshold_template.conf:71
msgid "AM, PM (adaptive/range)"
msgstr ""
#: /Applications/Splunk/etc/apps/SA-ITOA/default/itsi_kpi_threshold_template.conf:53
msgid "AM, PM (adaptive/stdev)"
msgstr ""
#: /Applications/Splunk/etc/apps/SA-ITOA/default/itsi_kpi_threshold_template.conf:44
msgid "AM, PM (static)"
msgstr ""
#: /Applications/Splunk/etc/apps/SA-ITOA/lib/ITOA/itoa_exceptions.py:56
#, python-format
msgid "Access denied. %s"
msgstr ""
#: /Applications/Splunk/etc/apps/SA-ITOA/lib/ITOA/event_management/notable_event_aggregation_policy.py:227
msgid ""
"Access denied. Default Aggregation Policy can only be edited by "
"itoa_admin role."
msgstr ""
#: /Applications/Splunk/etc/apps/SA-ITOA/lib/ITOA/itoa_object.py:269
#: /Applications/Splunk/etc/apps/SA-ITOA/lib/ITOA/itoa_object.py:392
msgid "Access denied. Object of type {} can only be created in Global team."
msgstr ""
#: /Applications/Splunk/etc/apps/SA-ITOA/lib/ITOA/itoa_object.py:482
msgid "Access denied. Object of type {} can only be updated in the Global team."
msgstr ""
#: /Applications/Splunk/etc/apps/SA-ITOA/lib/ITOA/itoa_object.py:664
msgid "Access denied. You do not have permission to access this object."
msgstr ""
#: /Applications/Splunk/etc/apps/SA-ITOA/lib/ITOA/itoa_object.py:277
#: /Applications/Splunk/etc/apps/SA-ITOA/lib/ITOA/itoa_object.py:401
msgid "Access denied. You do not have permission to create this object."
msgstr ""
#: /Applications/Splunk/etc/apps/SA-ITOA/lib/ITOA/itoa_object.py:548
#: /Applications/Splunk/etc/apps/SA-ITOA/lib/itsi/objects/itsi_security_group.py:55
msgid "Access denied. You do not have permission to delete this object."
msgstr ""
#: /Applications/Splunk/etc/apps/SA-ITOA/lib/itsi/objects/itsi_security_group.py:224
msgid "Access denied. You do not have permission to update the Global team."
msgstr ""
#: /Applications/Splunk/etc/apps/SA-ITOA/lib/ITOA/event_management/correlation_search.py:396
#: /Applications/Splunk/etc/apps/SA-ITOA/lib/ITOA/itoa_object.py:491
msgid "Access denied. You do not have permission to update this object."
msgstr ""
#: /Applications/Splunk/etc/apps/SA-ITOA/lib/ITOA/event_management/notable_event_actions.py:979
#, python-format
msgid "Action name is not specified=\"%s\"."
msgstr ""
#: /Applications/Splunk/etc/apps/SA-ITOA/lib/ITOA/event_management/notable_event_actions.py:146
msgid "Action {0} does not exist for this user {1}."
msgstr ""
#: /Applications/Splunk/etc/apps/SA-ITOA/lib/ITOA/event_management/rules_engine/actions.py:61
#, python-format
msgid "Actions: Expected type for `actions[\"items\"]`=listReceived=%s."
msgstr ""
#: /Applications/Splunk/etc/apps/SA-ITOA/lib/ITOA/event_management/rules_engine/actions.py:57
msgid "Actions: Missing key `condition`"
msgstr ""
#: /Applications/Splunk/etc/apps/SA-ITOA/lib/ITOA/event_management/rules_engine/actions.py:59
msgid "Actions: Missing key `items`"
msgstr ""
#: /Applications/Splunk/etc/apps/SA-ITOA/lib/itsi/objects/itsi_kpi.py:535
msgid ""
"Ad hoc search KPIs does not seem to have populated a base search. Specify"
" a base search for the KPI."
msgstr ""
#: /Applications/Splunk/etc/apps/SA-ITOA/lib/ITOA/event_management/correlation_search.py:98
msgid "Addition validation has failed"
msgstr ""
#: /Applications/Splunk/etc/apps/SA-ITOA/bin/itsi_age_kpi_alert_value_cache.py:42
msgid "Aging/retention time in seconds for entries present in KPIs Summary Cache."
msgstr ""
#: /Applications/Splunk/etc/apps/SA-ITOA/default/itsi_notable_event_status.conf:11
msgid "An error is preventing the issue from having a valid status assignment"
msgstr ""
#: /Applications/Splunk/etc/apps/SA-ITOA/lib/itsi/objects/itsi_kpi.py:433
msgid ""
"An invalid aggregation operator is specified for a KPI. Refer to the ITSI"
" documentation for a listof valid operators and syntax."
msgstr ""
#: /Applications/Splunk/etc/apps/SA-ITOA/lib/itsi/objects/itsi_event_management_state.py:44
msgid "An invalid value is specified for {0}. Specify a valid value."
msgstr ""
#: /Applications/Splunk/etc/apps/SA-ITOA/lib/itsi/upgrade/itsi_migration.py:985
#, python-format
msgid ""
"Anomaly detection search: %s in $SPLUNK_HOME/etc/apps/itsi/local will be "
"deleted."
msgstr ""
#: /Applications/Splunk/etc/apps/SA-ITOA/default/app.conf:14
msgid "App for configuring and storing entities, services, and the like"
msgstr ""
#: /Applications/Splunk/etc/apps/SA-ITOA/bin/itsi_user_access_init.py:57
msgid "Application name"
msgstr ""
#: /Applications/Splunk/etc/apps/SA-ITOA/lib/ITOA/itoa_object.py:363
msgid ""
"Are you sure you wanted to save a batch? Are you sure it wasn't "
"NOTHING?!?!, cannot save empty payload, received {}"
msgstr ""
#: /Applications/Splunk/etc/apps/SA-ITOA/lib/ITOA/event_management/notable_event_comment.py:248
msgid "Array of comments expected"
msgstr ""
#: /Applications/Splunk/etc/apps/SA-ITOA/lib/maintenance_services/objects/maintenance_calendar.py:626
msgid ""
"At least one object specified in invalid. Must specify a key and an "
"object type for each object."
msgstr ""
#: /Applications/Splunk/etc/apps/SA-ITOA/lib/maintenance_services/objects/maintenance_calendar.py:632
msgid "At least one object specified with invalid key. Must specify a valid key."
msgstr ""
#: /Applications/Splunk/etc/apps/SA-ITOA/lib/itsi/csv_import/itoa_bulk_import_entity.py:73
msgid "Attempt to use reserved word \"{}\" as a fieldname."
msgstr ""
#: /Applications/Splunk/etc/apps/SA-ITOA/lib/itsi/backfill/__init__.py:154
msgid "Attempting to add a job already in the queue"
msgstr ""
#: /Applications/Splunk/etc/apps/SA-ITOA/lib/ITOA/storage/itoa_generic_persistables.py:168
#: /Applications/Splunk/etc/apps/SA-ITOA/lib/ITOA/storage/itoa_generic_persistables.py:171
msgid "Attempting to call an abstract method"
msgstr ""
#: /Applications/Splunk/etc/apps/SA-ITOA/lib/ITOA/storage/itoa_storage.py:112
msgid "Backend not registered or undefined"
msgstr ""
#: /Applications/Splunk/etc/apps/SA-ITOA/lib/itsi/upgrade/kvstore_backup_restore.py:211
msgid "Backup file not found. Ensure backup zip file is present."
msgstr ""
#: /Applications/Splunk/etc/apps/SA-ITOA/lib/ITOA/controller_utils.py:1182
msgid ""
"Backup/restore jobs are in progress. Configuration changes are not "
"allowed while backup/restore jobs are in progress."
msgstr ""
#: /Applications/Splunk/etc/apps/SA-ITOA/lib/ITOA/event_management/rules_engine/clause.py:39
#, python-format
msgid "Bad Request. Expecting either \"AND\" or \"OR\". Received \"%s\""
msgstr ""
#: /Applications/Splunk/etc/apps/SA-ITOA/lib/ITOA/event_management/rules_engine/clause.py:43
#, python-format
msgid "Bad Request. Expecting type=list. Received type=%s"
msgstr ""
#: /Applications/Splunk/etc/apps/SA-ITOA/lib/ITOA/controller_utils.py:460
#: /Applications/Splunk/etc/apps/SA-ITOA/lib/itsi/access_control/access_control_controller_utils.py:251
#, python-format
msgid "Bad Request: Missing one/all of the keys=`%s`. Received=%s."
msgstr ""
#: /Applications/Splunk/etc/apps/SA-ITOA/lib/itsi/access_control/splunkd_controller_rbac_utils.py:121
msgid "Bad Request: Missing required args needed by decorator."
msgstr ""
#: /Applications/Splunk/etc/apps/SA-ITOA/lib/ITOA/controller_utils.py:560
#, python-format
msgid "Bad Request: Unable to jsonify data, %s."
msgstr ""
#: /Applications/Splunk/etc/apps/SA-ITOA/bin/backfill_services.py:30
msgid "Bad argument count."
msgstr ""
#: /Applications/Splunk/etc/apps/SA-ITOA/lib/ITOA/event_management/notable_event_aggregation_policy.py:87
#, python-format
msgid "Bad collection name. Received=%s."
msgstr ""
#: /Applications/Splunk/etc/apps/SA-ITOA/lib/itsi/csv_import/itoa_bulk_import_entity_parser.py:151
msgid ""
"Bad data in source: Identifiers cannot contain equal or quote characters:"
" \"{}\""
msgstr ""
#: /Applications/Splunk/etc/apps/SA-ITOA/lib/itsi/csv_import/itoa_bulk_import_entity_parser.py:117
#: /Applications/Splunk/etc/apps/SA-ITOA/lib/itsi/csv_import/itoa_bulk_import_service_parser.py:113
msgid "Bad data in source: Names cannot contain equal or quote characters: \"{}\""
msgstr ""
#: /Applications/Splunk/etc/apps/SA-ITOA/lib/itsi/csv_import/itoa_bulk_import_entity_parser.py:112
msgid "Bad data in source: Row contains empty title: \"{}\""
msgstr ""
#: /Applications/Splunk/etc/apps/SA-ITOA/lib/itsi/csv_import/itoa_bulk_import_entity_parser.py:105
#: /Applications/Splunk/etc/apps/SA-ITOA/lib/itsi/csv_import/itoa_bulk_import_entity_parser.py:128
#: /Applications/Splunk/etc/apps/SA-ITOA/lib/itsi/csv_import/itoa_bulk_import_service_parser.py:102
#: /Applications/Splunk/etc/apps/SA-ITOA/lib/itsi/csv_import/itoa_bulk_import_service_parser.py:122
#: /Applications/Splunk/etc/apps/SA-ITOA/lib/itsi/csv_import/itoa_bulk_import_service_parser.py:141
msgid ""
"Bad data in source: Row contains not enough data to process all requested"
" fields: \"{}\""
msgstr ""
#: /Applications/Splunk/etc/apps/SA-ITOA/lib/ITOA/event_management/notable_event_aggregation_policy.py:83
#, python-format
msgid "Bad object type. Received=%s."
msgstr ""
#: /Applications/Splunk/etc/apps/SA-ITOA/lib/ITOA/event_management/notable_event_aggregation_policy.py:79
#, python-format
msgid "Bad owner. Received=%s."
msgstr ""
#: /Applications/Splunk/etc/apps/SA-ITOA/lib/ITOA/event_management/notable_event_aggregation_policy.py:75
msgid "Bad session key."
msgstr ""
#: /Applications/Splunk/etc/apps/SA-ITOA/lib/itsi/searches/itsi_searches.py:818
msgid "Base search of KPI cannot be a empty string."
msgstr ""
#: /Applications/Splunk/etc/apps/SA-ITOA/lib/itsi/objects/itsi_kpi.py:221
#, python-format
msgid "Base search with ID: \"%s\" does not exist. No attributes to populate."
msgstr ""
#: /Applications/Splunk/etc/apps/SA-ITOA/lib/ITOA/storage/statestore.py:582
msgid "Batch save requires input be a list, actual data input={0}"
msgstr ""
#: /Applications/Splunk/etc/apps/SA-ITOA/lib/ITOA/storage/statestore.py:626
msgid "Batch save to KV store failed with code {0}. Error details: {1}"
msgstr ""
#: /Applications/Splunk/etc/apps/SA-ITOA/bin/itsi_notable_event_actions_queue_consumer.py:53
msgid "Batch size"
msgstr ""
#: /Applications/Splunk/etc/apps/SA-ITOA/lib/SA_ITOA_app_common/solnlib/packages/schematics/types/base.py:1051
msgid "Both values in point must be float or int"
msgstr ""
#: /Applications/Splunk/etc/apps/SA-ITOA/lib/itsi/objects/itsi_service_template.py:888
msgid "Bulk creation of Service Template objects is not supported."
msgstr ""
#: /Applications/Splunk/etc/apps/SA-ITOA/lib/itsi/objects/itsi_service_template.py:872
msgid ""
"Bulk creation of service template objects is not supported or ID field "
"missing for at least one of the objects in bulk update request."
msgstr ""
#: /Applications/Splunk/etc/apps/SA-ITOA/bin/itsi_async_csv_loader.py:83
#: /Applications/Splunk/etc/apps/SA-ITOA/bin/itsi_csv_import.py:96
msgid "CSV Location"
msgstr ""
#: /Applications/Splunk/etc/apps/SA-ITOA/lib/itsi/csv_import/itoa_bulk_import_rest_interface_provider.py:234
msgid "CSV Upload failure. Check the logs for details."
msgstr ""
#: /Applications/Splunk/etc/apps/SA-ITOA/lib/ITOA/storage/statestore.py:405
msgid "Cannot change permissions from 'app' to 'user' without cloning."
msgstr ""
#: /Applications/Splunk/etc/apps/SA-ITOA/lib/itsi/objects/itsi_service.py:2344
msgid ""
"Cannot change service health type KPIs. Remove service health KPIs and "
"retry."
msgstr ""
#: /Applications/Splunk/etc/apps/SA-ITOA/lib/itsi/objects/itsi_security_group.py:313
msgid "Cannot create team without valid ACL."
msgstr ""
#: /Applications/Splunk/etc/apps/SA-ITOA/lib/itsi/objects/changehandlers/kpi_delete_handler.py:150
msgid ""
"Cannot delete all KPI saved searches. We recommend that you manually "
"delete them. Saves search names are: {0}"
msgstr ""
#: /Applications/Splunk/etc/apps/SA-ITOA/lib/ITOA/itoa_object.py:539
#: /Applications/Splunk/etc/apps/SA-ITOA/lib/itsi/objects/itsi_security_group.py:46
#: /Applications/Splunk/etc/apps/SA-ITOA/lib/maintenance_services/objects/maintenance_calendar.py:488
msgid "Cannot delete object with invalid object ID."
msgstr ""
#: /Applications/Splunk/etc/apps/SA-ITOA/lib/itsi/upgrade/itsi_migration.py:992
#, python-format
msgid ""
"Cannot delete/disable old Anomaly Detection search: %s, check the search "
"manually."
msgstr ""
#: /Applications/Splunk/etc/apps/SA-ITOA/lib/itsi/objects/changehandlers/kpi_delete_handler.py:130
msgid ""
"Cannot disable/delete all impacted correlation searches. We recommend "
"that you update the impacted correlation searches by the UI. Correlation "
"search names are: {0}"
msgstr ""
#: /Applications/Splunk/etc/apps/SA-ITOA/lib/itsi_module/itsi_module_modules.py:42
msgid "Cannot download requested file. No downloads have been exported yet."
msgstr ""
#: /Applications/Splunk/etc/apps/SA-ITOA/lib/ITOA/storage/itoa_generic_persistables.py:334
msgid "Cannot fetch an unsaved model."
msgstr ""
#: /Applications/Splunk/etc/apps/SA-ITOA/lib/itsi/objects/itsi_service.py:1845
msgid ""
"Cannot filter on entities in {0} \"{1}\" for kpi \"{2}\" if there are no "
"entities in the {3}."
msgstr ""
#: /Applications/Splunk/etc/apps/SA-ITOA/lib/itsi/searches/itsi_shared_base_search.py:55
#, python-format
msgid "Cannot find KPI base search with ID: %s."
msgstr ""
#: /Applications/Splunk/etc/apps/SA-ITOA/lib/itsi/searches/itsi_searches.py:1054
msgid ""
"Cannot generate an entity time series for a KPI without entity breakdown "
"enabled."
msgstr ""
#: /Applications/Splunk/etc/apps/SA-ITOA/lib/ITOA/event_management/rules_engine/criterion.py:76
msgid ""
"Cannot instantiate this class. Call "
"`ActivationCriteria.validate(criteria)`"
msgstr ""
#: /Applications/Splunk/etc/apps/SA-ITOA/lib/ITOA/event_management/rules_engine/criterion.py:50
msgid "Cannot instantiate this class. Call `BreakingCriteria.validate(criteria)`"
msgstr ""
#: /Applications/Splunk/etc/apps/SA-ITOA/lib/ITOA/event_management/rules_engine/actions.py:45
#: /Applications/Splunk/etc/apps/SA-ITOA/lib/ITOA/event_management/rules_engine/clause.py:24
msgid "Cannot instantiate this class. Call `Clause.validate(condition, items)`"
msgstr ""
#: /Applications/Splunk/etc/apps/SA-ITOA/lib/ITOA/event_management/rules_engine/criterion.py:104
msgid "Cannot instantiate this class. Call `ExecutionCriteria.validate(criteria)`"
msgstr ""
#: /Applications/Splunk/etc/apps/SA-ITOA/lib/ITOA/event_management/rules_engine/criterion.py:26
msgid "Cannot instantiate this class. Call `FilterCriteria.validate(criteria)`"
msgstr ""
#: /Applications/Splunk/etc/apps/SA-ITOA/lib/ITOA/event_management/rules_engine/actions.py:18
#: /Applications/Splunk/etc/apps/SA-ITOA/lib/ITOA/event_management/rules_engine/clause_item_config.py:12
#: /Applications/Splunk/etc/apps/SA-ITOA/lib/ITOA/event_management/rules_engine/clause_item_config.py:21
#: /Applications/Splunk/etc/apps/SA-ITOA/lib/ITOA/event_management/rules_engine/clause_item_config.py:30
#: /Applications/Splunk/etc/apps/SA-ITOA/lib/ITOA/event_management/rules_engine/clause_item_config.py:39
#: /Applications/Splunk/etc/apps/SA-ITOA/lib/ITOA/event_management/rules_engine/clause_item_config.py:48
#: /Applications/Splunk/etc/apps/SA-ITOA/lib/ITOA/event_management/rules_engine/clause_item_config.py:57
#: /Applications/Splunk/etc/apps/SA-ITOA/lib/ITOA/event_management/rules_engine/clause_item_config.py:66
#: /Applications/Splunk/etc/apps/SA-ITOA/lib/ITOA/event_management/rules_engine/clause_item_config.py:75
#: /Applications/Splunk/etc/apps/SA-ITOA/lib/ITOA/event_management/rules_engine/item.py:21
#: /Applications/Splunk/etc/apps/SA-ITOA/lib/ITOA/event_management/rules_engine/item.py:57
msgid "Cannot instantiate this class. Call `Item.validate(item)`"
msgstr ""
#: /Applications/Splunk/etc/apps/SA-ITOA/lib/ITOA/event_management/rules_engine/rule.py:19
msgid "Cannot instantiate this class. Call `Rule.validate(rule)`"
msgstr ""
#: /Applications/Splunk/etc/apps/SA-ITOA/lib/itsi_module/itsi_module_common.py:733
#, python-format
msgid "Cannot replace special characters in string: %s."
msgstr ""
#: /Applications/Splunk/etc/apps/SA-ITOA/lib/ITOA/itoa_object.py:644
msgid "Cannot retrieve object with invalid object ID."
msgstr ""
#: /Applications/Splunk/etc/apps/SA-ITOA/lib/itsi/upgrade/itsi_migration.py:1059
#, python-format
msgid "Cannot update fields for an invalid deep dive=%s. Type=%s."
msgstr ""
#: /Applications/Splunk/etc/apps/SA-ITOA/lib/ITOA/itoa_object.py:458
#: /Applications/Splunk/etc/apps/SA-ITOA/lib/itsi/objects/itsi_security_group.py:208
msgid "Cannot update object with invalid object ID."
msgstr ""
#: /Applications/Splunk/etc/apps/SA-ITOA/lib/itsi/upgrade/itsi_migration.py:1131
#, python-format
msgid "Cannot update overlay settings for an invalid deep dive=%s. Type=%s."
msgstr ""
#: /Applications/Splunk/etc/apps/SA-ITOA/lib/itsi/upgrade/itsi_migration.py:1095
#, python-format
msgid "Cannot update threshold settings for an invalid deep dive=%s. Type=%s."
msgstr ""
#: /Applications/Splunk/etc/apps/SA-ITOA/lib/itsi/csv_import/itsi_csv_import_utils.py:283
msgid "Cannot work with \"{}\"."
msgstr ""
#: /Applications/Splunk/etc/apps/SA-ITOA/lib/itsi/access_control/access_control_controller_utils.py:353
msgid ""
"Checking for accessible object IDs.\n"
"Requested IDs: {0}\n"
"operation: {1}\n"
"app: {2}\n"
"object type: {3}\n"
"object store: {4}"
msgstr ""
#: /Applications/Splunk/etc/apps/SA-ITOA/default/savedsearches.conf:156
msgid "Clean up models that is 24 hours old and not saved in any service models."
msgstr ""
#: /Applications/Splunk/etc/apps/SA-ITOA/default/itsi_notable_event_status.conf:42
msgid "Closed"
msgstr ""
#: /Applications/Splunk/etc/apps/SA-ITOA/default/itsi_base_service_template.conf:3329
msgid "Cloud KPIs - AWS EBS (SAI)"
msgstr ""
#: /Applications/Splunk/etc/apps/SA-ITOA/default/itsi_base_service_template.conf:2535
msgid "Cloud KPIs - AWS EC2 (SAI)"
msgstr ""
#: /Applications/Splunk/etc/apps/SA-ITOA/default/savedsearches.conf:54
msgid ""
"Collect the *nix hosts provided through the TA-nix app for entry into IT "
"Service Intelligence"
msgstr ""
#: /Applications/Splunk/etc/apps/SA-ITOA/default/savedsearches.conf:111
msgid "Collect the OS X hosts provided through the TA-nix app for entry into ITSI"
msgstr ""
#: /Applications/Splunk/etc/apps/SA-ITOA/default/savedsearches.conf:107
msgid ""
"Collect the solaris hosts provided through the TA-nix app for entry into "
"ITSI"
msgstr ""
#: /Applications/Splunk/etc/apps/SA-ITOA/default/savedsearches.conf:103
msgid ""
"Collect the unix and linux hosts provided through the TA-nix app for "
"entry into ITSI"
msgstr ""
#: /Applications/Splunk/etc/apps/SA-ITOA/bin/itsi_csv_import.py:196
msgid ""
"Column in CSV file that contains the name of the service template that "
"the imported service should be linked to. Optional"
msgstr ""
#: /Applications/Splunk/etc/apps/SA-ITOA/bin/itsi_async_csv_loader.py:96
#: /Applications/Splunk/etc/apps/SA-ITOA/bin/itsi_csv_import.py:109
msgid ""
"Column in CSV file that represents the conflict resolution field of an "
"entity. Case sensitive"
msgstr ""
#: /Applications/Splunk/etc/apps/SA-ITOA/bin/itsi_async_csv_loader.py:141
#: /Applications/Splunk/etc/apps/SA-ITOA/bin/itsi_csv_import.py:154
msgid ""
"Column in CSV file that represents the title of a service. Mandatory. "
"Case sensitive"
msgstr ""
#: /Applications/Splunk/etc/apps/SA-ITOA/bin/itsi_async_csv_loader.py:90
#: /Applications/Splunk/etc/apps/SA-ITOA/bin/itsi_csv_import.py:103
msgid ""
"Column in CSV file that represents title of an entity. Mandatory. Case "
"sensitive"
msgstr ""
#: /Applications/Splunk/etc/apps/SA-ITOA/bin/itsi_async_csv_loader.py:172
#: /Applications/Splunk/etc/apps/SA-ITOA/bin/itsi_csv_import.py:185
msgid ""
"Comma separated list of services which need to be attached to "
"entities/services being imported. Optional"
msgstr ""
#: /Applications/Splunk/etc/apps/SA-ITOA/bin/itsi_async_csv_loader.py:102
#: /Applications/Splunk/etc/apps/SA-ITOA/bin/itsi_async_csv_loader.py:147
#: /Applications/Splunk/etc/apps/SA-ITOA/bin/itsi_csv_import.py:115
#: /Applications/Splunk/etc/apps/SA-ITOA/bin/itsi_csv_import.py:160
msgid ""
"Comma separated names of column headers from the CSV file that may "
"describe an asset. Case sensitive"
msgstr ""
#: /Applications/Splunk/etc/apps/SA-ITOA/bin/itsi_async_csv_loader.py:108
#: /Applications/Splunk/etc/apps/SA-ITOA/bin/itsi_csv_import.py:121
msgid ""
"Comma separated names of column headers to be imported from the CSV File "
"that represent fields that may identify the asset. Case sensitive."
msgstr ""
#: /Applications/Splunk/etc/apps/SA-ITOA/bin/itsi_async_csv_loader.py:115
#: /Applications/Splunk/etc/apps/SA-ITOA/bin/itsi_csv_import.py:128
msgid ""
"Comma separated names of column headers to be imported from the CSV File "
"that represent fields that provide non-identifying data about the asset. "
"Case sensitive."
msgstr ""
#: /Applications/Splunk/etc/apps/SA-ITOA/bin/itsi_user_access_init.py:51
msgid "Configuration Flag"
msgstr ""
#: /Applications/Splunk/etc/apps/SA-ITOA/bin/configure_itsi.py:49
msgid "Configuration flag"
msgstr ""
#: /Applications/Splunk/etc/apps/SA-ITOA/bin/configure_itsi.py:28
msgid "Configures IT Service Intelligence"
msgstr ""
#: /Applications/Splunk/etc/apps/SA-ITOA/bin/itsi_entity_exchange_consumer.py:28
msgid "Consumes entities published on the entity exchange module."
msgstr ""
#: /Applications/Splunk/etc/apps/SA-ITOA/bin/itsi_notable_event_actions_queue_consumer.py:29
msgid "Consumes producer data from the KV Store and executes an episode action."
msgstr ""
#: /Applications/Splunk/etc/apps/SA-ITOA/lib/itsi/mad/itsi_mad_searches.py:82
#: /Applications/Splunk/etc/apps/SA-ITOA/lib/itsi/mad/itsi_mad_searches.py:112
#: /Applications/Splunk/etc/apps/SA-ITOA/lib/itsi/mad/itsi_mad_searches.py:163
#: /Applications/Splunk/etc/apps/SA-ITOA/lib/itsi/mad/itsi_mad_searches.py:203
#: /Applications/Splunk/etc/apps/SA-ITOA/lib/itsi/mad/itsi_mad_searches.py:237
#: /Applications/Splunk/etc/apps/SA-ITOA/lib/itsi/mad/itsi_mad_searches.py:276
#: /Applications/Splunk/etc/apps/SA-ITOA/lib/itsi/mad/itsi_mad_searches.py:311
#: /Applications/Splunk/etc/apps/SA-ITOA/lib/itsi/mad/itsi_mad_searches.py:344
#: /Applications/Splunk/etc/apps/SA-ITOA/lib/itsi/mad/itsi_mad_searches.py:392
msgid "Context name must be in the format of a valid string."
msgstr ""
#: /Applications/Splunk/etc/apps/SA-ITOA/lib/ITOA/event_management/notable_event_ticketing.py:286
msgid "Correlation id is mandated for operations pertaining to external ticket."
msgstr ""
#: /Applications/Splunk/etc/apps/SA-ITOA/lib/SA_ITOA_app_common/solnlib/packages/schematics/types/base.py:741
msgid "Could not convert {0}. Time zone offsets not allowed."
msgstr ""
#: /Applications/Splunk/etc/apps/SA-ITOA/lib/SA_ITOA_app_common/solnlib/packages/schematics/types/base.py:740
msgid "Could not convert {0}. Time zone required but not found."
msgstr ""
#: /Applications/Splunk/etc/apps/SA-ITOA/lib/ITOA/saved_search_utility.py:161
msgid "Could not create search {0} because it already exists."
msgstr ""
#: /Applications/Splunk/etc/apps/SA-ITOA/lib/itsi/upgrade/kvstore_backup_restore.py:1091
msgid ""
"Could not determine the ITSI version from which the backup data was "
"collected. Make sure all the backup files are contained within a folder "
"named \"backup\". It may be a backup taken from an old ITSI version. Use "
"the command line tool to perform the restore operation by specifying the "
"ITSI version from which the backup data was collected."
msgstr ""
#: /Applications/Splunk/etc/apps/SA-ITOA/lib/ITOA/rest_interface_provider_base.py:352
msgid "Could not extract \"data\" from payload. Check input."
msgstr ""
#: /Applications/Splunk/etc/apps/SA-ITOA/lib/itsi/objects/itsi_service_template.py:778
msgid "Could not find cached service `{}`. Please debug."
msgstr ""
#: /Applications/Splunk/etc/apps/SA-ITOA/lib/kvstore_queue/kvstore_queue_consumer.py:243
#, python-format
msgid "Could not find commit method %s."
msgstr ""
#: /Applications/Splunk/etc/apps/SA-ITOA/lib/itsi/searches/itsi_searches.py:198
msgid "Could not find datamodel object {0} in datamodel {1}"
msgstr ""
#: /Applications/Splunk/etc/apps/SA-ITOA/lib/itsi/event_management/itsi_correlation_search.py:116
#: /Applications/Splunk/etc/apps/SA-ITOA/lib/itsi/event_management/itsi_correlation_search.py:138
msgid "Could not find metadata to generate search"
msgstr ""
#: /Applications/Splunk/etc/apps/SA-ITOA/lib/kvstore_queue/kvstore_queue_consumer.py:197
#, python-format
msgid "Could not find processing method method=%s uid=%s."
msgstr ""
#: /Applications/Splunk/etc/apps/SA-ITOA/lib/ITOA/itoa_common.py:1282
#, python-format
msgid "Could not find roles for the user \"%s\". User access info: %s"
msgstr ""
#: /Applications/Splunk/etc/apps/SA-ITOA/lib/ITOA/event_management/ace_interface.py:53
msgid "Could not find search with sid: {}, seed group save failed."
msgstr ""
#: /Applications/Splunk/etc/apps/SA-ITOA/lib/itsi/objects/itsi_service_template.py:526
msgid ""
"Could not find service object with id `{}`. Cannot create base service "
"template from non-existent service"
msgstr ""
#: /Applications/Splunk/etc/apps/SA-ITOA/lib/itsi/objects/itsi_service_template.py:602
msgid ""
"Could not find service template object with id `{}`. Cannot create base "
"service template from non-existent service template"
msgstr ""
#: /Applications/Splunk/etc/apps/SA-ITOA/lib/itsi/objects/itsi_service.py:1343
msgid ""
"Could not find service template object(s) with id(s) `{}`. Cannot create "
"service(s) from non-existent service template(s)."
msgstr ""
#: /Applications/Splunk/etc/apps/SA-ITOA/lib/itsi/backup_restore/backup_restore_rest_provider.py:297
msgid ""
"Could not find the backup file to get counts of knowledge objects for "
"preview."
msgstr ""
#: /Applications/Splunk/etc/apps/SA-ITOA/lib/ITOA/event_management/push_event_manager.py:38
msgid "Could not find token value in response from server for token name=\"{0}\"."
msgstr ""
#: /Applications/Splunk/etc/apps/SA-ITOA/lib/itsi/searches/itsi_searches.py:157
msgid "Could not get all datamodel objects"
msgstr ""
#: /Applications/Splunk/etc/apps/SA-ITOA/lib/SA_ITOA_app_common/solnlib/packages/schematics/types/compound.py:216
msgid "Could not interpret the value as a list"
msgstr ""
#: /Applications/Splunk/etc/apps/SA-ITOA/lib/itsi/event_management/itsi_correlation_search.py:125
msgid "Could not load metadata into JSON format"
msgstr ""
#: /Applications/Splunk/etc/apps/SA-ITOA/lib/itsi/objects/itsi_service_template.py:358
#: /Applications/Splunk/etc/apps/SA-ITOA/lib/itsi/searches/itsi_searches.py:149
msgid "Could not locate specified datamodel {}"
msgstr ""
#: /Applications/Splunk/etc/apps/SA-ITOA/lib/SA_ITOA_app_common/solnlib/packages/schematics/types/base.py:737
msgid "Could not parse {0}."
msgstr ""
#: /Applications/Splunk/etc/apps/SA-ITOA/lib/SA_ITOA_app_common/solnlib/packages/schematics/types/base.py:639
msgid "Could not parse {0}. Should be ISO 8601 (YYYY-MM-DD)."
msgstr ""
#: /Applications/Splunk/etc/apps/SA-ITOA/lib/SA_ITOA_app_common/solnlib/packages/schematics/types/base.py:735
msgid "Could not parse {0}. Should be ISO 8601 or timestamp."
msgstr ""
#: /Applications/Splunk/etc/apps/SA-ITOA/lib/SA_ITOA_app_common/solnlib/packages/schematics/types/base.py:739
msgid "Could not parse {0}. Time zone offset not allowed."
msgstr ""
#: /Applications/Splunk/etc/apps/SA-ITOA/lib/SA_ITOA_app_common/solnlib/packages/schematics/types/base.py:738
msgid "Could not parse {0}. Time zone offset required."
msgstr ""
#: /Applications/Splunk/etc/apps/SA-ITOA/lib/SA_ITOA_app_common/solnlib/packages/schematics/types/base.py:640
#: /Applications/Splunk/etc/apps/SA-ITOA/lib/SA_ITOA_app_common/solnlib/packages/schematics/types/base.py:736
msgid "Could not parse {0}. Valid formats: {1}"
msgstr ""
#: /Applications/Splunk/etc/apps/SA-ITOA/lib/ITOA/event_management/base_event_generation.py:77
#: /Applications/Splunk/etc/apps/SA-ITOA/lib/ITOA/event_management/base_event_generation.py:80
msgid "Could not retrieve search job info."
msgstr ""
#: /Applications/Splunk/etc/apps/SA-ITOA/lib/ITOA/event_management/correlation_search.py:96
#: /Applications/Splunk/etc/apps/SA-ITOA/lib/itsi/event_management/itsi_correlation_search.py:96
msgid "Could not validate searches because the provided data is not a valid list."
msgstr ""
#: /Applications/Splunk/etc/apps/SA-ITOA/lib/SA_ITOA_app_common/solnlib/packages/schematics/contrib/enum_type.py:33
msgid "Couldn't interpret '{0}' as member of {1}."
msgstr ""
#: /Applications/Splunk/etc/apps/SA-ITOA/lib/SA_ITOA_app_common/solnlib/packages/schematics/types/base.py:385
msgid "Couldn't interpret '{0}' as string."
msgstr ""
#: /Applications/Splunk/etc/apps/SA-ITOA/lib/SA_ITOA_app_common/solnlib/packages/schematics/types/base.py:981
msgid "Couldn't interpret '{0}' value as Timedelta."
msgstr ""
#: /Applications/Splunk/etc/apps/SA-ITOA/lib/SA_ITOA_app_common/solnlib/packages/schematics/types/base.py:354
msgid "Couldn't interpret '{0}' value as UUID."
msgstr ""
#: /Applications/Splunk/etc/apps/SA-ITOA/lib/SA_ITOA_app_common/solnlib/packages/schematics/types/union.py:34
msgid "Couldn't interpret value '{0}' as any of {1}."
msgstr ""
#: /Applications/Splunk/etc/apps/SA-ITOA/lib/SA_ITOA_app_common/solnlib/packages/schematics/contrib/mongo.py:27
msgid "Couldn't interpret value as an ObjectId."
msgstr ""
#: /Applications/Splunk/etc/apps/SA-ITOA/lib/SA_ITOA_app_common/solnlib/packages/schematics/types/base.py:1092
msgid "Couldn't interpret value as string."
msgstr ""
#: /Applications/Splunk/etc/apps/SA-ITOA/default/itsi_notable_event_severity.conf:38
msgid "Critical"
msgstr ""
#: /Applications/Splunk/etc/apps/SA-ITOA/lib/itsi/objects/itsi_kpi.py:149
#, python-format
msgid ""
"Custom value provided to fill in data gap is not valid. Only numeric "
"values are accepted. %s_key=\"%s\", "
"invalid_field=\"gap_custom_alert_value\""
msgstr ""
#: /Applications/Splunk/etc/apps/SA-ITOA/lib/itsi/objects/itsi_kpi.py:143
#, python-format
msgid ""
"Custom value to fill data gaps not provided. Provide a static value when "
"\"custom_value\" option is selected to fill data gaps. %s_key=\"%s\", "
"missing_field=\"gap_custom_alert_value\""
msgstr ""
#: /Applications/Splunk/etc/apps/SA-ITOA/lib/itsi/objects/itsi_entity.py:337
msgid "Data corruption: blank values are not permitted."
msgstr ""
#: /Applications/Splunk/etc/apps/SA-ITOA/lib/itsi/objects/itsi_entity.py:330
msgid "Data corruption: field names and attribute names do not match."
