|
4 | 4 | "version": "0.1.2-preview",
|
5 | 5 | "parameters": {
|
6 | 6 | "config": {
|
7 |
| - "isWizard": true |
| 7 | + "isWizard": false |
8 | 8 | },
|
9 | 9 | "basics": [
|
10 | 10 | {
|
|
84 | 84 | "name": "ehPolicyDropDown",
|
85 | 85 | "type": "Microsoft.Common.DropDown",
|
86 | 86 | "label": "Event Hub Access Policy",
|
87 |
| - "toolTip": "Specify a policy with a 'Listen' claim.", |
| 87 | + "toolTip": "Specify a policy with a 'Listen' or greater claim.", |
88 | 88 | "constraints": {
|
89 | 89 | "allowedValues": "[map(steps('appSettings').ehPolicyApi.value, (item) => parse(concat('{\"label\":\"', item.name, '\",\"value\":\"', item.name, '\"}')))]",
|
90 | 90 | "required": true
|
|
115 | 115 | {
|
116 | 116 | "name": "splunkHECEndpoint",
|
117 | 117 | "label": "Splunk HEC Endpoint",
|
118 |
| - "toolTip": "URL for the Splunk HTTP Event Collector", |
| 118 | + "toolTip": "URL for the Splunk HTTP Event Collector.", |
119 | 119 | "type": "Microsoft.Common.TextBox",
|
120 | 120 | "placeholder": "https://<YOUR SPLUNK URL>:<PORT>/services/collector/event",
|
121 | 121 | "constraints": {
|
|
125 | 125 | {
|
126 | 126 | "name": "splunkHECToken",
|
127 | 127 | "label": "Splunk HEC Token",
|
128 |
| - "toolTip": "Splunk HTTP Event Collector Token", |
| 128 | + "toolTip": "Splunk HTTP Event Collector Token.", |
129 | 129 | "type": "Microsoft.Common.TextBox",
|
130 | 130 | "constraints": {
|
131 | 131 | "required": true
|
|
142 | 142 | {
|
143 | 143 | "name": "repoURL",
|
144 | 144 | "label": "Repository URL",
|
145 |
| - "toolTip": "URL for the function code", |
| 145 | + "toolTip": "URL for the function code.", |
146 | 146 | "type": "Microsoft.Common.TextBox",
|
147 | 147 | "defaultValue": "https://github.com/splunk/azure-functions-splunk.git",
|
148 | 148 | "constraints": {
|
|
161 | 161 | {
|
162 | 162 | "name": "repoProject",
|
163 | 163 | "label": "Project",
|
164 |
| - "toolTip": "If the source code for the function resides in a subdirectory, specify the subdirctory containing the code.", |
| 164 | + "toolTip": "If the source code for the function resides in a subdirectory, specify the subdirectory containing the code.", |
165 | 165 | "type": "Microsoft.Common.TextBox",
|
166 | 166 | "defaultValue": "event-hubs-hec"
|
167 | 167 | }
|
|
212 | 212 | {
|
213 | 213 | "name": "ehActivitySourcetype",
|
214 | 214 | "label": "Activity Log Sourcetype",
|
215 |
| - "toolTip": "Splunk sourcetype for activity logs", |
| 215 | + "toolTip": "Splunk sourcetype for activity logs.", |
216 | 216 | "type": "Microsoft.Common.TextBox",
|
217 | 217 | "defaultValue": "azure:activity:log",
|
218 | 218 | "placeholder": "azure:activity:log",
|
|
269 | 269 | },
|
270 | 270 | {
|
271 | 271 | "name": "ehAADSASourcetype",
|
272 |
| - "label": "AAD Sign-in and Audit Sourcetype", |
273 |
| - "toolTip": "Splunk sourcetype for Azure AD sign-in and activity data.", |
| 272 | + "label": "AAD Sign-in and Audit Sourcetype Base", |
| 273 | + "toolTip": "Splunk sourcetype base for Azure AD sign-in and activity data.", |
274 | 274 | "type": "Microsoft.Common.TextBox",
|
275 | 275 | "defaultValue": "azure:aad",
|
276 | 276 | "placeholder": "azure:aad",
|
277 | 277 | "constraints": {
|
278 | 278 | "required": "[steps('ehAADLogs').ehAADSASection.ehAADSAEnable]"
|
279 | 279 | },
|
280 | 280 | "visible": "[steps('ehAADLogs').ehAADSASection.ehAADSAEnable]"
|
| 281 | + }, |
| 282 | + { |
| 283 | + "name": "ehAADSASourcetypeInfo", |
| 284 | + "type": "Microsoft.Common.InfoBox", |
| 285 | + "visible": "[steps('ehAADLogs').ehAADSASection.ehAADSAEnable]", |
