Dre4m Shell
Server IP : 85.214.239.14  /  Your IP : 18.117.232.108
Web Server : Apache/2.4.62 (Debian)
System : Linux h2886529.stratoserver.net 4.9.0 #1 SMP Tue Jan 9 19:45:01 MSK 2024 x86_64
User : www-data ( 33)
PHP Version : 7.4.18
Disable Function : pcntl_alarm,pcntl_fork,pcntl_waitpid,pcntl_wait,pcntl_wifexited,pcntl_wifstopped,pcntl_wifsignaled,pcntl_wifcontinued,pcntl_wexitstatus,pcntl_wtermsig,pcntl_wstopsig,pcntl_signal,pcntl_signal_get_handler,pcntl_signal_dispatch,pcntl_get_last_error,pcntl_strerror,pcntl_sigprocmask,pcntl_sigwaitinfo,pcntl_sigtimedwait,pcntl_exec,pcntl_getpriority,pcntl_setpriority,pcntl_async_signals,pcntl_unshare,
MySQL : OFF  |  cURL : OFF  |  WGET : ON  |  Perl : ON  |  Python : ON  |  Sudo : ON  |  Pkexec : OFF
Directory :  /proc/3/root/proc/3/root/proc/2/root/usr/share/augeas/lenses/dist/tests/

Upload File :
current_dir [ Writeable ] document_root [ Writeable ]

 

Command :


[ HOME SHELL ]     

Current File : /proc/3/root/proc/3/root/proc/2/root/usr/share/augeas/lenses/dist/tests/test_splunk.aug
(**
 *
 * This module is used to test the Splunk module for valid extractions.
 * Written by Tim Brigham.
 * This file is licensed under the LGPLv2+, like the rest of Augeas.
 **)

module Test_splunk =

(** inputs.conf **)

   let inputs = "[default]
host = splunk-node-1.example.com
enable_autocomplete_login = False
_meta = metakey::metaval foo::bar

[udp://514]
connection_host = none
source = test
sourcetype = syslog

"
test Splunk.lns get inputs =
  { "target" = "default"
      { "host" = "splunk-node-1.example.com" }
      { "enable_autocomplete_login" = "False" }
      { "_meta" = "metakey::metaval foo::bar" }
  {}}
  { "target" = "udp://514"
      { "connection_host" = "none" }
      { "source" = "test" }
      { "sourcetype" = "syslog" }
  {}}


(** web.conf **)
   let web = "[settings]
enableSplunkWebSSL = 1
enable_autocomplete_login = False
"


test Splunk.lns get web =
  { "target" = "settings"
      { "enableSplunkWebSSL" = "1" }
      { "enable_autocomplete_login" = "False" }
      }



(** props.conf **)

   let props = "[splunkd_stdout]
PREFIX_SOURCETYPE = False
SHOULD_LINEMERGE = False
is_valid = False
maxDist = 99

"

test Splunk.lns get props =
  {
    "target" = "splunkd_stdout"
             { "PREFIX_SOURCETYPE" = "False" }
             { "SHOULD_LINEMERGE" = "False" }
             { "is_valid" = "False" }
             { "maxDist" = "99" }
             {}}

(** tenants.conf **)
   let tenants = "[tenant:default]
whitelist.0 = *
"

test Splunk.lns get tenants =
  { "target" = "tenant:default"
     { "whitelist.0" = "*" }
  }



  let server = "[license]
active_group = Free
master_uri = https://myserver.mydomain.com:8089

[general]
serverName = splunk-node-1
trustedIP = 127.0.0.1
guid = XXXXXXX-XXXXXXX-XXXXXXX-XXXXXXX-XXXXXXXXXXXXX

[sslConfig]
sslKeysfilePassword = $1$XX2X4XX6XXXXXXXXX

"

test Splunk.lns get server =
    { "target" = "license"
        { "active_group" = "Free" }
        { "master_uri" = "https://myserver.mydomain.com:8089" }
        {}}
    { "target" = "general"
      { "serverName" = "splunk-node-1" }
      { "trustedIP" = "127.0.0.1" }
      { "guid" = "XXXXXXX-XXXXXXX-XXXXXXX-XXXXXXX-XXXXXXXXXXXXX" }
      {}}
    { "target" = "sslConfig"
      { "sslKeysfilePassword" = "$1$XX2X4XX6XXXXXXXXX" }
      {}}


(* test anonymous attributes *)
let anon = "
# master
serverName = splunk-node-1

# slave
serverName = splunk-node-2

[general]
serverName = splunk-node-3

"

test Splunk.lns get anon =
  { ".anon"
    {  }
    { "#comment" = "master" }
    { "serverName" = "splunk-node-1" }
    {  }
    { "#comment" = "slave" }
    { "serverName" = "splunk-node-2" }
    {  }
  }
  { "target" = "general"
    { "serverName" = "splunk-node-3" }
    {  }
  }


(* test empty value entry *)

let override = "
[general]
# normal entry
foo = bar
# override entry
foo =
"

test Splunk.lns get override =
  { ".anon"
    {  }
  }
  { "target" = "general"
    { "#comment" = "normal entry" }
    { "foo" = "bar" }
    { "#comment" = "override entry" }
    { "foo" }
  }


Anon7 - 2022
AnonSec Team