msgstr ""
#: /Applications/Splunk/etc/apps/SA-ITOA/lib/ITOA/event_management/notable_event_tag.py:85
#, python-format
msgid "Data does not contain either %s or %s."
msgstr ""
#: /Applications/Splunk/etc/apps/SA-ITOA/lib/ITOA/event_management/base_event_management.py:244
#: /Applications/Splunk/etc/apps/SA-ITOA/lib/ITOA/event_management/notable_event.py:271
#: /Applications/Splunk/etc/apps/SA-ITOA/lib/ITOA/event_management/notable_event_aggregation_policy.py:129
#: /Applications/Splunk/etc/apps/SA-ITOA/lib/ITOA/event_management/notable_event_aggregation_policy.py:172
#, python-format
msgid "Data is not a valid dictionary, data type=%s."
msgstr ""
#: /Applications/Splunk/etc/apps/SA-ITOA/lib/ITOA/event_management/notable_event_group.py:74
#: /Applications/Splunk/etc/apps/SA-ITOA/lib/ITOA/event_management/notable_event_tag.py:79
msgid "Data is not a valid dictionary."
msgstr ""
#: /Applications/Splunk/etc/apps/SA-ITOA/lib/ITOA/event_management/notable_event_kpi_alert.py:65
#: /Applications/Splunk/etc/apps/SA-ITOA/lib/ITOA/event_management/notable_event_mad.py:70
#, python-format
msgid "Data is not a valid dictonary, data type is %s."
msgstr ""
#: /Applications/Splunk/etc/apps/SA-ITOA/lib/ITOA/event_management/notable_event_tag.py:75
#, python-format
msgid "Data is not a valid list, actual type is %s."
msgstr ""
#: /Applications/Splunk/etc/apps/SA-ITOA/lib/ITOA/event_management/notable_event_aggregation_policy.py:168
#: /Applications/Splunk/etc/apps/SA-ITOA/lib/ITOA/event_management/notable_event_group.py:70
#, python-format
msgid "Data is not a valid list, data_list type is %s."
msgstr ""
#: /Applications/Splunk/etc/apps/SA-ITOA/lib/ITOA/event_management/notable_event.py:430
msgid "Data or fetched data is None."
msgstr ""
#: /Applications/Splunk/etc/apps/SA-ITOA/lib/itsi/event_management/event_management_services.py:462
msgid "Data should be valid dict"
msgstr ""
#: /Applications/Splunk/etc/apps/SA-ITOA/lib/ITOA/event_management/notable_event.py:133
#: /Applications/Splunk/etc/apps/SA-ITOA/lib/ITOA/event_management/notable_event.py:505
msgid "Data: {0} is not a valid dictionary, data type is {1}."
msgstr ""
#: /Applications/Splunk/etc/apps/SA-ITOA/lib/ITOA/event_management/notable_event.py:126
#: /Applications/Splunk/etc/apps/SA-ITOA/lib/ITOA/event_management/notable_event.py:578
#: /Applications/Splunk/etc/apps/SA-ITOA/lib/ITOA/event_management/notable_event.py:631
#: /Applications/Splunk/etc/apps/SA-ITOA/lib/ITOA/event_management/notable_event.py:818
msgid "Data_list: {0} is not a valid list, data_list type is {1}."
msgstr ""
#: /Applications/Splunk/etc/apps/SA-ITOA/lib/itsi/objects/itsi_kpi.py:599
msgid ""
"Datamodel filters must be an array of filters. Found a KPI with an "
"invalid specification for datamodel filters."
msgstr ""
#: /Applications/Splunk/etc/apps/SA-ITOA/lib/itsi/objects/itsi_kpi.py:590
msgid ""
"Datamodel search based KPI does not seem to have specified a valid "
"datamodel search. Specify a datamodel based search KPIs with all "
"mandatory fields: datamodel, object, field and owner_field."
msgstr ""
#: /Applications/Splunk/etc/apps/SA-ITOA/lib/itsi/objects/itsi_kpi.py:579
msgid ""
"Datamodel search based KPI does not seem to have specified a valid "
"datamodel search. Specify a datamodel based search for the KPI."
msgstr ""
#: /Applications/Splunk/etc/apps/SA-ITOA/lib/itsi/objects/itsi_kpi_threshold_template.py:138
msgid "Default policy cannot be removed from a KPI time policy specification."
msgstr ""
#: /Applications/Splunk/etc/apps/SA-ITOA/lib/ITOA/event_management/notable_event_utils.py:786
msgid "Default severity cannot be None."
msgstr ""
#: /Applications/Splunk/etc/apps/SA-ITOA/lib/ITOA/event_management/notable_event_utils.py:764
msgid "Default status cannot be None."
msgstr ""
#: /Applications/Splunk/etc/apps/SA-ITOA/default/itsi_team.conf:3
msgid "Default team for ITSI"
msgstr ""
#: /Applications/Splunk/etc/apps/SA-ITOA/bin/itsi_age_kpi_alert_value_cache.py:24
msgid "Deletes the aged KPI Summary entries from the KPI Alert Value Cache."
msgstr ""
#: /Applications/Splunk/etc/apps/SA-ITOA/lib/itsi/access_control/access_control_controller_utils.py:759
#, python-format
msgid ""
"Deleting permissions for object_id=`%s` object_app=`%s object_type=`%s` "
"object_store=`%s`"
msgstr ""
#: /Applications/Splunk/etc/apps/SA-ITOA/lib/itsi/objects/itsi_service.py:2085
#: /Applications/Splunk/etc/apps/SA-ITOA/lib/itsi/objects/itsi_service.py:2121
#, python-format
msgid ""
"Dependency being configured violates team membership rules. Services "
"could only depend on services from other teams if the depending service "
"is in the parent hierarchy of the service's team. Violating dependent "
"service is %s, for the service %s."
msgstr ""
#: /Applications/Splunk/etc/apps/SA-ITOA/lib/integrations/phantom/api.py:13
msgid "Derived class did not implement `create`."
msgstr ""
#: /Applications/Splunk/etc/apps/SA-ITOA/lib/integrations/phantom/api.py:25
msgid "Derived class did not implement `delete`."
msgstr ""
#: /Applications/Splunk/etc/apps/SA-ITOA/lib/integrations/commons/server.py:7
msgid "Derived class did not implement `get_rest_endpoint`."
msgstr ""
#: /Applications/Splunk/etc/apps/SA-ITOA/lib/integrations/commons/server.py:10
msgid "Derived class did not implement `get_rest_headers`."
msgstr ""
#: /Applications/Splunk/etc/apps/SA-ITOA/lib/integrations/phantom/api.py:17
msgid "Derived class did not implement `read`."
msgstr ""
#: /Applications/Splunk/etc/apps/SA-ITOA/lib/integrations/phantom/api.py:21
msgid "Derived class did not implement `update`."
msgstr ""
#: /Applications/Splunk/etc/apps/SA-ITOA/lib/ITOA/event_management/base_event_management.py:252
msgid "Derived class must implement this method"
msgstr ""
#: /Applications/Splunk/etc/apps/SA-ITOA/lib/itsi/event_management/sdk/custom_group_action_base.py:149
msgid "Derived class must implemented `execute`."
msgstr ""
#: /Applications/Splunk/etc/apps/SA-ITOA/bin/itsi_async_csv_loader.py:55
#: /Applications/Splunk/etc/apps/SA-ITOA/bin/itsi_csv_import.py:63
msgid "Do you wish to import from search ?"
msgstr ""
#: /Applications/Splunk/etc/apps/SA-ITOA/bin/command_get_kpi_search.py:69
#: /Applications/Splunk/etc/apps/SA-ITOA/bin/command_get_kpi_search.py:88
msgid "Double equal signs found. Must fix your query."
msgstr ""
#: /Applications/Splunk/etc/apps/SA-ITOA/lib/ITOA/event_management/notable_event_group.py:280
#: /Applications/Splunk/etc/apps/SA-ITOA/lib/ITOA/event_management/notable_event_group.py:320
#: /Applications/Splunk/etc/apps/SA-ITOA/lib/ITOA/event_management/notable_event_group.py:372
msgid "Drilldown data must have link and name"
msgstr ""
#: /Applications/Splunk/etc/apps/SA-ITOA/lib/ITOA/event_management/notable_event_group.py:294
msgid "Drilldown field is not of type list"
msgstr ""
#: /Applications/Splunk/etc/apps/SA-ITOA/lib/ITOA/event_management/notable_event_group.py:344
#: /Applications/Splunk/etc/apps/SA-ITOA/lib/ITOA/event_management/notable_event_group.py:393
msgid "Drilldown index given is not an integer."
msgstr ""
#: /Applications/Splunk/etc/apps/SA-ITOA/lib/ITOA/event_management/notable_event_group.py:340
#: /Applications/Splunk/etc/apps/SA-ITOA/lib/ITOA/event_management/notable_event_group.py:395
msgid "Drilldown index of: {0} out of bounds for drilldown list."
msgstr ""
#: /Applications/Splunk/etc/apps/SA-ITOA/lib/ITOA/event_management/notable_event_group.py:391
msgid "Drilldown list is not of type list."
msgstr ""
#: /Applications/Splunk/etc/apps/SA-ITOA/lib/ITOA/event_management/notable_event_group.py:346
msgid "Drilldown list item at index: {0} is not of type dict"
msgstr ""
#: /Applications/Splunk/etc/apps/SA-ITOA/lib/ITOA/event_management/notable_event_group.py:386
msgid "Drilldown with name: {0} not found."
msgstr ""
#: /Applications/Splunk/etc/apps/SA-ITOA/bin/command_check_for_dup_alias.py:18
msgid ""
"Duplicate entity aliases found. This may cause incorrect statistical "
"aggregation results for KPI base searches. [[{}|Show duplicates.]]"
msgstr ""
#: /Applications/Splunk/etc/apps/SA-ITOA/lib/itsi/csv_import/itoa_bulk_import.py:415
msgid "Duplicate fieldname in row assignment: {0}"
msgstr ""
#: /Applications/Splunk/etc/apps/SA-ITOA/lib/itsi/csv_import/itoa_bulk_import_specification.py:460
msgid "Duplicate fieldname role assignments in Bulk Import Specification: {}."
msgstr ""
#: /Applications/Splunk/etc/apps/SA-ITOA/lib/itsi/objects/itsi_entity_relationship.py:545
#, python-format
msgid "Duplicate identifiers with keys found among %s"
msgstr ""
#: /Applications/Splunk/etc/apps/SA-ITOA/lib/ITOA/itoa_object.py:240
msgid ""
"Duplicate object name(s) found: {}. Please rename the object(s) before "
"proceeding."
msgstr ""
#: /Applications/Splunk/etc/apps/SA-ITOA/bin/command_storeentities.py:48
#, python-format
msgid "Duplicate parameter found: %s."
msgstr ""
#: /Applications/Splunk/etc/apps/SA-ITOA/lib/itsi/objects/itsi_service.py:1820
msgid "Duplicated KPI title within the same {}."
msgstr ""
#: /Applications/Splunk/etc/apps/SA-ITOA/lib/itsi/objects/itsi_kpi_threshold_template.py:66
msgid ""
"Duplication of policy title is not allowed. Duplicate policy title: "
"\"{0}\""
msgstr ""
#: /Applications/Splunk/etc/apps/SA-ITOA/lib/itsi/objects/itsi_kpi.py:607
msgid ""
"Each datamodel filter must be a valid JSON filter specification. Found a "
"KPI with an invalid specification for a datamodel filter."
msgstr ""
#: /Applications/Splunk/etc/apps/SA-ITOA/lib/itsi/objects/itsi_kpi.py:615
msgid ""
"Each datamodel filter must specify a field and value. Found a KPI with no"
" field or value specified for a datamodel filter."
msgstr ""
#: /Applications/Splunk/etc/apps/SA-ITOA/lib/itsi/objects/itsi_kpi.py:623
msgid ""
"Each datamodel filter operator must be =, < or >. Found a KPI with "
"invalid operator specified for a datamodel filter."
msgstr ""
#: /Applications/Splunk/etc/apps/SA-ITOA/default/itsi_kpi_threshold_template.conf:77
#: /Applications/Splunk/etc/apps/SA-ITOA/default/itsi_kpi_threshold_template.conf:86
#: /Applications/Splunk/etc/apps/SA-ITOA/default/itsi_kpi_threshold_template.conf:95
#: /Applications/Splunk/etc/apps/SA-ITOA/default/itsi_kpi_threshold_template.conf:104
msgid "Each day of the week broken up into 1 hour chunks"
msgstr ""
#: /Applications/Splunk/etc/apps/SA-ITOA/default/itsi_kpi_threshold_template.conf:113
#: /Applications/Splunk/etc/apps/SA-ITOA/default/itsi_kpi_threshold_template.conf:122
#: /Applications/Splunk/etc/apps/SA-ITOA/default/itsi_kpi_threshold_template.conf:131
#: /Applications/Splunk/etc/apps/SA-ITOA/default/itsi_kpi_threshold_template.conf:140
msgid "Each day of the week broken up into 2 hour chunks"
msgstr ""
#: /Applications/Splunk/etc/apps/SA-ITOA/default/itsi_kpi_threshold_template.conf:149
#: /Applications/Splunk/etc/apps/SA-ITOA/default/itsi_kpi_threshold_template.conf:158
#: /Applications/Splunk/etc/apps/SA-ITOA/default/itsi_kpi_threshold_template.conf:167
#: /Applications/Splunk/etc/apps/SA-ITOA/default/itsi_kpi_threshold_template.conf:176
msgid "Each day of the week broken up into 3 hour chunks"
msgstr ""
#: /Applications/Splunk/etc/apps/SA-ITOA/bin/itsi_async_csv_loader.py:69
#: /Applications/Splunk/etc/apps/SA-ITOA/bin/itsi_csv_import.py:82
msgid "Earliest index time"
msgstr ""
#: /Applications/Splunk/etc/apps/SA-ITOA/bin/itsi_async_csv_loader.py:70
#: /Applications/Splunk/etc/apps/SA-ITOA/bin/itsi_csv_import.py:83
msgid ""
"Earliest index time you want to use to with your Splunk search to import "
"entities/services. If no value is provided, we will default to '-15m'"
msgstr ""
#: /Applications/Splunk/etc/apps/SA-ITOA/lib/ITOA/storage/itoa_generic_persistables.py:135
msgid "Either interface or session key/owner must be provided."
msgstr ""
#: /Applications/Splunk/etc/apps/SA-ITOA/lib/itsi_module/itsi_module_service_template.py:176
msgid ""
"Either the flag \"resolve_kpis\" or \"resolve_kpis_from_itsi\" can be "
"set, not both."
msgstr ""
#: /Applications/Splunk/etc/apps/SA-ITOA/lib/ITOA/itoa_common.py:194
#, python-format
msgid "Element `%s` is not an array"
msgstr ""
#: /Applications/Splunk/etc/apps/SA-ITOA/lib/ITOA/storage/statestore.py:283
#: /Applications/Splunk/etc/apps/SA-ITOA/lib/ITOA/storage/statestore.py:486
msgid "Empty field received - Rejecting filter."
msgstr ""
#: /Applications/Splunk/etc/apps/SA-ITOA/lib/itsi/csv_import/itoa_bulk_import_specification.py:277
msgid "Empty subject field for entity relationship in import specification"
msgstr ""
#: /Applications/Splunk/etc/apps/SA-ITOA/lib/itsi/csv_import/itoa_bulk_import_specification.py:267
msgid "Empty title field for entity in import specification."
msgstr ""
#: /Applications/Splunk/etc/apps/SA-ITOA/lib/itsi/csv_import/itoa_bulk_import_specification.py:286
msgid "Empty title field for service in import specification."
msgstr ""
#: /Applications/Splunk/etc/apps/SA-ITOA/lib/ITOA/event_management/notable_event_ticketing.py:240
msgid ""
"Empty/missing correlation_value_for_group in your "
"notable_event_actions.conf."
msgstr ""
#: /Applications/Splunk/etc/apps/SA-ITOA/bin/itsi_csv_import.py:206
msgid "Enable Backfill for All KPIs?"
msgstr ""
#: /Applications/Splunk/etc/apps/SA-ITOA/bin/itsi_csv_import.py:207
msgid ""
"Enable backfill on all KPIs in Services linked to Service Templates. "
"Service template field must be specified."
msgstr ""
#: /Applications/Splunk/etc/apps/SA-ITOA/bin/itsi_csv_import.py:190
msgid "Enable imported services?"
msgstr ""
#: /Applications/Splunk/etc/apps/SA-ITOA/bin/itsi_refresher.py:27
msgid ""
"Ensures data integrity and eventual consistency of ITSI configuration. "
"This runs as a single instance."
msgstr ""
#: /Applications/Splunk/etc/apps/SA-ITOA/lib/itsi/itoa_rest_interface_provider/itoa_rest_interface_provider.py:548
msgid ""
"Entities, Services, and KPI templates can only exist at app level "
"(user='nobody')."
msgstr ""
#: /Applications/Splunk/etc/apps/SA-ITOA/lib/itsi/itoa_rest_interface_provider/itoa_rest_interface_provider.py:424
#, python-format
msgid ""
"Entities, Services, and KPIs can only exist at app level (user='nobody') "
"- %s."
msgstr ""
#: /Applications/Splunk/etc/apps/SA-ITOA/bin/itsi_async_csv_loader.py:95
#: /Applications/Splunk/etc/apps/SA-ITOA/bin/itsi_csv_import.py:108
msgid "Entity Conflict Resolution Field Column"
msgstr ""
#: /Applications/Splunk/etc/apps/SA-ITOA/bin/itsi_async_csv_loader.py:101
#: /Applications/Splunk/etc/apps/SA-ITOA/bin/itsi_csv_import.py:114
msgid "Entity Description Column"
msgstr ""
#: /Applications/Splunk/etc/apps/SA-ITOA/bin/itsi_async_csv_loader.py:121
#: /Applications/Splunk/etc/apps/SA-ITOA/bin/itsi_csv_import.py:134
msgid "Entity Field Mappings"
msgstr ""
#: /Applications/Splunk/etc/apps/SA-ITOA/bin/itsi_async_csv_loader.py:107
#: /Applications/Splunk/etc/apps/SA-ITOA/bin/itsi_csv_import.py:120
msgid "Entity Identifier Fields"
msgstr ""
#: /Applications/Splunk/etc/apps/SA-ITOA/bin/itsi_async_csv_loader.py:114
#: /Applications/Splunk/etc/apps/SA-ITOA/bin/itsi_csv_import.py:127
msgid "Entity Informational Fields"
msgstr ""
#: /Applications/Splunk/etc/apps/SA-ITOA/bin/itsi_async_csv_loader.py:131
#: /Applications/Splunk/etc/apps/SA-ITOA/bin/itsi_csv_import.py:144
msgid "Entity Relationship Specification"
msgstr ""
#: /Applications/Splunk/etc/apps/SA-ITOA/bin/itsi_async_csv_loader.py:132
#: /Applications/Splunk/etc/apps/SA-ITOA/bin/itsi_csv_import.py:145
msgid ""
"Entity Relationship for Entity Import. A dictionary of relationships and "
"list of fields. For example, if your CSV contains 'foo' and 'bar' as "
"headers and you want to specify both of them relating to entity title "
"field in 'hosts' relationship, you should set entity relationship spec as"
" {\"hosts\": [\"foo\", \"bar\"]}."
msgstr ""
#: /Applications/Splunk/etc/apps/SA-ITOA/bin/itsi_csv_import.py:201
msgid "Entity Rules to Service Template mappings"
msgstr ""
#: /Applications/Splunk/etc/apps/SA-ITOA/bin/itsi_async_csv_loader.py:89
#: /Applications/Splunk/etc/apps/SA-ITOA/bin/itsi_csv_import.py:102
msgid "Entity Title Column"
msgstr ""
#: /Applications/Splunk/etc/apps/SA-ITOA/lib/itsi/csv_import/itoa_bulk_import_entity_parser.py:54
msgid ""
"Entity are specified in import rule but not present in source, will be "
"skipped: {}"
msgstr ""
#: /Applications/Splunk/etc/apps/SA-ITOA/lib/itsi/csv_import/itoa_bulk_import_entity_parser.py:66
msgid ""
"Entity fieldnames discovered as valid fieldname but not present in fields"
" to be imported, will be skipped: {}"
msgstr ""
#: /Applications/Splunk/etc/apps/SA-ITOA/bin/itsi_csv_import.py:202
msgid "Entity rules to Service Template mappings. Optional"
msgstr ""
#: /Applications/Splunk/etc/apps/SA-ITOA/lib/itsi/event_management/event_management_rest_provider.py:890
msgid ""
"Entity {0} in KPI {1} associated with service {2} was dropped from "
"cohesive analysis. Maximum entity limit is {3}."
msgstr ""
#: /Applications/Splunk/etc/apps/SA-ITOA/lib/itsi_module/itsi_module_common.py:716
#, python-format
msgid "Error getting %s id: %s."
msgstr ""
#: /Applications/Splunk/etc/apps/SA-ITOA/lib/itsi_module/itsi_module_common.py:666
#, python-format
msgid "Error getting content of conf file %s: %s."
msgstr ""
#: /Applications/Splunk/etc/apps/SA-ITOA/lib/itsi/objects/itsi_kpi_base_search.py:431
msgid "Error getting the appropriate id array for object array"
msgstr ""
#: /Applications/Splunk/etc/apps/SA-ITOA/lib/itsi/itoa_rest_interface_provider/itoa_rest_interface_provider.py:900
msgid "Error retrieving request data."
msgstr ""
#: /Applications/Splunk/etc/apps/SA-ITOA/lib/itsi_module/itsi_module_common.py:508
#, python-format
msgid "Error templatizing %s id: %s."
msgstr ""
#: /Applications/Splunk/etc/apps/SA-ITOA/lib/itsi_module/itsi_module_service_template.py:92
#, python-format
msgid "Error templatizing service: %s"
msgstr ""
#: /Applications/Splunk/etc/apps/SA-ITOA/lib/itsi_module/itsi_module_common.py:439
#: /Applications/Splunk/etc/apps/SA-ITOA/lib/itsi_module/itsi_module_common.py:474
#, python-format
msgid "Error updating %s: %s."
msgstr ""
#: /Applications/Splunk/etc/apps/SA-ITOA/lib/itsi/itoa_rest_interface_provider/itoa_rest_interface_provider.py:874
msgid "Error updating request data."
msgstr ""
#: /Applications/Splunk/etc/apps/SA-ITOA/lib/itsi/backup_restore/backup_restore_rest_provider.py:295
msgid ""
"Error while parsing the backup file to get counts of knowledge objects "
"for preview."
msgstr ""
#: /Applications/Splunk/etc/apps/SA-ITOA/lib/ITOA/itoa_common.py:1349
#, python-format
msgid ""
"Error while polling Splunkd for current user context. Response: \"%s\". "
"Content: \"%s\"."
msgstr ""
#: /Applications/Splunk/etc/apps/SA-ITOA/lib/ITOA/itoa_common.py:1237
#, python-format
msgid ""
"Error while polling Splunkd for role information. Response: \"%s\". "
"Content: \"%s\"."
msgstr ""
#: /Applications/Splunk/etc/apps/SA-ITOA/lib/ITOA/itoa_common.py:1193
#, python-format
msgid ""
"Error while polling Splunkd for user access information. Response: "
"\"%s\". Content: \"%s\"."
msgstr ""
#: /Applications/Splunk/etc/apps/SA-ITOA/lib/itsi/csv_import/itoa_bulk_import_rest_interface_provider.py:312
msgid ""
"Error while trying to fetch search results. The search may have failed. "
"If the problem persists, contact support."
msgstr ""
#: /Applications/Splunk/etc/apps/SA-ITOA/lib/itsi/objects/changehandlers/base_service_template_update_handler.py:216
#: /Applications/Splunk/etc/apps/SA-ITOA/lib/itsi/objects/changehandlers/base_service_template_update_handler.py:225
#, python-format
msgid ""
"Error while updating services linked to service_template=\"%s\". "
"Exception=\"%s\""
msgstr ""
#: /Applications/Splunk/etc/apps/SA-ITOA/lib/itsi/service_template/service_template_utils.py:602
msgid ""
"Error while updating {} services linked to service template {}. See "
"service template configuration page for more details. "
msgstr ""
#: /Applications/Splunk/etc/apps/SA-ITOA/lib/itsi_module/itsi_module_kpi_base_search.py:139
msgid "Error writing data into conf."
msgstr ""
#: /Applications/Splunk/etc/apps/SA-ITOA/lib/itsi_module/itsi_module_common.py:398
#, python-format
msgid "Error writing data into conf: %s."
msgstr ""
#: /Applications/Splunk/etc/apps/SA-ITOA/lib/itsi_module/itsi_module_kpi_group.py:140
#: /Applications/Splunk/etc/apps/SA-ITOA/lib/itsi_module/itsi_module_service_template.py:149
#, python-format
msgid "Error writing into conf file %s."
msgstr ""
#: /Applications/Splunk/etc/apps/SA-ITOA/lib/itsi_module/itsi_module_service_template.py:130
#, python-format
msgid "Error writing stanza %s into itsi_kpi_template file."
msgstr ""
#: /Applications/Splunk/etc/apps/SA-ITOA/lib/ITOA/itoa_common.py:262
#, python-format
msgid "Error. Captain is not ready even after 5 minutes. node=`%s`."
msgstr ""
#: /Applications/Splunk/etc/apps/SA-ITOA/lib/itsi/csv_import/itoa_csv_spec_transformer.py:90
#, python-format
msgid ""
"Error. Expected import_info to be type: dict. Actual import_info type is:"
" %s"
msgstr ""
#: /Applications/Splunk/etc/apps/SA-ITOA/lib/itsi/csv_import/itoa_csv_spec_transformer.py:96
msgid ""
"Error. Invalid import_info. Make sure at least one of service_title_field"
" and entity_title_field key exists in import_info."
msgstr ""
#: /Applications/Splunk/etc/apps/SA-ITOA/lib/itsi/csv_import/itoa_csv_spec_transformer.py:101
#: /Applications/Splunk/etc/apps/SA-ITOA/lib/itsi/csv_import/itoa_csv_spec_transformer.py:106
msgid ""
"Error. Invalid import_info. Make sure entity_title_field key exists when "
"entity_relationship_spec key exists in import_info"
msgstr ""
#: /Applications/Splunk/etc/apps/SA-ITOA/lib/itsi/csv_import/itoa_csv_spec_transformer.py:93
msgid "Error. import_info is empty."
msgstr ""
#: /Applications/Splunk/etc/apps/SA-ITOA/default/itsi_notable_event_status.conf:31
msgid "Event closure is pending some action"
msgstr ""
#: /Applications/Splunk/etc/apps/SA-ITOA/default/itsi_notable_event_status.conf:19
msgid "Event has not been reviewed"
msgstr ""
#: /Applications/Splunk/etc/apps/SA-ITOA/default/itsi_kpi_template.conf:3
msgid "Example KPIs"
msgstr ""
#: /Applications/Splunk/etc/apps/SA-ITOA/bin/itsi_notable_event_actions_queue_consumer.py:40
msgid "Execution delay time"
msgstr ""
#: /Applications/Splunk/etc/apps/SA-ITOA/bin/itsi_async_csv_loader.py:171
#: /Applications/Splunk/etc/apps/SA-ITOA/bin/itsi_csv_import.py:184
msgid "Existing services to apply"
msgstr ""
#: /Applications/Splunk/etc/apps/SA-ITOA/lib/itsi/searches/itsi_filter.py:73
msgid "Expected a dict for the filter expression, got something else"
msgstr ""
#: /Applications/Splunk/etc/apps/SA-ITOA/lib/itsi/objects/changehandlers/base_service_template_delete_handler.py:57
#: /Applications/Splunk/etc/apps/SA-ITOA/lib/itsi/objects/changehandlers/base_service_template_update_handler.py:89
msgid ""
"Expected change_detail to be an instance of dictionary. But, received "
"change_detail=`{0}`, of type {1}."
msgstr ""
#: /Applications/Splunk/etc/apps/SA-ITOA/lib/itsi/objects/changehandlers/service_dependency_handler.py:23
msgid "Expected change_type to be \"service_dependency_changed\""
msgstr ""
#: /Applications/Splunk/etc/apps/SA-ITOA/lib/itsi/objects/changehandlers/kpi_ad_update_handler.py:46
#: /Applications/Splunk/etc/apps/SA-ITOA/lib/itsi/objects/changehandlers/kpi_cohesive_ad_update_handler.py:51
msgid "Expected change_type to be \"service_kpi_ad\""
msgstr ""
#: /Applications/Splunk/etc/apps/SA-ITOA/lib/itsi/objects/changehandlers/kpi_at_ad_update_handler.py:58
msgid "Expected change_type to be \"service_kpi_at\""
msgstr ""
#: /Applications/Splunk/etc/apps/SA-ITOA/lib/itsi/objects/changehandlers/kpi_backfill_enabled_handler.py:32
msgid "Expected change_type to be \"service_kpi_backfill_enabled\""
msgstr ""
#: /Applications/Splunk/etc/apps/SA-ITOA/lib/itsi/objects/changehandlers/kpi_delete_handler.py:55
msgid "Expected change_type to be \"service_kpi_deletion\""
msgstr ""
#: /Applications/Splunk/etc/apps/SA-ITOA/lib/itsi/objects/changehandlers/kpi_thresholds_template_delete_handler.py:45
msgid "Expected change_type to be \"service_kpi_thresholds_template_delete\""
msgstr ""
#: /Applications/Splunk/etc/apps/SA-ITOA/lib/itsi/objects/changehandlers/kpi_thresholds_template_update_handler.py:49
msgid "Expected change_type to be \"service_kpi_thresholds_template_update\""
msgstr ""
#: /Applications/Splunk/etc/apps/SA-ITOA/lib/itsi/objects/changehandlers/kpi_alert_period_update_handler.py:59
msgid "Expected change_type to be \"service_kpi_update_alert_period\""
msgstr ""
#: /Applications/Splunk/etc/apps/SA-ITOA/lib/itsi/objects/changehandlers/base_service_template_update_handler.py:80
msgid ""
"Expected change_type to be `base_service_template_update`. But, received "
"`{}`."
msgstr ""
#: /Applications/Splunk/etc/apps/SA-ITOA/lib/itsi/objects/changehandlers/base_service_template_delete_handler.py:48
msgid ""
"Expected change_type to be `delete_base_service_template`. But, received "
"`{}`."
msgstr ""
#: /Applications/Splunk/etc/apps/SA-ITOA/lib/itsi/objects/changehandlers/base_service_template_delete_handler.py:63
#: /Applications/Splunk/etc/apps/SA-ITOA/lib/itsi/objects/changehandlers/base_service_template_update_handler.py:95
msgid ""
"Expected changed_object_key to be an instance of list. But, received "
"changed_object_key=`{0}`, of type {1}."
msgstr ""
#: /Applications/Splunk/etc/apps/SA-ITOA/lib/itsi/objects/changehandlers/kpi_ad_update_handler.py:42
#: /Applications/Splunk/etc/apps/SA-ITOA/lib/itsi/objects/changehandlers/kpi_alert_period_update_handler.py:55
#: /Applications/Splunk/etc/apps/SA-ITOA/lib/itsi/objects/changehandlers/kpi_at_ad_update_handler.py:54
#: /Applications/Splunk/etc/apps/SA-ITOA/lib/itsi/objects/changehandlers/kpi_cohesive_ad_update_handler.py:47
#: /Applications/Splunk/etc/apps/SA-ITOA/lib/itsi/objects/changehandlers/kpi_delete_handler.py:52
msgid "Expected changed_object_type to be \"kpi\""
msgstr ""
#: /Applications/Splunk/etc/apps/SA-ITOA/lib/itsi/objects/changehandlers/kpi_thresholds_template_delete_handler.py:42
#: /Applications/Splunk/etc/apps/SA-ITOA/lib/itsi/objects/changehandlers/kpi_thresholds_template_update_handler.py:46
msgid "Expected changed_object_type to be \"kpi_threshold_template\""
msgstr ""
#: /Applications/Splunk/etc/apps/SA-ITOA/lib/itsi/objects/changehandlers/kpi_backfill_enabled_handler.py:29
#: /Applications/Splunk/etc/apps/SA-ITOA/lib/itsi/objects/changehandlers/service_dependency_handler.py:20
msgid "Expected changed_object_type to be \"service\""
msgstr ""
#: /Applications/Splunk/etc/apps/SA-ITOA/lib/itsi/objects/changehandlers/base_service_template_delete_handler.py:52
#: /Applications/Splunk/etc/apps/SA-ITOA/lib/itsi/objects/changehandlers/base_service_template_update_handler.py:84
msgid ""
"Expected changed_object_type to be `base_service_template`. But, received"
" `{}`."
msgstr ""
#: /Applications/Splunk/etc/apps/SA-ITOA/lib/itsi/searches/itsi_filter.py:100
msgid "Expected value definition in the json"
msgstr ""
#: /Applications/Splunk/etc/apps/SA-ITOA/lib/itsi/csv_import/itoa_bulk_import_specification.py:403
msgid "Expecting \"{}\" in {} to be of type \"{}\". Received \"{}\" instead."
msgstr ""
#: /Applications/Splunk/etc/apps/SA-ITOA/lib/ITOA/event_management/rules_engine/actions.py:54
#, python-format
msgid "Expecting `actions` to be a dict. Received type=%s."
msgstr ""
#: /Applications/Splunk/etc/apps/SA-ITOA/lib/itsi/event_management/sdk/grouping.py:713
#, python-format
msgid "Expecting `blob` to be a dict/list. Received: %s"
msgstr ""
#: /Applications/Splunk/etc/apps/SA-ITOA/lib/itsi/event_management/sdk/grouping.py:717
msgid "Expecting `blob` to be non-empty."
msgstr ""
#: /Applications/Splunk/etc/apps/SA-ITOA/lib/itsi/event_management/sdk/grouping.py:499
#, python-format
msgid "Expecting `comment_id` to be non-empty basestring. Received: %s"
msgstr ""
#: /Applications/Splunk/etc/apps/SA-ITOA/lib/itsi/event_management/sdk/grouping.py:467
#, python-format
msgid "Expecting `comment` to be non-empty basestring. Received: %s"
msgstr ""
#: /Applications/Splunk/etc/apps/SA-ITOA/lib/itsi/event_management/sdk/grouping.py:321
#: /Applications/Splunk/etc/apps/SA-ITOA/lib/itsi/event_management/sdk/grouping.py:372
#: /Applications/Splunk/etc/apps/SA-ITOA/lib/itsi/event_management/sdk/grouping.py:397
#: /Applications/Splunk/etc/apps/SA-ITOA/lib/itsi/event_management/sdk/grouping.py:444
#: /Applications/Splunk/etc/apps/SA-ITOA/lib/itsi/event_management/sdk/grouping.py:464
#: /Applications/Splunk/etc/apps/SA-ITOA/lib/itsi/event_management/sdk/grouping.py:516
#, python-format
msgid "Expecting `group_id` to be non-empty basestring. Received: %s"
msgstr ""
#: /Applications/Splunk/etc/apps/SA-ITOA/lib/itsi/event_management/sdk/grouping.py:726
msgid "Expecting `group_ids` in your input."
msgstr ""
#: /Applications/Splunk/etc/apps/SA-ITOA/lib/itsi/event_management/sdk/grouping.py:866
#, python-format
msgid ""
"Expecting `group_ids` to be of type basestring/list. Received: %s. Type: "
"%s"
msgstr ""
#: /Applications/Splunk/etc/apps/SA-ITOA/lib/itsi/event_management/sdk/grouping.py:777
#: /Applications/Splunk/etc/apps/SA-ITOA/lib/itsi/event_management/sdk/grouping.py:822
msgid ""
"Expecting `group_ids` to be of type basestring/list. Received: {}. Type: "
"{}"
msgstr ""
#: /Applications/Splunk/etc/apps/SA-ITOA/lib/itsi/event_management/sdk/grouping.py:773
#: /Applications/Splunk/etc/apps/SA-ITOA/lib/itsi/event_management/sdk/grouping.py:862
#, python-format
msgid "Expecting `group_ids` to contain some value. Received: %s"
msgstr ""
#: /Applications/Splunk/etc/apps/SA-ITOA/lib/itsi/event_management/sdk/grouping.py:818
msgid "Expecting `group_ids` to contain some value. Received: {}"
msgstr ""
#: /Applications/Splunk/etc/apps/SA-ITOA/lib/itsi/event_management/sdk/grouping.py:172
#: /Applications/Splunk/etc/apps/SA-ITOA/lib/itsi/event_management/sdk/grouping.py:213
#: /Applications/Splunk/etc/apps/SA-ITOA/lib/itsi/event_management/sdk/grouping.py:254
msgid "Expecting `group_ids`."