| 286 | + "options": { |
| 287 | + "icon": "Info", |
| 288 | + "text": "The base sourcetype will be combined with the event category to construct the full Splunk sourcetype.", |
| 289 | + "uri": "https://github.com/splunk/azure-functions-splunk/tree/event-hubs/event-hubs-hec#splunk-sourcetypes" |
| 290 | + } |
281 | 291 | }
|
282 | 292 | ]
|
283 | 293 | },
|
|
332 | 342 | "required": "[steps('ehAADLogs').ehAADNISection.ehAADNIEnable]"
|
333 | 343 | },
|
334 | 344 | "visible": "[steps('ehAADLogs').ehAADNISection.ehAADNIEnable]"
|
| 345 | + }, |
| 346 | + { |
| 347 | + "name": "ehAADNISourcetypeInfo", |
| 348 | + "type": "Microsoft.Common.InfoBox", |
| 349 | + "visible": "[steps('ehAADLogs').ehAADNISection.ehAADNIEnable]", |
| 350 | + "options": { |
| 351 | + "icon": "Info", |
| 352 | + "text": "The base sourcetype will be combined with the event category to construct the full Splunk sourcetype.", |
| 353 | + "uri": "https://github.com/splunk/azure-functions-splunk/tree/event-hubs/event-hubs-hec#splunk-sourcetypes" |
| 354 | + } |
335 | 355 | }
|
336 | 356 | ]
|
337 | 357 | },
|
|
386 | 406 | "required": "[steps('ehAADLogs').ehAADSPSection.ehAADSPEnable]"
|
387 | 407 | },
|
388 | 408 | "visible": "[steps('ehAADLogs').ehAADSPSection.ehAADSPEnable]"
|
| 409 | + }, |
| 410 | + { |
| 411 | + "name": "ehAADSPSourcetypeInfo", |
| 412 | + "type": "Microsoft.Common.InfoBox", |
| 413 | + "visible": "[steps('ehAADLogs').ehAADSPSection.ehAADSPEnable]", |
| 414 | + "options": { |
| 415 | + "icon": "Info", |
| 416 | + "text": "The base sourcetype will be combined with the event category to construct the full Splunk sourcetype.", |
| 417 | + "uri": "https://github.com/splunk/azure-functions-splunk/tree/event-hubs/event-hubs-hec#splunk-sourcetypes" |
| 418 | + } |
389 | 419 | }
|
390 | 420 | ]
|
391 | 421 | }
|
|
432 | 462 | },
|
433 | 463 | {
|
434 | 464 | "name": "ehDiagnosticsSourcetype",
|
435 |
| - "label": "Diagnostics Log Sourcetype", |
436 |
| - "toolTip": "Splunk sourcetype for diagnostics logs", |
| 465 | + "label": "Diagnostics Log Default Sourcetype", |
| 466 | + "toolTip": "Splunk default sourcetype for diagnostics logs.", |
437 | 467 | "type": "Microsoft.Common.TextBox",
|
438 | 468 | "defaultValue": "azure:diagnostics",
|
439 | 469 | "placeholder": "azure:diagnostics",
|
440 | 470 | "constraints": {
|
441 | 471 | "required": "[steps('ehDiagnosticsLogs').ehDiagnosticsEnable]"
|
442 | 472 | },
|
443 | 473 | "visible": "[steps('ehDiagnosticsLogs').ehDiagnosticsEnable]"
|
| 474 | + }, |
| 475 | + { |
| 476 | + "name": "ehDiagnosticsSourcetypeInfo", |
| 477 | + "type": "Microsoft.Common.InfoBox", |
| 478 | + "visible": "[steps('ehDiagnosticsLogs').ehDiagnosticsEnable]", |
| 479 | + "options": { |
| 480 | + "icon": "Info", |
| 481 | + "text": "The function code will attempt to create a Splunk sourcetype based on the resourceId of the event. If a sourcetype cannot be constructed from the event, the specified default sourcetype entered will be used.", |
| 482 | + "uri": "https://github.com/splunk/azure-functions-splunk/tree/event-hubs/event-hubs-hec#splunk-sourcetypes" |
| 483 | + } |
444 | 484 | }
|
445 | 485 | ]
|
446 | 486 | },
|
|
486 | 526 | {
|
487 | 527 | "name": "ehMetricsSourcetype",
|
488 | 528 | "label": "Metrics Sourcetype",
|
489 |
| - "toolTip": "Splunk sourcetype for metrics", |
| 529 | + "toolTip": "Splunk sourcetype for metrics.", |
490 | 530 | "type": "Microsoft.Common.TextBox",
|
491 | 531 | "defaultValue": "azure:metrics",
|
492 | 532 | "placeholder": "azure:metrics",
|
|
0 commit comments