mirror of
https://github.com/elastic/kibana.git
synced 2025-04-24 17:59:23 -04:00
[ML] Edits create anomaly job intro text (#64607)
* Edits create anomaly job intro text * [DOCS] More edits * [DOCS] Removes obsolete translations * [DOCS] Addresses feedback * [DOCS] Update create job breadcrumb Co-authored-by: Elastic Machine <elasticmachine@users.noreply.github.com>
This commit is contained in:
parent
c2422c9fce
commit
415d33b756
23 changed files with 26 additions and 38 deletions
|
@ -19,7 +19,7 @@ import { getRichDetectors } from './util/general';
|
|||
import { IndexPattern } from '../../../../../../../../../src/plugins/data/public';
|
||||
|
||||
export class MultiMetricJobCreator extends JobCreator {
|
||||
// a multi metric job has one optional overall partition field
|
||||
// a multi-metric job has one optional overall partition field
|
||||
// which is the same for all detectors.
|
||||
private _splitField: SplitField = null;
|
||||
|
||||
|
|
|
@ -298,7 +298,7 @@ export function getJobCreatorTitle(jobCreator: JobCreatorType) {
|
|||
});
|
||||
case JOB_TYPE.MULTI_METRIC:
|
||||
return i18n.translate('xpack.ml.newJob.wizard.jobCreatorTitle.multiMetric', {
|
||||
defaultMessage: 'Multi metric',
|
||||
defaultMessage: 'Multi-metric',
|
||||
});
|
||||
case JOB_TYPE.POPULATION:
|
||||
return i18n.translate('xpack.ml.newJob.wizard.jobCreatorTitle.population', {
|
||||
|
|
|
@ -40,7 +40,7 @@ export const SingleMetricSettings: FC<Props> = ({ setIsValid }) => {
|
|||
<EuiButtonEmpty onClick={convertToMultiMetric}>
|
||||
<FormattedMessage
|
||||
id="xpack.ml.newJob.wizard.pickFieldsStep.singleMetricView.convertToMultiMetricButton"
|
||||
defaultMessage="Convert to multi metric job"
|
||||
defaultMessage="Convert to multi-metric job"
|
||||
/>
|
||||
</EuiButtonEmpty>
|
||||
</EuiFlexItem>
|
||||
|
|
|
@ -106,15 +106,15 @@ export const Page: FC = () => {
|
|||
icon: {
|
||||
type: 'createMultiMetricJob',
|
||||
ariaLabel: i18n.translate('xpack.ml.newJob.wizard.jobType.multiMetricAriaLabel', {
|
||||
defaultMessage: 'Multi metric job',
|
||||
defaultMessage: 'Multi-metric job',
|
||||
}),
|
||||
},
|
||||
title: i18n.translate('xpack.ml.newJob.wizard.jobType.multiMetricTitle', {
|
||||
defaultMessage: 'Multi metric',
|
||||
defaultMessage: 'Multi-metric',
|
||||
}),
|
||||
description: i18n.translate('xpack.ml.newJob.wizard.jobType.multiMetricDescription', {
|
||||
defaultMessage:
|
||||
'Detect anomalies in multiple metrics by splitting a time series by a categorical field.',
|
||||
'Detect anomalies with one or more metrics and optionally split the analysis.',
|
||||
}),
|
||||
id: 'mlJobTypeLinkMultiMetricJob',
|
||||
},
|
||||
|
@ -208,7 +208,7 @@ export const Page: FC = () => {
|
|||
<h2>
|
||||
<FormattedMessage
|
||||
id="xpack.ml.newJob.wizard.jobType.useSuppliedConfigurationTitle"
|
||||
defaultMessage="Use a supplied configuration"
|
||||
defaultMessage="Use preconfigured jobs"
|
||||
/>
|
||||
</h2>
|
||||
</EuiTitle>
|
||||
|
@ -217,8 +217,8 @@ export const Page: FC = () => {
|
|||
<p>
|
||||
<FormattedMessage
|
||||
id="xpack.ml.newJob.wizard.jobType.useSuppliedConfigurationDescription"
|
||||
defaultMessage="The fields in your data have been recognized as matching known configurations.