msgstr ""
#: /Applications/Splunk/etc/apps/SA-ITOA/lib/ITOA/itoa_common.py:328
#, python-format
msgid "Expecting `objects` to be list/dict type and not `%s`"
msgstr ""
#: /Applications/Splunk/etc/apps/SA-ITOA/lib/itsi/event_management/sdk/grouping.py:375
#: /Applications/Splunk/etc/apps/SA-ITOA/lib/itsi/event_management/sdk/grouping.py:415
#: /Applications/Splunk/etc/apps/SA-ITOA/lib/itsi/event_management/sdk/grouping.py:430
#, python-format
msgid "Expecting `tag_id` to be non-empty basestring. Received: %s"
msgstr ""
#: /Applications/Splunk/etc/apps/SA-ITOA/lib/itsi/event_management/sdk/grouping.py:324
#, python-format
msgid "Expecting `tag_value` to be non-empty basestring. Received: %s"
msgstr ""
#: /Applications/Splunk/etc/apps/SA-ITOA/lib/itsi/event_management/sdk/custom_group_action_base.py:46
#, python-format
msgid "Expecting a JSON serializeable string. Received=`%s`. Type=`%s`"
msgstr ""
#: /Applications/Splunk/etc/apps/SA-ITOA/lib/ITOA/event_management/rules_engine/actions.py:27
#: /Applications/Splunk/etc/apps/SA-ITOA/lib/ITOA/event_management/rules_engine/item.py:32
#: /Applications/Splunk/etc/apps/SA-ITOA/lib/ITOA/event_management/rules_engine/item.py:70
#: /Applications/Splunk/etc/apps/SA-ITOA/lib/ITOA/event_management/rules_engine/rule.py:28
#, python-format
msgid "Expecting a dictionary for %s. Received type=%s"
msgstr ""
#: /Applications/Splunk/etc/apps/SA-ITOA/lib/itsi/event_management/sdk/grouping.py:723
#, python-format
msgid "Expecting a dictionary. Received: `%s`. Type: `%s`"
msgstr ""
#: /Applications/Splunk/etc/apps/SA-ITOA/lib/ITOA/event_management/notable_event_aggregation_policy.py:146
#, python-format
msgid "Expecting a list of rules. Received=%s Type=%s."
msgstr ""
#: /Applications/Splunk/etc/apps/SA-ITOA/bin/itsi_user_access_init.py:111
msgid "Expecting a non-None dict for capability_matrix_maintenance_services"
msgstr ""
#: /Applications/Splunk/etc/apps/SA-ITOA/bin/itsi_user_access_init.py:105
msgid "Expecting a non-None dict for capability_matrix_notable_events"
msgstr ""
#: /Applications/Splunk/etc/apps/SA-ITOA/bin/itsi_user_access_init.py:97
msgid ""
"Expecting a non-None string for app_name and a non-None dict for "
"capability_matrix"
msgstr ""
#: /Applications/Splunk/etc/apps/SA-ITOA/lib/ITOA/event_management/notable_event_actions.py:257
#, python-format
msgid "Expecting a valid dict for data. Received=%s. Type=%s."
msgstr ""
#: /Applications/Splunk/etc/apps/SA-ITOA/lib/itsi/event_management/sdk/custom_group_action_base.py:100
#, python-format
msgid "Expecting a valid file path. Received: `%s`."
msgstr ""
#: /Applications/Splunk/etc/apps/SA-ITOA/lib/ITOA/itoa_common.py:1178
#: /Applications/Splunk/etc/apps/SA-ITOA/lib/ITOA/itoa_common.py:1221
#, python-format
msgid "Expecting a valid session_key, \"%s\" is invalid"
msgstr ""
#: /Applications/Splunk/etc/apps/SA-ITOA/lib/ITOA/itoa_common.py:1176
#: /Applications/Splunk/etc/apps/SA-ITOA/lib/ITOA/itoa_common.py:1219
msgid "Expecting a valid username, \"{0}\" is invalid"
msgstr ""
#: /Applications/Splunk/etc/apps/SA-ITOA/lib/ITOA/event_management/rules_engine/rule.py:38
#, python-format
msgid "Expecting actions to be list. Received=%s type=%s"
msgstr ""
#: /Applications/Splunk/etc/apps/SA-ITOA/lib/itsi/objects/changehandlers/itoa_change_handler.py:56
msgid "Expecting changed_object_key to be of type list"
msgstr ""
#: /Applications/Splunk/etc/apps/SA-ITOA/lib/ITOA/controller_utils.py:568
#, python-format
msgid "Expecting data to be a dict/list. Bad format %s."
msgstr ""
#: /Applications/Splunk/etc/apps/SA-ITOA/lib/itsi/event_management/sdk/eventing.py:236
#: /Applications/Splunk/etc/apps/SA-ITOA/lib/itsi/event_management/sdk/eventing.py:296
#: /Applications/Splunk/etc/apps/SA-ITOA/lib/itsi/event_management/sdk/eventing.py:356
msgid "Expecting either `events` or `event_ids`. Both are None."
msgstr ""
#: /Applications/Splunk/etc/apps/SA-ITOA/lib/itsi/event_management/sdk/eventing.py:173
msgid "Expecting event_ids to be a string or list"
msgstr ""
#: /Applications/Splunk/etc/apps/SA-ITOA/lib/itsi/event_management/sdk/grouping.py:601
#: /Applications/Splunk/etc/apps/SA-ITOA/lib/itsi/event_management/sdk/grouping.py:650
#, python-format
msgid "Expecting group_ids to be a list type. Received=%s."
msgstr ""
#: /Applications/Splunk/etc/apps/SA-ITOA/lib/itsi/event_management/sdk/grouping.py:115
msgid "Expecting group_ids to be a string or list"
msgstr ""
#: /Applications/Splunk/etc/apps/SA-ITOA/lib/itsi/event_management/sdk/grouping.py:603
#: /Applications/Splunk/etc/apps/SA-ITOA/lib/itsi/event_management/sdk/grouping.py:652
#, python-format
msgid "Expecting group_ids to have at least 1 id. Received=%s."
msgstr ""
#: /Applications/Splunk/etc/apps/SA-ITOA/lib/itsi/event_management/sdk/grouping.py:869
msgid "Expecting non-empty list of `group_ids`. and valid owner string"
msgstr ""
#: /Applications/Splunk/etc/apps/SA-ITOA/lib/itsi/event_management/sdk/grouping.py:781
msgid "Expecting non-empty list of `group_ids`. and valid severity string"
msgstr ""
#: /Applications/Splunk/etc/apps/SA-ITOA/lib/itsi/event_management/sdk/grouping.py:826
msgid "Expecting non-empty list of `group_ids`. and valid status string"
msgstr ""
#: /Applications/Splunk/etc/apps/SA-ITOA/lib/itsi/objects/changehandlers/itoa_change_handler.py:60
msgid "Expecting object_type to equal \"refresh_job\""
msgstr ""
#: /Applications/Splunk/etc/apps/SA-ITOA/lib/ITOA/event_management/notable_event_ticketing.py:397
#, python-format
msgid "Expecting str for uri. Received: %s."
msgstr ""
#: /Applications/Splunk/etc/apps/SA-ITOA/lib/ITOA/event_management/notable_event_ticketing.py:277
#, python-format
msgid "Expecting string type for params. Received=`%s`."
msgstr ""
#: /Applications/Splunk/etc/apps/SA-ITOA/lib/ITOA/event_management/notable_event_ticketing.py:583
msgid "Expecting ticket_id to be non-zero length str. Received={}."
msgstr ""
#: /Applications/Splunk/etc/apps/SA-ITOA/lib/ITOA/event_management/notable_event_ticketing.py:580
msgid "Expecting ticket_id to be str type. Received={}."
msgstr ""
#: /Applications/Splunk/etc/apps/SA-ITOA/lib/ITOA/event_management/notable_event_ticketing.py:578
msgid "Expecting ticket_system to be non-zero length str."
msgstr ""
#: /Applications/Splunk/etc/apps/SA-ITOA/lib/ITOA/event_management/notable_event_ticketing.py:576
msgid "Expecting ticket_system to be str type."
msgstr ""
#: /Applications/Splunk/etc/apps/SA-ITOA/lib/itsi/event_management/itsi_notable_event_queue_consumer.py:85
msgid "Expecting valid logger."
msgstr ""
#: /Applications/Splunk/etc/apps/SA-ITOA/lib/itsi/csv_import/itoa_bulk_import_specification.py:252
msgid "Expecting valid update type. Received \"{}\"."
msgstr ""
#: /Applications/Splunk/etc/apps/SA-ITOA/lib/itsi_module/itsi_module_kpi_base_search.py:189
#: /Applications/Splunk/etc/apps/SA-ITOA/lib/itsi_module/itsi_module_kpi_group.py:238
#: /Applications/Splunk/etc/apps/SA-ITOA/lib/itsi_module/itsi_module_service_template.py:311
#, python-format
msgid "Failed deleting object id %s: %s."
msgstr ""
#: /Applications/Splunk/etc/apps/SA-ITOA/lib/itsi_module/itsi_module_kpi_base_search.py:85
#, python-format
msgid "Failed templatizing %s."
msgstr ""
#: /Applications/Splunk/etc/apps/SA-ITOA/lib/ITOA/event_management/notable_event.py:250
msgid "Failed to add key {0} to data: {1}."
msgstr ""
#: /Applications/Splunk/etc/apps/SA-ITOA/lib/ITOA/event_management/hec_utils.py:145
msgid ""
"Failed to collect HTTP event listener global settings, response={0}, "
"content={1}."
msgstr ""
#: /Applications/Splunk/etc/apps/SA-ITOA/lib/itsi/upgrade/kvstore_backup_restore.py:584
#: /Applications/Splunk/etc/apps/SA-ITOA/lib/migration/object_interface/filesave_migration_interface.py:34
#: /Applications/Splunk/etc/apps/SA-ITOA/lib/migration/object_interface/iconcollection_migration_interface.py:34
#: /Applications/Splunk/etc/apps/SA-ITOA/lib/migration/object_interface/useraccess_migration_interface.py:38
msgid "Failed to convert object contents to JSON format."
msgstr ""
#: /Applications/Splunk/etc/apps/SA-ITOA/lib/ITOA/storage/itoa_generic_persistables.py:277
msgid "Failed to create model."
msgstr ""
#: /Applications/Splunk/etc/apps/SA-ITOA/lib/ITOA/storage/itoa_generic_persistables.py:268
msgid "Failed to create model: data validation failed."
msgstr ""
#: /Applications/Splunk/etc/apps/SA-ITOA/lib/itsi/searches/itsi_shared_base_search.py:266
#: /Applications/Splunk/etc/apps/SA-ITOA/lib/itsi/upgrade/migration_handlers_3_1_1.py:234
#, python-format
msgid "Failed to create saved search %s."
msgstr ""
#: /Applications/Splunk/etc/apps/SA-ITOA/lib/itsi/objects/itsi_service.py:1086
msgid "Failed to create saved search={0} for KPI={1}."
msgstr ""
#: /Applications/Splunk/etc/apps/SA-ITOA/lib/ITOA/event_management/hec_utils.py:248
#, python-format
msgid "Failed to create token=`%s`, response=%s, content=%s."
msgstr ""
#: /Applications/Splunk/etc/apps/SA-ITOA/lib/ITOA/storage/itoa_generic_persistables.py:365
msgid "Failed to delete model."
msgstr ""
#: /Applications/Splunk/etc/apps/SA-ITOA/lib/ITOA/event_management/notable_event_utils.py:514
msgid "Failed to delete one or more event(s)={0}."
msgstr ""
#: /Applications/Splunk/etc/apps/SA-ITOA/lib/itsi/upgrade/migration_handlers_2_6_0.py:534
msgid ""
"Failed to delete the HEC token {0} during upgrade. To proceed, you must "
"delete this token manually."
msgstr ""
#: /Applications/Splunk/etc/apps/SA-ITOA/lib/ITOA/event_management/notable_event_ticketing.py:735
msgid ""
"Failed to delete ticket. Ticket does not exist or has been deleted "
"already."
msgstr ""
#: /Applications/Splunk/etc/apps/SA-ITOA/lib/ITOA/event_management/notable_event_ticketing.py:727
msgid ""
"Failed to delete ticket. Ticketing system does not exist or has been "
"deleted already."
msgstr ""
#: /Applications/Splunk/etc/apps/SA-ITOA/lib/ITOA/event_management/notable_event_ticketing.py:749
msgid "Failed to delete ticket. Unable to find ticket with ID {}."
msgstr ""
#: /Applications/Splunk/etc/apps/SA-ITOA/bin/itsi_sample_event_action_ping.py:276
msgid "Failed to execute one or more ping actions."
msgstr ""
#: /Applications/Splunk/etc/apps/SA-ITOA/lib/itsi_module/itsi_module_kpi_base_search.py:319
#, python-format
msgid "Failed to fetch %s."
msgstr ""
#: /Applications/Splunk/etc/apps/SA-ITOA/lib/ITOA/storage/itoa_generic_persistables.py:416
#, python-format
msgid "Failed to fetch collection: %s."
msgstr ""
#: /Applications/Splunk/etc/apps/SA-ITOA/lib/itsi/event_management/itsi_notable_event_queue_consumer.py:485
#, python-format
msgid "Failed to fetch consumer_registration object %s."
msgstr ""
#: /Applications/Splunk/etc/apps/SA-ITOA/lib/ITOA/event_management/notable_event_actions.py:111
#, python-format
msgid "Failed to fetch data using url=`%s`."
msgstr ""
#: /Applications/Splunk/etc/apps/SA-ITOA/lib/ITOA/storage/itoa_generic_persistables.py:344
#, python-format
msgid "Failed to fetch model: %s."
msgstr ""
#: /Applications/Splunk/etc/apps/SA-ITOA/bin/backfill_services.py:78
#: /Applications/Splunk/etc/apps/SA-ITOA/bin/backfill_services.py:137
msgid "Failed to fetch resource with id {}."
msgstr ""
#: /Applications/Splunk/etc/apps/SA-ITOA/lib/itsi/event_management/itsi_notable_event_queue_consumer.py:547
msgid ""
"Failed to get associated events of group (notable_event_change action), "
"ret={}."
msgstr ""
#: /Applications/Splunk/etc/apps/SA-ITOA/lib/itsi_module/itsi_module_modules.py:273
msgid "Failed to get contents of SPL file."
msgstr ""
#: /Applications/Splunk/etc/apps/SA-ITOA/lib/ITOA/event_management/notable_event_retention_policy.py:133
#, python-format
msgid "Failed to get data from uri=\"%s\""
msgstr ""
#: /Applications/Splunk/etc/apps/SA-ITOA/lib/itsi_module/itsi_module_kpi_base_search.py:302
msgid "Failed to get existing base search ids."
msgstr ""
#: /Applications/Splunk/etc/apps/SA-ITOA/lib/itsi/health_services/health_services_provider.py:159
msgid ""
"Failed to get minimum and maximum value of given status={0}. It may be an"
" invalid status."
msgstr ""
#: /Applications/Splunk/etc/apps/SA-ITOA/lib/migration/object_interface/notable_migration_interface.py:100
#: /Applications/Splunk/etc/apps/SA-ITOA/lib/migration/object_interface/notable_migration_interface.py:129
#, python-format
msgid "Failed to get notable event collection from object type: %s."
msgstr ""
#: /Applications/Splunk/etc/apps/SA-ITOA/lib/ITOA/event_management/base_event_management.py:410
#, python-format
msgid "Failed to get object ID=%s from KV store."
msgstr ""
#: /Applications/Splunk/etc/apps/SA-ITOA/lib/itsi/upgrade/kvstore_backup_restore.py:580
#: /Applications/Splunk/etc/apps/SA-ITOA/lib/migration/object_interface/useraccess_migration_interface.py:34
msgid "Failed to get object content."
msgstr ""
#: /Applications/Splunk/etc/apps/SA-ITOA/lib/ITOA/event_management/notable_event_utils.py:807
#, python-format
msgid "Failed to get severity from itsi_notable_event_severity, response=\"%s\"."
msgstr ""
#: /Applications/Splunk/etc/apps/SA-ITOA/lib/ITOA/itoa_common.py:839
msgid "Failed to get size of object={0}."
msgstr ""
#: /Applications/Splunk/etc/apps/SA-ITOA/lib/ITOA/event_management/notable_event.py:745
msgid "Failed to get state for event: {0} from KV store."
msgstr ""
#: /Applications/Splunk/etc/apps/SA-ITOA/lib/ITOA/event_management/notable_event.py:704
msgid "Failed to get state for events: {0} from KV store."
msgstr ""
#: /Applications/Splunk/etc/apps/SA-ITOA/lib/ITOA/event_management/hec_utils.py:351
msgid "Failed to get token={0} settings. response={1}, content={2}."
msgstr ""
#: /Applications/Splunk/etc/apps/SA-ITOA/lib/ITOA/event_management/notable_event_utils.py:867
#, python-format
msgid "Failed to get users from uri=%s."
msgstr ""
#: /Applications/Splunk/etc/apps/SA-ITOA/lib/itsi/upgrade/itsi_migration.py:3682
msgid ""
"Failed to import Team settings. ITSI will not work properly until the "
"Team settings are imported. See [{} this documentation page] for "
"instructions on how to resolve this issue."
msgstr ""
#: /Applications/Splunk/etc/apps/SA-ITOA/lib/itsi/upgrade/migration_handlers_2_5_0.py:388
msgid ""
"Failed to migrate backup restore jobs to 2.5.0. Unable to save. Check the"
" logs for details."
msgstr ""
#: /Applications/Splunk/etc/apps/SA-ITOA/lib/itsi/upgrade/itsi_migration.py:1201
msgid ""
"Failed to migrate deep dives to 2.3.0. Unable to save. Check the logs for"
" details."
msgstr ""
#: /Applications/Splunk/etc/apps/SA-ITOA/lib/itsi/upgrade/migration_handlers_2_5_0.py:327
msgid ""
"Failed to migrate maintenance calendars to 2.5.0. Unable to save. Check "
"the logs for details."
msgstr ""
#: /Applications/Splunk/etc/apps/SA-ITOA/lib/itsi/upgrade/migration_handlers_4_4_0.py:159
msgid "Failed to migrate notable event comments."
msgstr ""
#: /Applications/Splunk/etc/apps/SA-ITOA/lib/itsi/upgrade/migration_handlers_2_5_0.py:260
msgid ""
"Failed to migrate service schema to 2.5.0. Unable to save. Check the logs"
" for details."
msgstr ""
#: /Applications/Splunk/etc/apps/SA-ITOA/lib/itsi/upgrade/migration_handlers_2_6_0.py:395
#: /Applications/Splunk/etc/apps/SA-ITOA/lib/itsi/upgrade/migration_handlers_2_6_0.py:413
msgid ""
"Failed to migrate service schema to 2.6.0. Unable to save. Check the logs"
" for details."
msgstr ""
#: /Applications/Splunk/etc/apps/SA-ITOA/lib/itsi/csv_import/itoa_bulk_import_rest_interface_provider.py:400
msgid "Failed to preview CSV data. Check the logs for details. {}"
msgstr ""
#: /Applications/Splunk/etc/apps/SA-ITOA/lib/itsi/csv_import/itoa_bulk_import_modinput_interface_provider.py:342
#, python-format
msgid "Failed to read meta file: %s"
msgstr ""
#: /Applications/Splunk/etc/apps/SA-ITOA/lib/ITOA/event_management/notable_event_ticketing.py:422
#, python-format
msgid "Failed to refresh notable event=%s."
msgstr ""
#: /Applications/Splunk/etc/apps/SA-ITOA/lib/itsi/event_management/itsi_notable_event_queue_consumer.py:648
msgid "Failed to run action on instance_id={0}, exception={1}."
msgstr ""
#: /Applications/Splunk/etc/apps/SA-ITOA/lib/ITOA/storage/itoa_generic_persistables.py:313
msgid "Failed to save model."
msgstr ""
#: /Applications/Splunk/etc/apps/SA-ITOA/lib/itsi/event_management/itsi_notable_event_queue_consumer.py:495
msgid "Failed to save modular input ID to KV Store."
msgstr ""
#: /Applications/Splunk/etc/apps/SA-ITOA/lib/ITOA/event_management/correlation_search.py:288
msgid "Failed to save search {0}."
msgstr ""
#: /Applications/Splunk/etc/apps/SA-ITOA/lib/itsi/objects/itsi_service.py:1077
msgid ""
"Failed to update ACL settings for savedsearch: \"{}\"; KPI: \"{}\". Do "
"this manually."
msgstr ""
#: /Applications/Splunk/etc/apps/SA-ITOA/lib/itsi/upgrade/migration_handlers_3_0_0.py:84
msgid "Failed to update Aggregation Policies to include GROUP execute_on criteria"
msgstr ""
#: /Applications/Splunk/etc/apps/SA-ITOA/lib/itsi/upgrade/migration_handlers_4_0_0.py:275
msgid ""
"Failed to update Aggregation Policies to migrate to GROUP execute_on "
"criteria"
msgstr ""
#: /Applications/Splunk/etc/apps/SA-ITOA/lib/itsi/upgrade/migration_handlers_4_2_0.py:340
msgid "Failed to update Correlation Searches to use new entity filtering macros."
msgstr ""
#: /Applications/Splunk/etc/apps/SA-ITOA/lib/itsi/upgrade/migration_handlers_3_1_0.py:90
msgid ""
"Failed to update Glass Tables set any default drilldowns that were OFF to"
" ON - Default"
msgstr ""
#: /Applications/Splunk/etc/apps/SA-ITOA/lib/ITOA/event_management/hec_utils.py:122
#, python-format
msgid "Failed to update HTTP event listener global settings, response=`%s`."
msgstr ""
#: /Applications/Splunk/etc/apps/SA-ITOA/lib/ITOA/event_management/hec_utils.py:390
msgid "Failed to update acl settings of token={0}. response={1}, content={2}."
msgstr ""
#: /Applications/Splunk/etc/apps/SA-ITOA/lib/itsi/upgrade/migration_handlers_4_4_0.py:88
msgid "Failed to update beta Glass Tables include time range picker."
msgstr ""
#: /Applications/Splunk/etc/apps/SA-ITOA/lib/itsi/event_management/itsi_correlation_search.py:401
#: /Applications/Splunk/etc/apps/SA-ITOA/lib/itsi/event_management/itsi_correlation_search.py:428
msgid "Failed to update correlation search={0}, with data=\"{1}\"."
msgstr ""
#: /Applications/Splunk/etc/apps/SA-ITOA/lib/itsi/upgrade/migration_handlers_4_3_1.py:41
msgid "Failed to update correlation searches."
msgstr ""
#: /Applications/Splunk/etc/apps/SA-ITOA/lib/itsi/upgrade/migration_handlers_4_4_0.py:215
msgid "Failed to update episodes."
msgstr ""
#: /Applications/Splunk/etc/apps/SA-ITOA/lib/itsi/upgrade/migration_handlers_3_0_0.py:271
msgid "Failed to update external tickets to have mod_time added"
msgstr ""
#: /Applications/Splunk/etc/apps/SA-ITOA/lib/ITOA/storage/itoa_generic_persistables.py:282
msgid "Failed to update model."
msgstr ""
#: /Applications/Splunk/etc/apps/SA-ITOA/lib/itsi/event_management/event_management_rest_provider.py:172
#: /Applications/Splunk/etc/apps/SA-ITOA/lib/itsi/itoa_rest_interface_provider/itoa_rest_interface_provider.py:268
#: /Applications/Splunk/etc/apps/SA-ITOA/lib/itsi/itoa_rest_interface_provider/itoa_rest_interface_provider.py:382
#, python-format
msgid "Failed to update permissions. %s. Check the logs for details."
msgstr ""
#: /Applications/Splunk/etc/apps/SA-ITOA/lib/itsi/event_management/event_management_rest_provider.py:268
#, python-format
msgid "Failed to update perms. %s. Check the logs for details."
msgstr ""
#: /Applications/Splunk/etc/apps/SA-ITOA/lib/ITOA/event_management/hec_utils.py:329
msgid "Failed to update token={0} settings. response={1}, content={2}."
msgstr ""
#: /Applications/Splunk/etc/apps/SA-ITOA/lib/itsi/upgrade/itsi_migration.py:2834
msgid "Failed to upgrade IT Service Intelligence."
msgstr ""
#: /Applications/Splunk/etc/apps/SA-ITOA/lib/ITOA/event_management/base_event_generation.py:178
msgid "Failed to validate arguments. Please make sure arguments are correct"
msgstr ""
#: /Applications/Splunk/etc/apps/SA-ITOA/lib/itsi_module/itsi_module_kpi_base_search.py:168
#: /Applications/Splunk/etc/apps/SA-ITOA/lib/itsi_module/itsi_module_kpi_group.py:217
#: /Applications/Splunk/etc/apps/SA-ITOA/lib/itsi_module/itsi_module_service_template.py:270
#, python-format
msgid "Failed updating object id %s: %s."
msgstr ""
#: /Applications/Splunk/etc/apps/SA-ITOA/lib/ITOA/event_management/notable_event_kpi_alert.py:58
#: /Applications/Splunk/etc/apps/SA-ITOA/lib/ITOA/event_management/notable_event_mad.py:63
msgid "Failure parsing string data into json"
msgstr ""
#: /Applications/Splunk/etc/apps/SA-ITOA/bin/configure_itsi.py:72
#: /Applications/Splunk/etc/apps/SA-ITOA/lib/itsi/upgrade/itsi_migration.py:2920
msgid ""
"Failures occurred while attempting to import some IT Service Intelligence"
" settings from configuration files for apps and modules. Check the logs "
"to get information about which settings failed to be imported."
msgstr ""
#: /Applications/Splunk/etc/apps/SA-ITOA/lib/itsi/backup_restore/backup_restore_rest_provider.py:379
#, python-format
msgid "File `%s` is a path, not a file name. Paths are not supported."
msgstr ""
#: /Applications/Splunk/etc/apps/SA-ITOA/lib/itsi/backup_restore/backup_restore_rest_provider.py:398
msgid "File already exists."
msgstr ""
#: /Applications/Splunk/etc/apps/SA-ITOA/lib/itsi/backup_restore/backup_restore_rest_provider.py:387
msgid "File name provided contains characters not supported."
msgstr ""
#: /Applications/Splunk/etc/apps/SA-ITOA/lib/itsi/backup_restore/itsi_backup_restore_utils.py:680
msgid "File not found."
msgstr ""
#: /Applications/Splunk/etc/apps/SA-ITOA/lib/itsi/upgrade/kvstore_backup_restore.py:1110
msgid ""
"File not found. Ensure ZIP file contains JSON files contained within a "
"\"backup\" folder."
msgstr ""
#: /Applications/Splunk/etc/apps/SA-ITOA/lib/itsi/csv_import/itsi_csv_import_utils.py:286
msgid "File {} does not exist."
msgstr ""
#: /Applications/Splunk/etc/apps/SA-ITOA/lib/itsi/event_management/sdk/custom_group_action_base.py:103
#, python-format
msgid "File=`%s` does not exist."
msgstr ""
#: /Applications/Splunk/etc/apps/SA-ITOA/lib/ITOA/event_management/notable_event_actions.py:822
msgid "Filename is missing in the request."
msgstr ""
#: /Applications/Splunk/etc/apps/SA-ITOA/lib/itsi/searches/itsi_shared_base_search.py:797
#: /Applications/Splunk/etc/apps/SA-ITOA/lib/itsi/searches/itsi_shared_base_search.py:864
msgid "For an entity search, valid entity breakdown id field is required."
msgstr ""
#: /Applications/Splunk/etc/apps/SA-ITOA/lib/itsi/searches/itsi_shared_base_search.py:799
#: /Applications/Splunk/etc/apps/SA-ITOA/lib/itsi/searches/itsi_shared_base_search.py:866
msgid "For an entity search, valid entity id field is required."
msgstr ""
#: /Applications/Splunk/etc/apps/SA-ITOA/lib/itsi/upgrade/itsi_migration.py:947
msgid ""
"Found one or more KPIs with stale datamodel specification. These KPIs "
"were auto converted to adhoc search type to prevent service failures."
msgstr ""
#: /Applications/Splunk/etc/apps/SA-ITOA/lib/ITOA/event_management/notable_event_retention_policy.py:60
#: /Applications/Splunk/etc/apps/SA-ITOA/lib/ITOA/event_management/notable_event_retention_policy.py:76
msgid "Function has not been implemented by inherit class"
msgstr ""
#: /Applications/Splunk/etc/apps/SA-ITOA/lib/ITOA/event_management/base_event_generation.py:198
#: /Applications/Splunk/etc/apps/SA-ITOA/lib/ITOA/event_management/base_event_generation.py:207
msgid "Function is not implemented"
msgstr ""
#: /Applications/Splunk/etc/apps/SA-ITOA/lib/SA_ITOA_app_common/solnlib/packages/schematics/types/base.py:1046
msgid "GeoPointType can only accept tuples, lists, or dicts"
msgstr ""
#: /Applications/Splunk/etc/apps/SA-ITOA/default/savedsearches.conf:82
msgid ""
"Get a list of all known IP addresses from the CIM Inventory and Network "
"Traffic data models"
msgstr ""
#: /Applications/Splunk/etc/apps/SA-ITOA/default/savedsearches.conf:86
msgid ""
"Get a list of all known MAC addresses and their associated IP addresses "
"in a multivalue field"
msgstr ""
#: /Applications/Splunk/etc/apps/SA-ITOA/default/savedsearches.conf:21
msgid ""
"Get a list of splunk forwarders, which can later be used to populate the "
"IT Service Intelligence splunk service"
msgstr ""
#: /Applications/Splunk/etc/apps/SA-ITOA/default/savedsearches.conf:3
msgid ""
"Get a list of splunk indexers, which can later be used to populate the IT"
" Service Intelligence splunk service"
msgstr ""
#: /Applications/Splunk/etc/apps/SA-ITOA/default/savedsearches.conf:9
msgid ""
"Get a list of splunk search heads, which can later be used to populate "
"the IT Service Intelligence splunk service"
msgstr ""
#: /Applications/Splunk/etc/apps/SA-ITOA/default/savedsearches.conf:15
msgid ""
"Get a list of splunk search peers, which can later be used to populate "
"the IT Service Intelligence splunk service"
msgstr ""
#: /Applications/Splunk/etc/apps/SA-ITOA/default/savedsearches.conf:60
#: /Applications/Splunk/etc/apps/SA-ITOA/default/savedsearches.conf:90
msgid ""
"Get the VMWware Datacenters and format them in a way that is appropriate "
"for IT Service Intelligence"
msgstr ""
#: /Applications/Splunk/etc/apps/SA-ITOA/default/savedsearches.conf:65
#: /Applications/Splunk/etc/apps/SA-ITOA/default/savedsearches.conf:94
msgid ""
"Get the VMWware ESX\\ESXi host systems and format them in a way that is "
"appropriate for IT Service Intelligence"
msgstr ""
#: /Applications/Splunk/etc/apps/SA-ITOA/default/savedsearches.conf:70
#: /Applications/Splunk/etc/apps/SA-ITOA/default/savedsearches.conf:98
msgid ""
"Get the VMWware Virtual Machines and format them in a way that is "
"appropriate for IT Service Intelligence"
msgstr ""
#: /Applications/Splunk/etc/apps/SA-ITOA/default/searchbnf.conf:33
msgid ""
"Get the value for the search_alert field for the provided serviceId and "
"kpiId"
msgstr ""
#: /Applications/Splunk/etc/apps/SA-ITOA/lib/ITOA/splunk_search_chunk_protocol.py:124
msgid "Getinfo exchanges does not contain meta data"
msgstr ""
#: /Applications/Splunk/etc/apps/SA-ITOA/default/searchbnf.conf:32
msgid "Gets the value for a kpi search field."
msgstr ""
#: /Applications/Splunk/etc/apps/SA-ITOA/default/searchbnf.conf:31
msgid ""
"Gets the value for a kpi search field. Must specify service id, kpi id, "
"and search field."
msgstr ""
#: /Applications/Splunk/etc/apps/SA-ITOA/default/alert_actions.conf:35
msgid ""
"Given a ITSI Notable Event, link a ticket of your choice of Ticketing "
"System."
msgstr ""
#: /Applications/Splunk/etc/apps/SA-ITOA/default/alert_actions.conf:23
msgid "Given one or more ITSI Notable Event, ping the `host` in it."
msgstr ""
#: /Applications/Splunk/etc/apps/SA-ITOA/default/itsi_team.conf:2
msgid "Global"
msgstr ""
#: /Applications/Splunk/etc/apps/SA-ITOA/lib/itsi/objects/itsi_security_group.py:348
msgid "Global group does not seem to exist. Cannot create private groups"
msgstr ""
#: /Applications/Splunk/etc/apps/SA-ITOA/lib/itsi/objects/itsi_security_group.py:63
msgid "Global team cannot be deleted."
msgstr ""
#: /Applications/Splunk/etc/apps/SA-ITOA/lib/itsi/itsi_utils.py:792
#, python-format
msgid "Got bad status code %s - Aborting."
msgstr ""
#: /Applications/Splunk/etc/apps/SA-ITOA/lib/itsi/backfill/itsi_backfill_requests.py:131
#, python-format
msgid "Got the following for data: %s"
msgstr ""
#: /Applications/Splunk/etc/apps/SA-ITOA/lib/ITOA/event_management/notable_event_group.py:289
#: /Applications/Splunk/etc/apps/SA-ITOA/lib/ITOA/event_management/notable_event_group.py:329
#: /Applications/Splunk/etc/apps/SA-ITOA/lib/ITOA/event_management/notable_event_group.py:381
msgid "Group is not of type dict"
msgstr ""
#: /Applications/Splunk/etc/apps/SA-ITOA/lib/SA_ITOA_app_common/solnlib/packages/schematics/types/base.py:556
msgid "Hash value is not hexadecimal."
msgstr ""
#: /Applications/Splunk/etc/apps/SA-ITOA/lib/SA_ITOA_app_common/solnlib/packages/schematics/types/base.py:555
msgid "Hash value is wrong length."
msgstr ""
#: /Applications/Splunk/etc/apps/SA-ITOA/bin/itsi_async_csv_loader.py:32
msgid ""
"Helps to load your entities, services, and their relationships into the "
"KV store."
msgstr ""
#: /Applications/Splunk/etc/apps/SA-ITOA/bin/itsi_csv_import.py:43
msgid ""
"Helps to populate your entities, services, and their relationships into "
"the KV store."
msgstr ""
#: /Applications/Splunk/etc/apps/SA-ITOA/default/itsi_notable_event_severity.conf:33
msgid "High"
msgstr ""
#: /Applications/Splunk/etc/apps/SA-ITOA/lib/itsi_module/itsi_module_kpi_group.py:31
msgid "ID for KPI {} needs to be prefixed with module ID."
msgstr ""
#: /Applications/Splunk/etc/apps/SA-ITOA/lib/ITOA/event_management/notable_event_utils.py:414
msgid "IDs are not a valid list."
msgstr ""
#: /Applications/Splunk/etc/apps/SA-ITOA/bin/itsi_user_access_init.py:34
msgid "IT Service Intelligence Access Control Registration"
msgstr ""
#: /Applications/Splunk/etc/apps/SA-ITOA/bin/itsi_notable_event_actions_queue_consumer.py:28
msgid "IT Service Intelligence Actions Queue Consumer"
msgstr ""
#: /Applications/Splunk/etc/apps/SA-ITOA/bin/itsi_async_csv_loader.py:31
msgid "IT Service Intelligence Asynchronous CSV Loader"
msgstr ""
#: /Applications/Splunk/etc/apps/SA-ITOA/bin/itsi_backfill.py:36
msgid "IT Service Intelligence Backfill Manager"
msgstr ""
#: /Applications/Splunk/etc/apps/SA-ITOA/bin/itsi_backup_restore.py:20
msgid "IT Service Intelligence Backup Restore Jobs Processor"
msgstr ""
#: /Applications/Splunk/etc/apps/SA-ITOA/bin/itsi_csv_import.py:42
msgid "IT Service Intelligence CSV Import"
msgstr ""
#: /Applications/Splunk/etc/apps/SA-ITOA/bin/configure_itsi.py:27
msgid "IT Service Intelligence Configurator"
msgstr ""
#: /Applications/Splunk/etc/apps/SA-ITOA/bin/itsi_default_correlation_search_acl_loader.py:27
msgid "IT Service Intelligence Default Correlation Search ACL loader"
msgstr ""
#: /Applications/Splunk/etc/apps/SA-ITOA/bin/itsi_default_aggregation_policy_loader.py:28
msgid "IT Service Intelligence Default Policies Loader"
msgstr ""
#: /Applications/Splunk/etc/apps/SA-ITOA/bin/itsi_entity_exchange_consumer.py:27
msgid "IT Service Intelligence Entity Exchange Consumer Modular Input"
msgstr ""
#: /Applications/Splunk/etc/apps/SA-ITOA/bin/itsi_notable_event_hec_init.py:26
msgid "IT Service Intelligence HEC Initializer"
msgstr ""
#: /Applications/Splunk/etc/apps/SA-ITOA/bin/itsi_age_kpi_alert_value_cache.py:23
msgid "IT Service Intelligence KPI Summary Cache Cleaner"
msgstr ""
#: /Applications/Splunk/etc/apps/SA-ITOA/bin/itsi_upgrade.py:31
msgid "IT Service Intelligence Migration Modular Input"
msgstr ""
#: /Applications/Splunk/etc/apps/SA-ITOA/bin/itsi_refresher.py:26
msgid "IT Service Intelligence Refresher"
msgstr ""
#: /Applications/Splunk/etc/apps/SA-ITOA/bin/itsi_scheduled_backup_caller.py:27
msgid "IT Service Intelligence Scheduled Backup Modular Input"
msgstr ""
#: /Applications/Splunk/etc/apps/SA-ITOA/bin/itsi_service_template_update_scheduler.py:27
msgid "IT Service Intelligence Service Template Update Scheduler"
msgstr ""
#: /Applications/Splunk/etc/apps/SA-ITOA/lib/itsi/upgrade/itsi_migration.py:2832
msgid ""
"IT Service Intelligence minor version upgrade from {} to {} has completed"
" successfully."
msgstr ""
#: /Applications/Splunk/etc/apps/SA-ITOA/bin/itsi_notable_event_archive.py:26
msgid "IT Service Intelligence notable event archiver"
msgstr ""
#: /Applications/Splunk/etc/apps/SA-ITOA/lib/itsi/upgrade/itsi_migration.py:2833
msgid "IT Service Intelligence upgrade has completed successfully."
msgstr ""
#: /Applications/Splunk/etc/apps/SA-ITOA/lib/itsi/upgrade/itsi_migration.py:3080
msgid ""
"IT Service Intelligence version 2.2.0+ does not require the SA-"
"ThreatIntelligence. With the following 2 exceptions, you can safely "
"remove SA-ThreatIntelligence from $SPLUNK_HOME/etc/apps. Exception 1. The"
" Splunk Enterprise Security app requires SA-ThreatIntelligence. If you "
"are running Splunk Enterprise Security, do not remove SA-"
"ThreatIntelligence. Exception 2. If you want to migrate old notable "
"events to the new index: First, follow the steps as specified in the "
"documentation. Once the migration is complete, you can safely remove SA-"
"ThreatIntelligence from $SPLUNK_HOME/etc/apps."
msgstr ""
#: /Applications/Splunk/etc/apps/SA-ITOA/lib/itsi/upgrade/itsi_migration.py:3089
msgid ""
"IT Service Intelligence version 2.2.0+ does not require the SA-Ticketing."
