summaryrefslogtreecommitdiffstats
path: root/ansible_collections/splunk/es/docs
diff options
context:
space:
mode:
Diffstat (limited to 'ansible_collections/splunk/es/docs')
-rw-r--r--ansible_collections/splunk/es/docs/splunk.es.adaptive_response_notable_event_module.rst2
-rw-r--r--ansible_collections/splunk/es/docs/splunk.es.data_input_monitor_module.rst10
-rw-r--r--ansible_collections/splunk/es/docs/splunk.es.data_input_network_module.rst2
-rw-r--r--ansible_collections/splunk/es/docs/splunk.es.splunk_adaptive_response_notable_events_module.rst40
-rw-r--r--ansible_collections/splunk/es/docs/splunk.es.splunk_correlation_searches_module.rst4
-rw-r--r--ansible_collections/splunk/es/docs/splunk.es.splunk_data_inputs_monitor_module.rst10
-rw-r--r--ansible_collections/splunk/es/docs/splunk.es.splunk_data_inputs_network_module.rst10
7 files changed, 40 insertions, 38 deletions
diff --git a/ansible_collections/splunk/es/docs/splunk.es.adaptive_response_notable_event_module.rst b/ansible_collections/splunk/es/docs/splunk.es.adaptive_response_notable_event_module.rst
index 4f2462652..c21dab991 100644
--- a/ansible_collections/splunk/es/docs/splunk.es.adaptive_response_notable_event_module.rst
+++ b/ansible_collections/splunk/es/docs/splunk.es.adaptive_response_notable_event_module.rst
@@ -260,6 +260,7 @@ Parameters
</div>
</td>
<td>
+ <b>Default:</b><br/><div style="color: blue">[]</div>
</td>
<td>
<div>List of adaptive responses that should be run next</div>
@@ -277,6 +278,7 @@ Parameters
</div>
</td>
<td>
+ <b>Default:</b><br/><div style="color: blue">[]</div>
</td>
<td>
<div>List of adaptive responses that are recommended to be run next</div>
diff --git a/ansible_collections/splunk/es/docs/splunk.es.data_input_monitor_module.rst b/ansible_collections/splunk/es/docs/splunk.es.data_input_monitor_module.rst
index e4b7beb00..0ab4be9be 100644
--- a/ansible_collections/splunk/es/docs/splunk.es.data_input_monitor_module.rst
+++ b/ansible_collections/splunk/es/docs/splunk.es.data_input_monitor_module.rst
@@ -71,7 +71,7 @@ Parameters
</ul>
</td>
<td>
- <div>If set to <code>True</code>, the index value is checked to ensure that it is the name of a valid index.</div>
+ <div>If set to <code>true</code>, the index value is checked to ensure that it is the name of a valid index.</div>
</td>
</tr>
<tr>
@@ -90,7 +90,7 @@ Parameters
</ul>
</td>
<td>
- <div>If set to <code>True</code>, the name value is checked to ensure that it exists.</div>
+ <div>If set to <code>true</code>, the name value is checked to ensure that it exists.</div>
</td>
</tr>
<tr>
@@ -143,7 +143,7 @@ Parameters
</ul>
</td>
<td>
- <div>If set to <code>True</code>, files that are seen for the first time is read from the end.</div>
+ <div>If set to <code>true</code>, files that are seen for the first time is read from the end.</div>
</td>
</tr>
<tr>
@@ -253,7 +253,7 @@ Parameters
</ul>
</td>
<td>
- <div>Setting this to False prevents monitoring of any subdirectories encountered within this data input.</div>
+ <div>Setting this to false prevents monitoring of any subdirectories encountered within this data input.</div>
</td>
</tr>
<tr>
@@ -351,7 +351,7 @@ Examples
splunk.es.data_input_monitor:
name: "/var/log/example.log"
state: "present"
- recursive: True
+ recursive: true
diff --git a/ansible_collections/splunk/es/docs/splunk.es.data_input_network_module.rst b/ansible_collections/splunk/es/docs/splunk.es.data_input_network_module.rst
index fb48a05d7..3686ab253 100644
--- a/ansible_collections/splunk/es/docs/splunk.es.data_input_network_module.rst
+++ b/ansible_collections/splunk/es/docs/splunk.es.data_input_network_module.rst
@@ -232,7 +232,7 @@ Parameters
<td>
<div>Set the source type for events from this input.</div>
<div>&quot;sourcetype=&quot; is automatically prepended to &lt;string&gt;.</div>
- <div>Defaults to audittrail (if signedaudit=True) or fschange (if signedaudit=False).</div>
+ <div>Defaults to audittrail (if signedaudit=True) or fschange (if signedaudit=false).</div>
</td>
</tr>
<tr>
diff --git a/ansible_collections/splunk/es/docs/splunk.es.splunk_adaptive_response_notable_events_module.rst b/ansible_collections/splunk/es/docs/splunk.es.splunk_adaptive_response_notable_events_module.rst
index 4838de449..fdd3a9946 100644
--- a/ansible_collections/splunk/es/docs/splunk.es.splunk_adaptive_response_notable_events_module.rst
+++ b/ansible_collections/splunk/es/docs/splunk.es.splunk_adaptive_response_notable_events_module.rst
@@ -532,19 +532,19 @@ Examples
drilldown_earliest_offset: $info_min_time$
drilldown_latest_offset: $info_max_time$
extract_artifacts:
- asset:
- - src
- - dest
- identity:
- - src_user
- - user
- - src_user_id
+ asset:
+ - src
+ - dest
+ identity:
+ - src_user
+ - user
+ - src_user_id
next_steps:
- - makestreams
+ - makestreams
name: ansible_test_notable
recommended_actions:
- - email
- - logevent
+ - email
+ - logevent
security_domain: threat
