Server IP : 85.214.239.14 / Your IP : 3.148.115.43 Web Server : Apache/2.4.62 (Debian) System : Linux h2886529.stratoserver.net 4.9.0 #1 SMP Tue Jan 9 19:45:01 MSK 2024 x86_64 User : www-data ( 33) PHP Version : 7.4.18 Disable Function : pcntl_alarm,pcntl_fork,pcntl_waitpid,pcntl_wait,pcntl_wifexited,pcntl_wifstopped,pcntl_wifsignaled,pcntl_wifcontinued,pcntl_wexitstatus,pcntl_wtermsig,pcntl_wstopsig,pcntl_signal,pcntl_signal_get_handler,pcntl_signal_dispatch,pcntl_get_last_error,pcntl_strerror,pcntl_sigprocmask,pcntl_sigwaitinfo,pcntl_sigtimedwait,pcntl_exec,pcntl_getpriority,pcntl_setpriority,pcntl_async_signals,pcntl_unshare, MySQL : OFF | cURL : OFF | WGET : ON | Perl : ON | Python : ON | Sudo : ON | Pkexec : OFF Directory : /proc/2/root/proc/self/root/proc/2/cwd/usr/share/augeas/lenses/dist/tests/ |
Upload File : |
(** * * This module is used to test the Splunk module for valid extractions. * Written by Tim Brigham. * This file is licensed under the LGPLv2+, like the rest of Augeas. **) module Test_splunk = (** inputs.conf **) let inputs = "[default] host = splunk-node-1.example.com enable_autocomplete_login = False _meta = metakey::metaval foo::bar [udp://514] connection_host = none source = test sourcetype = syslog " test Splunk.lns get inputs = { "target" = "default" { "host" = "splunk-node-1.example.com" } { "enable_autocomplete_login" = "False" } { "_meta" = "metakey::metaval foo::bar" } {}} { "target" = "udp://514" { "connection_host" = "none" } { "source" = "test" } { "sourcetype" = "syslog" } {}} (** web.conf **) let web = "[settings] enableSplunkWebSSL = 1 enable_autocomplete_login = False " test Splunk.lns get web = { "target" = "settings" { "enableSplunkWebSSL" = "1" } { "enable_autocomplete_login" = "False" } } (** props.conf **) let props = "[splunkd_stdout] PREFIX_SOURCETYPE = False SHOULD_LINEMERGE = False is_valid = False maxDist = 99 " test Splunk.lns get props = { "target" = "splunkd_stdout" { "PREFIX_SOURCETYPE" = "False" } { "SHOULD_LINEMERGE" = "False" } { "is_valid" = "False" } { "maxDist" = "99" } {}} (** tenants.conf **) let tenants = "[tenant:default] whitelist.0 = * " test Splunk.lns get tenants = { "target" = "tenant:default" { "whitelist.0" = "*" } } let server = "[license] active_group = Free master_uri = https://myserver.mydomain.com:8089 [general] serverName = splunk-node-1 trustedIP = 127.0.0.1 guid = XXXXXXX-XXXXXXX-XXXXXXX-XXXXXXX-XXXXXXXXXXXXX [sslConfig] sslKeysfilePassword = $1$XX2X4XX6XXXXXXXXX " test Splunk.lns get server = { "target" = "license" { "active_group" = "Free" } { "master_uri" = "https://myserver.mydomain.com:8089" } {}} { "target" = "general" { "serverName" = "splunk-node-1" } { "trustedIP" = "127.0.0.1" } { "guid" = "XXXXXXX-XXXXXXX-XXXXXXX-XXXXXXX-XXXXXXXXXXXXX" } {}} { "target" = "sslConfig" { "sslKeysfilePassword" = "$1$XX2X4XX6XXXXXXXXX" } {}} (* test anonymous attributes *) let anon = " # master serverName = splunk-node-1 # slave serverName = splunk-node-2 [general] serverName = splunk-node-3 " test Splunk.lns get anon = { ".anon" { } { "#comment" = "master" } { "serverName" = "splunk-node-1" } { } { "#comment" = "slave" } { "serverName" = "splunk-node-2" } { } } { "target" = "general" { "serverName" = "splunk-node-3" } { } } (* test empty value entry *) let override = " [general] # normal entry foo = bar # override entry foo = " test Splunk.lns get override = { ".anon" { } } { "target" = "general" { "#comment" = "normal entry" } { "foo" = "bar" } { "#comment" = "override entry" } { "foo" } }