" You can safely remove SA-Ticketing from $SPLUNK_HOME/etc/apps."
msgstr ""
#: /Applications/Splunk/etc/apps/SA-ITOA/lib/itsi/upgrade/itsi_migration.py:3133
msgid ""
"IT Service Intelligence version 2.3.0+ does not require SA-Utils. With "
"the following exception, you can safely remove SA-Utils from "
"$SPLUNK_HOME/etc/apps : The Splunk Enterprise Security App, Splunk App "
"for VMware and Splunk App for Netapp Data Ontap require SA-Utils. If you "
"are using either of these Apps, do not remove SA-Utils."
msgstr ""
#: /Applications/Splunk/etc/apps/SA-ITOA/default/app.conf:9
msgid "ITOA Backend"
msgstr ""
#: /Applications/Splunk/etc/apps/SA-ITOA/default/alert_actions.conf:4
msgid "ITSI Alert Generator"
msgstr ""
#: /Applications/Splunk/etc/apps/SA-ITOA/default/props.conf:14
msgid "ITSI Internal Log"
msgstr ""
#: /Applications/Splunk/etc/apps/SA-ITOA/bin/itsi_consumer.py:145
msgid "ITSI Multiple Job Queue Processor"
msgstr ""
#: /Applications/Splunk/etc/apps/SA-ITOA/lib/ITOA/event_management/notable_event_actions.py:585
msgid ""
"ITSI episode action {} was dispatched to the executor, but the action has"
" not been configured on the executor host."
msgstr ""
#: /Applications/Splunk/etc/apps/SA-ITOA/lib/itsi_module/itsi_module_modules.py:178
msgid "ITSI module action is not supported: {}."
msgstr ""
#: /Applications/Splunk/etc/apps/SA-ITOA/lib/itsi_module/itsi_module_modules.py:176
msgid "ITSI module action is not valid."
msgstr ""
#: /Applications/Splunk/etc/apps/SA-ITOA/lib/itsi_module/itsi_module_interface_provider_base.py:583
msgid "ITSI module name is invalid. It should start with DA-ITSI-"
msgstr ""
#: /Applications/Splunk/etc/apps/SA-ITOA/lib/itsi_module/itsi_module_modules.py:165
msgid "ITSI module name is not valid."
msgstr ""
#: /Applications/Splunk/etc/apps/SA-ITOA/lib/ITOA/event_management/base_event_management.py:544
#, python-format
msgid "Id cannot be empty or invalid id=%s."
msgstr ""
#: /Applications/Splunk/etc/apps/SA-ITOA/lib/itsi/searches/itsi_filter.py:55
#, python-format
msgid "Illegal character %s in value %s."
msgstr ""
#: /Applications/Splunk/etc/apps/SA-ITOA/bin/itsi_csv_import.py:191
msgid "Import services as enabled by default."
msgstr ""
#: /Applications/Splunk/etc/apps/SA-ITOA/bin/configure_itsi.py:78
#: /Applications/Splunk/etc/apps/SA-ITOA/lib/itsi/upgrade/itsi_migration.py:2926
msgid ""
"Importing IT Service Intelligence settings from conf files for apps and "
"modules failed with: {}"
msgstr ""
#: /Applications/Splunk/etc/apps/SA-ITOA/default/itsi_notable_event_status.conf:24
msgid "In Progress"
msgstr ""
#: /Applications/Splunk/etc/apps/SA-ITOA/lib/itsi/event_management/sdk/eventing_base.py:34
msgid ""
"In the absence of session_key, expecting a valid non-empty string, for "
"both your username and password."
msgstr ""
#: /Applications/Splunk/etc/apps/SA-ITOA/lib/itsi/objects/changehandlers/kpi_thresholds_template_delete_handler.py:52
#: /Applications/Splunk/etc/apps/SA-ITOA/lib/itsi/objects/changehandlers/kpi_thresholds_template_update_handler.py:56
msgid "Incoming kpi_thresholds_template is not a valid JSON object"
msgstr ""
#: /Applications/Splunk/etc/apps/SA-ITOA/bin/command_get_kpi_search.py:96
msgid "Incomplete key-value pair found. Must fix your query."
msgstr ""
#: /Applications/Splunk/etc/apps/SA-ITOA/bin/command_get_kpi_search.py:67
msgid "Incomplete key-value pair found. Must specify a key."
msgstr ""
#: /Applications/Splunk/etc/apps/SA-ITOA/lib/itsi/objects/itsi_entity.py:124
#, python-format
msgid ""
"Incorrect format of %s field, in entity object. Expected list, found %s, "
"entity_title=\"%s\", %s_field=\"%s\""
msgstr ""
#: /Applications/Splunk/etc/apps/SA-ITOA/bin/itsi_notable_event_actions_queue_consumer.py:41
msgid ""
"Induce some delay (in seconds) in execution after reading from queue. "
"Defaults to 0 seconds"
msgstr ""
#: /Applications/Splunk/etc/apps/SA-ITOA/default/itsi_notable_event_severity.conf:12
msgid "Info"
msgstr ""
#: /Applications/Splunk/etc/apps/SA-ITOA/bin/itsi_notable_event_hec_init.py:27
msgid ""
"Initializes Splunk HEC, creates and sets the right ACL values for HEC "
"tokens consumed by ITSI Episode Review."
msgstr ""
#: /Applications/Splunk/etc/apps/SA-ITOA/lib/SA_ITOA_app_common/solnlib/packages/schematics/types/compound.py:155
#, python-format
msgid "Input must be a mapping or '%s' instance"
msgstr ""
#: /Applications/Splunk/etc/apps/SA-ITOA/bin/kvstore_to_json.py:343
msgid ""
"Input not specified for the service KPI operation. Must provide a valid "
"directory path containing input.json."
msgstr ""
#: /Applications/Splunk/etc/apps/SA-ITOA/lib/itsi/mad/itsi_mad_searches.py:168
#: /Applications/Splunk/etc/apps/SA-ITOA/lib/itsi/mad/itsi_mad_searches.py:355
msgid "Instance data must be in the format of a valid dictionary."
msgstr ""
#: /Applications/Splunk/etc/apps/SA-ITOA/lib/itsi/mad/itsi_mad_searches.py:281
#: /Applications/Splunk/etc/apps/SA-ITOA/lib/itsi/mad/itsi_mad_searches.py:349
msgid "Instance id must be in the format of a valid string."
msgstr ""
#: /Applications/Splunk/etc/apps/SA-ITOA/bin/itsi_async_csv_loader.py:178
#: /Applications/Splunk/etc/apps/SA-ITOA/bin/itsi_csv_import.py:212
msgid ""
"Instructions on how to update existing records. If APPEND, all records "
"are treated as new records. If UPSERT, new information is added to "
"records with matching title fields. If REPLACE, new records will replace "
"old records when an existing match on the title field is found."
msgstr ""
#: /Applications/Splunk/etc/apps/SA-ITOA/bin/deep_dive_services.py:49
msgid "Insufficient arguments provided."
msgstr ""
#: /Applications/Splunk/etc/apps/SA-ITOA/lib/itsi/objects/itsi_entity.py:333
msgid "Integrity failure: Attempt to overwrite reserved word."
msgstr ""
#: /Applications/Splunk/etc/apps/SA-ITOA/lib/itsi/objects/itsi_entity.py:327
msgid "Integrity failure: Duplicate field names."
msgstr ""
#: /Applications/Splunk/etc/apps/SA-ITOA/lib/itsi/objects/itsi_entity.py:340
msgid "Integrity failure: Values collections are not congruent."
msgstr ""
#: /Applications/Splunk/etc/apps/SA-ITOA/lib/itsi/event_management/event_management_rest_provider.py:162
#: /Applications/Splunk/etc/apps/SA-ITOA/lib/itsi/event_management/event_management_rest_provider.py:258
#: /Applications/Splunk/etc/apps/SA-ITOA/lib/itsi/event_management/event_management_rest_provider.py:278
#: /Applications/Splunk/etc/apps/SA-ITOA/lib/itsi/itoa_rest_interface_provider/itoa_rest_interface_provider.py:258
#: /Applications/Splunk/etc/apps/SA-ITOA/lib/itsi/itoa_rest_interface_provider/itoa_rest_interface_provider.py:372
#: /Applications/Splunk/etc/apps/SA-ITOA/lib/itsi/itoa_rest_interface_provider/itoa_rest_interface_provider.py:392
msgid ""
"Internal Exception. Input: `{0}` Method: `{1}`. Check the logs for "
"details."
msgstr ""
#: /Applications/Splunk/etc/apps/SA-ITOA/lib/itsi/searches/itsi_searches.py:651
msgid "Invalid \"kpi\". Expecting a dictionary."
msgstr ""
#: /Applications/Splunk/etc/apps/SA-ITOA/lib/itsi/objects/itsi_service.py:1888
#, python-format
msgid "Invalid %s anomaly detection sensitivity specified, must be integer."
msgstr ""
#: /Applications/Splunk/etc/apps/SA-ITOA/lib/itsi/objects/itsi_service.py:1876
#, python-format
msgid "Invalid %s anomaly detection settings specified."
msgstr ""
#: /Applications/Splunk/etc/apps/SA-ITOA/lib/itsi/objects/itsi_security_group.py:297
msgid "Invalid ACLs in the team. Team cannot be created."
msgstr ""
#: /Applications/Splunk/etc/apps/SA-ITOA/lib/SA_ITOA_app_common/solnlib/packages/schematics/types/net.py:65
#, python-format
msgid "Invalid IP%s address"
msgstr ""
#: /Applications/Splunk/etc/apps/SA-ITOA/lib/ITOA/event_management/base_event_management.py:269
msgid "Invalid JSON list to do bulk create."
msgstr ""
#: /Applications/Splunk/etc/apps/SA-ITOA/lib/itsi/objects/itsi_kpi_base_search.py:506
#, python-format
msgid ""
"Invalid KPI base search entity_breakdown_id_fields for %s. Cannot contain"
" more than one value."
msgstr ""
#: /Applications/Splunk/etc/apps/SA-ITOA/lib/itsi/objects/itsi_kpi_base_search.py:489
#, python-format
msgid ""
"Invalid KPI base search entity_id_fields for %s. Cannot contain more than"
" one value."
msgstr ""
#: /Applications/Splunk/etc/apps/SA-ITOA/lib/itsi/itsi_time_block_utils.py:79
#: /Applications/Splunk/etc/apps/SA-ITOA/lib/itsi/set_severity_fields.py:408
msgid "Invalid KPI policies: {0}. Expected dict to not be empty."
msgstr ""
#: /Applications/Splunk/etc/apps/SA-ITOA/lib/itsi/itsi_time_block_utils.py:74
#: /Applications/Splunk/etc/apps/SA-ITOA/lib/itsi/set_severity_fields.py:403
msgid "Invalid KPI policies: {0}. Expected dict."
msgstr ""
#: /Applications/Splunk/etc/apps/SA-ITOA/lib/itsi/objects/itsi_kpi_threshold_template.py:58
msgid ""
"Invalid KPI threshold template policy title specified. Specified invalid "
"title: \"{0}\""
msgstr ""
#: /Applications/Splunk/etc/apps/SA-ITOA/lib/itsi/objects/itsi_kpi_threshold_template.py:163
msgid ""
"Invalid KPI threshold template specified. KPI threshold templates must be"
" dictionaries."
msgstr ""
#: /Applications/Splunk/etc/apps/SA-ITOA/lib/itsi/itsi_time_block_utils.py:68
#: /Applications/Splunk/etc/apps/SA-ITOA/lib/itsi/set_severity_fields.py:397
msgid "Invalid KPI threshold_spec: {0}. Expected dict."
msgstr ""
#: /Applications/Splunk/etc/apps/SA-ITOA/lib/SA_ITOA_app_common/solnlib/packages/schematics/types/net.py:113
msgid "Invalid MAC address"
msgstr ""
#: /Applications/Splunk/etc/apps/SA-ITOA/bin/itoa_rest_interface_splunkd.py:751
msgid "Invalid REST args received by ITOA interface - {}"
msgstr ""
#: /Applications/Splunk/etc/apps/SA-ITOA/bin/itsi_module_interface_splunkd.py:356
msgid "Invalid REST args received by ITSI module interface - {}"
msgstr ""
#: /Applications/Splunk/etc/apps/SA-ITOA/bin/backup_restore_interface_splunkd.py:221
msgid "Invalid REST args received by backup restore interface - {}"
msgstr ""
#: /Applications/Splunk/etc/apps/SA-ITOA/bin/event_management_interface_splunkd.py:460
msgid "Invalid REST args received by event management interface - {}"
msgstr ""
#: /Applications/Splunk/etc/apps/SA-ITOA/bin/maintenance_services_interface_splunkd.py:205
msgid "Invalid REST args received by maintenance services interface - {}"
msgstr ""
#: /Applications/Splunk/etc/apps/SA-ITOA/bin/notable_event_ace_interface_splunkd.py:59
msgid "Invalid REST method and path"
msgstr ""
#: /Applications/Splunk/etc/apps/SA-ITOA/bin/itoa_rest_interface_splunkd.py:770
msgid "Invalid REST path received by ITOA interface - {}"
msgstr ""
#: /Applications/Splunk/etc/apps/SA-ITOA/bin/itsi_module_interface_splunkd.py:362
msgid "Invalid REST path received by ITSI module interface - {}"
msgstr ""
#: /Applications/Splunk/etc/apps/SA-ITOA/bin/backup_restore_interface_splunkd.py:235
msgid "Invalid REST path received by backup restore interface - {}"
msgstr ""
#: /Applications/Splunk/etc/apps/SA-ITOA/bin/event_management_interface_splunkd.py:476
msgid "Invalid REST path received by event management interface - {}"
msgstr ""
#: /Applications/Splunk/etc/apps/SA-ITOA/bin/maintenance_services_interface_splunkd.py:221
msgid "Invalid REST path received by maintenance services interface - {}"
msgstr ""
#: /Applications/Splunk/etc/apps/SA-ITOA/lib/itsi/objects/itsi_service.py:1899
msgid "Invalid Service Health KPI count. Expecting 1. Found {0}."
msgstr ""
#: /Applications/Splunk/etc/apps/SA-ITOA/lib/SA_ITOA_app_common/solnlib/packages/schematics/types/base.py:386
msgid "Invalid UTF-8 data."
msgstr ""
#: /Applications/Splunk/etc/apps/SA-ITOA/lib/itsi/objects/itsi_service.py:984
#, python-format
msgid "Invalid `change_type` argument: %s."
msgstr ""
#: /Applications/Splunk/etc/apps/SA-ITOA/lib/ITOA/event_management/notable_event_actions.py:141
msgid "Invalid action name"
msgstr ""
#: /Applications/Splunk/etc/apps/SA-ITOA/lib/ITOA/event_management/notable_event_actions.py:987
#, python-format
msgid "Invalid action. This action: `%s` is not allowed for notable event."
msgstr ""
#: /Applications/Splunk/etc/apps/SA-ITOA/lib/ITOA/event_management/notable_event_ticketing.py:384
msgid "Invalid action_name"
msgstr ""
#: /Applications/Splunk/etc/apps/SA-ITOA/lib/ITOA/event_management/notable_event_actions.py:492
#, python-format
msgid "Invalid action_name %s"
msgstr ""
#: /Applications/Splunk/etc/apps/SA-ITOA/lib/itsi/searches/compute_health_score.py:712
msgid "Invalid alert ret_value={0}, for level={1}."
msgstr ""
#: /Applications/Splunk/etc/apps/SA-ITOA/lib/itsi/objects/itsi_kpi.py:401
#: /Applications/Splunk/etc/apps/SA-ITOA/lib/itsi/searches/itsi_shared_base_search.py:191
msgid ""
"Invalid alert_lag passed to saved search management, must be below 30 "
"minutes"
msgstr ""
#: /Applications/Splunk/etc/apps/SA-ITOA/lib/itsi/objects/itsi_kpi.py:657
msgid ""
"Invalid alert_lag, must be a positive integer less than 1800 (in s = 30 "
"minutes)."
msgstr ""
#: /Applications/Splunk/etc/apps/SA-ITOA/lib/itsi/objects/itsi_kpi.py:664
msgid ""
"Invalid alert_lag, must be a positive integer less than 1800 (in s = 30 "
"minutes). Specified: {0}"
msgstr ""
#: /Applications/Splunk/etc/apps/SA-ITOA/lib/ITOA/event_management/hec_utils.py:72
msgid "Invalid app value."
msgstr ""
#: /Applications/Splunk/etc/apps/SA-ITOA/lib/ITOA/event_management/hec_utils.py:70
msgid "Invalid app. Expecting string."
msgstr ""
#: /Applications/Splunk/etc/apps/SA-ITOA/lib/ITOA/rest_interface_provider_base.py:270
msgid "Invalid args received by extract_rest_args. args: {}, field: {}"
msgstr ""
#: /Applications/Splunk/etc/apps/SA-ITOA/bin/command_getservice.py:37
#: /Applications/Splunk/etc/apps/SA-ITOA/bin/command_health_monitor.py:31
#: /Applications/Splunk/etc/apps/SA-ITOA/bin/command_token_replacement.py:37
#: /Applications/Splunk/etc/apps/SA-ITOA/bin/command_token_replacement.py:49
#: /Applications/Splunk/etc/apps/SA-ITOA/lib/itsi/suppress_alert.py:35
#: /Applications/Splunk/etc/apps/SA-ITOA/lib/itsi/suppress_alert.py:51
#, python-format
msgid "Invalid argument '%s'."
msgstr ""
#: /Applications/Splunk/etc/apps/SA-ITOA/bin/command_token_replacement.py:42
#: /Applications/Splunk/etc/apps/SA-ITOA/lib/itsi/suppress_alert.py:40
#, python-format
msgid "Invalid argument value '%s', it should be a valid value."
msgstr ""
#: /Applications/Splunk/etc/apps/SA-ITOA/lib/itsi/suppress_alert.py:47
#, python-format
msgid "Invalid argument value '%s', it should not be non-zero value."
msgstr ""
#: /Applications/Splunk/etc/apps/SA-ITOA/lib/itsi/objects/itsi_service.py:1447
#, python-format
msgid ""
"Invalid base_service_template_id provided for KPI. A service can be "
"linked to only one service template. service_id=\"%s\", kpi_id=\"%s\", "
"service_base_template_id=\"%s\", kpi_base_template_id=\"%s\""
msgstr ""
#: /Applications/Splunk/etc/apps/SA-ITOA/lib/itsi/itsi_time_block_utils.py:650
msgid ""
"Invalid character in cron element: {0}. Expected int, \"*\", \",\", or "
"\"-\"."
msgstr ""
#: /Applications/Splunk/etc/apps/SA-ITOA/lib/ITOA/event_management/base_event_management.py:100
msgid "Invalid collection name"
msgstr ""
#: /Applications/Splunk/etc/apps/SA-ITOA/lib/itsi/event_management/correlation_search_generation.py:57
msgid "Invalid correlation search type:{0}"
msgstr ""
#: /Applications/Splunk/etc/apps/SA-ITOA/lib/ITOA/itoa_object.py:259
msgid "Invalid create payload found, must be a valid JSON dictionary."
msgstr ""
#: /Applications/Splunk/etc/apps/SA-ITOA/lib/itsi/itsi_time_block_utils.py:722
msgid "Invalid cron element number: {0}. Expected positive int."
msgstr ""
#: /Applications/Splunk/etc/apps/SA-ITOA/lib/itsi/itsi_time_block_utils.py:571
#: /Applications/Splunk/etc/apps/SA-ITOA/lib/itsi/itsi_time_block_utils.py:639
msgid "Invalid cron element type: {0}. Expected value in list: {1}."
msgstr ""
#: /Applications/Splunk/etc/apps/SA-ITOA/lib/itsi/itsi_time_block_utils.py:661
msgid "Invalid cron element: {0} for cron element type: {1}. Expected int."
msgstr ""
#: /Applications/Splunk/etc/apps/SA-ITOA/lib/itsi/itsi_time_block_utils.py:680
msgid "Invalid cron element: {0}. Unable to parse range for: {1}."
msgstr ""
#: /Applications/Splunk/etc/apps/SA-ITOA/lib/itsi/itsi_time_block_utils.py:608
msgid ""
"Invalid cron number: {0}, for cron element type: {1}. Expected value in "
"range: {2} - {3}."
msgstr ""
#: /Applications/Splunk/etc/apps/SA-ITOA/lib/itsi/itsi_time_block_utils.py:598
msgid "Invalid cron number: {0}. Expected int."
msgstr ""
#: /Applications/Splunk/etc/apps/SA-ITOA/lib/itsi/objects/itsi_service_template.py:88
msgid ""
"Invalid data for creating service template from service. Expected a JSON "
"object, received {}."
msgstr ""
#: /Applications/Splunk/etc/apps/SA-ITOA/lib/itsi/objects/itsi_service_template.py:82
msgid ""
"Invalid data for creating the service template. Expected a list of JSON "
"objects, received {}."
msgstr ""
#: /Applications/Splunk/etc/apps/SA-ITOA/lib/ITOA/event_management/notable_event_actions.py:524
msgid "Invalid data for refresh."
msgstr ""
#: /Applications/Splunk/etc/apps/SA-ITOA/lib/ITOA/event_management/notable_event_seed_group.py:58
msgid "Invalid data for search data conversion to seed group"
msgstr ""
#: /Applications/Splunk/etc/apps/SA-ITOA/lib/itsi/event_management/event_management_services.py:500
msgid "Invalid data format, data can be either dict or list. {}"
msgstr ""
#: /Applications/Splunk/etc/apps/SA-ITOA/lib/ITOA/event_management/correlation_search.py:311
msgid "Invalid data list, type={0}."
msgstr ""
#: /Applications/Splunk/etc/apps/SA-ITOA/lib/ITOA/event_management/notable_event_actions.py:393
#: /Applications/Splunk/etc/apps/SA-ITOA/lib/ITOA/event_management/notable_event_actions.py:576
msgid "Invalid data so cannot perform actions."
msgstr ""
#: /Applications/Splunk/etc/apps/SA-ITOA/lib/itsi/event_management/itsi_correlation_search.py:100
msgid "Invalid data, type {0}"
msgstr ""
#: /Applications/Splunk/etc/apps/SA-ITOA/lib/ITOA/event_management/notable_event_actions.py:486
msgid "Invalid data."
msgstr ""
#: /Applications/Splunk/etc/apps/SA-ITOA/lib/itsi/objects/itsi_service_template.py:345
msgid "Invalid datamodel defined for KPI {}"
msgstr ""
#: /Applications/Splunk/etc/apps/SA-ITOA/lib/itsi/objects/itsi_service.py:1835
msgid ""
"Invalid datamodel specification in {0} \"{1}\" for kpi \"{2}\". Datamodel"
" info: {3}"
msgstr ""
#: /Applications/Splunk/etc/apps/SA-ITOA/lib/itsi/itsi_time_block_utils.py:179
msgid "Invalid duration: {0}. Expected value in range: {1} - {2}."
msgstr ""
#: /Applications/Splunk/etc/apps/SA-ITOA/lib/itsi/event_management/event_management_rest_provider.py:838
#, python-format
msgid "Invalid entity ID received from MAD: %s."
msgstr ""
#: /Applications/Splunk/etc/apps/SA-ITOA/lib/ITOA/event_management/notable_event_seed_group.py:72
msgid "Invalid factor for seed group"
msgstr ""
#: /Applications/Splunk/etc/apps/SA-ITOA/lib/itsi/csv_import/itoa_bulk_import_specification.py:425
msgid "Invalid field mapping \"{}\"; reserved word."
msgstr ""
#: /Applications/Splunk/etc/apps/SA-ITOA/lib/itsi/objects/itsi_entity.py:69
msgid "Invalid field name specified, field is required."
msgstr ""
#: /Applications/Splunk/etc/apps/SA-ITOA/lib/itsi/objects/itsi_entity.py:80
msgid ""
"Invalid field names specified; {0}. Fields cannot be an internal "
"keywords: {1}."
msgstr ""
#: /Applications/Splunk/etc/apps/SA-ITOA/lib/itsi/objects/itsi_entity.py:74
msgid ""
"Invalid field names specified; {}. Fields cannot contain special "
"characters not supported by SPL."
msgstr ""
#: /Applications/Splunk/etc/apps/SA-ITOA/lib/itsi/csv_import/itoa_bulk_import_specification.py:467
msgid ""
"Invalid fieldnames in Bulk Import Specification. Fieldnames cannot "
"contain quotes or equals: {}."
msgstr ""
#: /Applications/Splunk/etc/apps/SA-ITOA/lib/ITOA/event_management/base_event_management.py:154
msgid "Invalid filter data to merge"
msgstr ""
#: /Applications/Splunk/etc/apps/SA-ITOA/lib/itsi/objects/itsi_event_management_state.py:53
msgid ""
"Invalid filterCollection list specified. Specify a valid filterCollection"
" list."
msgstr ""
#: /Applications/Splunk/etc/apps/SA-ITOA/lib/ITOA/version_check.py:63
#, python-format
msgid "Invalid format for `dest_version`:%s."
msgstr ""
#: /Applications/Splunk/etc/apps/SA-ITOA/lib/ITOA/version_check.py:65
#, python-format
msgid "Invalid format for `src_version`:%s."
msgstr ""
#: /Applications/Splunk/etc/apps/SA-ITOA/lib/ITOA/event_management/notable_event.py:916
msgid "Invalid group_id=\"{}\" or fields_to_update=\"{}\" or filter=\"{}\"."
msgstr ""
#: /Applications/Splunk/etc/apps/SA-ITOA/bin/itsi_sample_event_action_ping.py:153
#, python-format
msgid "Invalid host to ping. Received=`%s`. Type=`%s`"
msgstr ""
#: /Applications/Splunk/etc/apps/SA-ITOA/lib/ITOA/event_management/notable_event_ticketing.py:214
#, python-format
msgid "Invalid ids list. Received=`%s`. Type=`%s`."
msgstr ""
#: /Applications/Splunk/etc/apps/SA-ITOA/lib/ITOA/event_management/notable_event_actions.py:777
#, python-format
msgid "Invalid ids. Expecting valid list. Received=`%s`."
msgstr ""
#: /Applications/Splunk/etc/apps/SA-ITOA/lib/ITOA/event_management/notable_event_actions.py:682
msgid ""
"Invalid ids={0} to perform action. List must have at-leastone action to "
"perform action."
msgstr ""
#: /Applications/Splunk/etc/apps/SA-ITOA/lib/itsi/objects/itsi_entity.py:172
#, python-format
msgid ""
"Invalid informational field(s) specified for entity . Some of the info "
"fields conflict with identifier fields. entity_title=\"%s\". "
"conflicting_info_fields=\"%s\""
msgstr ""
#: /Applications/Splunk/etc/apps/SA-ITOA/lib/migration/object_interface/base_migration_interface.py:123
#, python-format
msgid "Invalid input data, expected list but received %s."
msgstr ""
#: /Applications/Splunk/etc/apps/SA-ITOA/lib/itsi/upgrade/itsi_migration.py:1523
msgid "Invalid instance type for metadata. Must be a valid dictionary."
msgstr ""
#: /Applications/Splunk/etc/apps/SA-ITOA/lib/itsi/objects/itsi_service.py:1808
msgid ""
"Invalid key specified for KPI, Eg. {}. Key cannot contain special "
"characters not supported by SPL. Key could also not be reserved words "
"like service_aggregate or N/A."
msgstr ""
#: /Applications/Splunk/etc/apps/SA-ITOA/bin/command_storeentities.py:53
#, python-format
msgid "Invalid key specified: %s."
msgstr ""
#: /Applications/Splunk/etc/apps/SA-ITOA/lib/ITOA/event_management/base_event_management.py:307
#: /Applications/Splunk/etc/apps/SA-ITOA/lib/ITOA/event_management/notable_event.py:355
#, python-format
msgid "Invalid key to get object, value=%s."
msgstr ""
#: /Applications/Splunk/etc/apps/SA-ITOA/lib/itsi/objects/itsi_service_template.py:71
msgid ""
"Invalid kpi type for {} service template. Expected only shared base "
"search kpis, received {}."
msgstr ""
#: /Applications/Splunk/etc/apps/SA-ITOA/bin/command_set_severity_fields.py:128
msgid "Invalid kpiid argument"
msgstr ""
#: /Applications/Splunk/etc/apps/SA-ITOA/lib/itsi/itsi_time_block_utils.py:711
msgid "Invalid list of CRON element numbers: {0}. Expected at least one number."
msgstr ""
#: /Applications/Splunk/etc/apps/SA-ITOA/lib/ITOA/event_management/notable_event_actions.py:527
msgid "Invalid list of ids for refresh."
msgstr ""
#: /Applications/Splunk/etc/apps/SA-ITOA/lib/ITOA/event_management/notable_event_utils.py:725
msgid "Invalid logger object"
msgstr ""
#: /Applications/Splunk/etc/apps/SA-ITOA/lib/itsi/event_management/event_management_rest_provider.py:634
#, python-format
msgid "Invalid method \"%s\". Only DELETE method is valid."
msgstr ""
#: /Applications/Splunk/etc/apps/SA-ITOA/lib/itsi/event_management/event_management_rest_provider.py:540
#, python-format
msgid "Invalid method \"%s\". Valid method is GET."
msgstr ""
#: /Applications/Splunk/etc/apps/SA-ITOA/lib/itsi/event_management/event_management_rest_provider.py:474
#: /Applications/Splunk/etc/apps/SA-ITOA/lib/itsi/event_management/event_management_rest_provider.py:557
#, python-format
msgid "Invalid method \"%s\". Valid methods are GET and POST."
msgstr ""
#: /Applications/Splunk/etc/apps/SA-ITOA/lib/itsi/event_management/event_management_rest_provider.py:606
#, python-format
msgid "Invalid method \"%s\". Valid methods are GET, POST and PUT."
msgstr ""
#: /Applications/Splunk/etc/apps/SA-ITOA/lib/itsi/event_management/event_management_rest_provider.py:639
#: /Applications/Splunk/etc/apps/SA-ITOA/lib/itsi/event_management/event_management_rest_provider.py:703
#: /Applications/Splunk/etc/apps/SA-ITOA/lib/itsi/event_management/event_management_rest_provider.py:767
#: /Applications/Splunk/etc/apps/SA-ITOA/lib/itsi/event_management/event_management_rest_provider.py:876
#, python-format
msgid "Invalid method \"%s\". Valid methods are POST and PUT."
msgstr ""
#: /Applications/Splunk/etc/apps/SA-ITOA/lib/itsi/event_management/event_management_rest_provider.py:434
msgid "Invalid method \"{}\". Valid methods are GET, POST, PUT and DELETE."
msgstr ""
#: /Applications/Splunk/etc/apps/SA-ITOA/lib/itsi/objects/itsi_entity.py:269
msgid "Invalid method name {0} received"
msgstr ""
#: /Applications/Splunk/etc/apps/SA-ITOA/lib/itsi/backup_restore/backup_restore_rest_provider.py:456
msgid "Invalid method. Valid methods are GET, POST and DELETE."
msgstr ""
#: /Applications/Splunk/etc/apps/SA-ITOA/lib/itsi/backup_restore/backup_restore_rest_provider.py:232
#: /Applications/Splunk/etc/apps/SA-ITOA/lib/itsi/backup_restore/backup_restore_rest_provider.py:352
msgid "Invalid method. Valid methods are GET, POST, PUT and DELETE."
msgstr ""
#: /Applications/Splunk/etc/apps/SA-ITOA/lib/ITOA/event_management/correlation_search.py:260
msgid "Invalid object list, type is {0}."
msgstr ""
#: /Applications/Splunk/etc/apps/SA-ITOA/lib/itsi/event_management/event_management_rest_provider.py:329
#: /Applications/Splunk/etc/apps/SA-ITOA/lib/itsi/event_management/event_management_rest_provider.py:426
msgid "Invalid object type \"{}\", does not support DELETE."
msgstr ""
#: /Applications/Splunk/etc/apps/SA-ITOA/lib/itsi/event_management/event_management_rest_provider.py:310
msgid "Invalid object type \"{}\", supported object types are {}."
msgstr ""
#: /Applications/Splunk/etc/apps/SA-ITOA/lib/itsi/backup_restore/backup_restore_rest_provider.py:209
#: /Applications/Splunk/etc/apps/SA-ITOA/lib/itsi/backup_restore/backup_restore_rest_provider.py:262
#: /Applications/Splunk/etc/apps/SA-ITOA/lib/itsi/backup_restore/backup_restore_rest_provider.py:329
#, python-format
msgid "Invalid object type, supported object types are %s."
msgstr ""
#: /Applications/Splunk/etc/apps/SA-ITOA/lib/maintenance_services/objects/maintenance_calendar.py:642
msgid "Invalid object types specified. Supported object types are: "
msgstr ""
#: /Applications/Splunk/etc/apps/SA-ITOA/lib/itsi/objects/itsi_kpi.py:136
#, python-format
msgid ""
"Invalid option provided to fill data gaps for object \"%s\". "
"option_provided=\"%s\", supported_options=\"%s\", %s_key=\"%s\""
msgstr ""
#: /Applications/Splunk/etc/apps/SA-ITOA/bin/command_fill_gaps_backfill.py:64
msgid ""
"Invalid options passed to \"fillgapsbackfill\" command; must have alert "
"period and kpi type or entity split field."
msgstr ""
#: /Applications/Splunk/etc/apps/SA-ITOA/bin/command_set_severity_fields.py:121
msgid ""
"Invalid options passed to command; must have service and kpi or kpi base "
"search"
msgstr ""
#: /Applications/Splunk/etc/apps/SA-ITOA/lib/itsi/itoa_rest_interface_provider/itoa_rest_interface_provider.py:1401
msgid ""
"Invalid or missing query param \"entity_identifier\" or \"entity_key\". "
"Expecting non-empty string for entity_identifier or entity_key."
msgstr ""
#: /Applications/Splunk/etc/apps/SA-ITOA/lib/itsi/itoa_rest_interface_provider/itoa_rest_interface_provider.py:1057
msgid ""
"Invalid or missing query param \"service_id\". Expecting non-empty string"
" for service identifier."
msgstr ""
#: /Applications/Splunk/etc/apps/SA-ITOA/lib/itsi/itoa_rest_interface_provider/itoa_rest_interface_provider.py:776
msgid "Invalid or missing service link map. Payload received: {}"
msgstr ""
#: /Applications/Splunk/etc/apps/SA-ITOA/lib/itsi/itoa_rest_interface_provider/itoa_rest_interface_provider.py:786
msgid "Invalid overwrite_entity_rules. Payload received: {}."
msgstr ""
#: /Applications/Splunk/etc/apps/SA-ITOA/lib/itsi/event_management/utils.py:94
msgid ""
"Invalid owner={0} for event title={1}. Unable to find owner in valid "
"Splunk user list, hence setting to default owner={2}."
msgstr ""
#: /Applications/Splunk/etc/apps/SA-ITOA/bin/notable_event_ace_interface_splunkd.py:53
msgid "Invalid parameters recieved from splunkd rest request"
msgstr ""
#: /Applications/Splunk/etc/apps/SA-ITOA/lib/itsi/upgrade/kvstore_backup_restore.py:1214
msgid "Invalid partial backup rule. Must provide a valid rule."
msgstr ""
#: /Applications/Splunk/etc/apps/SA-ITOA/lib/ITOA/itoa_common.py:168
#, python-format
msgid "Invalid path element. %s"
msgstr ""
#: /Applications/Splunk/etc/apps/SA-ITOA/lib/itsi/objects/itsi_kpi.py:443
msgid ""
"Invalid percentile value enter, the value must be a whole number between "
"1 and 99."
msgstr ""
#: /Applications/Splunk/etc/apps/SA-ITOA/lib/itsi/access_control/access_control_controller_utils.py:283
msgid "Invalid r_data: {} type: {}"
msgstr ""
#: /Applications/Splunk/etc/apps/SA-ITOA/lib/itsi/itsi_time_block_utils.py:577
msgid ""
"Invalid range for cron element type: {0}. Expected [<int>, <int>], found:"
" {1}."