severity: high
state: merged
@@ -611,19 +611,19 @@ Examples
drilldown_earliest_offset: $info_min_time$
drilldown_latest_offset: $info_max_time$
extract_artifacts:
- asset:
- - src
- - dest
- identity:
- - src_user
- - user
- - src_user_id
+ asset:
+ - src
+ - dest
+ identity:
+ - src_user
+ - user
+ - src_user_id
next_steps:
- - makestreams
+ - makestreams
name: ansible_test_notable
recommended_actions:
- - email
- - logevent
+ - email
+ - logevent
security_domain: threat
severity: high
state: replaced
diff --git a/ansible_collections/splunk/es/docs/splunk.es.splunk_correlation_searches_module.rst b/ansible_collections/splunk/es/docs/splunk.es.splunk_correlation_searches_module.rst
index 76295b5dd..78b87b0f4 100644
--- a/ansible_collections/splunk/es/docs/splunk.es.splunk_correlation_searches_module.rst
+++ b/ansible_collections/splunk/es/docs/splunk.es.splunk_correlation_searches_module.rst
@@ -694,7 +694,7 @@ Examples
throttle_window_duration: 5s
throttle_fields_to_group_by:
- test_field1
- suppress_alerts: False
+ suppress_alerts: false
search: >
'| tstats summariesonly=true values("Authentication.tag") as "tag",dc("Authentication.user") as "user_count",dc("Authent'
'ication.dest") as "dest_count",count from datamodel="Authentication"."Authentication" where nodename="Authentication.Fai'
@@ -801,7 +801,7 @@ Examples
throttle_fields_to_group_by:
- test_field1
- test_field2
- suppress_alerts: True
+ suppress_alerts: true
search: >
'| tstats summariesonly=true values("Authentication.tag") as "tag",dc("Authentication.user") as "user_count",dc("Authent'
'ication.dest") as "dest_count",count from datamodel="Authentication"."Authentication" where nodename="Authentication.Fai'
diff --git a/ansible_collections/splunk/es/docs/splunk.es.splunk_data_inputs_monitor_module.rst b/ansible_collections/splunk/es/docs/splunk.es.splunk_data_inputs_monitor_module.rst
index 54cb445ea..7e79bcaaa 100644
--- a/ansible_collections/splunk/es/docs/splunk.es.splunk_data_inputs_monitor_module.rst
+++ b/ansible_collections/splunk/es/docs/splunk.es.splunk_data_inputs_monitor_module.rst
@@ -83,7 +83,7 @@ Parameters
</ul>
</td>
<td>
- <div>If set to <code>True</code>, the index value is checked to ensure that it is the name of a valid index.</div>
+ <div>If set to <code>true</code>, the index value is checked to ensure that it is the name of a valid index.</div>
<div>This parameter is not returned back by Splunk while obtaining object information. It is therefore left out while performing idempotency checks</div>
</td>
</tr>
@@ -104,7 +104,7 @@ Parameters
</ul>
</td>
<td>
- <div>If set to <code>True</code>, the name value is checked to ensure that it exists.</div>
+ <div>If set to <code>true</code>, the name value is checked to ensure that it exists.</div>
<div>This parameter is not returned back by Splunk while obtaining object information. It is therefore left out while performing idempotency checks</div>
</td>
</tr>
@@ -161,7 +161,7 @@ Parameters
</ul>
</td>
<td>
- <div>If set to <code>True</code>, files that are seen for the first time is read from the end.</div>
+ <div>If set to <code>true</code>, files that are seen for the first time is read from the end.</div>
</td>
</tr>
<tr>
@@ -436,8 +436,8 @@ Examples
config:
- name: "/var/log"
blacklist: "//var/log/[a-z]/gm"
- check_index: True
- check_path: True
+ check_index: true
+ check_path: true
crc_salt: <SOURCE>
rename_source: "test"
whitelist: "//var/log/[0-9]/gm"
diff --git a/ansible_collections/splunk/es/docs/splunk.es.splunk_data_inputs_network_module.rst b/ansible_collections/splunk/es/docs/splunk.es.splunk_data_inputs_network_module.rst
index aa561b1f0..0f220ae49 100644
--- a/ansible_collections/splunk/es/docs/splunk.es.splunk_data_inputs_network_module.rst
+++ b/ansible_collections/splunk/es/docs/splunk.es.splunk_data_inputs_network_module.rst
@@ -405,7 +405,7 @@ Parameters
<td>
<div>Set the source type for events from this input.</div>
<div>&quot;sourcetype=&quot; is automatically prepended to &lt;string&gt;.</div>
- <div>Defaults to audittrail (if signedaudit=True) or fschange (if signedaudit=False).</div>
+ <div>Defaults to audittrail (if signedaudit=true) or fschange (if signedaudit=false).</div>
</td>
</tr>
<tr>
@@ -668,7 +668,7 @@ Examples
datatype: raw
name: 8100
connection_host: ip
- disabled: True
+ disabled: true
raw_tcp_done_timeout: 9
restrict_to_host: default
queue: parsingQueue
@@ -719,7 +719,7 @@ Examples
datatype: cooked
name: 8101
connection_host: ip
- disabled: False
+ disabled: false
restrict_to_host: default
state: merged
@@ -770,7 +770,7 @@ Examples
# ],
# "before": [],
- - name: To add the Splunk SSL
+ - name: To add the Splunk SSL
splunk.es.splunk_data_inputs_network:
config:
- protocol: tcp
@@ -841,7 +841,7 @@ Examples
datatype: raw
name: 8100
connection_host: ip
- disabled: True
+ disabled: true
host: "$decideOnStartup"
index: default
queue: parsingQueue