[ML] Edits create anomaly job intro text (#64607)

* Edits create anomaly job intro text

* [DOCS] More edits

* [DOCS] Removes obsolete translations

* [DOCS] Addresses feedback

* [DOCS] Update create job breadcrumb

Co-authored-by: Elastic Machine <elasticmachine@users.noreply.github.com>
This commit is contained in:
Lisa Cawley 2020-05-05 11:38:20 -07:00 committed by GitHub
parent c2422c9fce
commit 415d33b756
No known key found for this signature in database
GPG key ID: 4AEE18F83AFDEB23
23 changed files with 26 additions and 38 deletions

View file

@ -19,7 +19,7 @@ import { getRichDetectors } from './util/general';
import { IndexPattern } from '../../../../../../../../../src/plugins/data/public';
export class MultiMetricJobCreator extends JobCreator {
// a multi metric job has one optional overall partition field
// a multi-metric job has one optional overall partition field
// which is the same for all detectors.
private _splitField: SplitField = null;

View file

@ -298,7 +298,7 @@ export function getJobCreatorTitle(jobCreator: JobCreatorType) {
});
case JOB_TYPE.MULTI_METRIC:
return i18n.translate('xpack.ml.newJob.wizard.jobCreatorTitle.multiMetric', {
defaultMessage: 'Multi metric',
defaultMessage: 'Multi-metric',
});
case JOB_TYPE.POPULATION:
return i18n.translate('xpack.ml.newJob.wizard.jobCreatorTitle.population', {

View file

@ -40,7 +40,7 @@ export const SingleMetricSettings: FC<Props> = ({ setIsValid }) => {
<EuiButtonEmpty onClick={convertToMultiMetric}>
<FormattedMessage
id="xpack.ml.newJob.wizard.pickFieldsStep.singleMetricView.convertToMultiMetricButton"
defaultMessage="Convert to multi metric job"
defaultMessage="Convert to multi-metric job"
/>
</EuiButtonEmpty>
</EuiFlexItem>

View file

@ -106,15 +106,15 @@ export const Page: FC = () => {
icon: {
type: 'createMultiMetricJob',
ariaLabel: i18n.translate('xpack.ml.newJob.wizard.jobType.multiMetricAriaLabel', {
defaultMessage: 'Multi metric job',
defaultMessage: 'Multi-metric job',
}),
},
title: i18n.translate('xpack.ml.newJob.wizard.jobType.multiMetricTitle', {
defaultMessage: 'Multi metric',
defaultMessage: 'Multi-metric',
}),
description: i18n.translate('xpack.ml.newJob.wizard.jobType.multiMetricDescription', {
defaultMessage:
'Detect anomalies in multiple metrics by splitting a time series by a categorical field.',
'Detect anomalies with one or more metrics and optionally split the analysis.',
}),
id: 'mlJobTypeLinkMultiMetricJob',
},
@ -208,7 +208,7 @@ export const Page: FC = () => {
<h2>
<FormattedMessage
id="xpack.ml.newJob.wizard.jobType.useSuppliedConfigurationTitle"
defaultMessage="Use a supplied configuration"
defaultMessage="Use preconfigured jobs"
/>
</h2>
</EuiTitle>
@ -217,8 +217,8 @@ export const Page: FC = () => {
<p>
<FormattedMessage
id="xpack.ml.newJob.wizard.jobType.useSuppliedConfigurationDescription"
defaultMessage="The fields in your data have been recognized as matching known configurations.
Select to create a set of machine learning jobs and associated dashboards."
defaultMessage="The fields in your data match known configurations.
Create a set of preconfigured jobs."
/>
</p>
</EuiText>
@ -244,16 +244,6 @@ export const Page: FC = () => {
/>
</h2>
</EuiTitle>
<EuiSpacer size="s" />
<EuiText>
<p>
<FormattedMessage
id="xpack.ml.newJob.wizard.jobType.useWizardDescription"
defaultMessage="Use one of the wizards to create a machine learning job to find anomalies in your data."
/>
</p>
</EuiText>
<EuiSpacer size="m" />
<EuiFlexGrid gutterSize="l" columns={4}>

View file

@ -37,7 +37,7 @@ export const DATA_VISUALIZER_BREADCRUMB: ChromeBreadcrumb = Object.freeze({
export const CREATE_JOB_BREADCRUMB: ChromeBreadcrumb = Object.freeze({
text: i18n.translate('xpack.ml.createJobsBreadcrumbLabel', {
defaultMessage: 'Create jobs',
defaultMessage: 'Create job',
}),
href: '#/jobs/new_job',
});

View file

@ -42,7 +42,7 @@ const multiMetricBreadcrumbs = [
...baseBreadcrumbs,
{
text: i18n.translate('xpack.ml.jobsBreadcrumbs.multiMetricLabel', {
defaultMessage: 'Multi metric',
defaultMessage: 'Multi-metric',
}),
href: '',
},