msgstr ""
#: /Applications/Splunk/etc/apps/SA-ITOA/lib/itsi/searches/itsi_filter.py:330
msgid "Invalid range requested. offset: {0}, count: {1}, result set count: {2}"
msgstr ""
#: /Applications/Splunk/etc/apps/SA-ITOA/lib/ITOA/storage/itoa_generic_persistables.py:76
msgid "Invalid response received from the backend."
msgstr ""
#: /Applications/Splunk/etc/apps/SA-ITOA/lib/itsi/event_management/itsi_notable_event_retention_policy.py:76
msgid "Invalid retention object count={0}, expected key={1}."
msgstr ""
#: /Applications/Splunk/etc/apps/SA-ITOA/lib/itsi/searches/kpi_summary_cache_retention_policy.py:46
#, python-format
msgid "Invalid retention time provided. retention_time=\"%s\""
msgstr ""
#: /Applications/Splunk/etc/apps/SA-ITOA/lib/itsi/event_management/itsi_notable_event_retention_policy.py:50
msgid "Invalid retention time={0}, expected key={1}."
msgstr ""
#: /Applications/Splunk/etc/apps/SA-ITOA/lib/ITOA/event_management/correlation_search.py:434
msgid "Invalid search list. Provided type={0}."
msgstr ""
#: /Applications/Splunk/etc/apps/SA-ITOA/lib/ITOA/event_management/correlation_search.py:458
msgid "Invalid search name. Search name is required."
msgstr ""
#: /Applications/Splunk/etc/apps/SA-ITOA/lib/itsi/objects/itsi_service.py:582
#, python-format
msgid "Invalid service in service list %s."
msgstr ""
#: /Applications/Splunk/etc/apps/SA-ITOA/lib/itsi/objects/changehandlers/kpi_thresholds_template_delete_handler.py:68
#: /Applications/Splunk/etc/apps/SA-ITOA/lib/itsi/objects/changehandlers/kpi_thresholds_template_update_handler.py:81
msgid "Invalid service list"
msgstr ""
#: /Applications/Splunk/etc/apps/SA-ITOA/lib/itsi/objects/itsi_service.py:1292
msgid ""
"Invalid service template id provided while updating service `{0}`. Cannot"
" re-link service to another service template through this endpoint, check"
" ITSI API docs to find API for re-linking of service to another service "
"template. Expected service template id `{1}`, found `{2}`"
msgstr ""
#: /Applications/Splunk/etc/apps/SA-ITOA/lib/itsi/itoa_rest_interface_provider/itoa_rest_interface_provider.py:779
msgid "Invalid service template key. Payload received: {}"
msgstr ""
#: /Applications/Splunk/etc/apps/SA-ITOA/lib/itsi/objects/changehandlers/kpi_thresholds_template_update_handler.py:83
msgid "Invalid service templates list"
msgstr ""
#: /Applications/Splunk/etc/apps/SA-ITOA/bin/command_set_severity_fields.py:133
msgid "Invalid serviceid argument"
msgstr ""
#: /Applications/Splunk/etc/apps/SA-ITOA/lib/ITOA/event_management/hec_utils.py:60
msgid "Invalid session key type. Expecting string."
msgstr ""
#: /Applications/Splunk/etc/apps/SA-ITOA/lib/ITOA/event_management/base_event_management.py:84
#: /Applications/Splunk/etc/apps/SA-ITOA/lib/ITOA/event_management/correlation_search.py:60
#: /Applications/Splunk/etc/apps/SA-ITOA/lib/ITOA/event_management/hec_utils.py:62
#: /Applications/Splunk/etc/apps/SA-ITOA/lib/ITOA/event_management/notable_event_utils.py:277
#: /Applications/Splunk/etc/apps/SA-ITOA/lib/ITOA/event_management/notable_event_utils.py:545
#: /Applications/Splunk/etc/apps/SA-ITOA/lib/ITOA/event_management/notable_event_utils.py:723
#: /Applications/Splunk/etc/apps/SA-ITOA/lib/ITOA/itoa_common.py:216
#: /Applications/Splunk/etc/apps/SA-ITOA/lib/ITOA/itoa_common.py:236
#: /Applications/Splunk/etc/apps/SA-ITOA/lib/itsi/event_management/utils.py:504
#: /Applications/Splunk/etc/apps/SA-ITOA/lib/itsi/event_management/utils.py:579
msgid "Invalid session key."
msgstr ""
#: /Applications/Splunk/etc/apps/SA-ITOA/lib/itsi/event_management/utils.py:114
msgid ""
"Invalid severity={0} for event title={1}. Unable to find severity in "
"itsi_notable_event_severity.conf, hence setting to default severity={2}."
msgstr ""
#: /Applications/Splunk/etc/apps/SA-ITOA/lib/itsi/csv_import/itoa_bulk_import_specification.py:135
msgid ""
"Invalid specification - No object specification found in input. Received "
"- {0}."
msgstr ""
#: /Applications/Splunk/etc/apps/SA-ITOA/lib/itsi/csv_import/itoa_bulk_import_specification.py:496
msgid "Invalid specification: The title field is specified as a duplicate of {}."
msgstr ""
#: /Applications/Splunk/etc/apps/SA-ITOA/lib/itsi/csv_import/itoa_bulk_import_specification.py:483
msgid "Invalid specification: The title field is specified multiple times."
msgstr ""
#: /Applications/Splunk/etc/apps/SA-ITOA/lib/itsi/event_management/utils.py:104
msgid ""
"Invalid status={0} for event title={1}. Unable to find status in "
"itsi_notable_event_status.conf, hence setting to default status={2}."
msgstr ""
#: /Applications/Splunk/etc/apps/SA-ITOA/lib/itsi/itsi_time_block_utils.py:206
msgid "Invalid time block cron: {0}. Expected {1} elements, received {2}."
msgstr ""
#: /Applications/Splunk/etc/apps/SA-ITOA/lib/ITOA/itoa_object.py:151
#: /Applications/Splunk/etc/apps/SA-ITOA/lib/itsi/objects/itsi_entity.py:43
#, python-format
msgid ""
"Invalid title specified for the object_type: %s. Cannot be empty and "
"cannot contain = \" or '."
msgstr ""
#: /Applications/Splunk/etc/apps/SA-ITOA/lib/ITOA/event_management/hec_utils.py:65
msgid "Invalid token name type. Expecting string."
msgstr ""
#: /Applications/Splunk/etc/apps/SA-ITOA/lib/ITOA/event_management/hec_utils.py:67
msgid "Invalid token name value."
msgstr ""
#: /Applications/Splunk/etc/apps/SA-ITOA/lib/itsi/itsi_time_block_utils.py:706
msgid "Invalid type \"{0}\" for CRON element numbers: {1}. Expected list."
msgstr ""
#: /Applications/Splunk/etc/apps/SA-ITOA/lib/itsi/itsi_time_block_utils.py:634
msgid "Invalid type \"{0}\" for cron element: {1}. Expected basestring."
msgstr ""
#: /Applications/Splunk/etc/apps/SA-ITOA/lib/itsi/itsi_time_block_utils.py:171
msgid "Invalid type \"{0}\" for duration: {1}. Expected int."
msgstr ""
#: /Applications/Splunk/etc/apps/SA-ITOA/lib/itsi/itsi_time_block_utils.py:200
msgid "Invalid type \"{0}\" for time block cron: {1}. Expected basestring."
msgstr ""
#: /Applications/Splunk/etc/apps/SA-ITOA/lib/ITOA/event_management/notable_event_ticketing.py:145
msgid "Invalid type `app`."
msgstr ""
#: /Applications/Splunk/etc/apps/SA-ITOA/lib/ITOA/event_management/notable_event_ticketing.py:137
msgid "Invalid type `collection`."
msgstr ""
#: /Applications/Splunk/etc/apps/SA-ITOA/lib/ITOA/event_management/notable_event_ticketing.py:129
msgid "Invalid type `event_id`."
msgstr ""
#: /Applications/Splunk/etc/apps/SA-ITOA/lib/ITOA/event_management/notable_event_ticketing.py:141
msgid "Invalid type `ns`."
msgstr ""
#: /Applications/Splunk/etc/apps/SA-ITOA/lib/ITOA/event_management/notable_event_ticketing.py:133
msgid "Invalid type `session_key`."
msgstr ""
#: /Applications/Splunk/etc/apps/SA-ITOA/lib/ITOA/event_management/notable_event_ticketing.py:530
#: /Applications/Splunk/etc/apps/SA-ITOA/lib/ITOA/event_management/notable_event_ticketing.py:656
#, python-format
msgid "Invalid type event_ids. Received=%s."
msgstr ""
#: /Applications/Splunk/etc/apps/SA-ITOA/lib/itsi/searches/itsi_searches.py:253
msgid "Invalid type for \"kpi_id\". Expecting non-empty string."
msgstr ""
#: /Applications/Splunk/etc/apps/SA-ITOA/lib/itsi/event_management/itsi_notable_event_queue_consumer.py:90
msgid ""
"Invalid type for \"{}\". Expecting string type. Received value=\"{}\" "
"type=\"{}\""
msgstr ""
#: /Applications/Splunk/etc/apps/SA-ITOA/lib/itsi/objects/itsi_service.py:1755
#, python-format
msgid "Invalid type for KPI. Expected JSON, received %s."
msgstr ""
#: /Applications/Splunk/etc/apps/SA-ITOA/lib/itsi/objects/itsi_kpi.py:325
msgid "Invalid type for KPI. Expecting a dictionary."
msgstr ""
#: /Applications/Splunk/etc/apps/SA-ITOA/lib/itsi/objects/itsi_service.py:1748
#, python-format
msgid "Invalid type for KPIs. Expected list, received %s."
msgstr ""
#: /Applications/Splunk/etc/apps/SA-ITOA/lib/ITOA/event_management/rules_engine/clause.py:33
#, python-format
msgid "Invalid type for `clause`. expecting: dict received type=%s."
msgstr ""
#: /Applications/Splunk/etc/apps/SA-ITOA/lib/itsi/event_management/sdk/eventing.py:241
#: /Applications/Splunk/etc/apps/SA-ITOA/lib/itsi/event_management/sdk/eventing.py:301
#: /Applications/Splunk/etc/apps/SA-ITOA/lib/itsi/event_management/sdk/eventing.py:361
msgid "Invalid type for `events`. Expecting list. Received type: {}"
msgstr ""
#: /Applications/Splunk/etc/apps/SA-ITOA/lib/ITOA/event_management/rules_engine/criterion.py:35
#: /Applications/Splunk/etc/apps/SA-ITOA/lib/ITOA/event_management/rules_engine/criterion.py:59
#: /Applications/Splunk/etc/apps/SA-ITOA/lib/ITOA/event_management/rules_engine/criterion.py:85
#: /Applications/Splunk/etc/apps/SA-ITOA/lib/ITOA/event_management/rules_engine/criterion.py:113
#, python-format
msgid "Invalid type for criteria. Expecting a dictionary.Received type=%s"
msgstr ""
#: /Applications/Splunk/etc/apps/SA-ITOA/lib/itsi/upgrade/itsi_migration.py:1174
#, python-format
msgid "Invalid type for deep dive. Expecting a dictionary. Received=%s. type=%s."
msgstr ""
#: /Applications/Splunk/etc/apps/SA-ITOA/lib/ITOA/event_management/notable_event_utils.py:856
msgid "Invalid type for owner_collection_uri."
msgstr ""
#: /Applications/Splunk/etc/apps/SA-ITOA/lib/itsi/objects/itsi_service.py:1526
msgid "Invalid type for service(s). Expected list, received {}."
msgstr ""
#: /Applications/Splunk/etc/apps/SA-ITOA/lib/itsi/objects/itsi_service.py:1256
msgid "Invalid type for service. Expected JSON, received {}."
msgstr ""
#: /Applications/Splunk/etc/apps/SA-ITOA/lib/itsi/objects/itsi_kpi.py:331
msgid "Invalid type for service_entity_rules. Expecting valid list"
msgstr ""
#: /Applications/Splunk/etc/apps/SA-ITOA/lib/itsi/objects/itsi_kpi.py:333
msgid "Invalid type for service_id. Expecting valid string."
msgstr ""
#: /Applications/Splunk/etc/apps/SA-ITOA/lib/itsi/objects/itsi_kpi.py:337
msgid "Invalid type for service_is_enabled. Expecting int."
msgstr ""
#: /Applications/Splunk/etc/apps/SA-ITOA/lib/itsi/objects/itsi_kpi.py:335
msgid "Invalid type for service_title. Expecting valid string."
msgstr ""
#: /Applications/Splunk/etc/apps/SA-ITOA/lib/itsi/event_management/itsi_notable_event_queue_consumer.py:80
msgid "Invalid type for session_key. Received type=\"{}\"."
msgstr ""
#: /Applications/Splunk/etc/apps/SA-ITOA/lib/itsi/objects/itsi_service.py:1743
msgid "Invalid type for {0}. Expected JSON, received {1}."
msgstr ""
#: /Applications/Splunk/etc/apps/SA-ITOA/lib/itsi/objects/itsi_service.py:1641
#, python-format
msgid ""
"Invalid type of AND entity rule term specified for service %s. Expected "
"JSON, received %s."
msgstr ""
#: /Applications/Splunk/etc/apps/SA-ITOA/lib/itsi/objects/itsi_service.py:1632
#, python-format
msgid ""
"Invalid type of OR entity rule term specified for service %s. Expected "
"JSON, received %s."
msgstr ""
#: /Applications/Splunk/etc/apps/SA-ITOA/lib/ITOA/splunk_search_chunk_protocol.py:115
msgid "Invalid type value"
msgstr ""
#: /Applications/Splunk/etc/apps/SA-ITOA/lib/itsi/objects/itsi_kpi.py:208
#, python-format
msgid "Invalid type=\"%s\" for KPI. Expecting a dictionary."
msgstr ""
#: /Applications/Splunk/etc/apps/SA-ITOA/lib/itsi/objects/itsi_kpi.py:189
#, python-format
msgid "Invalid type=\"%s\" for kpi_id. Expecting string type."
msgstr ""
#: /Applications/Splunk/etc/apps/SA-ITOA/lib/itsi/upgrade/itsi_migration.py:1073
#: /Applications/Splunk/etc/apps/SA-ITOA/lib/itsi/upgrade/itsi_migration.py:1109
#: /Applications/Splunk/etc/apps/SA-ITOA/lib/itsi/upgrade/itsi_migration.py:1145
#, python-format
msgid "Invalid type=%s for `lane_settings_collection`. Expecting list."
msgstr ""
#: /Applications/Splunk/etc/apps/SA-ITOA/lib/ITOA/event_management/notable_event_ticketing.py:209
#, python-format
msgid "Invalid type=`%s` for `%s`. Expecting string."
msgstr ""
#: /Applications/Splunk/etc/apps/SA-ITOA/lib/ITOA/itoa_object.py:463
#: /Applications/Splunk/etc/apps/SA-ITOA/lib/itsi/objects/itsi_security_group.py:213
msgid "Invalid update payload found, must be a valid JSON dictionary."
msgstr ""
#: /Applications/Splunk/etc/apps/SA-ITOA/lib/itsi/objects/itsi_service.py:1488
#, python-format
msgid ""
"Invalid update request. Cannot add a new KPI with a link to service "
"template, through service update request. To add a new KPI with a link to"
" service template, add the KPI to the service template, then push out the"
" changes to linked services. service_id=\"%s\", kpi_id=\"%s\""
msgstr ""
#: /Applications/Splunk/etc/apps/SA-ITOA/lib/itsi/objects/itsi_service.py:1462
#, python-format
msgid ""
"Invalid update request. Cannot update search attributes for KPI linked to"
" service template. To update KPI search attributes, update the "
"corresponding KPI in service template and then push out changes to linked"
" services. service_id=\"%s\", kpi_id=\"%s\", service_template_id=\"%s\", "
"attribute_update_requested=\"%s\""
msgstr ""
#: /Applications/Splunk/etc/apps/SA-ITOA/lib/ITOA/itoa_object.py:359
msgid "Invalid upsert payload found, must be a valid JSON list."
msgstr ""
#: /Applications/Splunk/etc/apps/SA-ITOA/lib/ITOA/event_management/notable_event_ticketing.py:147
msgid "Invalid value `app`."
msgstr ""
#: /Applications/Splunk/etc/apps/SA-ITOA/lib/ITOA/event_management/notable_event_ticketing.py:139
msgid "Invalid value `collection`."
msgstr ""
#: /Applications/Splunk/etc/apps/SA-ITOA/lib/ITOA/event_management/notable_event_ticketing.py:131
msgid "Invalid value `event_id`."
msgstr ""
#: /Applications/Splunk/etc/apps/SA-ITOA/lib/ITOA/event_management/notable_event_ticketing.py:143
msgid "Invalid value `ns`."
msgstr ""
#: /Applications/Splunk/etc/apps/SA-ITOA/lib/ITOA/event_management/notable_event_ticketing.py:135
msgid "Invalid value `session_key`."
msgstr ""
#: /Applications/Splunk/etc/apps/SA-ITOA/bin/command_suppress_alert.py:43
msgid "Invalid value for `count` field."
msgstr ""
#: /Applications/Splunk/etc/apps/SA-ITOA/bin/command_suppress_alert.py:46
msgid "Invalid value for `is_consecutive` field."
msgstr ""
#: /Applications/Splunk/etc/apps/SA-ITOA/lib/ITOA/event_management/notable_event_utils.py:859
msgid "Invalid value for owner_collection_uri."
msgstr ""
#: /Applications/Splunk/etc/apps/SA-ITOA/lib/migration/migration.py:222
#: /Applications/Splunk/etc/apps/SA-ITOA/lib/migration/migration.py:224
msgid "Invalid version:{0}."
msgstr ""
#: /Applications/Splunk/etc/apps/SA-ITOA/lib/itsi/event_management/event_management_rest_provider.py:643
msgid "Invalid/Missing data."
msgstr ""
#: /Applications/Splunk/etc/apps/SA-ITOA/lib/itsi/event_management/event_management_rest_provider.py:652
msgid "Invalid/Missing event IDs."
msgstr ""
#: /Applications/Splunk/etc/apps/SA-ITOA/lib/itsi/csv_import/itoa_bulk_import_specification.py:244
msgid "Invalid/empty specification as input. Received - {0}."
msgstr ""
#: /Applications/Splunk/etc/apps/SA-ITOA/default/itsi_notable_event_status.conf:25
msgid "Investigation or response is in-process"
msgstr ""
#: /Applications/Splunk/etc/apps/SA-ITOA/lib/ITOA/event_management/base_event_generation.py:108
msgid "Invoking modular alert action"
msgstr ""
#: /Applications/Splunk/etc/apps/SA-ITOA/default/itsi_notable_event_status.conf:43
msgid "Issue has been resolved and verified"
msgstr ""
#: /Applications/Splunk/etc/apps/SA-ITOA/lib/ITOA/storage/statestore.py:93
msgid "JSON payload is invalid."
msgstr ""
#: /Applications/Splunk/etc/apps/SA-ITOA/lib/itsi/backup_restore/itsi_backup_restore_utils.py:406
msgid ""
"Job {}'s owning host with search head id {} seems to be unavailable. "
"Cannot process job. Retry once host is up."
msgstr ""
#: /Applications/Splunk/etc/apps/SA-ITOA/lib/itsi/backup_restore/itsi_backup_restore_utils.py:401
msgid ""
"Job {}'s owning host {} seems to be unavailable. Cannot process job. "
"Retry once host is up."
msgstr ""
#: /Applications/Splunk/etc/apps/SA-ITOA/lib/itsi/upgrade/itsi_migration.py:417
#, python-format
msgid "KPI %s has no 'isadhoc' field, analyzing KPI to determine search type."
msgstr ""
#: /Applications/Splunk/etc/apps/SA-ITOA/lib/itsi/event_management/itsi_correlation_search.py:232
msgid "KPI ID is not a list."
msgstr ""
#: /Applications/Splunk/etc/apps/SA-ITOA/lib/itsi/mad/itsi_mad_searches.py:397
msgid "KPI ID must be in the format of a valid string."
msgstr ""
#: /Applications/Splunk/etc/apps/SA-ITOA/lib/itsi/searches/itsi_shared_base_search.py:46
msgid "KPI base search ID must be a valid string."
msgstr ""
#: /Applications/Splunk/etc/apps/SA-ITOA/lib/itsi_module/itsi_module_kpi_base_search.py:27
msgid "KPI base search ID needs to be prefixed with module ID."
msgstr ""
#: /Applications/Splunk/etc/apps/SA-ITOA/lib/itsi/objects/itsi_kpi_base_search.py:517
msgid ""
"KPI base search cannot be deleted because it is being used by one or more"
" service templates."
msgstr ""
#: /Applications/Splunk/etc/apps/SA-ITOA/default/itsi_kpi_base_search.conf:461
msgid "KPI base search for Cloud Performance of AWS EBS entities."
msgstr ""
#: /Applications/Splunk/etc/apps/SA-ITOA/default/itsi_kpi_base_search.conf:563
msgid "KPI base search for Cloud Performance of AWS EC2 entities."
msgstr ""
#: /Applications/Splunk/etc/apps/SA-ITOA/default/itsi_kpi_base_search.conf:193
msgid "KPI base search for Disk Device Performance of *Nix entities."
msgstr ""
#: /Applications/Splunk/etc/apps/SA-ITOA/default/itsi_kpi_base_search.conf:119
msgid "KPI base search for Disk Performance of *Nix entities."
msgstr ""
#: /Applications/Splunk/etc/apps/SA-ITOA/default/itsi_kpi_base_search.conf:239
msgid "KPI base search for Network Performance of *Nix entities."
msgstr ""
#: /Applications/Splunk/etc/apps/SA-ITOA/default/itsi_kpi_base_search.conf:387
msgid "KPI base search for OS Instance Performance of Windows entities."
msgstr ""
#: /Applications/Splunk/etc/apps/SA-ITOA/default/itsi_kpi_base_search.conf:3
msgid "KPI base search for OS Performance of *Nix entities."
msgstr ""
#: /Applications/Splunk/etc/apps/SA-ITOA/default/itsi_kpi_base_search.conf:327
msgid "KPI base search for OS Performance of Windows entities."
msgstr ""
#: /Applications/Splunk/etc/apps/SA-ITOA/lib/itsi/objects/itsi_kpi_base_search.py:472
msgid ""
"KPI base search metric cannot be deleted because it is being used by one "
"or more service templates."
msgstr ""
#: /Applications/Splunk/etc/apps/SA-ITOA/lib/itsi_module/itsi_module_kpi_base_search.py:30
msgid "KPI base search metric {} must have an ID."
msgstr ""
#: /Applications/Splunk/etc/apps/SA-ITOA/lib/itsi_module/itsi_module_kpi_base_search.py:29
msgid "KPI base search needs to contain at least one metric."
msgstr ""
#: /Applications/Splunk/etc/apps/SA-ITOA/lib/itsi/searches/itsi_shared_base_search.py:50
msgid "KPI base search passed in does not match key passed in."
msgstr ""
#: /Applications/Splunk/etc/apps/SA-ITOA/lib/itsi_module/itsi_module_kpi_base_search.py:28
msgid "KPI base search title needs to be prefixed with module ID."
msgstr ""
#: /Applications/Splunk/etc/apps/SA-ITOA/lib/itsi_module/itsi_module_kpi_group.py:85
msgid "KPI group title is missing from the payload."
msgstr ""
#: /Applications/Splunk/etc/apps/SA-ITOA/lib/itsi/objects/itsi_service.py:1771
msgid ""
"KPI keys are not unique within the same {0}. KPIs must have unique keys. "
"Duplicate _key = {1}"
msgstr ""
#: /Applications/Splunk/etc/apps/SA-ITOA/lib/itsi/objects/itsi_service.py:1788
msgid "KPI keys are not unique. KPIs must have unique keys. Eg. _key: "
msgstr ""
#: /Applications/Splunk/etc/apps/SA-ITOA/lib/itsi/objects/itsi_service.py:1936
msgid ""
"KPI keys are not unique. KPIs must have unique keys. Eg: existing service"
" duplicating key for KPIs that you are trying to save are: "
msgstr ""
#: /Applications/Splunk/etc/apps/SA-ITOA/lib/itsi/objects/itsi_service.py:1943
msgid "KPI keys specified for update do not exist. Example: "
msgstr ""
#: /Applications/Splunk/etc/apps/SA-ITOA/lib/itsi_module/itsi_module_kpi_group.py:27
msgid "KPI template ID needs to be prefixed with module ID."
msgstr ""
#: /Applications/Splunk/etc/apps/SA-ITOA/lib/itsi_module/itsi_module_kpi_group.py:29
msgid "KPI template requires a description."
msgstr ""
#: /Applications/Splunk/etc/apps/SA-ITOA/lib/itsi_module/itsi_module_kpi_group.py:28
msgid "KPI template requires a title."
msgstr ""
#: /Applications/Splunk/etc/apps/SA-ITOA/lib/itsi_module/itsi_module_kpi_group.py:30
msgid "KPI template requires at least one KPI."
msgstr ""
#: /Applications/Splunk/etc/apps/SA-ITOA/lib/itsi/objects/itsi_kpi_threshold_template.py:228
msgid ""
"KPI threshold template cannot be deleted because it is being used by one "
"or more service templates."
msgstr ""
#: /Applications/Splunk/etc/apps/SA-ITOA/lib/itsi_module/itsi_module_kpi_group.py:33
msgid ""
"KPI {} refers to base search ID {} and base search metric {} that is not "
"part of an exported KPI base search."
msgstr ""
#: /Applications/Splunk/etc/apps/SA-ITOA/lib/itsi_module/itsi_module_kpi_group.py:32
msgid ""
"KPI {} refers to base search ID {} that is not part of an exported KPI "
"base search."
msgstr ""
#: /Applications/Splunk/etc/apps/SA-ITOA/lib/itsi/objects/itsi_kpi.py:475
msgid "KPIs must have a valid title."
msgstr ""
#: /Applications/Splunk/etc/apps/SA-ITOA/lib/itsi/objects/itsi_kpi_template.py:61
msgid "KPIs seem invalid. Expected list, found {0}."
msgstr ""
#: /Applications/Splunk/etc/apps/SA-ITOA/lib/ITOA/storage/itoa_generic_persistables.py:122
msgid "KV store collection name must be supplied as a class variable."
msgstr ""
#: /Applications/Splunk/etc/apps/SA-ITOA/lib/itsi/event_management/utils.py:532
msgid "KV store failed to initialize in time"
msgstr ""
#: /Applications/Splunk/etc/apps/SA-ITOA/bin/kvstore_to_json.py:674
msgid ""
"KV store has not been initialized yet. Make sure Splunk is running. If it"
" is, check for startup errors."
msgstr ""
#: /Applications/Splunk/etc/apps/SA-ITOA/lib/itsi/event_management/itsi_notable_event_queue_consumer.py:133
msgid "KV store is not initialized."
msgstr ""
#: /Applications/Splunk/etc/apps/SA-ITOA/lib/itsi/itsi_utils.py:1345
msgid ""
"KV store is not initialized. We have tried for 5 minutes but KV store "
"still not available."
msgstr ""
#: /Applications/Splunk/etc/apps/SA-ITOA/lib/ITOA/storage/itoa_generic_persistables.py:40
msgid "KV store is unavailable."
msgstr ""
#: /Applications/Splunk/etc/apps/SA-ITOA/lib/itsi/csv_import/itoa_bulk_import_common.py:232
#, python-format
msgid "Key %s not found."
msgstr ""
#: /Applications/Splunk/etc/apps/SA-ITOA/bin/itsi_async_csv_loader.py:76
#: /Applications/Splunk/etc/apps/SA-ITOA/bin/itsi_csv_import.py:89
msgid "Latest index time"
msgstr ""
#: /Applications/Splunk/etc/apps/SA-ITOA/bin/itsi_async_csv_loader.py:77
#: /Applications/Splunk/etc/apps/SA-ITOA/bin/itsi_csv_import.py:90
msgid ""
"Latest index time you want to use with your Splunk search to import "
"entities/services. If no value is provided, we will default to 'now'"
msgstr ""
#: /Applications/Splunk/etc/apps/SA-ITOA/default/alert_actions.conf:34
msgid "Link Ticket"
msgstr ""
#: /Applications/Splunk/etc/apps/SA-ITOA/bin/itsi_default_aggregation_policy_loader.py:29
msgid "Loads the default aggregation policies."
msgstr ""
#: /Applications/Splunk/etc/apps/SA-ITOA/bin/itsi_default_correlation_search_acl_loader.py:28
msgid "Loads the default correlation search ACL."
msgstr ""
#: /Applications/Splunk/etc/apps/SA-ITOA/bin/configure_itsi.py:44
#: /Applications/Splunk/etc/apps/SA-ITOA/bin/itsi_age_kpi_alert_value_cache.py:36
#: /Applications/Splunk/etc/apps/SA-ITOA/bin/itsi_async_csv_loader.py:49
#: /Applications/Splunk/etc/apps/SA-ITOA/bin/itsi_backfill.py:51
#: /Applications/Splunk/etc/apps/SA-ITOA/bin/itsi_backup_restore.py:33
#: /Applications/Splunk/etc/apps/SA-ITOA/bin/itsi_consumer.py:168
#: /Applications/Splunk/etc/apps/SA-ITOA/bin/itsi_csv_import.py:57
#: /Applications/Splunk/etc/apps/SA-ITOA/bin/itsi_default_aggregation_policy_loader.py:40
#: /Applications/Splunk/etc/apps/SA-ITOA/bin/itsi_default_correlation_search_acl_loader.py:39
#: /Applications/Splunk/etc/apps/SA-ITOA/bin/itsi_notable_event_hec_init.py:38
#: /Applications/Splunk/etc/apps/SA-ITOA/bin/itsi_refresher.py:41
#: /Applications/Splunk/etc/apps/SA-ITOA/bin/itsi_scheduled_backup_caller.py:39
#: /Applications/Splunk/etc/apps/SA-ITOA/bin/itsi_service_template_update_scheduler.py:39
#: /Applications/Splunk/etc/apps/SA-ITOA/bin/itsi_upgrade.py:43
#: /Applications/Splunk/etc/apps/SA-ITOA/bin/itsi_user_access_init.py:46
#: /Applications/Splunk/etc/apps/SA-ITOA/bin/maintenance_minder.py:35
msgid "Logging Level"
msgstr ""
#: /Applications/Splunk/etc/apps/SA-ITOA/bin/itsi_consumer.py:169
msgid "Logging level to use for logging errors (ERROR, WARNING, INFO, DEBUG)"
msgstr ""
#: /Applications/Splunk/etc/apps/SA-ITOA/lib/itsi/event_management/sdk/eventing_base.py:38
msgid "Login failed. Check your credentials and try again."
msgstr ""
#: /Applications/Splunk/etc/apps/SA-ITOA/default/itsi_notable_event_severity.conf:23
msgid "Low"
msgstr ""
#: /Applications/Splunk/etc/apps/SA-ITOA/bin/maintenance_minder.py:22
msgid "Maintenance Minder Modular Input"
msgstr ""
#: /Applications/Splunk/etc/apps/SA-ITOA/bin/maintenance_minder.py:23
msgid ""
"Maintenance minder to populate operative maintenance log for maintenance "
"services."
msgstr ""
#: /Applications/Splunk/etc/apps/SA-ITOA/lib/maintenance_services/maintenance_services_rest_provider/maintenance_services_rest_provider.py:77
msgid "Maintenance objects can only exist at app level (owner='nobody')."
msgstr ""
#: /Applications/Splunk/etc/apps/SA-ITOA/lib/itsi/csv_import/itoa_bulk_import_modinput_interface_provider.py:127
msgid "Maximum number of restart attempts reached {}, therefore terminating."
msgstr ""
#: /Applications/Splunk/etc/apps/SA-ITOA/default/itsi_notable_event_severity.conf:28
msgid "Medium"
msgstr ""
#: /Applications/Splunk/etc/apps/SA-ITOA/lib/itsi/csv_import/itoa_bulk_import_entity.py:263
#: /Applications/Splunk/etc/apps/SA-ITOA/lib/itsi/csv_import/itoa_bulk_import_entity_relationship.py:106
msgid "Merge update called when strategy is append, cannot handle."
msgstr ""
#: /Applications/Splunk/etc/apps/SA-ITOA/lib/itsi/csv_import/itoa_bulk_import_rest_interface_provider.py:288
msgid "Message from splunkd: {}"
msgstr ""
#: /Applications/Splunk/etc/apps/SA-ITOA/lib/itsi/upgrade/kvstore_backup_restore.py:717
#: /Applications/Splunk/etc/apps/SA-ITOA/lib/itsi/upgrade/kvstore_backup_restore.py:727
msgid "Method not supported on backup paths of type files."
msgstr ""
#: /Applications/Splunk/etc/apps/SA-ITOA/lib/itsi/objects/itsi_kpi.py:562
msgid ""
"Metric search KPIs do not seem to have specified a metric search. Specify"
" a metric based search for the KPI."
msgstr ""
#: /Applications/Splunk/etc/apps/SA-ITOA/lib/itsi/objects/itsi_kpi.py:569
msgid ""
"Metric search based KPI does not seem to have specified a valid metric "
"search. Specify metric based search KPIs with all mandatory fields: "
"metric_index, metric_name."
msgstr ""
#: /Applications/Splunk/etc/apps/SA-ITOA/bin/itsi_upgrade.py:32
msgid "Migrates the schemas from the old version to the new version."
msgstr ""
#: /Applications/Splunk/etc/apps/SA-ITOA/lib/itsi/upgrade/itsi_migration.py:391
msgid ""
"Migration could not delete some KPI saved searches named with the old "
"convention. Delete them manually as soon as possible. Name them in the "
"format: \"Indicator - <KPI key> - Rule.\""
msgstr ""
#: /Applications/Splunk/etc/apps/SA-ITOA/lib/migration/migration.py:269
msgid "Migration function: {} is not instance of MigrationFunctionAbstract."
msgstr ""
#: /Applications/Splunk/etc/apps/SA-ITOA/lib/itsi/itoa_rest_interface_provider/itoa_rest_interface_provider.py:1141
msgid "Missing 'data' parameter in request for search clause."
msgstr ""
#: /Applications/Splunk/etc/apps/SA-ITOA/lib/ITOA/event_management/notable_event_ticketing.py:388
msgid "Missing `ids` in data"
msgstr ""
#: /Applications/Splunk/etc/apps/SA-ITOA/lib/itsi/csv_import/itoa_bulk_import_specification.py:257
msgid ""
"Missing both - \"{}\" & \"{}\" from your request. At least one is "
"expected."
msgstr ""
#: /Applications/Splunk/etc/apps/SA-ITOA/lib/itsi/mad/itsi_mad_searches.py:117
#: /Applications/Splunk/etc/apps/SA-ITOA/lib/itsi/mad/itsi_mad_searches.py:242
msgid "Missing context name. A context name is required to create new context."
msgstr ""
#: /Applications/Splunk/etc/apps/SA-ITOA/lib/itsi/mad/itsi_mad_searches.py:208
msgid "Missing context name. A context name is required to delete a context."
msgstr ""
#: /Applications/Splunk/etc/apps/SA-ITOA/lib/ITOA/rest_interface_provider_base.py:124
msgid "Missing field"
msgstr ""
#: /Applications/Splunk/etc/apps/SA-ITOA/lib/ITOA/controller_utils.py:232
#: /Applications/Splunk/etc/apps/SA-ITOA/lib/itsi/backup_restore/backup_restore_rest_provider.py:100
msgid "Missing identifier"
msgstr ""
#: /Applications/Splunk/etc/apps/SA-ITOA/lib/ITOA/controller_utils.py:1135
msgid "Missing json_data"
msgstr ""
#: /Applications/Splunk/etc/apps/SA-ITOA/lib/ITOA/event_management/rules_engine/rule.py:36
msgid "Missing key `actions` in rule"
msgstr ""
#: /Applications/Splunk/etc/apps/SA-ITOA/lib/ITOA/event_management/rules_engine/rule.py:34
msgid "Missing key `activation_criteria` in rule"
msgstr ""
#: /Applications/Splunk/etc/apps/SA-ITOA/lib/ITOA/event_management/rules_engine/actions.py:33
#: /Applications/Splunk/etc/apps/SA-ITOA/lib/ITOA/event_management/rules_engine/item.py:41
msgid "Missing key `config`"
msgstr ""
#: /Applications/Splunk/etc/apps/SA-ITOA/lib/ITOA/event_management/rules_engine/criterion.py:117
msgid "Missing key `execute_on`."
msgstr ""
#: /Applications/Splunk/etc/apps/SA-ITOA/lib/ITOA/event_management/rules_engine/actions.py:35
msgid "Missing key `execution_criteria`"
msgstr ""
#: /Applications/Splunk/etc/apps/SA-ITOA/lib/itsi/upgrade/itsi_migration.py:1065
#: /Applications/Splunk/etc/apps/SA-ITOA/lib/itsi/upgrade/itsi_migration.py:1101
#: /Applications/Splunk/etc/apps/SA-ITOA/lib/itsi/upgrade/itsi_migration.py:1137
#, python-format
msgid "Missing key `lane_settings_collection` in deep dive=%s."