|
||||
Select to create a set of machine learning jobs and associated dashboards."
|
||||
defaultMessage="The fields in your data match known configurations.
|
||||
Create a set of preconfigured jobs."
|
||||
/>
|
||||
</p>
|
||||
</EuiText>
|
||||
|
@ -244,16 +244,6 @@ export const Page: FC = () => {
|
|||
/>
|
||||
</h2>
|
||||
</EuiTitle>
|
||||
<EuiSpacer size="s" />
|
||||
<EuiText>
|
||||
<p>
|
||||
<FormattedMessage
|
||||
id="xpack.ml.newJob.wizard.jobType.useWizardDescription"
|
||||
defaultMessage="Use one of the wizards to create a machine learning job to find anomalies in your data."
|
||||
/>
|
||||
</p>
|
||||
</EuiText>
|
||||
|
||||
<EuiSpacer size="m" />
|
||||
|
||||
<EuiFlexGrid gutterSize="l" columns={4}>
|
||||
|
|
|
@ -37,7 +37,7 @@ export const DATA_VISUALIZER_BREADCRUMB: ChromeBreadcrumb = Object.freeze({
|
|||
|
||||
export const CREATE_JOB_BREADCRUMB: ChromeBreadcrumb = Object.freeze({
|
||||
text: i18n.translate('xpack.ml.createJobsBreadcrumbLabel', {
|
||||
defaultMessage: 'Create jobs',
|
||||
defaultMessage: 'Create job',
|
||||
}),
|
||||
href: '#/jobs/new_job',
|
||||
});
|
||||
|
|
|
@ -42,7 +42,7 @@ const multiMetricBreadcrumbs = [
|
|||
...baseBreadcrumbs,
|
||||
{
|
||||
text: i18n.translate('xpack.ml.jobsBreadcrumbs.multiMetricLabel', {
|
||||
defaultMessage: 'Multi metric',
|
||||
defaultMessage: 'Multi-metric',
|
||||
}),
|
||||
href: '',
|
||||
},
|
||||
|
|
|
@ -1,7 +1,7 @@
|
|||
{
|
||||
"id": "apache_ecs",
|
||||
"title": "Apache access logs",
|
||||
"description": "Find unusual activity in HTTP access logs from filebeat (ECS)",
|
||||
"description": "Find unusual activity in HTTP access logs from filebeat (ECS).",
|
||||
"type": "Web Access Logs",
|
||||
"logoFile": "logo.json",
|
||||
"defaultIndexPattern": "filebeat-*",
|
||||
|
|
|
@ -1,7 +1,7 @@
|
|||
{
|
||||
"id": "apm_transaction",
|
||||
"title": "APM",
|
||||
"description": "Detect anomalies in high mean of transaction duration (ECS)",
|
||||
"description": "Detect anomalies in high mean of transaction duration (ECS).",
|
||||
"type": "Transaction data",
|
||||
"logoFile": "logo.json",
|
||||
"defaultIndexPattern": "apm-*",
|
||||
|
|
|
@ -1,7 +1,7 @@
|
|||
{
|
||||
"id": "auditbeat_process_docker_ecs",
|
||||
"title": "Auditbeat docker processes",
|
||||
"description": "Detect unusual processes in docker containers from auditd data (ECS)",
|
||||
"description": "Detect unusual processes in docker containers from auditd data (ECS).",
|
||||
"type": "Auditbeat data",
|
||||
"logoFile": "logo.json",
|
||||
"defaultIndexPattern": "auditbeat-*",
|
||||
|
|
|
@ -1,7 +1,7 @@
|
|||
{
|
||||
"id": "auditbeat_process_hosts_ecs",
|
||||
"title": "Auditbeat host processes",
|
||||
"description": "Detect unusual processes on hosts from auditd data (ECS)",
|
||||
"description": "Detect unusual processes on hosts from auditd data (ECS).",