msgstr ""
#: /Applications/Splunk/etc/apps/SA-ITOA/lib/ITOA/event_management/rules_engine/rule.py:32
msgid "Missing key `title` in rule"
msgstr ""
#: /Applications/Splunk/etc/apps/SA-ITOA/lib/ITOA/event_management/rules_engine/actions.py:31
#: /Applications/Splunk/etc/apps/SA-ITOA/lib/ITOA/event_management/rules_engine/item.py:36
msgid "Missing key `type`"
msgstr ""
#: /Applications/Splunk/etc/apps/SA-ITOA/lib/itsi/event_management/event_management_rest_provider.py:221
#: /Applications/Splunk/etc/apps/SA-ITOA/lib/itsi/itoa_rest_interface_provider/itoa_rest_interface_provider.py:321
msgid "Missing key in data. `acl` on POST is mandatory. Received: `{}`"
msgstr ""
#: /Applications/Splunk/etc/apps/SA-ITOA/lib/itsi/csv_import/itoa_bulk_import_specification.py:264
msgid "Missing key(s) \"{}\" from required entity fields - {}."
msgstr ""
#: /Applications/Splunk/etc/apps/SA-ITOA/lib/itsi/csv_import/itoa_bulk_import_specification.py:274
msgid "Missing key(s) \"{}\" from required entity relationship fields - {}."
msgstr ""
#: /Applications/Splunk/etc/apps/SA-ITOA/lib/itsi/csv_import/itoa_bulk_import_specification.py:283
msgid "Missing key(s) \"{}\" from required service fields - {}."
msgstr ""
#: /Applications/Splunk/etc/apps/SA-ITOA/lib/itsi/csv_import/itoa_bulk_import_rest_interface_provider.py:170
msgid "Missing key(s) in data sent to server \"{}\""
msgstr ""
#: /Applications/Splunk/etc/apps/SA-ITOA/lib/itsi/objects/itsi_service.py:1759
msgid "Missing key. KPI must have a \"_key\" populated."
msgstr ""
#: /Applications/Splunk/etc/apps/SA-ITOA/lib/ITOA/event_management/rules_engine/clause.py:36
msgid "Missing key. Required: `condition`, `items`"
msgstr ""
#: /Applications/Splunk/etc/apps/SA-ITOA/lib/itsi/searches/itsi_at_search.py:50
msgid "Missing parameters to search template"
msgstr ""
#: /Applications/Splunk/etc/apps/SA-ITOA/bin/command_storeentities.py:61
#, python-format
msgid "Missing required key(s): %s."
msgstr ""
#: /Applications/Splunk/etc/apps/SA-ITOA/lib/ITOA/event_management/notable_event_aggregation_policy.py:136
#, python-format
msgid "Missing required key. Received=%s. Required=%s."
msgstr ""
#: /Applications/Splunk/etc/apps/SA-ITOA/lib/itsi/itoa_rest_interface_provider/itoa_rest_interface_provider.py:1281
#: /Applications/Splunk/etc/apps/SA-ITOA/lib/itsi/itoa_rest_interface_provider/itoa_rest_interface_provider.py:1318
msgid "Missing required parameter 'entity_filter'."
msgstr ""
#: /Applications/Splunk/etc/apps/SA-ITOA/lib/itsi/objects/changehandlers/itoa_change_handler.py:52
#, python-format
msgid "Missing the following required attributes: %s"
msgstr ""
#: /Applications/Splunk/etc/apps/SA-ITOA/lib/SA_ITOA_app_common/solnlib/packages/schematics/types/compound.py:143
msgid "Model conversion requires a model or dict"
msgstr ""
#: /Applications/Splunk/etc/apps/SA-ITOA/lib/itsi_module/itsi_module_modules.py:35
msgid "Module package name must start with DA-ITSI-."
msgstr ""
#: /Applications/Splunk/etc/apps/SA-ITOA/lib/itsi_module/itsi_module_modules.py:37
msgid "Module requires a description."
msgstr ""
#: /Applications/Splunk/etc/apps/SA-ITOA/lib/itsi_module/itsi_module_modules.py:36
msgid "Module requires a label."
msgstr ""
#: /Applications/Splunk/etc/apps/SA-ITOA/lib/itsi_module/itsi_module_modules.py:38
msgid "Module requires a version."
msgstr ""
#: /Applications/Splunk/etc/apps/SA-ITOA/lib/itsi_module/itsi_module_modules.py:39
msgid "Module requires an author."
msgstr ""
#: /Applications/Splunk/etc/apps/SA-ITOA/bin/itsi_notable_event_archive.py:27
msgid ""
"Moves notable events from the KV store to the index based upon retention "
"policy."
msgstr ""
#: /Applications/Splunk/etc/apps/SA-ITOA/lib/SA_ITOA_app_common/solnlib/packages/schematics/types/base.py:624
msgid "Must be either true or false."
msgstr ""
#: /Applications/Splunk/etc/apps/SA-ITOA/lib/itsi/upgrade/itsi_migration.py:3073
msgid ""
"Must delete correlationsearches.conf file from "
"$SPLUNK_HOME/etc/apps/itsi/default and $SPLUNK_HOME/etc/apps/itsi/local. "
"Note: If you want to migrate old notable events to the new index: First "
"follow the steps as specified in the documentation, then delete the "
"correlationsearches.conf files as described above."
msgstr ""
#: /Applications/Splunk/etc/apps/SA-ITOA/bin/kvstore_to_json.py:52
msgid ""
"Must enter the correct response value or contact your Splunk "
"administrator."
msgstr ""
#: /Applications/Splunk/etc/apps/SA-ITOA/lib/itsi/mad/itsi_mad_searches.py:402
msgid "Must have context name or kpi_id to get the instance."
msgstr ""
#: /Applications/Splunk/etc/apps/SA-ITOA/lib/itsi/mad/itsi_mad_searches.py:316
msgid "Must have context name to get the instance list."
msgstr ""
#: /Applications/Splunk/etc/apps/SA-ITOA/lib/itsi/mad/itsi_mad_searches.py:173
msgid "Must have context or instance data to create an instance"
msgstr ""
#: /Applications/Splunk/etc/apps/SA-ITOA/lib/itsi/mad/itsi_mad_searches.py:286
msgid "Must have context or instance id to delete an instance."
msgstr ""
#: /Applications/Splunk/etc/apps/SA-ITOA/lib/itsi/objects/itsi_entity_relationship.py:348
msgid ""
"Must provide entity identifier or key in order to resolve to a unique "
"existing entity"
msgstr ""
#: /Applications/Splunk/etc/apps/SA-ITOA/lib/itsi/itoa_rest_interface_provider/itoa_rest_interface_provider.py:1146
msgid "Must specify KPI for search generation."
msgstr ""
#: /Applications/Splunk/etc/apps/SA-ITOA/bin/command_set_severity_fields.py:255
#: /Applications/Splunk/etc/apps/SA-ITOA/bin/command_set_severity_fields.py:311
#: /Applications/Splunk/etc/apps/SA-ITOA/bin/command_set_severity_fields.py:321
#: /Applications/Splunk/etc/apps/SA-ITOA/lib/itsi/set_severity_fields.py:218
#: /Applications/Splunk/etc/apps/SA-ITOA/lib/itsi/set_severity_fields.py:219
msgid "N/A"
msgstr ""
#: /Applications/Splunk/etc/apps/SA-ITOA/lib/SA_ITOA_app_common/solnlib/packages/schematics/types/base.py:1097
msgid "Name of locale {0} did not match validation regex."
msgstr ""
#: /Applications/Splunk/etc/apps/SA-ITOA/lib/ITOA/itoa_object.py:210
#, python-format
msgid ""
"Names cannot contain equal and quote characters. List of invalid names: "
"%s."
msgstr ""
#: /Applications/Splunk/etc/apps/SA-ITOA/lib/itsi/objects/itsi_entity_relationship.py:205
msgid ""
"Names cannot contain equal and quote characters. List of triples with "
"invalid names: {0}"
msgstr ""
#: /Applications/Splunk/etc/apps/SA-ITOA/bin/itsi_notable_event_archive.py:39
msgid "Namespace"
msgstr ""
#: /Applications/Splunk/etc/apps/SA-ITOA/bin/itsi_notable_event_archive.py:40
msgid ""
"Namespace under which the KV store operation is called. Default is "
"'nobody'."
msgstr ""
#: /Applications/Splunk/etc/apps/SA-ITOA/lib/itsi/objects/itsi_kpi_template.py:65
msgid "Need at least one KPI defined in the KPI template."
msgstr ""
#: /Applications/Splunk/etc/apps/SA-ITOA/lib/itsi/objects/itsi_entity_relationship_rule.py:53
msgid ""
"Need specify either subject_entity_search, object_entity_search and "
"predicate_rules, or entity_relationship_search."
msgstr ""
#: /Applications/Splunk/etc/apps/SA-ITOA/lib/itsi/objects/itsi_entity_relationship_rule.py:42
msgid "Need specify subject_identifier_field, object_identifier_field, predicate."
msgstr ""
#: /Applications/Splunk/etc/apps/SA-ITOA/default/itsi_notable_event_status.conf:18
msgid "New"
msgstr ""
#: /Applications/Splunk/etc/apps/SA-ITOA/lib/itsi/objects/itsi_entity_relationship.py:251
msgid ""
"New triple specified already exist. Must use new unique triple. Duplicate"
" triple found: {0}"
msgstr ""
#: /Applications/Splunk/etc/apps/SA-ITOA/lib/itsi/objects/changehandlers/kpi_alert_period_update_handler.py:31
msgid "No MAD instance to update"
msgstr ""
#: /Applications/Splunk/etc/apps/SA-ITOA/bin/command_set_severity_fields.py:252
#: /Applications/Splunk/etc/apps/SA-ITOA/bin/command_set_severity_fields.py:256
#, python-format
msgid "No alert_value found for metric %s."
msgstr ""
#: /Applications/Splunk/etc/apps/SA-ITOA/lib/itsi/itoa_rest_interface_provider/itoa_rest_interface_provider.py:1194
msgid "No data field input got keys: {}."
msgstr ""
#: /Applications/Splunk/etc/apps/SA-ITOA/lib/itsi/event_management/event_management_rest_provider.py:219
#: /Applications/Splunk/etc/apps/SA-ITOA/lib/itsi/itoa_rest_interface_provider/itoa_rest_interface_provider.py:319
#: /Applications/Splunk/etc/apps/SA-ITOA/lib/itsi/itoa_rest_interface_provider/itoa_rest_interface_provider.py:983
#: /Applications/Splunk/etc/apps/SA-ITOA/lib/itsi/objects/itsi_entity.py:421
msgid "No data received."
msgstr ""
#: /Applications/Splunk/etc/apps/SA-ITOA/lib/itsi/event_management/event_management_rest_provider.py:127
#: /Applications/Splunk/etc/apps/SA-ITOA/lib/itsi/itoa_rest_interface_provider/itoa_rest_interface_provider.py:223
#, python-format
msgid "No data received. `data` is a mandatory key. Received: %s."
msgstr ""
#: /Applications/Splunk/etc/apps/SA-ITOA/lib/SA_ITOA_app_common/solnlib/packages/schematics/types/base.py:1096
msgid "No default or explicit locales were given."
msgstr ""
#: /Applications/Splunk/etc/apps/SA-ITOA/lib/itsi/objects/itsi_entity.py:426
msgid "No entities supplied for editing."
msgstr ""
#: /Applications/Splunk/etc/apps/SA-ITOA/lib/itsi/itoa_rest_interface_provider/itoa_rest_interface_provider.py:946
msgid "No entries created/updated"
msgstr ""
#: /Applications/Splunk/etc/apps/SA-ITOA/bin/command_storeentities.py:182
msgid "No fields to automatically extract from results set."
msgstr ""
#: /Applications/Splunk/etc/apps/SA-ITOA/lib/itsi_module/itsi_module_modules.py:40
msgid "No filename specified. Must specify a filename to download."
msgstr ""
#: /Applications/Splunk/etc/apps/SA-ITOA/bin/itsi_consumer.py:129
#, python-format
msgid "No handler manifest could be found selector=%s, key=%s, tid=%s"
msgstr ""
#: /Applications/Splunk/etc/apps/SA-ITOA/bin/itsi_sample_event_action_ping.py:201
msgid "No host to ping."
msgstr ""
#: /Applications/Splunk/etc/apps/SA-ITOA/bin/command_set_severity_fields.py:322
msgid "No matching services found for entity."
msgstr ""
#: /Applications/Splunk/etc/apps/SA-ITOA/lib/itsi/event_management/sdk/custom_group_action_base.py:121
msgid "No notable_data received"
msgstr ""
#: /Applications/Splunk/etc/apps/SA-ITOA/lib/itsi/csv_import/itoa_bulk_import_rest_interface_provider.py:49
msgid "No or insufficient data found. Check {} and try again."
msgstr ""
#: /Applications/Splunk/etc/apps/SA-ITOA/lib/ITOA/event_management/notable_event_ticketing.py:392
#, python-format
msgid "No refresh config found for %s."
msgstr ""
#: /Applications/Splunk/etc/apps/SA-ITOA/lib/SA_ITOA_app_common/solnlib/packages/schematics/types/base.py:1095
msgid "No requested locale was available."
msgstr ""
#: /Applications/Splunk/etc/apps/SA-ITOA/lib/itsi/event_management/sdk/custom_group_action_base.py:81
msgid "No results_file found in settings"
msgstr ""
#: /Applications/Splunk/etc/apps/SA-ITOA/bin/itsi_consumer.py:125
#, python-format
msgid "No selector found in data field=%s, key=%s, tid=%s"
msgstr ""
#: /Applications/Splunk/etc/apps/SA-ITOA/bin/kvstore_to_json.py:365
msgid "No service KPI operation specified."
msgstr ""
#: /Applications/Splunk/etc/apps/SA-ITOA/lib/itsi_module/itsi_module_service_template.py:40
msgid "No service template defined."
msgstr ""
#: /Applications/Splunk/etc/apps/SA-ITOA/lib/itsi/event_management/sdk/custom_group_action_base.py:68
msgid "No session key found in settings"
msgstr ""
#: /Applications/Splunk/etc/apps/SA-ITOA/lib/itsi/csv_import/itoa_bulk_import_modinput_interface_provider.py:346
#, python-format
msgid "No stanza exists in meta file: %s"
msgstr ""
#: /Applications/Splunk/etc/apps/SA-ITOA/lib/itsi/csv_import/itoa_bulk_import_entity_relationship_parser.py:61
msgid "No subject field for entity relationships found in source data."
msgstr ""
#: /Applications/Splunk/etc/apps/SA-ITOA/lib/itsi/itoa_rest_interface_provider/itoa_rest_interface_provider.py:1079
#, python-format
msgid "No such service for identifier=%s."
msgstr ""
#: /Applications/Splunk/etc/apps/SA-ITOA/lib/itsi/csv_import/itoa_bulk_import_service_parser.py:68
msgid "No title column \"{}\" found for services in source data."
msgstr ""
#: /Applications/Splunk/etc/apps/SA-ITOA/lib/itsi/csv_import/itoa_bulk_import_entity_parser.py:48
msgid "No title field for entities found in source data."
msgstr ""
#: /Applications/Splunk/etc/apps/SA-ITOA/lib/ITOA/itoa_refresh_queue_utils.py:175
msgid "No valid handler found for job: {0}."
msgstr ""
#: /Applications/Splunk/etc/apps/SA-ITOA/lib/migration/migration.py:112
msgid "No valid handler found for object_type: {0}, grab a noop handler."
msgstr ""
#: /Applications/Splunk/etc/apps/SA-ITOA/lib/ITOA/event_management/notable_event_group.py:342
msgid "Non dictionary type given for drilldown."
msgstr ""
#: /Applications/Splunk/etc/apps/SA-ITOA/lib/itsi/csv_import/itoa_bulk_import_entity.py:75
msgid "Non-iterable passed as metadata value."
msgstr ""
#: /Applications/Splunk/etc/apps/SA-ITOA/lib/itsi/searches/compute_health_score.py:759
msgid "None of fields:{0} exist in to get data"
msgstr ""
#: /Applications/Splunk/etc/apps/SA-ITOA/default/itsi_notable_event_severity.conf:18
msgid "Normal"
msgstr ""
#: /Applications/Splunk/etc/apps/SA-ITOA/lib/SA_ITOA_app_common/solnlib/packages/schematics/types/net.py:265
msgid "Not a well-formed email address."
msgstr ""
#: /Applications/Splunk/etc/apps/SA-ITOA/lib/ITOA/event_management/correlation_search.py:143
#: /Applications/Splunk/etc/apps/SA-ITOA/lib/ITOA/event_management/notable_event.py:162
msgid "Not implemented"
msgstr ""
#: /Applications/Splunk/etc/apps/SA-ITOA/lib/ITOA/event_management/notable_event.py:887
msgid "Notable event bulk update failed."
msgstr ""
#: /Applications/Splunk/etc/apps/SA-ITOA/lib/ITOA/event_management/notable_event_kpi_alert.py:74
#: /Applications/Splunk/etc/apps/SA-ITOA/lib/ITOA/event_management/notable_event_kpi_alert.py:95
#: /Applications/Splunk/etc/apps/SA-ITOA/lib/ITOA/event_management/notable_event_mad.py:79
msgid "Notable event creation failed."
msgstr ""
#: /Applications/Splunk/etc/apps/SA-ITOA/bin/itsi_notable_event_actions_queue_consumer.py:54
msgid "Number of jobs to be claimed in one request. Default value is 5."
msgstr ""
#: /Applications/Splunk/etc/apps/SA-ITOA/default/itsi_base_service_template.conf:2
msgid "OS KPIs - *nix (SAI)"
msgstr ""
#: /Applications/Splunk/etc/apps/SA-ITOA/default/itsi_base_service_template.conf:1548
msgid "OS KPIs - Windows (SAI)"
msgstr ""
#: /Applications/Splunk/etc/apps/SA-ITOA/lib/ITOA/event_management/notable_event_aggregation_policy.py:288
#, python-format
msgid "Object %s does not exist."
msgstr ""
#: /Applications/Splunk/etc/apps/SA-ITOA/lib/ITOA/event_management/base_event_management.py:479
#, python-format
msgid "Object ID is not a valid string, value=%s."
msgstr ""
#: /Applications/Splunk/etc/apps/SA-ITOA/lib/ITOA/event_management/base_event_management.py:515
#: /Applications/Splunk/etc/apps/SA-ITOA/lib/ITOA/event_management/notable_event.py:385
#, python-format
msgid "Object IDs is not a valid list, value=%s."
msgstr ""
#: /Applications/Splunk/etc/apps/SA-ITOA/lib/maintenance_services/objects/maintenance_calendar.py:119
#: /Applications/Splunk/etc/apps/SA-ITOA/lib/maintenance_services/objects/maintenance_calendar.py:380
#: /Applications/Splunk/etc/apps/SA-ITOA/lib/maintenance_services/objects/maintenance_calendar.py:496
msgid "Object does not exist."
msgstr ""
#: /Applications/Splunk/etc/apps/SA-ITOA/lib/ITOA/event_management/correlation_search.py:186
msgid "Object is not a valid splunk entity object."
msgstr ""
#: /Applications/Splunk/etc/apps/SA-ITOA/lib/ITOA/itoa_object.py:217
#, python-format
msgid ""
"Object names must be unique for object type: %s. List of duplicate names:"
" %s."
msgstr ""
#: /Applications/Splunk/etc/apps/SA-ITOA/lib/itsi/backup_restore/backup_restore_rest_provider.py:341
#: /Applications/Splunk/etc/apps/SA-ITOA/lib/itsi/itoa_rest_interface_provider/itoa_rest_interface_provider.py:636
#: /Applications/Splunk/etc/apps/SA-ITOA/lib/maintenance_services/maintenance_services_rest_provider/maintenance_services_rest_provider.py:182
msgid "Object not found."
msgstr ""
#: /Applications/Splunk/etc/apps/SA-ITOA/lib/itsi_module/itsi_module_common.py:525
msgid "Object title cannot be empty or none."
msgstr ""
#: /Applications/Splunk/etc/apps/SA-ITOA/lib/itsi_module/itsi_module_interface_provider_base.py:603
#, python-format
msgid "Object type is invalid. It should be: %s"
msgstr ""
#: /Applications/Splunk/etc/apps/SA-ITOA/lib/ITOA/storage/statestore.py:415
#, python-format
msgid "Object with ID: %s does not exist in statestore."
msgstr ""
#: /Applications/Splunk/etc/apps/SA-ITOA/lib/ITOA/storage/statestore.py:105
#, python-format
msgid ""
"Object you are trying to save is too large (%s bytes). KV store only "
"supports documents within 16MB sizes."
msgstr ""
#: /Applications/Splunk/etc/apps/SA-ITOA/lib/ITOA/event_management/notable_event.py:769
msgid "Object_id: {0} is not a valid string, object_id type is {1}."
msgstr ""
#: /Applications/Splunk/etc/apps/SA-ITOA/lib/ITOA/event_management/notable_event.py:814
msgid "Object_ids: {0} is not a valid list, object_ids type is {1}."
msgstr ""
#: /Applications/Splunk/etc/apps/SA-ITOA/lib/ITOA/event_management/notable_event.py:822
msgid "Object_ids: {0} to update don't match up with data_list: {1}."
msgstr ""
#: /Applications/Splunk/etc/apps/SA-ITOA/lib/maintenance_services/objects/maintenance_calendar.py:614
msgid ""
"Objects specified must be a valid non-empty list. Must specify at least "
"one object."
msgstr ""
#: /Applications/Splunk/etc/apps/SA-ITOA/bin/configure_itsi.py:50
msgid "Old configuration"
msgstr ""
#: /Applications/Splunk/etc/apps/SA-ITOA/lib/itsi/upgrade/itsi_migration.py:2471
#: /Applications/Splunk/etc/apps/SA-ITOA/lib/itsi/upgrade/itsi_migration.py:2644
msgid "Old glass table data is in invalid format."
msgstr ""
#: /Applications/Splunk/etc/apps/SA-ITOA/default/itsi_kpi_threshold_template.conf:41
#: /Applications/Splunk/etc/apps/SA-ITOA/default/itsi_kpi_threshold_template.conf:50
#: /Applications/Splunk/etc/apps/SA-ITOA/default/itsi_kpi_threshold_template.conf:59
#: /Applications/Splunk/etc/apps/SA-ITOA/default/itsi_kpi_threshold_template.conf:68
msgid "One chunk for 12AM-12PM, another chunk for 12PM-12AM"
msgstr ""
#: /Applications/Splunk/etc/apps/SA-ITOA/lib/itsi/upgrade/migration_handlers_4_2_0.py:50
msgid ""
"One or more KPIs may contain inconsistent entity configurations. [!{} "
"Click here for details.]"
msgstr ""
#: /Applications/Splunk/etc/apps/SA-ITOA/lib/SA_ITOA_app_common/solnlib/packages/schematics/types/compound.py:299
msgid "Only mappings may be used in a DictType"
msgstr ""
#: /Applications/Splunk/etc/apps/SA-ITOA/lib/itsi/backup_restore/backup_restore_rest_provider.py:78
msgid "Only one default scheduled backup is allowed."
msgstr ""
#: /Applications/Splunk/etc/apps/SA-ITOA/lib/itsi/objects/itsi_kpi.py:155
#, python-format
msgid ""
"Only positive numeric values are accepted to fill data gaps for object "
"\"%s\". Negative value provided. %s_key=\"%s\""
msgstr ""
#: /Applications/Splunk/etc/apps/SA-ITOA/lib/itsi_module/itsi_module_service_template.py:36
msgid ""
"Optional KPI refers to KPI ID {} that is not part of an exported KPI "
"group."
msgstr ""
#: /Applications/Splunk/etc/apps/SA-ITOA/lib/itsi/objects/itsi_kpi_threshold_template.py:109
msgid "Overlapping time blocks across multiple policies are not allowed."
msgstr ""
#: /Applications/Splunk/etc/apps/SA-ITOA/lib/itsi/objects/itsi_kpi_threshold_template.py:102
msgid "Overlapping time blocks within same policy are not allowed."
msgstr ""
#: /Applications/Splunk/etc/apps/SA-ITOA/bin/backfill_services.py:96
msgid ""
"PUT request requires the ID_ parameter, consider POST if you don't wish "
"to pass one"
msgstr ""
#: /Applications/Splunk/etc/apps/SA-ITOA/lib/itsi/event_management/event_management_rest_provider.py:771
#: /Applications/Splunk/etc/apps/SA-ITOA/lib/itsi/event_management/event_management_rest_provider.py:880
msgid "Payload is not a valid string."
msgstr ""
#: /Applications/Splunk/etc/apps/SA-ITOA/default/itsi_notable_event_status.conf:30
msgid "Pending"
msgstr ""
#: /Applications/Splunk/etc/apps/SA-ITOA/bin/itsi_scheduled_backup_caller.py:28
msgid "Performs auto backup on a regular basis."
msgstr ""
#: /Applications/Splunk/etc/apps/SA-ITOA/bin/itsi_service_template_update_scheduler.py:28
msgid "Performs scheduled sync from service templates to services."
msgstr ""
#: /Applications/Splunk/etc/apps/SA-ITOA/lib/maintenance_services/objects/maintenance_calendar.py:517
#: /Applications/Splunk/etc/apps/SA-ITOA/lib/maintenance_services/objects/maintenance_calendar.py:520
#: /Applications/Splunk/etc/apps/SA-ITOA/lib/maintenance_services/objects/maintenance_calendar.py:532
#: /Applications/Splunk/etc/apps/SA-ITOA/lib/maintenance_services/objects/maintenance_calendar.py:534
#: /Applications/Splunk/etc/apps/SA-ITOA/lib/maintenance_services/objects/maintenance_calendar.py:663
#: /Applications/Splunk/etc/apps/SA-ITOA/lib/maintenance_services/objects/maintenance_calendar.py:668
#: /Applications/Splunk/etc/apps/SA-ITOA/lib/maintenance_services/objects/maintenance_calendar.py:679
#: /Applications/Splunk/etc/apps/SA-ITOA/lib/maintenance_services/objects/maintenance_calendar.py:683
msgid "Permission denied."
msgstr ""
#: /Applications/Splunk/etc/apps/SA-ITOA/lib/itsi/itoa_rest_interface_provider/itoa_rest_interface_provider.py:305
#, python-format
msgid "Permissions can only be set for `%s`. Received: %s"
msgstr ""
#: /Applications/Splunk/etc/apps/SA-ITOA/lib/itsi/event_management/event_management_rest_provider.py:283
#: /Applications/Splunk/etc/apps/SA-ITOA/lib/itsi/itoa_rest_interface_provider/itoa_rest_interface_provider.py:397
msgid "Permissions found."
msgstr ""
#: /Applications/Splunk/etc/apps/SA-ITOA/lib/itsi/event_management/event_management_rest_provider.py:273
#: /Applications/Splunk/etc/apps/SA-ITOA/lib/itsi/itoa_rest_interface_provider/itoa_rest_interface_provider.py:387
msgid "Permissions not found."
msgstr ""
#: /Applications/Splunk/etc/apps/SA-ITOA/lib/itsi/event_management/event_management_rest_provider.py:120
#: /Applications/Splunk/etc/apps/SA-ITOA/lib/itsi/event_management/event_management_rest_provider.py:209
#: /Applications/Splunk/etc/apps/SA-ITOA/lib/itsi/itoa_rest_interface_provider/itoa_rest_interface_provider.py:216
#, python-format
msgid "Perms can only be set for `%s`. Received: %s."
msgstr ""
#: /Applications/Splunk/etc/apps/SA-ITOA/bin/kvstore_to_json.py:333
msgid ""
"Pick exactly one service KPI operation among: get, create, update and "
"delete."
msgstr ""
#: /Applications/Splunk/etc/apps/SA-ITOA/default/alert_actions.conf:22
msgid "Ping host"
msgstr ""
#: /Applications/Splunk/etc/apps/SA-ITOA/lib/SA_ITOA_app_common/solnlib/packages/schematics/types/compound.py:236
#, python-format
msgid "Please provide at least %d item."
msgstr ""
#: /Applications/Splunk/etc/apps/SA-ITOA/lib/SA_ITOA_app_common/solnlib/packages/schematics/types/compound.py:237
#, python-format
msgid "Please provide at least %d items."
msgstr ""
#: /Applications/Splunk/etc/apps/SA-ITOA/lib/SA_ITOA_app_common/solnlib/packages/schematics/types/compound.py:243
#, python-format
msgid "Please provide no more than %d item."
msgstr ""
#: /Applications/Splunk/etc/apps/SA-ITOA/lib/SA_ITOA_app_common/solnlib/packages/schematics/types/compound.py:244
#, python-format
msgid "Please provide no more than %d items."
msgstr ""
#: /Applications/Splunk/etc/apps/SA-ITOA/lib/SA_ITOA_app_common/solnlib/packages/schematics/types/compound.py:393
msgid "Please use a mapping for this field or an instance of {}"
msgstr ""
#: /Applications/Splunk/etc/apps/SA-ITOA/lib/itsi/objects/itsi_kpi_threshold_template.py:95
msgid "Policies with more than one time block definition are not supported."
msgstr ""
#: /Applications/Splunk/etc/apps/SA-ITOA/lib/ITOA/event_management/notable_event_aggregation_policy.py:126
#, python-format
msgid "Policy_id is not a string. Data type=%s."
msgstr ""
#: /Applications/Splunk/etc/apps/SA-ITOA/lib/ITOA/event_management/base_event_generation.py:379
msgid "Pre-processing step failed while creating notable event"
msgstr ""
#: /Applications/Splunk/etc/apps/SA-ITOA/lib/ITOA/itoa_refresh_queue_utils.py:77
msgid "Problem with input to create_refresh_job"
msgstr ""
#: /Applications/Splunk/etc/apps/SA-ITOA/lib/itsi/csv_import/itoa_bulk_import_modinput_interface_provider.py:262
msgid ""
"Processing completed. {} Entities created/updated. {} Services "
"created/updated. {} Entity relationships created/updated."
msgstr ""
#: /Applications/Splunk/etc/apps/SA-ITOA/lib/itsi/csv_import/itoa_bulk_import_modinput_interface_provider.py:252
msgid ""
"Processing import. Handled {} of {} rows ({}%). Entities written {}. "
"Services written {}. Entity Relationships written {}. Entities skipped "
"{}. Services skipped {}. Entity Relationships skipped {}. Import status: "
"{}."
msgstr ""
#: /Applications/Splunk/etc/apps/SA-ITOA/lib/itsi/upgrade/kvstore_backup_restore.py:195
#, python-format
msgid "Provided path=%s is neither a file nor a directory. Provide a valid path."
msgstr ""
#: /Applications/Splunk/etc/apps/SA-ITOA/lib/itsi/service_template/service_template_utils.py:357
msgid "Re-link operation is not supported through bulk import."
msgstr ""
#: /Applications/Splunk/etc/apps/SA-ITOA/lib/itsi/itoa_rest_interface_provider/itoa_rest_interface_provider.py:1204
msgid "Received a preview merge request with no entities."
msgstr ""
#: /Applications/Splunk/etc/apps/SA-ITOA/lib/itsi/event_management/itsi_notable_event_queue_consumer.py:82
msgid "Received empty session_key."
msgstr ""
#: /Applications/Splunk/etc/apps/SA-ITOA/lib/itsi/event_management/itsi_notable_event_queue_consumer.py:104
msgid "Received empty value for `audit_source`."
msgstr ""
#: /Applications/Splunk/etc/apps/SA-ITOA/lib/itsi/event_management/itsi_notable_event_queue_consumer.py:109
msgid "Received empty value for `audit_sourcetype`."
msgstr ""
#: /Applications/Splunk/etc/apps/SA-ITOA/lib/itsi/event_management/itsi_notable_event_queue_consumer.py:99
msgid "Received empty value for `audit_token_name`."
msgstr ""
#: /Applications/Splunk/etc/apps/SA-ITOA/lib/itsi/event_management/itsi_notable_event_queue_consumer.py:114
msgid "Received empty value for `instance_id`."
msgstr ""
#: /Applications/Splunk/etc/apps/SA-ITOA/lib/itsi/event_management/itsi_notable_event_queue_consumer.py:94
msgid "Received empty value for collection name."
msgstr ""
#: /Applications/Splunk/etc/apps/SA-ITOA/lib/itsi_module/itsi_module_interface_provider_base.py:645
msgid "Received unexpected results from dispatcher: {}."
msgstr ""
#: /Applications/Splunk/etc/apps/SA-ITOA/lib/itsi_module/itsi_module_service_template.py:35
msgid ""
"Recommended KPI refers to KPI ID {} that is not part of an exported KPI "
"group."
msgstr ""
#: /Applications/Splunk/etc/apps/SA-ITOA/bin/itsi_user_access_init.py:35
msgid "Registers ITSI's capabilities with SA-UserAccess."
msgstr ""
#: /Applications/Splunk/etc/apps/SA-ITOA/lib/itsi/backfill/__init__.py:431
#, python-format
msgid "RequestProcessor: Attempted to adopt a non-running request %s"
msgstr ""
#: /Applications/Splunk/etc/apps/SA-ITOA/lib/itsi/access_control/access_control_controller_utils.py:755
msgid "Requested IDs: {} are accessible."
msgstr ""
#: /Applications/Splunk/etc/apps/SA-ITOA/lib/itsi_module/itsi_module_common.py:394
#: /Applications/Splunk/etc/apps/SA-ITOA/lib/itsi_module/itsi_module_common.py:437
#: /Applications/Splunk/etc/apps/SA-ITOA/lib/itsi_module/itsi_module_common.py:472
msgid "Requested itsi_module does not exist."
msgstr ""
#: /Applications/Splunk/etc/apps/SA-ITOA/lib/itsi_module/itsi_module_common.py:506
#: /Applications/Splunk/etc/apps/SA-ITOA/lib/itsi_module/itsi_module_common.py:714
#, python-format
msgid "Requested itsi_object: %s / object_id=%s does not exist."
msgstr ""
#: /Applications/Splunk/etc/apps/SA-ITOA/lib/itsi_module/itsi_module_common.py:663
msgid "Requested module/conf file does not exist."
msgstr ""
#: /Applications/Splunk/etc/apps/SA-ITOA/lib/itsi_module/itsi_module_modules.py:43
msgid ""
"Requested package does not exist. Either module was not created, or not "
"exported yet."
msgstr ""
#: /Applications/Splunk/etc/apps/SA-ITOA/bin/command_suppress_alert.py:36
msgid "Required field `count` is missing."
msgstr ""
#: /Applications/Splunk/etc/apps/SA-ITOA/bin/command_suppress_alert.py:39
msgid "Required field `is_consecutive` is missing."
msgstr ""
#: /Applications/Splunk/etc/apps/SA-ITOA/lib/ITOA/event_management/base_event_generation.py:224
msgid "Required field={0} does not exist"
msgstr ""
#: /Applications/Splunk/etc/apps/SA-ITOA/lib/itsi/csv_import/itoa_csv_spec_transformer.py:112
msgid ""
"Required fields not found. Make sure both \"transaction_id\" and "
"\"uploaded_by\" are included in meta file."
msgstr ""
#: /Applications/Splunk/etc/apps/SA-ITOA/lib/itsi/backfill/itsi_backfill_requests.py:130
#, python-format
msgid "Required keys %s are missing from model data"
msgstr ""
#: /Applications/Splunk/etc/apps/SA-ITOA/bin/deep_dive_services.py:225
msgid "Required parameter drilldowns missing."
msgstr ""
#: /Applications/Splunk/etc/apps/SA-ITOA/bin/itsi_async_csv_loader.py:56
#: /Applications/Splunk/etc/apps/SA-ITOA/bin/itsi_csv_import.py:64
msgid "Required. Do you wish to import further via a search or from disk on file?"
msgstr ""
#: /Applications/Splunk/etc/apps/SA-ITOA/lib/itsi/objects/itsi_service.py:1852
msgid ""
"Requires a valid entity alias mapping to be set to generate searches when"
" filtering on entities in {}."
msgstr ""
#: /Applications/Splunk/etc/apps/SA-ITOA/lib/itsi/objects/itsi_service.py:1862
msgid ""
"Requires a valid entity breakdown id field in order to split KPI by "
"entities."
msgstr ""
#: /Applications/Splunk/etc/apps/SA-ITOA/default/itsi_notable_event_status.conf:36
msgid "Resolved"
msgstr ""
#: /Applications/Splunk/etc/apps/SA-ITOA/lib/ITOA/event_management/base_event_generation.py:104
msgid "Result must have an ID"
msgstr ""
#: /Applications/Splunk/etc/apps/SA-ITOA/bin/itsi_age_kpi_alert_value_cache.py:41
msgid "Retention Time"
msgstr ""
#: /Applications/Splunk/etc/apps/SA-ITOA/default/savedsearches.conf:33
msgid ""
"Retrieves a list of Netapp Vservers from the Netapp App, for use for "
"importing into IT Service Intelligence as entities"
msgstr ""
#: /Applications/Splunk/etc/apps/SA-ITOA/default/savedsearches.conf:28
msgid ""
"Retrieves a list of Netapp controllers, for use importing into IT Service"
" Intelligence as entities"
msgstr ""
#: /Applications/Splunk/etc/apps/SA-ITOA/default/savedsearches.conf:43
msgid ""
"Retrieves a list of aggregates from the Netapp App, for use into "
"importing into IT Service Intelligence as entities."
msgstr ""
#: /Applications/Splunk/etc/apps/SA-ITOA/default/savedsearches.conf:48
msgid ""
"Retrieves a list of disks from the Netapp App, for use into importing "
"into IT Service Intelligence as entities."