|
||||
"type": "Auditbeat data",
|
||||
"logoFile": "logo.json",
|
||||
"defaultIndexPattern": "auditbeat-*",
|
||||
|
|
|
@ -1,7 +1,7 @@
|
|||
{
|
||||
"id": "logs_ui_analysis",
|
||||
"title": "Log Analysis",
|
||||
"description": "Detect anomalies in log entries via the Logs UI",
|
||||
"description": "Detect anomalies in log entries via the Logs UI.",
|
||||
"type": "Logs",
|
||||
"logoFile": "logo.json",
|
||||
"jobs": [
|
||||
|
|
|
@ -1,7 +1,7 @@
|
|||
{
|
||||
"id": "logs_ui_categories",
|
||||
"title": "Log entry categories",
|
||||
"description": "Detect anomalies in count of log entries by category",
|
||||
"description": "Detect anomalies in count of log entries by category.",
|
||||
"type": "Logs",
|
||||
"logoFile": "logo.json",
|
||||
"jobs": [
|
||||
|
|
|
@ -2,7 +2,7 @@
|
|||
"id": "metricbeat_system_ecs",
|
||||
"title": "Metricbeat System",
|
||||
"description": "Detect anomalies in Metricbeat System data (ECS)",
|
||||
"type": "Metricbeat data",
|
||||
"type": "Metricbeat data.",
|
||||
"logoFile": "logo.json",
|
||||
"defaultIndexPattern": "metricbeat-*",
|
||||
"query": {
|
||||
|
|
|
@ -1,7 +1,7 @@
|
|||
{
|
||||
"id": "nginx_ecs",
|
||||
"title": "Nginx access logs",
|
||||
"description": "Find unusual activity in HTTP access logs from filebeat (ECS)",
|
||||
"description": "Find unusual activity in HTTP access logs from filebeat (ECS).",
|
||||
"type": "Web Access Logs",
|
||||
"logoFile": "logo.json",
|
||||
"defaultIndexPattern": "filebeat-*",
|
||||
|
|
|
@ -1,7 +1,7 @@
|
|||
{
|
||||
"id": "sample_data_ecommerce",
|
||||
"title": "Kibana sample data eCommerce",
|
||||
"description": "Find anomalies in eCommerce total sales data",
|
||||
"description": "Find anomalies in eCommerce total sales data.",
|
||||
"type": "Sample Dataset",
|
||||
"logoFile": "logo.json",
|
||||
"defaultIndexPattern": "kibana_sample_data_ecommerce",
|
||||
|
|
|
@ -1,7 +1,7 @@
|
|||
{
|
||||
"id": "sample_data_weblogs",
|
||||
"title": "Kibana sample data web logs",
|
||||
"description": "Find anomalies in Kibana sample web logs data",
|
||||
"description": "Find anomalies in Kibana sample web logs data.",
|
||||
"type": "Sample Dataset",
|
||||
"logoFile": "logo.json",
|
||||
"defaultIndexPattern": "kibana_sample_data_logs",
|
||||
|
|
|
@ -1,7 +1,7 @@
|
|||
{
|
||||
"id": "siem_auditbeat",
|
||||
"title": "SIEM Auditbeat",
|
||||
"description": "Detect suspicious network activity and unusual processes in Auditbeat data (beta)",
|
||||
"description": "Detect suspicious network activity and unusual processes in Auditbeat data (beta).",
|
||||
"type": "Auditbeat data",
|
||||
"logoFile": "logo.json",
|
||||
"defaultIndexPattern": "auditbeat-*",
|
||||
|
|
|
@ -1,7 +1,7 @@
|
|||
{
|
||||
"id": "siem_auditbeat_auth",
|
||||
"title": "SIEM Auditbeat Authentication",