msgstr ""
#: /Applications/Splunk/etc/apps/SA-ITOA/default/savedsearches.conf:76
msgid "Retrieves a list of hosts generating Windows host data"
msgstr ""
#: /Applications/Splunk/etc/apps/SA-ITOA/default/savedsearches.conf:38
msgid ""
"Retrieves a list of volumes from the Netapp App, for use importing into "
"IT Service Intelligence as entities"
msgstr ""
#: /Applications/Splunk/etc/apps/SA-ITOA/bin/itsi_backup_restore.py:21
msgid "Runs backup and restore jobs."
msgstr ""
#: /Applications/Splunk/etc/apps/SA-ITOA/bin/itsi_consumer.py:146
msgid "Runs deferred operations to ensure consistency for ITSI knowledge objects."
msgstr ""
#: /Applications/Splunk/etc/apps/SA-ITOA/default/itsi_kpi_base_search.conf:460
msgid "SAI:Cloud.Performance.AWS-EBS"
msgstr ""
#: /Applications/Splunk/etc/apps/SA-ITOA/default/itsi_kpi_base_search.conf:562
msgid "SAI:Cloud.Performance.AWS-EC2"
msgstr ""
#: /Applications/Splunk/etc/apps/SA-ITOA/default/itsi_kpi_base_search.conf:326
msgid "SAI:OS.Performance.Windows"
msgstr ""
#: /Applications/Splunk/etc/apps/SA-ITOA/default/itsi_kpi_base_search.conf:386
msgid "SAI:OS.Performance.Windows.instance"
msgstr ""
#: /Applications/Splunk/etc/apps/SA-ITOA/default/itsi_kpi_base_search.conf:2
msgid "SAI:OS.Performance.nix"
msgstr ""
#: /Applications/Splunk/etc/apps/SA-ITOA/default/itsi_kpi_base_search.conf:118
msgid "SAI:OS.Performance.nix.disk"
msgstr ""
#: /Applications/Splunk/etc/apps/SA-ITOA/default/itsi_kpi_base_search.conf:192
msgid "SAI:OS.Performance.nix.disk_device"
msgstr ""
#: /Applications/Splunk/etc/apps/SA-ITOA/default/itsi_kpi_base_search.conf:238
msgid "SAI:OS.Performance.nix.network"
msgstr ""
#: /Applications/Splunk/etc/apps/SA-ITOA/lib/itsi/scheduled_backup/backup_scheduler.py:272
msgid ""
"Scheduled backup job failed. The next scheduled backup job will run in an"
" hour."
msgstr ""
#: /Applications/Splunk/etc/apps/SA-ITOA/lib/itsi/scheduled_backup/backup_scheduler.py:259
#, python-format
msgid ""
"Scheduled backup job updated successfully. The next scheduled backup job "
"will run at %s."
msgstr ""
#: /Applications/Splunk/etc/apps/SA-ITOA/lib/itsi/upgrade/kvstore_backup_restore.py:1128
msgid ""
"Scheduled sync of service template is in progress, cannot create backup "
"at this time. Try again a little later. To see the status of sync "
"operations, check the service template lister page."
msgstr ""
#: /Applications/Splunk/etc/apps/SA-ITOA/lib/ITOA/event_management/notable_event_utils.py:461
#, python-format
msgid "Search String=%s is not a valid string, type=%s."
msgstr ""
#: /Applications/Splunk/etc/apps/SA-ITOA/lib/ITOA/event_management/correlation_search.py:103
msgid "Search data is not defined, type={0}."
msgstr ""
#: /Applications/Splunk/etc/apps/SA-ITOA/lib/ITOA/event_management/notable_event_utils.py:482
#, python-format
msgid "Search failed to clean up event(s), messages=\"%s\"."
msgstr ""
#: /Applications/Splunk/etc/apps/SA-ITOA/lib/ITOA/event_management/notable_event_actions.py:867
#, python-format
msgid "Search failed with message=%s"
msgstr ""
#: /Applications/Splunk/etc/apps/SA-ITOA/lib/ITOA/event_management/correlation_search.py:216
msgid "Search name is not valid, type={0}."
msgstr ""
#: /Applications/Splunk/etc/apps/SA-ITOA/lib/ITOA/event_management/correlation_search.py:107
#: /Applications/Splunk/etc/apps/SA-ITOA/lib/ITOA/event_management/correlation_search.py:283
msgid "Search name={0} is not defined."
msgstr ""
#: /Applications/Splunk/etc/apps/SA-ITOA/lib/ITOA/event_management/correlation_search.py:112
msgid "Search string is not defined, value={0}."
msgstr ""
#: /Applications/Splunk/etc/apps/SA-ITOA/bin/itsi_async_csv_loader.py:64
#: /Applications/Splunk/etc/apps/SA-ITOA/bin/itsi_csv_import.py:72
msgid "Search string that would become a saved search for importing purposes"
msgstr ""
#: /Applications/Splunk/etc/apps/SA-ITOA/bin/itsi_async_csv_loader.py:63
#: /Applications/Splunk/etc/apps/SA-ITOA/bin/itsi_csv_import.py:71
msgid "Search string to execute for importing"
msgstr ""
#: /Applications/Splunk/etc/apps/SA-ITOA/default/alert_actions.conf:51
msgid "Send Episode to Phantom"
msgstr ""
#: /Applications/Splunk/etc/apps/SA-ITOA/default/alert_actions.conf:5
msgid "Send ITSI alert to summary index"
msgstr ""
#: /Applications/Splunk/etc/apps/SA-ITOA/default/alert_actions.conf:50
msgid "Send to Phantom"
msgstr ""
#: /Applications/Splunk/etc/apps/SA-ITOA/bin/itsi_async_csv_loader.py:163
#: /Applications/Splunk/etc/apps/SA-ITOA/bin/itsi_csv_import.py:176
msgid "Service Dependencies Specification"
msgstr ""
#: /Applications/Splunk/etc/apps/SA-ITOA/bin/itsi_async_csv_loader.py:164
#: /Applications/Splunk/etc/apps/SA-ITOA/bin/itsi_csv_import.py:177
msgid ""
"Service Dependencies for Service Import. A comma-separate list of field "
"names. Objects in these fields will be made child objects of the service"
" specified in the service_title_field column. Search "
"'sourcetype=itsi_internal_log' in Splunk for any errors"
msgstr ""
#: /Applications/Splunk/etc/apps/SA-ITOA/bin/itsi_async_csv_loader.py:146
#: /Applications/Splunk/etc/apps/SA-ITOA/bin/itsi_csv_import.py:159
msgid "Service Description Column"
msgstr ""
#: /Applications/Splunk/etc/apps/SA-ITOA/lib/itsi/event_management/itsi_correlation_search.py:228
msgid "Service ID is not valid."
msgstr ""
#: /Applications/Splunk/etc/apps/SA-ITOA/lib/itsi/event_management/itsi_correlation_search.py:224
msgid "Service ID or KPI ID are not provided."
msgstr ""
#: /Applications/Splunk/etc/apps/SA-ITOA/lib/itsi/event_management/itsi_correlation_search.py:178
msgid "Service IDs are not set, service_ids=\"{0}\"."
msgstr ""
#: /Applications/Splunk/etc/apps/SA-ITOA/bin/itsi_async_csv_loader.py:153
#: /Applications/Splunk/etc/apps/SA-ITOA/bin/itsi_csv_import.py:166
msgid ""
"Service Relationship for Service Import/Entity Import. A comma separated "
"list of strings. For example, 'service1,service2,service3' implies "
"'service1 depends on service2' 'service2 depends on service3'. All "
"services in the line are related to one another. Adding it in this "
"fashion would tie up the 'Service Health KPIs' for each of the services "
"with each other. Search 'sourcetype=itsi_internal_log' in Splunk for any "
"errors"
msgstr ""
#: /Applications/Splunk/etc/apps/SA-ITOA/bin/itsi_async_csv_loader.py:152
#: /Applications/Splunk/etc/apps/SA-ITOA/bin/itsi_csv_import.py:165
msgid "Service Relationships Specification"
msgstr ""
#: /Applications/Splunk/etc/apps/SA-ITOA/bin/itsi_csv_import.py:195
msgid "Service Template Column"
msgstr ""
#: /Applications/Splunk/etc/apps/SA-ITOA/bin/itsi_async_csv_loader.py:187
#: /Applications/Splunk/etc/apps/SA-ITOA/bin/itsi_csv_import.py:221
msgid "Service Title Associating Service To Entity"
msgstr ""
#: /Applications/Splunk/etc/apps/SA-ITOA/bin/itsi_async_csv_loader.py:140
#: /Applications/Splunk/etc/apps/SA-ITOA/bin/itsi_csv_import.py:153
msgid "Service Title Column"
msgstr ""
#: /Applications/Splunk/etc/apps/SA-ITOA/lib/itsi/objects/itsi_service.py:2091
#: /Applications/Splunk/etc/apps/SA-ITOA/lib/itsi/objects/itsi_service.py:2127
#, python-format
msgid ""
"Service dependency was broken by this action. Service %s no longer "
"depends on service %s."
msgstr ""
#: /Applications/Splunk/etc/apps/SA-ITOA/lib/itsi/upgrade/migration_handlers_2_5_0.py:155
#, python-format
msgid ""
"Service is not a valid dictionary, found type %s. Cannot apply timezone "
"offset."
msgstr ""
#: /Applications/Splunk/etc/apps/SA-ITOA/lib/itsi_module/itsi_module_service_template.py:32
msgid "Service template ID needs to be prefixed with module ID."
msgstr ""
#: /Applications/Splunk/etc/apps/SA-ITOA/lib/itsi/objects/itsi_service_template.py:666
msgid ""
"Service template changes cannot be pushed now because a backup/restore is"
" currently in progress. The service template sync has been scheduled for "
"a later time."
msgstr ""
#: /Applications/Splunk/etc/apps/SA-ITOA/lib/itsi_module/itsi_module_service_template.py:41
msgid "Service template does not contain a description."
msgstr ""
#: /Applications/Splunk/etc/apps/SA-ITOA/lib/itsi_module/itsi_module_service_template.py:33
msgid "Service template requires a title."
msgstr ""
#: /Applications/Splunk/etc/apps/SA-ITOA/lib/itsi_module/itsi_module_service_template.py:34
msgid "Service template requires at least one recommended KPI."
msgstr ""
#: /Applications/Splunk/etc/apps/SA-ITOA/lib/itsi/service_template/service_template_utils.py:86
msgid "Service with ID: {} does not exist."
msgstr ""
#: /Applications/Splunk/etc/apps/SA-ITOA/lib/ITOA/event_management/notable_event_retention_policy.py:31
#: /Applications/Splunk/etc/apps/SA-ITOA/lib/itsi/searches/kpi_summary_cache_retention_policy.py:20
#, python-format
msgid "Session key is not defined, session_key=%s"
msgstr ""
#: /Applications/Splunk/etc/apps/SA-ITOA/default/searchbnf.conf:53
msgid "Sets alert_* fields for a KPI."
msgstr ""
#: /Applications/Splunk/etc/apps/SA-ITOA/default/searchbnf.conf:52
msgid ""
"Sets alert_severity, alert_level, alert_color, alert_value, alert_entity "
"fields; serviceid and kpiid fields must be passed as argument."
msgstr ""
#: /Applications/Splunk/etc/apps/SA-ITOA/lib/itsi/objects/itsi_kpi.py:529
msgid ""
"Shared base KPIs does not seem to have populated a base search. Specify a"
" base search for the KPI."
msgstr ""
#: /Applications/Splunk/etc/apps/SA-ITOA/lib/itsi/objects/itsi_kpi.py:226
#, python-format
msgid ""
"Shared base search configured on KPI \"%s\" does not match security group"
" of KPI/Service. Check the team on the service."
msgstr ""
#: /Applications/Splunk/etc/apps/SA-ITOA/lib/ITOA/itoa_common.py:892
msgid "Size of one object={0} is more than 50 MB, splunk can't handle that size."
msgstr ""
#: /Applications/Splunk/etc/apps/SA-ITOA/lib/itsi/objects/itsi_service.py:2028
msgid "Some or all services are being configured with invalid teams."
msgstr ""
#: /Applications/Splunk/etc/apps/SA-ITOA/lib/itsi/searches/itsi_filter.py:42
#, python-format
msgid ""
"Source data could not be recognized as a string or parsed json. Data "
"passed in: %s"
msgstr ""
#: /Applications/Splunk/etc/apps/SA-ITOA/lib/itsi/csv_import/itoa_bulk_import_specification.py:312
msgid "Specification expects {} to be a {}, but it was not."
msgstr ""
#: /Applications/Splunk/etc/apps/SA-ITOA/bin/backup_restore_interface_splunkd.py:241
#: /Applications/Splunk/etc/apps/SA-ITOA/bin/backup_restore_interface_splunkd.py:249
#: /Applications/Splunk/etc/apps/SA-ITOA/bin/backup_restore_interface_splunkd.py:255
#: /Applications/Splunk/etc/apps/SA-ITOA/bin/backup_restore_interface_splunkd.py:284
#: /Applications/Splunk/etc/apps/SA-ITOA/bin/event_management_interface_splunkd.py:482
#: /Applications/Splunk/etc/apps/SA-ITOA/bin/event_management_interface_splunkd.py:490
#: /Applications/Splunk/etc/apps/SA-ITOA/bin/event_management_interface_splunkd.py:496
#: /Applications/Splunk/etc/apps/SA-ITOA/bin/event_management_interface_splunkd.py:538
#: /Applications/Splunk/etc/apps/SA-ITOA/bin/event_management_interface_splunkd.py:576
#: /Applications/Splunk/etc/apps/SA-ITOA/bin/itoa_rest_interface_splunkd.py:776
#: /Applications/Splunk/etc/apps/SA-ITOA/bin/itoa_rest_interface_splunkd.py:784
#: /Applications/Splunk/etc/apps/SA-ITOA/bin/itoa_rest_interface_splunkd.py:790
#: /Applications/Splunk/etc/apps/SA-ITOA/bin/itoa_rest_interface_splunkd.py:805
#: /Applications/Splunk/etc/apps/SA-ITOA/bin/itoa_rest_interface_splunkd.py:850
#: /Applications/Splunk/etc/apps/SA-ITOA/bin/itsi_module_interface_splunkd.py:369
#: /Applications/Splunk/etc/apps/SA-ITOA/bin/itsi_module_interface_splunkd.py:380
#: /Applications/Splunk/etc/apps/SA-ITOA/bin/itsi_module_interface_splunkd.py:411
#: /Applications/Splunk/etc/apps/SA-ITOA/bin/maintenance_services_interface_splunkd.py:227
#: /Applications/Splunk/etc/apps/SA-ITOA/bin/maintenance_services_interface_splunkd.py:235
#: /Applications/Splunk/etc/apps/SA-ITOA/bin/maintenance_services_interface_splunkd.py:243
#: /Applications/Splunk/etc/apps/SA-ITOA/bin/maintenance_services_interface_splunkd.py:266
msgid "Specified REST url/path is invalid - {}."
msgstr ""
#: /Applications/Splunk/etc/apps/SA-ITOA/bin/kvstore_to_json.py:336
msgid ""
"Specified file path is invalid. It must be a directory containing "
"input.jsonwith the input to the specified service KPI operation. On exit,"
" it will contain output.json with the results."
msgstr ""
#: /Applications/Splunk/etc/apps/SA-ITOA/lib/itsi/upgrade/migration_handlers_2_5_0.py:488
#: /Applications/Splunk/etc/apps/SA-ITOA/lib/itsi/upgrade/migration_handlers_2_6_0.py:457
#, python-format
msgid "Specified object type \"%s\" is invalid."
msgstr ""
#: /Applications/Splunk/etc/apps/SA-ITOA/lib/itsi/upgrade/migration_handlers_2_5_0.py:511
#: /Applications/Splunk/etc/apps/SA-ITOA/lib/itsi/upgrade/migration_handlers_2_6_0.py:480
msgid "Specified timezone offset to apply is invalid. Must pick a number."
msgstr ""
#: /Applications/Splunk/etc/apps/SA-ITOA/lib/maintenance_services/objects/maintenance_calendar.py:583
msgid "Start time and end time are mandatory fields. Must specify both."
msgstr ""
#: /Applications/Splunk/etc/apps/SA-ITOA/lib/maintenance_services/objects/maintenance_calendar.py:600
msgid "Start time and end time must be valid epoch time. Check the values."
msgstr ""
#: /Applications/Splunk/etc/apps/SA-ITOA/lib/maintenance_services/objects/maintenance_calendar.py:606
msgid "Start time must be earlier than end time. Check the values."
msgstr ""
#: /Applications/Splunk/etc/apps/SA-ITOA/bin/command_storeentities.py:229
msgid ""
"Storeentities error - identifying field {0} must be non-Null for all "
"entities"
msgstr ""
#: /Applications/Splunk/etc/apps/SA-ITOA/bin/command_storeentities.py:333
#, python-format
msgid "Storeentities exception: %s"
msgstr ""
#: /Applications/Splunk/etc/apps/SA-ITOA/bin/itsi_user_access_init.py:58
msgid ""
"String indicating the name of the app that wants to register its "
"capabilities."
msgstr ""
#: /Applications/Splunk/etc/apps/SA-ITOA/lib/SA_ITOA_app_common/solnlib/packages/schematics/types/base.py:389
msgid "String value did not match validation regex."
msgstr ""
#: /Applications/Splunk/etc/apps/SA-ITOA/lib/SA_ITOA_app_common/solnlib/packages/schematics/types/base.py:1098
msgid "String value in locale {0} did not match validation regex."
msgstr ""
#: /Applications/Splunk/etc/apps/SA-ITOA/lib/SA_ITOA_app_common/solnlib/packages/schematics/types/base.py:1093
msgid "String value in locale {0} is too long."
msgstr ""
#: /Applications/Splunk/etc/apps/SA-ITOA/lib/SA_ITOA_app_common/solnlib/packages/schematics/types/base.py:1094
msgid "String value in locale {0} is too short."
msgstr ""
#: /Applications/Splunk/etc/apps/SA-ITOA/lib/SA_ITOA_app_common/solnlib/packages/schematics/types/base.py:387
msgid "String value is too long."
msgstr ""
#: /Applications/Splunk/etc/apps/SA-ITOA/lib/SA_ITOA_app_common/solnlib/packages/schematics/types/base.py:388
msgid "String value is too short."
msgstr ""
#: /Applications/Splunk/etc/apps/SA-ITOA/lib/itsi/event_management/itsi_notable_event_queue_consumer.py:519
msgid "Successfully action=executed notable_event_action, ret_data={}."
msgstr ""
#: /Applications/Splunk/etc/apps/SA-ITOA/lib/ITOA/event_management/hec_utils.py:252
#, python-format
msgid "Successfully created token=`%s`, response=%s, content=%s."
msgstr ""
#: /Applications/Splunk/etc/apps/SA-ITOA/lib/itsi/event_management/itsi_notable_event_queue_consumer.py:545
msgid "Successfully executed action=notable_event_change, ret={}."
msgstr ""
#: /Applications/Splunk/etc/apps/SA-ITOA/lib/itsi/event_management/itsi_notable_event_queue_consumer.py:461
msgid ""
"Successfully executed action=notable_event_group_state_change, "
"updated/create group state={}."
msgstr ""
#: /Applications/Splunk/etc/apps/SA-ITOA/lib/itsi/event_management/itsi_notable_event_queue_consumer.py:591
msgid "Successfully executed action={0}, ret_data={1}."
msgstr ""
#: /Applications/Splunk/etc/apps/SA-ITOA/lib/itsi/event_management/itsi_notable_event_queue_consumer.py:629
msgid "Successfully executed action={0}."
msgstr ""
#: /Applications/Splunk/etc/apps/SA-ITOA/lib/itsi/event_management/itsi_notable_event_queue_consumer.py:434
msgid "Successfully executed actions={}."
msgstr ""
#: /Applications/Splunk/etc/apps/SA-ITOA/lib/ITOA/event_management/base_event_generation.py:74
msgid "Successfully retrieved search job info."
msgstr ""
#: /Applications/Splunk/etc/apps/SA-ITOA/lib/itsi/event_management/event_management_rest_provider.py:168
#: /Applications/Splunk/etc/apps/SA-ITOA/lib/itsi/event_management/event_management_rest_provider.py:264
#: /Applications/Splunk/etc/apps/SA-ITOA/lib/itsi/itoa_rest_interface_provider/itoa_rest_interface_provider.py:264
#: /Applications/Splunk/etc/apps/SA-ITOA/lib/itsi/itoa_rest_interface_provider/itoa_rest_interface_provider.py:378
msgid "Successfully updated permissions."
msgstr ""
#: /Applications/Splunk/etc/apps/SA-ITOA/lib/itsi/service_template/service_template_utils.py:597
msgid "Successfully updated {} services linked to service template {}. "
msgstr ""
#: /Applications/Splunk/etc/apps/SA-ITOA/bin/itsi_backfill.py:37
msgid ""
"Supervises long-running backfill jobs that generate summarized KPI "
"metrics from raw data."
msgstr ""
#: /Applications/Splunk/etc/apps/SA-ITOA/bin/itsi_csv_import.py:77
msgid "Team"
msgstr ""
#: /Applications/Splunk/etc/apps/SA-ITOA/lib/itsi/objects/itsi_security_group.py:393
#, python-format
msgid "Team \"%s\" cannot be deleted since it has objects inheriting from it."
msgstr ""
#: /Applications/Splunk/etc/apps/SA-ITOA/lib/itsi/objects/itsi_service.py:2077
msgid "Team is incorrectly configured for the service."
msgstr ""
#: /Applications/Splunk/etc/apps/SA-ITOA/bin/itsi_csv_import.py:78
msgid "Team that the imported service(s) object should be associated with."
msgstr ""
#: /Applications/Splunk/etc/apps/SA-ITOA/lib/itsi/objects/itsi_security_group.py:463
#, python-format
msgid ""
"Team with name: \"%s\" cannot be deleted because it contains services. "
"Move or delete the services first."
msgstr ""
#: /Applications/Splunk/etc/apps/SA-ITOA/default/itsi_kpi_template.conf:2
msgid "Templates"
msgstr ""
#: /Applications/Splunk/etc/apps/SA-ITOA/default/searchbnf.conf:44
msgid "The ID of the KPI that the search field belongs to."
msgstr ""
#: /Applications/Splunk/etc/apps/SA-ITOA/default/searchbnf.conf:40
msgid "The ID of the service that KPI belongs to."
msgstr ""
#: /Applications/Splunk/etc/apps/SA-ITOA/lib/itsi/objects/itsi_service_template.py:106
msgid ""
"The `service_id` or the `base_service_template_id` field is required to "
"create a service template."
msgstr ""
#: /Applications/Splunk/etc/apps/SA-ITOA/lib/itsi/objects/itsi_service.py:1440
#, python-format
msgid ""
"The base_service_template_id must be provided. A KPI cannot be unlinked "
"from a service template, only a service can be unlinked from a service "
"template. service_id=\"%s\", kpi_id=\"%s\""
msgstr ""
#: /Applications/Splunk/etc/apps/SA-ITOA/lib/itsi/csv_import/itoa_bulk_import_rest_interface_provider.py:228
msgid ""
"The file is not in ASCII or UTF format. Encoding not detected. Check the "
"CSV file."
msgstr ""
#: /Applications/Splunk/etc/apps/SA-ITOA/lib/itsi_module/itsi_module_modules.py:41
msgid "The filename you are requesting is an invalid SPL package."
msgstr ""
#: /Applications/Splunk/etc/apps/SA-ITOA/lib/itsi_module/itsi_module_service_template.py:189
msgid "The filter provided is invalid JSON."
msgstr ""
#: /Applications/Splunk/etc/apps/SA-ITOA/lib/itsi/csv_import/itoa_bulk_import_rest_interface_provider.py:216
msgid ""
"The following column names are duplicated: {}. Change the column names "
"and try again."
msgstr ""
#: /Applications/Splunk/etc/apps/SA-ITOA/default/itsi_notable_event_status.conf:37
msgid "The issue has been resolved and awaits verification"
msgstr ""
#: /Applications/Splunk/etc/apps/SA-ITOA/bin/command_check_for_kvstore_size.py:83
msgid ""
"The itsi_services collection size is {0}mb which is larger than the KV "
"store get limit. Increase the max_size_per_result_mb setting in "
"SA_ITOA/local/limits.conf to more than {0}mb."
msgstr ""
#: /Applications/Splunk/etc/apps/SA-ITOA/lib/itsi/objects/itsi_backup_restore.py:63
msgid ""
"The keep_max_time value is too low ({}). Setting it to {} for {} "
"scheduled backup."
msgstr ""
#: /Applications/Splunk/etc/apps/SA-ITOA/bin/itsi_async_csv_loader.py:84
#: /Applications/Splunk/etc/apps/SA-ITOA/bin/itsi_csv_import.py:97
msgid ""
"The path to the CSV File. Please note that if it is stored remotely it "
"must be accessible to this machine"
msgstr ""
#: /Applications/Splunk/etc/apps/SA-ITOA/lib/kvstore_queue/kvstore_queue_consumer.py:199
#, python-format
msgid "The processing object is not callable method=%s uid=%s."
msgstr ""
#: /Applications/Splunk/etc/apps/SA-ITOA/lib/itsi_module/itsi_module_common.py:96
msgid "The requested module or ID was not found."
msgstr ""
#: /Applications/Splunk/etc/apps/SA-ITOA/lib/itsi/csv_import/itoa_bulk_import_rest_interface_provider.py:305
msgid ""
"The search failed. If the problem persists, contact support. Search Error"
" - {}"
msgstr ""
#: /Applications/Splunk/etc/apps/SA-ITOA/default/searchbnf.conf:48
msgid "The search field to get the value of from the provided KPI."
msgstr ""
#: /Applications/Splunk/etc/apps/SA-ITOA/lib/itsi/csv_import/itoa_bulk_import_rest_interface_provider.py:291
msgid "The search job was not started. {}"
msgstr ""
#: /Applications/Splunk/etc/apps/SA-ITOA/lib/itsi/objects/itsi_entity_relationship.py:145
msgid "The triple ({0}) is not completely specified in {1}"
msgstr ""
#: /Applications/Splunk/etc/apps/SA-ITOA/lib/itsi/objects/itsi_entity_relationship.py:354
msgid "There are more than one matching entity. {}"
msgstr ""
#: /Applications/Splunk/etc/apps/SA-ITOA/lib/itsi/objects/itsi_kpi_template.py:49
#, python-format
msgid ""
"There is no description specified for object_type: %s. Provide some "
"description for this KPI template."
msgstr ""
#: /Applications/Splunk/etc/apps/SA-ITOA/lib/itsi/objects/itsi_entity_relationship.py:350
msgid "There is no matching entity. {}"
msgstr ""
#: /Applications/Splunk/etc/apps/SA-ITOA/lib/itsi/objects/itsi_entity_relationship.py:213
msgid "There is no triple ({0}) with valid names"
msgstr ""
#: /Applications/Splunk/etc/apps/SA-ITOA/lib/itsi/csv_import/itoa_bulk_import.py:189
msgid "This class cannot be called directly."
msgstr ""
#: /Applications/Splunk/etc/apps/SA-ITOA/lib/SA_ITOA_app_common/solnlib/packages/schematics/types/base.py:167
msgid "This field is required."
msgstr ""
#: /Applications/Splunk/etc/apps/SA-ITOA/bin/itsi_user_access_init.py:52
msgid ""
"This flag indicates whether or not the application has previously "
"registered its capabilities."
msgstr ""
#: /Applications/Splunk/etc/apps/SA-ITOA/bin/configure_itsi.py:45
#: /Applications/Splunk/etc/apps/SA-ITOA/bin/itsi_age_kpi_alert_value_cache.py:37
#: /Applications/Splunk/etc/apps/SA-ITOA/bin/itsi_backfill.py:52
#: /Applications/Splunk/etc/apps/SA-ITOA/bin/itsi_backup_restore.py:34
#: /Applications/Splunk/etc/apps/SA-ITOA/bin/itsi_default_aggregation_policy_loader.py:41
#: /Applications/Splunk/etc/apps/SA-ITOA/bin/itsi_default_correlation_search_acl_loader.py:40
#: /Applications/Splunk/etc/apps/SA-ITOA/bin/itsi_refresher.py:42
#: /Applications/Splunk/etc/apps/SA-ITOA/bin/itsi_scheduled_backup_caller.py:40
#: /Applications/Splunk/etc/apps/SA-ITOA/bin/itsi_service_template_update_scheduler.py:40
#: /Applications/Splunk/etc/apps/SA-ITOA/bin/itsi_upgrade.py:44
#: /Applications/Splunk/etc/apps/SA-ITOA/bin/itsi_user_access_init.py:47
#: /Applications/Splunk/etc/apps/SA-ITOA/bin/maintenance_minder.py:36
msgid "This is the level at which the modular input will log data."
msgstr ""
#: /Applications/Splunk/etc/apps/SA-ITOA/bin/itsi_async_csv_loader.py:50
#: /Applications/Splunk/etc/apps/SA-ITOA/bin/itsi_csv_import.py:58
#: /Applications/Splunk/etc/apps/SA-ITOA/bin/itsi_notable_event_hec_init.py:39
msgid ""
"This is the level at which the modular input will log data; DEBUG, INFO, "
"WARN, ERROR. Defaults to WARN."
msgstr ""
#: /Applications/Splunk/etc/apps/SA-ITOA/lib/ITOA/controller_utils.py:125
msgid ""
"This object is provided as a template and cannot be edited. Clone the "
"object to customize its settings."
msgstr ""
#: /Applications/Splunk/etc/apps/SA-ITOA/lib/itsi/event_management/correlation_search_generation.py:96
msgid "Threshold score is not set, for id={0}"
msgstr ""
#: /Applications/Splunk/etc/apps/SA-ITOA/lib/itsi/event_management/event_management_rest_provider.py:590
msgid "Ticket ID must be defined to create or update ticket."
msgstr ""
#: /Applications/Splunk/etc/apps/SA-ITOA/lib/itsi/event_management/event_management_rest_provider.py:588
msgid "Ticket System must be defined to create or update ticket."
msgstr ""
#: /Applications/Splunk/etc/apps/SA-ITOA/lib/itsi/event_management/event_management_rest_provider.py:592
msgid "Ticket URL must be defined to create or update ticket."
msgstr ""
#: /Applications/Splunk/etc/apps/SA-ITOA/lib/itsi/event_management/event_management_rest_provider.py:661
msgid "Ticket system/ID/URL must be specified to create or update ticket."
msgstr ""
#: /Applications/Splunk/etc/apps/SA-ITOA/lib/SA_ITOA_app_common/solnlib/packages/schematics/types/base.py:743
msgid "Time zone information not allowed."
msgstr ""
#: /Applications/Splunk/etc/apps/SA-ITOA/lib/SA_ITOA_app_common/solnlib/packages/schematics/types/base.py:742
msgid "Time zone information required but not found."
msgstr ""
#: /Applications/Splunk/etc/apps/SA-ITOA/lib/SA_ITOA_app_common/solnlib/packages/schematics/types/base.py:744
msgid "Time zone must be UTC but was None."
msgstr ""
#: /Applications/Splunk/etc/apps/SA-ITOA/lib/SA_ITOA_app_common/solnlib/packages/schematics/types/base.py:745
msgid "Time zone must be UTC."
msgstr ""
#: /Applications/Splunk/etc/apps/SA-ITOA/bin/itsi_notable_event_actions_queue_consumer.py:46
msgid "Timeout for given action"
msgstr ""
#: /Applications/Splunk/etc/apps/SA-ITOA/bin/itsi_notable_event_actions_queue_consumer.py:47
msgid "Timeout value for action queue. Default timeout is 30 minutes."
msgstr ""
#: /Applications/Splunk/etc/apps/SA-ITOA/lib/itsi/upgrade/migration_handlers_2_5_0.py:149
#: /Applications/Splunk/etc/apps/SA-ITOA/lib/itsi/upgrade/migration_handlers_2_6_0.py:196
#: /Applications/Splunk/etc/apps/SA-ITOA/lib/itsi/upgrade/migration_handlers_2_6_0.py:276
#, python-format
msgid ""
"Timezone offset specified is invalid. Must be within a 24-hour (1440 "
"minute) range. Specified value: %s "
msgstr ""
#: /Applications/Splunk/etc/apps/SA-ITOA/lib/itsi/objects/itsi_service.py:2281
msgid ""
"To change KPIs, pass in a non-empty list of service keys with their KPIs "
"list. Expected format: [{_key: <service key>, kpis: [{_key: <KPI key>, "
"<rest of KPI structure>}]]. Duplicate service entries (keys) received. "
"Check services specified."
msgstr ""
#: /Applications/Splunk/etc/apps/SA-ITOA/lib/itsi/objects/itsi_service.py:2258
msgid ""
"To change KPIs, pass in a non-empty list of service keys with their KPIs "
"list. Expected format: [{_key: <service key>, kpis: [{_key: <KPI key>, "
"<rest of KPI structure>}]]. Invalid input received."
msgstr ""
#: /Applications/Splunk/etc/apps/SA-ITOA/lib/itsi/objects/itsi_service.py:2272
msgid ""
"To change KPIs, pass in a non-empty list of service keys with their KPIs "
"list. Expected format: [{_key: <service key>, kpis: [{_key: <KPI key>, "
"<rest of KPI structure>}]]. Invalid service keys received."
msgstr ""
#: /Applications/Splunk/etc/apps/SA-ITOA/lib/itsi/objects/itsi_service.py:2317
msgid ""
"To change KPIs, pass in a non-empty list of service keys with their KPIs "
"list. Expected format: [{_key: <service key>, kpis: [{_key: <KPI key>, "
"<rest of KPI structure>}]]. No KPIs received for some services. Check the"
" KPIs."
msgstr ""
#: /Applications/Splunk/etc/apps/SA-ITOA/lib/itsi/objects/itsi_service.py:2297
msgid ""
"To change KPIs, pass in a non-empty list of service keys with their KPIs "
"list. Expected format: [{_key: <service key>, kpis: [{_key: <KPI key>, "
"<rest of KPI structure>}]]. No service keys received."
msgstr ""
#: /Applications/Splunk/etc/apps/SA-ITOA/lib/itsi/objects/itsi_service.py:2336
msgid ""
"To change KPIs, pass in a non-empty list of service keys with their KPIs "
"list. Expected format: [{_key: <service key>, kpis: [{_key: <KPI key>, "
"<rest of KPI structure>}]]. Some KPIs are specified with invalid key."
msgstr ""
#: /Applications/Splunk/etc/apps/SA-ITOA/lib/itsi/objects/itsi_service.py:2414
msgid ""
"To delete KPIs, pass in a list of service keys with the keys for the KPIs"
" to delete. Expected format: [{_key: <service key>, kpis: [{_key: <KPI "
"key>}]]. Duplicate service key received. Must specify all KPIs for a "
"service in one entry."
msgstr ""
#: /Applications/Splunk/etc/apps/SA-ITOA/lib/itsi/objects/itsi_service.py:2390
msgid ""
"To delete KPIs, pass in a list of service keys with the keys for the KPIs"
" to delete. Expected format: [{_key: <service key>, kpis: [{_key: <KPI "
"key>}]]. Invalid input received."
msgstr ""
#: /Applications/Splunk/etc/apps/SA-ITOA/lib/itsi/objects/itsi_service.py:2406
msgid ""
"To delete KPIs, pass in a list of service keys with the keys for the KPIs"
" to delete. Expected format: [{_key: <service key>, kpis: [{_key: <KPI "
"key>}]]. Specify at least one KPI per service."
msgstr ""
#: /Applications/Splunk/etc/apps/SA-ITOA/lib/itsi/objects/itsi_service.py:2194
msgid ""
"To get KPIs, pass in a list of service keys with their KPI keys. Expected"
" format: [{_key: <service key>, kpis: [{_key: <KPI key>}]]. Duplicate "
"service key entries received."
msgstr ""
#: /Applications/Splunk/etc/apps/SA-ITOA/lib/itsi/objects/itsi_service.py:2177
#: /Applications/Splunk/etc/apps/SA-ITOA/lib/itsi/objects/itsi_service.py:2202
msgid ""
"To get KPIs, pass in a list of service keys with their KPI keys. Expected"
" format: [{_key: <service key>, kpis: [{_key: <KPI key>}]]. Invalid input"
" received."
msgstr ""
#: /Applications/Splunk/etc/apps/SA-ITOA/lib/ITOA/event_management/notable_event_actions.py:617
msgid ""
"Too many episodes selected to perform this action. Select {} or fewer "
"episodes and try again."
msgstr ""
#: /Applications/Splunk/etc/apps/SA-ITOA/lib/itsi/csv_import/itoa_bulk_import_rest_interface_provider.py:193
#: /Applications/Splunk/etc/apps/SA-ITOA/lib/itsi/csv_import/itoa_bulk_import_rest_interface_provider.py:248
#: /Applications/Splunk/etc/apps/SA-ITOA/lib/itsi/csv_import/itoa_bulk_import_rest_interface_provider.py:368
msgid "Transaction id provided contains characters not supported."
msgstr ""
#: /Applications/Splunk/etc/apps/SA-ITOA/lib/itsi/objects/itsi_entity_relationship.py:220
msgid "Triple must be unique. There are duplicate triples in {0}"
msgstr ""
#: /Applications/Splunk/etc/apps/SA-ITOA/lib/ITOA/splunk_search_chunk_protocol.py:112
msgid "Type is not defined in out_meta_data to do get-exchange phase."