|
||||
"description": "Detect suspicious authentication events in Auditbeat data (beta)",
|
||||
"description": "Detect suspicious authentication events in Auditbeat data (beta).",
|
||||
"type": "Auditbeat data",
|
||||
"logoFile": "logo.json",
|
||||
"defaultIndexPattern": "auditbeat-*",
|
||||
|
|
|
@ -1,7 +1,7 @@
|
|||
{
|
||||
"id": "siem_packetbeat",
|
||||
"title": "SIEM Packetbeat",
|
||||
"description": "Detect suspicious network activity in Packetbeat data (beta)",
|
||||
"description": "Detect suspicious network activity in Packetbeat data (beta).",
|
||||
"type": "Packetbeat data",
|
||||
"logoFile": "logo.json",
|
||||
"defaultIndexPattern": "packetbeat-*",
|
||||
|
|
|
@ -1,7 +1,7 @@
|
|||
{
|
||||
"id": "siem_winlogbeat",
|
||||
"title": "SIEM Winlogbeat",
|
||||
"description": "Detect unusual processes and network activity in Winlogbeat data (beta)",
|
||||
"description": "Detect unusual processes and network activity in Winlogbeat data (beta).",
|
||||
"type": "Winlogbeat data",
|
||||
"logoFile": "logo.json",
|
||||
"defaultIndexPattern": "winlogbeat-*",
|
||||
|
|
|
@ -1,7 +1,7 @@
|
|||
{
|
||||
"id": "siem_winlogbeat_auth",
|
||||
"title": "SIEM Winlogbeat Authentication",
|
||||
"description": "Detect suspicious authentication events in Winlogbeat data (beta)",
|
||||
"description": "Detect suspicious authentication events in Winlogbeat data (beta).",
|
||||
"type": "Winlogbeat data",
|
||||
"logoFile": "logo.json",
|
||||
"defaultIndexPattern": "winlogbeat-*",
|
||||
|
|
|
@ -10252,7 +10252,6 @@
|
|||
"xpack.ml.newJob.wizard.jobType.singleMetricTitle": "シングルメトリック",
|
||||
"xpack.ml.newJob.wizard.jobType.useSuppliedConfigurationDescription": "データのフィールドが既知のカテゴリーと一致することが認識されました。選択して一連の機械学習ジョブと関連ダッシュボードを作成します。",
|
||||
"xpack.ml.newJob.wizard.jobType.useSuppliedConfigurationTitle": "提供された構成を使用",
|
||||
"xpack.ml.newJob.wizard.jobType.useWizardDescription": "ウィザードの 1 つを使用し、データの異常を検知する機械学習ジョブを作成します。",
|
||||
"xpack.ml.newJob.wizard.jobType.useWizardTitle": "ウィザードを使用",
|
||||
"xpack.ml.newJob.wizard.jsonFlyout.closeButton": "閉じる",
|
||||
"xpack.ml.newJob.wizard.jsonFlyout.datafeed.title": "データフィード構成 JSON",
|
||||
|
|
|
@ -10258,7 +10258,6 @@
|
|||
"xpack.ml.newJob.wizard.jobType.singleMetricTitle": "单一指标",
|
||||
"xpack.ml.newJob.wizard.jobType.useSuppliedConfigurationDescription": "数据中的字段已被识别为匹配已知配置。选择并创建一组 Machine Learning 作业和关联的仪表板。",
|
||||
"xpack.ml.newJob.wizard.jobType.useSuppliedConfigurationTitle": "使用提供的配置",
|
||||
"xpack.ml.newJob.wizard.jobType.useWizardDescription": "使用其中一个向导创建 Machine Learning 作业,以查找数据中的异常。",
|
||||
"xpack.ml.newJob.wizard.jobType.useWizardTitle": "使用向导",
|
||||
"xpack.ml.newJob.wizard.jsonFlyout.closeButton": "关闭",
|
||||
"xpack.ml.newJob.wizard.jsonFlyout.datafeed.title": "数据馈送配置 JSON",
|
||||
|
|
Loading…
Add table
Add a link
Reference in a new issue