msgstr ""
#: /Applications/Splunk/etc/apps/SA-ITOA/lib/ITOA/itoa_common.py:365
msgid "Unable to convert string_array - passed in a {0}"
msgstr ""
#: /Applications/Splunk/etc/apps/SA-ITOA/lib/itsi/csv_import/itoa_bulk_import_specification.py:366
msgid "Unable to create entity info for invalid import_info- {0}."
msgstr ""
#: /Applications/Splunk/etc/apps/SA-ITOA/lib/ITOA/event_management/notable_event_kpi_alert.py:191
#: /Applications/Splunk/etc/apps/SA-ITOA/lib/ITOA/event_management/notable_event_kpi_alert.py:207
#: /Applications/Splunk/etc/apps/SA-ITOA/lib/ITOA/event_management/notable_event_mad.py:248
#, python-format
msgid "Unable to create notable event, %s"
msgstr ""
#: /Applications/Splunk/etc/apps/SA-ITOA/lib/itsi/csv_import/itoa_bulk_import_specification.py:338
msgid "Unable to create service info for invalid import_info- {0}."
msgstr ""
#: /Applications/Splunk/etc/apps/SA-ITOA/lib/ITOA/storage/statestore.py:368
msgid "Unable to decode response from statestore for {0} {1}."
msgstr ""
#: /Applications/Splunk/etc/apps/SA-ITOA/lib/itsi/upgrade/itsi_migration.py:987
#, python-format
msgid ""
"Unable to delete search: %s, disable it now. User will need to delete "
"this search manually."
msgstr ""
#: /Applications/Splunk/etc/apps/SA-ITOA/lib/itsi/backup_restore/backup_restore_rest_provider.py:109
msgid ""
"Unable to delete this job since it is currently in progress. Try again "
"later."
msgstr ""
#: /Applications/Splunk/etc/apps/SA-ITOA/lib/ITOA/storage/statestore.py:469
msgid "Unable to delete {0} {1}."
msgstr ""
#: /Applications/Splunk/etc/apps/SA-ITOA/lib/itsi/upgrade/itsi_migration.py:990
#, python-format
msgid ""
"Unable to disable search: %s, delete the search manually if it is not "
"done so."
msgstr ""
#: /Applications/Splunk/etc/apps/SA-ITOA/lib/ITOA/storage/statestore.py:433
msgid "Unable to edit {0} {1}."
msgstr ""
#: /Applications/Splunk/etc/apps/SA-ITOA/lib/itsi/backup_restore/backup_restore_rest_provider.py:445
msgid "Unable to find backup file on the current host."
msgstr ""
#: /Applications/Splunk/etc/apps/SA-ITOA/lib/itsi/backup_restore/backup_restore_rest_provider.py:448
msgid "Unable to find backup file."
msgstr ""
#: /Applications/Splunk/etc/apps/SA-ITOA/lib/itsi/backup_restore/backup_restore_rest_provider.py:441
msgid ""
"Unable to locate the backup file on this host. The backup is possibly "
"resident on another host in the search head cluster. Please try to "
"download the backup from other search head hosts."
msgstr ""
#: /Applications/Splunk/etc/apps/SA-ITOA/lib/itsi/backup_restore/backup_restore_rest_provider.py:432
#, python-format
msgid ""
"Unable to locate the backup file on this host. The backup is possibly "
"resident on the host: %s in the search head cluster. Please try to "
"download the backup from this host."
msgstr ""
#: /Applications/Splunk/etc/apps/SA-ITOA/lib/ITOA/storage/statestore.py:634
msgid "Unable to parse batch response from statestore for batch_edit"
msgstr ""
#: /Applications/Splunk/etc/apps/SA-ITOA/lib/ITOA/controller_utils.py:1142
msgid "Unable to parse expected JSON data {0}"
msgstr ""
#: /Applications/Splunk/etc/apps/SA-ITOA/lib/ITOA/storage/statestore.py:237
#: /Applications/Splunk/etc/apps/SA-ITOA/lib/ITOA/storage/statestore.py:364
msgid "Unable to parse response from statestore for {0} {1}."
msgstr ""
#: /Applications/Splunk/etc/apps/SA-ITOA/lib/itsi/csv_import/itoa_bulk_import_rest_interface_provider.py:282
msgid "Unable to reach Splunkd."
msgstr ""
#: /Applications/Splunk/etc/apps/SA-ITOA/lib/ITOA/event_management/push_event_manager.py:35
#: /Applications/Splunk/etc/apps/SA-ITOA/lib/ITOA/event_management/push_event_manager.py:57
msgid "Unable to reach the data inputs endpoint, failed with status code=\"{0}\"."
msgstr ""
#: /Applications/Splunk/etc/apps/SA-ITOA/lib/ITOA/storage/statestore.py:229
msgid "Unable to save {0}, request failed. "
msgstr ""
#: /Applications/Splunk/etc/apps/SA-ITOA/default/itsi_notable_event_status.conf:10
msgid "Unassigned"
msgstr ""
#: /Applications/Splunk/etc/apps/SA-ITOA/lib/itsi/backup_restore/backup_restore_rest_provider.py:219
#: /Applications/Splunk/etc/apps/SA-ITOA/lib/itsi/backup_restore/backup_restore_rest_provider.py:226
#: /Applications/Splunk/etc/apps/SA-ITOA/lib/itsi/backup_restore/backup_restore_rest_provider.py:337
#: /Applications/Splunk/etc/apps/SA-ITOA/lib/itsi/backup_restore/backup_restore_rest_provider.py:346
#: /Applications/Splunk/etc/apps/SA-ITOA/lib/itsi/itoa_rest_interface_provider/itoa_rest_interface_provider.py:689
#: /Applications/Splunk/etc/apps/SA-ITOA/lib/itsi/itoa_rest_interface_provider/itoa_rest_interface_provider.py:699
#: /Applications/Splunk/etc/apps/SA-ITOA/lib/maintenance_services/maintenance_services_rest_provider/maintenance_services_rest_provider.py:85
#: /Applications/Splunk/etc/apps/SA-ITOA/lib/maintenance_services/maintenance_services_rest_provider/maintenance_services_rest_provider.py:92
#: /Applications/Splunk/etc/apps/SA-ITOA/lib/maintenance_services/maintenance_services_rest_provider/maintenance_services_rest_provider.py:187
#: /Applications/Splunk/etc/apps/SA-ITOA/lib/maintenance_services/maintenance_services_rest_provider/maintenance_services_rest_provider.py:194
msgid "Unexpected server error occurred. Check the logs for details."
msgstr ""
#: /Applications/Splunk/etc/apps/SA-ITOA/lib/itsi/searches/itsi_filter.py:86
msgid "Unexpected value='{0}' specified for field type, with type='{1}'."
msgstr ""
#: /Applications/Splunk/etc/apps/SA-ITOA/lib/itsi/itoa_rest_interface_provider/itoa_rest_interface_provider.py:1200
msgid "Unrecognized preview type passed in: {}."
msgstr ""
#: /Applications/Splunk/etc/apps/SA-ITOA/lib/itsi/csv_import/itoa_bulk_import_rest_interface_provider.py:157
msgid "Unsupported HTTP action"
msgstr ""
#: /Applications/Splunk/etc/apps/SA-ITOA/lib/itsi/event_management/event_management_rest_provider.py:114
#: /Applications/Splunk/etc/apps/SA-ITOA/lib/itsi/event_management/event_management_rest_provider.py:200
#: /Applications/Splunk/etc/apps/SA-ITOA/lib/itsi/itoa_rest_interface_provider/itoa_rest_interface_provider.py:211
#: /Applications/Splunk/etc/apps/SA-ITOA/lib/itsi/itoa_rest_interface_provider/itoa_rest_interface_provider.py:296
#: /Applications/Splunk/etc/apps/SA-ITOA/lib/itsi/itoa_rest_interface_provider/itoa_rest_interface_provider.py:415
#: /Applications/Splunk/etc/apps/SA-ITOA/lib/itsi/itoa_rest_interface_provider/itoa_rest_interface_provider.py:477
#: /Applications/Splunk/etc/apps/SA-ITOA/lib/itsi/itoa_rest_interface_provider/itoa_rest_interface_provider.py:1052
#: /Applications/Splunk/etc/apps/SA-ITOA/lib/maintenance_services/maintenance_services_rest_provider/maintenance_services_rest_provider.py:47
#: /Applications/Splunk/etc/apps/SA-ITOA/lib/maintenance_services/maintenance_services_rest_provider/maintenance_services_rest_provider.py:96
#: /Applications/Splunk/etc/apps/SA-ITOA/lib/maintenance_services/maintenance_services_rest_provider/maintenance_services_rest_provider.py:123
msgid "Unsupported HTTP method"
msgstr ""
#: /Applications/Splunk/etc/apps/SA-ITOA/bin/itoa_rest_interface_splunkd.py:466
#: /Applications/Splunk/etc/apps/SA-ITOA/bin/itoa_rest_interface_splunkd.py:500
#: /Applications/Splunk/etc/apps/SA-ITOA/lib/itsi/backup_restore/backup_restore_rest_provider.py:257
#: /Applications/Splunk/etc/apps/SA-ITOA/lib/itsi/csv_import/itoa_bulk_import_rest_interface_provider.py:162
#: /Applications/Splunk/etc/apps/SA-ITOA/lib/itsi/event_management/event_management_rest_provider.py:335
#: /Applications/Splunk/etc/apps/SA-ITOA/lib/itsi/event_management/event_management_rest_provider.py:379
#: /Applications/Splunk/etc/apps/SA-ITOA/lib/itsi/itoa_rest_interface_provider/itoa_rest_interface_provider.py:507
#: /Applications/Splunk/etc/apps/SA-ITOA/lib/itsi/itoa_rest_interface_provider/itoa_rest_interface_provider.py:538
#: /Applications/Splunk/etc/apps/SA-ITOA/lib/itsi/itoa_rest_interface_provider/itoa_rest_interface_provider.py:582
#: /Applications/Splunk/etc/apps/SA-ITOA/lib/itsi/itoa_rest_interface_provider/itoa_rest_interface_provider.py:625
#: /Applications/Splunk/etc/apps/SA-ITOA/lib/itsi/itoa_rest_interface_provider/itoa_rest_interface_provider.py:675
#: /Applications/Splunk/etc/apps/SA-ITOA/lib/itsi/itoa_rest_interface_provider/itoa_rest_interface_provider.py:728
#: /Applications/Splunk/etc/apps/SA-ITOA/lib/itsi/itoa_rest_interface_provider/itoa_rest_interface_provider.py:795
#: /Applications/Splunk/etc/apps/SA-ITOA/lib/itsi/itoa_rest_interface_provider/itoa_rest_interface_provider.py:822
#: /Applications/Splunk/etc/apps/SA-ITOA/lib/itsi/itoa_rest_interface_provider/itoa_rest_interface_provider.py:923
#: /Applications/Splunk/etc/apps/SA-ITOA/lib/itsi/itoa_rest_interface_provider/itoa_rest_interface_provider.py:975
#: /Applications/Splunk/etc/apps/SA-ITOA/lib/itsi/itoa_rest_interface_provider/itoa_rest_interface_provider.py:1012
#: /Applications/Splunk/etc/apps/SA-ITOA/lib/itsi/itoa_rest_interface_provider/itoa_rest_interface_provider.py:1135
#: /Applications/Splunk/etc/apps/SA-ITOA/lib/itsi/itoa_rest_interface_provider/itoa_rest_interface_provider.py:1184
#: /Applications/Splunk/etc/apps/SA-ITOA/lib/itsi/itoa_rest_interface_provider/itoa_rest_interface_provider.py:1230
#: /Applications/Splunk/etc/apps/SA-ITOA/lib/itsi/itoa_rest_interface_provider/itoa_rest_interface_provider.py:1254
#: /Applications/Splunk/etc/apps/SA-ITOA/lib/itsi/itoa_rest_interface_provider/itoa_rest_interface_provider.py:1277
#: /Applications/Splunk/etc/apps/SA-ITOA/lib/itsi/itoa_rest_interface_provider/itoa_rest_interface_provider.py:1314
#: /Applications/Splunk/etc/apps/SA-ITOA/lib/itsi/itoa_rest_interface_provider/itoa_rest_interface_provider.py:1353
#: /Applications/Splunk/etc/apps/SA-ITOA/lib/itsi/itoa_rest_interface_provider/itoa_rest_interface_provider.py:1387
#: /Applications/Splunk/etc/apps/SA-ITOA/lib/itsi/itoa_rest_interface_provider/itoa_rest_interface_provider.py:1429
#: /Applications/Splunk/etc/apps/SA-ITOA/lib/maintenance_services/maintenance_services_rest_provider/maintenance_services_rest_provider.py:198
#, python-format
msgid "Unsupported HTTP method %s."
msgstr ""
#: /Applications/Splunk/etc/apps/SA-ITOA/lib/ITOA/event_management/rules_engine/item.py:77
#, python-format
msgid "Unsupported Item Type. Received: %s. Supported=%s"
msgstr ""
#: /Applications/Splunk/etc/apps/SA-ITOA/lib/ITOA/event_management/rules_engine/item.py:87
#, python-format
msgid "Unsupported `type`=%s. Supported types=%s"
msgstr ""
#: /Applications/Splunk/etc/apps/SA-ITOA/lib/itsi/event_management/event_management_rest_provider.py:411
#: /Applications/Splunk/etc/apps/SA-ITOA/lib/itsi/itoa_rest_interface_provider/itoa_rest_interface_provider.py:421
#: /Applications/Splunk/etc/apps/SA-ITOA/lib/itsi/itoa_rest_interface_provider/itoa_rest_interface_provider.py:545
#: /Applications/Splunk/etc/apps/SA-ITOA/lib/itsi/itoa_rest_interface_provider/itoa_rest_interface_provider.py:594
#: /Applications/Splunk/etc/apps/SA-ITOA/lib/itsi/itoa_rest_interface_provider/itoa_rest_interface_provider.py:764
#: /Applications/Splunk/etc/apps/SA-ITOA/lib/itsi/itoa_rest_interface_provider/itoa_rest_interface_provider.py:828
#: /Applications/Splunk/etc/apps/SA-ITOA/lib/itsi/itoa_rest_interface_provider/itoa_rest_interface_provider.py:978
#: /Applications/Splunk/etc/apps/SA-ITOA/lib/itsi/itoa_rest_interface_provider/itoa_rest_interface_provider.py:1357
#: /Applications/Splunk/etc/apps/SA-ITOA/lib/itsi/itoa_rest_interface_provider/itoa_rest_interface_provider.py:1390
#: /Applications/Splunk/etc/apps/SA-ITOA/lib/maintenance_services/maintenance_services_rest_provider/maintenance_services_rest_provider.py:74
#: /Applications/Splunk/etc/apps/SA-ITOA/lib/maintenance_services/maintenance_services_rest_provider/maintenance_services_rest_provider.py:177
#, python-format
msgid "Unsupported object type %s."
msgstr ""
#: /Applications/Splunk/etc/apps/SA-ITOA/bin/backup_restore_interface_splunkd.py:174
#: /Applications/Splunk/etc/apps/SA-ITOA/bin/event_management_interface_splunkd.py:413
#: /Applications/Splunk/etc/apps/SA-ITOA/bin/itoa_rest_interface_splunkd.py:687
#: /Applications/Splunk/etc/apps/SA-ITOA/bin/itsi_module_interface_splunkd.py:104
#: /Applications/Splunk/etc/apps/SA-ITOA/bin/itsi_module_interface_splunkd.py:198
#: /Applications/Splunk/etc/apps/SA-ITOA/bin/itsi_module_interface_splunkd.py:271
#: /Applications/Splunk/etc/apps/SA-ITOA/bin/maintenance_services_interface_splunkd.py:158
#: /Applications/Splunk/etc/apps/SA-ITOA/lib/ITOA/controller_utils.py:448
msgid "Unsupported operation - {0}."
msgstr ""
#: /Applications/Splunk/etc/apps/SA-ITOA/lib/ITOA/event_management/rules_engine/criterion.py:122
#, python-format
msgid "Unsupported value for `execute_on`. Received=%s Supported=%s"
msgstr ""
#: /Applications/Splunk/etc/apps/SA-ITOA/lib/ITOA/controller_utils.py:466
msgid "Unsupported. Received: No operation."
msgstr ""
#: /Applications/Splunk/etc/apps/SA-ITOA/bin/itsi_async_csv_loader.py:177
#: /Applications/Splunk/etc/apps/SA-ITOA/bin/itsi_csv_import.py:211
msgid "Update Type"
msgstr ""
#: /Applications/Splunk/etc/apps/SA-ITOA/lib/itsi/objects/itsi_entity.py:439
msgid ""
"Update race: One or more entities changed during editing. Try refreshing "
"the page."
msgstr ""
#: /Applications/Splunk/etc/apps/SA-ITOA/lib/itsi/objects/itsi_entity.py:435
msgid ""
"Update race: One or more entities deleted during editing. Try refreshing "
"the page."
msgstr ""
#: /Applications/Splunk/etc/apps/SA-ITOA/lib/itsi/csv_import/itoa_bulk_import_rest_interface_provider.py:375
#: /Applications/Splunk/etc/apps/SA-ITOA/lib/itsi/csv_import/itoa_bulk_import_rest_interface_provider.py:422
#: /Applications/Splunk/etc/apps/SA-ITOA/lib/itsi/csv_import/itoa_bulk_import_rest_interface_provider.py:434
msgid "Uploaded data was not found."
msgstr ""
#: /Applications/Splunk/etc/apps/SA-ITOA/lib/itsi/upgrade/itsi_migration.py:2830
msgid ""
"Validating IT Service Intelligence configuration. While validation is in "
"process, the application is not accessible."
msgstr ""
#: /Applications/Splunk/etc/apps/SA-ITOA/lib/ITOA/event_management/correlation_search.py:324
msgid "Validation failed, for data=\"{0}\"."
msgstr ""
#: /Applications/Splunk/etc/apps/SA-ITOA/lib/SA_ITOA_app_common/solnlib/packages/schematics/types/base.py:442
msgid "Value '{0}' is not {1}."
msgstr ""
#: /Applications/Splunk/etc/apps/SA-ITOA/lib/SA_ITOA_app_common/solnlib/packages/schematics/types/base.py:1120
msgid "Value must be a dict or None"
msgstr ""
#: /Applications/Splunk/etc/apps/SA-ITOA/lib/SA_ITOA_app_common/solnlib/packages/schematics/types/base.py:1049
msgid "Value must be a two-dimensional point"
msgstr ""
#: /Applications/Splunk/etc/apps/SA-ITOA/lib/SA_ITOA_app_common/solnlib/packages/schematics/types/base.py:168
msgid "Value must be one of {0}."
msgstr ""
#: /Applications/Splunk/etc/apps/SA-ITOA/lib/itsi/event_management/sdk/custom_group_action_base.py:129
msgid "We will only work with JSON type data. Received: {}. Type: {}"
msgstr ""
#: /Applications/Splunk/etc/apps/SA-ITOA/lib/itsi_module/itsi_module_interface_provider_base.py:580
msgid "Wildcard is not supported for ITSI module name in this REST path."
msgstr ""
#: /Applications/Splunk/etc/apps/SA-ITOA/lib/itsi_module/itsi_module_interface_provider_base.py:600
msgid "Wildcard is not supported for object type in this REST path."
msgstr ""
#: /Applications/Splunk/etc/apps/SA-ITOA/lib/ITOA/event_management/notable_event_ticketing.py:462
#, python-format
msgid ""
"Will only work with list of ticket id and url. Received type id=%s "
"url=%s. message=%s"
msgstr ""
#: /Applications/Splunk/etc/apps/SA-ITOA/default/itsi_kpi_threshold_template.conf:5
#: /Applications/Splunk/etc/apps/SA-ITOA/default/itsi_kpi_threshold_template.conf:14
#: /Applications/Splunk/etc/apps/SA-ITOA/default/itsi_kpi_threshold_template.conf:23
#: /Applications/Splunk/etc/apps/SA-ITOA/default/itsi_kpi_threshold_template.conf:32
msgid "Work hours (M-F 8am-6pm, 6pm-8am; Sat Sun 1 chunk)"
msgstr ""
#: /Applications/Splunk/etc/apps/SA-ITOA/default/itsi_kpi_threshold_template.conf:26
msgid "Work hours, off hours, weekends (adaptive/quantile)"
msgstr ""
#: /Applications/Splunk/etc/apps/SA-ITOA/default/itsi_kpi_threshold_template.conf:35
msgid "Work hours, off hours, weekends (adaptive/range)"
msgstr ""
#: /Applications/Splunk/etc/apps/SA-ITOA/default/itsi_kpi_threshold_template.conf:17
msgid "Work hours, off hours, weekends (adaptive/stdev)"
msgstr ""
#: /Applications/Splunk/etc/apps/SA-ITOA/default/itsi_kpi_threshold_template.conf:8
msgid "Work hours, off hours, weekends (static)"
msgstr ""
#: /Applications/Splunk/etc/apps/SA-ITOA/default/itsi_kpi_threshold_template.conf:185
#: /Applications/Splunk/etc/apps/SA-ITOA/default/itsi_kpi_threshold_template.conf:194
#: /Applications/Splunk/etc/apps/SA-ITOA/default/itsi_kpi_threshold_template.conf:203
#: /Applications/Splunk/etc/apps/SA-ITOA/default/itsi_kpi_threshold_template.conf:212
msgid "Work week 1hr. Monday to Friday 1 hour chunks. Sat Sun 1 chunk"
msgstr ""
#: /Applications/Splunk/etc/apps/SA-ITOA/default/itsi_kpi_threshold_template.conf:221
#: /Applications/Splunk/etc/apps/SA-ITOA/default/itsi_kpi_threshold_template.conf:230
#: /Applications/Splunk/etc/apps/SA-ITOA/default/itsi_kpi_threshold_template.conf:239
#: /Applications/Splunk/etc/apps/SA-ITOA/default/itsi_kpi_threshold_template.conf:248
msgid "Work week 2hr. Monday to Friday 2 hour chunks. Sat Sun 1 chunk"
msgstr ""
#: /Applications/Splunk/etc/apps/SA-ITOA/default/itsi_kpi_threshold_template.conf:257
#: /Applications/Splunk/etc/apps/SA-ITOA/default/itsi_kpi_threshold_template.conf:266
#: /Applications/Splunk/etc/apps/SA-ITOA/default/itsi_kpi_threshold_template.conf:275
#: /Applications/Splunk/etc/apps/SA-ITOA/default/itsi_kpi_threshold_template.conf:284
msgid "Work week 3hr. Monday to Friday 3 hour chunks. Sat Sun 1 chunk"
msgstr ""
#: /Applications/Splunk/etc/apps/SA-ITOA/lib/itsi/access_control/access_control_controller_utils.py:747
msgid ""
"You do not have permission to delete the following correlation search(es)"
" or cannot delete the pre-defined correlation search(es): {}."
msgstr ""
#: /Applications/Splunk/etc/apps/SA-ITOA/lib/itsi/access_control/access_control_controller_utils.py:751
msgid "You do not have permission to delete the following object(s): {}."
msgstr ""
#: /Applications/Splunk/etc/apps/SA-ITOA/lib/itsi/access_control/access_control_controller_utils.py:645
msgid ""
"You do not have permission to write the following correlation search(es):"
" {}."
msgstr ""
#: /Applications/Splunk/etc/apps/SA-ITOA/lib/itsi/access_control/access_control_controller_utils.py:649
msgid "You do not have permission to write the following object(s): {}."
msgstr ""
#: /Applications/Splunk/etc/apps/SA-ITOA/lib/itsi/access_control/access_control_controller_utils.py:647
msgid "You may want to clone the correlation search(es) before editing them."
msgstr ""
#: /Applications/Splunk/etc/apps/SA-ITOA/lib/itsi/csv_import/itoa_bulk_import_itoa_handle.py:98
msgid "[itoa_bulk_import:ItoaHandle] called with unrecognized object type: {)"
msgstr ""
#: /Applications/Splunk/etc/apps/SA-ITOA/lib/ITOA/event_management/notable_event_actions.py:455
#, python-format
msgid "`%s` must have some configuration. Received None"
msgstr ""
#: /Applications/Splunk/etc/apps/SA-ITOA/lib/itsi/event_management/event_management_rest_provider.py:132
#: /Applications/Splunk/etc/apps/SA-ITOA/lib/itsi/itoa_rest_interface_provider/itoa_rest_interface_provider.py:228
#, python-format
msgid "`acl` & `objects` are mandatory keys in data. Received: %s."
msgstr ""
#: /Applications/Splunk/etc/apps/SA-ITOA/lib/itsi/event_management/event_management_rest_provider.py:139
#: /Applications/Splunk/etc/apps/SA-ITOA/lib/itsi/event_management/event_management_rest_provider.py:228
#: /Applications/Splunk/etc/apps/SA-ITOA/lib/itsi/itoa_rest_interface_provider/itoa_rest_interface_provider.py:235
#: /Applications/Splunk/etc/apps/SA-ITOA/lib/itsi/itoa_rest_interface_provider/itoa_rest_interface_provider.py:328
#, python-format
msgid "`acl` is missing mandatory keys `read`/`write`. Received: %s."
msgstr ""
#: /Applications/Splunk/etc/apps/SA-ITOA/lib/ITOA/event_management/notable_event_actions.py:429
#, python-format
msgid "`action_config` invalid type. Received=%s"
msgstr ""
#: /Applications/Splunk/etc/apps/SA-ITOA/bin/command_fill_gaps_backfill.py:77
msgid ""
"`alert_period` argument not provided to \"fillgapsbackfill\" search "
"command."
msgstr ""
#: /Applications/Splunk/etc/apps/SA-ITOA/bin/command_fill_gaps_backfill.py:84
msgid ""
"`alert_period` argument provided to \"fillgapsbackfill\" search command, "
"is not integer."
msgstr ""
#: /Applications/Splunk/etc/apps/SA-ITOA/lib/ITOA/saved_search_utility.py:63
msgid "`alert_period` must be one of 1440, 60, 15, 5, 1."
msgstr ""
#: /Applications/Splunk/etc/apps/SA-ITOA/lib/itsi/searches/itsi_searches.py:398
msgid "`datamodel` argument requires `datamodel_object_name`"
msgstr ""
#: /Applications/Splunk/etc/apps/SA-ITOA/lib/itsi/searches/itsi_searches.py:677
#: /Applications/Splunk/etc/apps/SA-ITOA/lib/itsi/searches/itsi_searches.py:699
msgid "`datamodel` model must be a dictionary."
msgstr ""
#: /Applications/Splunk/etc/apps/SA-ITOA/lib/itsi/searches/itsi_searches.py:680
msgid "`datamodel` model of KPI is invalid."
msgstr ""
#: /Applications/Splunk/etc/apps/SA-ITOA/bin/command_fill_gaps_backfill.py:73
msgid ""
"`entity_split_field` argument not provided to \"fillgapsbackfill\" search"
" command."
msgstr ""
#: /Applications/Splunk/etc/apps/SA-ITOA/lib/ITOA/event_management/push_event_manager.py:132
#, python-format
msgid "`events` is not a valid list. Received type=`%s`."
msgstr ""
#: /Applications/Splunk/etc/apps/SA-ITOA/lib/itsi/event_management/itsi_notable_event_queue_consumer.py:88
msgid "`exec_delay` must be a float, not \"{}\"."
msgstr ""
#: /Applications/Splunk/etc/apps/SA-ITOA/lib/itsi/objects/changehandlers/kpi_ad_update_handler.py:57
#: /Applications/Splunk/etc/apps/SA-ITOA/lib/itsi/objects/changehandlers/kpi_alert_period_update_handler.py:69
#: /Applications/Splunk/etc/apps/SA-ITOA/lib/itsi/objects/changehandlers/kpi_cohesive_ad_update_handler.py:66
#: /Applications/Splunk/etc/apps/SA-ITOA/lib/itsi/objects/changehandlers/kpi_thresholds_template_update_handler.py:74
msgid "`impacted_objects` is not a valid JSON object."
msgstr ""
#: /Applications/Splunk/etc/apps/SA-ITOA/lib/ITOA/storage/itoa_storage.py:148
msgid "`is_available` method can only be run on the KV store backend."
msgstr ""
#: /Applications/Splunk/etc/apps/SA-ITOA/lib/itsi/upgrade/migration_handlers_2_5_0.py:82
#: /Applications/Splunk/etc/apps/SA-ITOA/lib/itsi/upgrade/migration_handlers_2_6_0.py:83
#, python-format
msgid ""
"`json_data` is not a valid dictionary, found type %s. Cannot apply "
"timezone offset."
msgstr ""
#: /Applications/Splunk/etc/apps/SA-ITOA/lib/itsi/upgrade/migration_handlers_2_5_0.py:88
#: /Applications/Splunk/etc/apps/SA-ITOA/lib/itsi/upgrade/migration_handlers_2_6_0.py:89
#, python-format
msgid ""
"`json_field` is not a valid string, found type %s. Cannot apply timezone "
"offset."
msgstr ""
#: /Applications/Splunk/etc/apps/SA-ITOA/lib/itsi/upgrade/migration_handlers_2_6_0.py:201
#, python-format
msgid ""
"`kpi_threshold_template` is not a valid dictionary, found type %s. Cannot"
" apply timezone offset."
msgstr ""
#: /Applications/Splunk/etc/apps/SA-ITOA/lib/itsi/event_management/utils.py:42
msgid "`logger` is not provided."
msgstr ""
#: /Applications/Splunk/etc/apps/SA-ITOA/lib/ITOA/event_management/notable_event_comment.py:140
#: /Applications/Splunk/etc/apps/SA-ITOA/lib/ITOA/event_management/notable_event_tag.py:130
#: /Applications/Splunk/etc/apps/SA-ITOA/lib/ITOA/event_management/notable_event_tag.py:180
#, python-format
msgid "`object_id`=%s is not a valid string."
msgstr ""
#: /Applications/Splunk/etc/apps/SA-ITOA/lib/ITOA/itoa_object.py:1367
msgid "`object_ids` is invalid: {0}."
msgstr ""
#: /Applications/Splunk/etc/apps/SA-ITOA/lib/itsi/upgrade/migration_handlers_2_5_0.py:161
#, python-format
msgid ""
"`offset_in_hours` is not a valid int, found type %s. Cannot apply "
"timezone offset."
msgstr ""
#: /Applications/Splunk/etc/apps/SA-ITOA/lib/itsi/upgrade/migration_handlers_2_6_0.py:206
#: /Applications/Splunk/etc/apps/SA-ITOA/lib/itsi/upgrade/migration_handlers_2_6_0.py:286
#, python-format
msgid ""
"`offset_in_min` is not a valid int, found type %s. Cannot apply timezone "
"offset."
msgstr ""
#: /Applications/Splunk/etc/apps/SA-ITOA/lib/itsi/upgrade/migration_handlers_2_5_0.py:94
#: /Applications/Splunk/etc/apps/SA-ITOA/lib/itsi/upgrade/migration_handlers_2_6_0.py:95
#, python-format
msgid ""
"`offset_in_sec` is not a valid number, found type %s. Cannot apply "
"timezone offset."
msgstr ""
#: /Applications/Splunk/etc/apps/SA-ITOA/lib/itsi/upgrade/migration_handlers_2_6_0.py:281
#, python-format
msgid ""
"`service` is not a valid dictionary, found type %s. Cannot apply timezone"
" offset."
msgstr ""
#: /Applications/Splunk/etc/apps/SA-ITOA/lib/itsi/event_management/sdk/eventing_base.py:23
#: /Applications/Splunk/etc/apps/SA-ITOA/lib/itsi/event_management/sdk/eventing_base.py:25
msgid "`session_key` must be a string with length equals at least one character."
msgstr ""
#: /Applications/Splunk/etc/apps/SA-ITOA/lib/ITOA/event_management/notable_event_tag.py:114
#, python-format
msgid "`tag_name`=%s already exists."
msgstr ""
#: /Applications/Splunk/etc/apps/SA-ITOA/lib/itsi/event_management/sdk/grouping.py:545
msgid "delete_all_comments operation is not supported"
msgstr ""
#: /Applications/Splunk/etc/apps/SA-ITOA/lib/itsi/event_management/sdk/grouping.py:533
msgid "delete_comment operation is not supported"
msgstr ""
#: /Applications/Splunk/etc/apps/SA-ITOA/lib/itsi/upgrade/migration_handlers_4_2_0.py:62
msgid ""
"entity_title=\"{entity_title}\" (entity_id=\"{entity_id}\") has "
"potentially missing_alias_values=\"{missing_alias_values}\" for the "
"entity_filter_field=\"{field}\" of kpi_title=\"{kpi_title}\" "
"(kpi_id=\"{kpi_id}\") in service_title=\"{service_title}\" "
"(service_id=\"{service_id}\"). The entity might not be included in this "
"KPI's results due to the removal of the previous KPI "
"entity_alias_filtering_fields=\"{alias_filtering_fields}\"."
msgstr ""
#: /Applications/Splunk/etc/apps/SA-ITOA/lib/itsi/upgrade/migration_handlers_4_2_0.py:52
msgid ""
"entity_title=\"{entity_title}\" (entity_id=\"{entity_id}\") is missing an"
" alias for the entity_filter_field=\"{field}\" of "
"kpi_title=\"{kpi_title}\" (kpi_id=\"{kpi_id}\"\") in "
"service_title=\"{service_title}\" (service_id=\"{service_id}\"). The "
"entity might not be included in this KPI's results."
msgstr ""
#: /Applications/Splunk/etc/apps/SA-ITOA/lib/itsi/upgrade/migration_handlers_4_2_0.py:57
msgid ""
"entity_title=\"{entity_title}\" (entity_id=\"{entity_id}\") is missing an"
" alias for the entity_split_field=\"{field}\" of "
"kpi_title=\"{kpi_title}\" (kpi_id=\"{kpi_id}\") in "
"service_title=\"{service_title}\" (service_id=\"{service_id}\"). The "
"entity will not be included in this KPI's results."
msgstr ""
#: /Applications/Splunk/etc/apps/SA-ITOA/lib/itsi/objects/itsi_entity_relationship.py:757
msgid "limited by level"
msgstr ""
#: /Applications/Splunk/etc/apps/SA-ITOA/lib/itsi/objects/itsi_entity_relationship.py:761
msgid "limited by level and max count"
msgstr ""
#: /Applications/Splunk/etc/apps/SA-ITOA/lib/itsi/objects/itsi_entity_relationship.py:759
msgid "limited by max count"
msgstr ""
#: /Applications/Splunk/etc/apps/SA-ITOA/lib/ITOA/event_management/base_event_generation.py:44
#, python-format
msgid ""
"sendmodalert - signature=\"%s\" action_name=\"%s\" search_name=\"%s\" "
"sid=\"%s\" orig_sid=\"%s\" rid=\"%s\" orig_rid=\"%s\" app=\"%s\" "
"owner=\"%s\" action_mode=\"%s\" action_status=\"%s\""
msgstr ""
#: /Applications/Splunk/etc/apps/SA-ITOA/lib/itsi_py23.py:57
msgid "test"
msgstr ""
#: /Applications/Splunk/etc/apps/SA-ITOA/bin/itsi_notable_event_hec_init.py:129
#, python-format
msgid ""
"token: `%s`, index: `%s`, host: `%s`, source: `%s`, sourcetype: `%s` app:"
" `%s`"
msgstr ""
#: /Applications/Splunk/etc/apps/SA-ITOA/lib/itsi/event_management/sdk/grouping.py:568
msgid "update_comment operation is not supported"
msgstr ""
#: /Applications/Splunk/etc/apps/SA-ITOA/lib/itsi/searches/compute_health_score.py:393
msgid "{0} does not exist in conf file"
msgstr ""
#: /Applications/Splunk/etc/apps/SA-ITOA/lib/itsi/health_services/health_services_provider.py:93
msgid "{0} field is required in each field."
msgstr ""
#: /Applications/Splunk/etc/apps/SA-ITOA/lib/itsi/health_services/health_services_provider.py:90
msgid "{0} or {1} one of field needs to be provided."
msgstr ""
#: /Applications/Splunk/etc/apps/SA-ITOA/lib/SA_ITOA_app_common/solnlib/packages/schematics/types/base.py:443
msgid "{0} value should be greater than or equal to {1}."
msgstr ""
#: /Applications/Splunk/etc/apps/SA-ITOA/lib/SA_ITOA_app_common/solnlib/packages/schematics/types/base.py:444
msgid "{0} value should be less than or equal to {1}."
msgstr ""
#: /Applications/Splunk/etc/apps/SA-ITOA/lib/SA_ITOA_app_common/solnlib/packages/schematics/types/base.py:1027
msgid "{0} value {1} should be greater than or equal to {2}."
msgstr ""
#: /Applications/Splunk/etc/apps/SA-ITOA/lib/SA_ITOA_app_common/solnlib/packages/schematics/types/base.py:1028
msgid "{0} value {1} should be less than or equal to {2}."
msgstr ""
#: /Applications/Splunk/etc/apps/SA-ITOA/lib/itsi/backup_restore/itsi_backup_restore_utils.py:503
msgid "{} job \"{}\" has completed successfully."
msgstr ""
#: /Applications/Splunk/etc/apps/SA-ITOA/lib/itsi/backup_restore/itsi_backup_restore_utils.py:519
msgid "{} job \"{}\" has failed. Error: {}"
msgstr ""