View file

@ -1,7 +1,7 @@
{
"id": "apache_ecs",
"title": "Apache access logs",
"description": "Find unusual activity in HTTP access logs from filebeat (ECS)",
"description": "Find unusual activity in HTTP access logs from filebeat (ECS).",
"type": "Web Access Logs",
"logoFile": "logo.json",
"defaultIndexPattern": "filebeat-*",

View file

@ -1,7 +1,7 @@
{
"id": "apm_transaction",
"title": "APM",
"description": "Detect anomalies in high mean of transaction duration (ECS)",
"description": "Detect anomalies in high mean of transaction duration (ECS).",
"type": "Transaction data",
"logoFile": "logo.json",
"defaultIndexPattern": "apm-*",

View file

@ -1,7 +1,7 @@
{
"id": "auditbeat_process_docker_ecs",
"title": "Auditbeat docker processes",
"description": "Detect unusual processes in docker containers from auditd data (ECS)",
"description": "Detect unusual processes in docker containers from auditd data (ECS).",
"type": "Auditbeat data",
"logoFile": "logo.json",
"defaultIndexPattern": "auditbeat-*",

View file

@ -1,7 +1,7 @@
{
"id": "auditbeat_process_hosts_ecs",
"title": "Auditbeat host processes",
"description": "Detect unusual processes on hosts from auditd data (ECS)",
"description": "Detect unusual processes on hosts from auditd data (ECS).",
"type": "Auditbeat data",
"logoFile": "logo.json",
"defaultIndexPattern": "auditbeat-*",

View file

@ -1,7 +1,7 @@
{
"id": "logs_ui_analysis",
"title": "Log Analysis",
"description": "Detect anomalies in log entries via the Logs UI",
"description": "Detect anomalies in log entries via the Logs UI.",
"type": "Logs",
"logoFile": "logo.json",
"jobs": [

View file

@ -1,7 +1,7 @@
{
"id": "logs_ui_categories",
"title": "Log entry categories",
"description": "Detect anomalies in count of log entries by category",
"description": "Detect anomalies in count of log entries by category.",
"type": "Logs",
"logoFile": "logo.json",
"jobs": [

View file

@ -2,7 +2,7 @@
"id": "metricbeat_system_ecs",
"title": "Metricbeat System",
"description": "Detect anomalies in Metricbeat System data (ECS)",
"type": "Metricbeat data",
"type": "Metricbeat data.",
"logoFile": "logo.json",
"defaultIndexPattern": "metricbeat-*",
"query": {

View file

@ -1,7 +1,7 @@
{
"id": "nginx_ecs",
"title": "Nginx access logs",
"description": "Find unusual activity in HTTP access logs from filebeat (ECS)",
"description": "Find unusual activity in HTTP access logs from filebeat (ECS).",
"type": "Web Access Logs",
"logoFile": "logo.json",
"defaultIndexPattern": "filebeat-*",

View file

@ -1,7 +1,7 @@
{
"id": "sample_data_ecommerce",
"title": "Kibana sample data eCommerce",
"description": "Find anomalies in eCommerce total sales data",
"description": "Find anomalies in eCommerce total sales data.",
"type": "Sample Dataset",
"logoFile": "logo.json",
"defaultIndexPattern": "kibana_sample_data_ecommerce",

View file

@ -1,7 +1,7 @@
{
"id": "sample_data_weblogs",
"title": "Kibana sample data web logs",
"description": "Find anomalies in Kibana sample web logs data",
"description": "Find anomalies in Kibana sample web logs data.",
"type": "Sample Dataset",
"logoFile": "logo.json",
"defaultIndexPattern": "kibana_sample_data_logs",

View file

@ -1,7 +1,7 @@
{
"id": "siem_auditbeat",
"title": "SIEM Auditbeat",
"description": "Detect suspicious network activity and unusual processes in Auditbeat data (beta)",
"description": "Detect suspicious network activity and unusual processes in Auditbeat data (beta).",
"type": "Auditbeat data",
"logoFile": "logo.json",
"defaultIndexPattern": "auditbeat-*",

View file

@ -1,7 +1,7 @@
{
"id": "siem_auditbeat_auth",
"title": "SIEM Auditbeat Authentication",
"description": "Detect suspicious authentication events in Auditbeat data (beta)",
"description": "Detect suspicious authentication events in Auditbeat data (beta).",
"type": "Auditbeat data",
"logoFile": "logo.json",
"defaultIndexPattern": "auditbeat-*",

View file

@ -1,7 +1,7 @@
{
"id": "siem_packetbeat",
"title": "SIEM Packetbeat",
"description": "Detect suspicious network activity in Packetbeat data (beta)",
"description": "Detect suspicious network activity in Packetbeat data (beta).",
"type": "Packetbeat data",
"logoFile": "logo.json",
"defaultIndexPattern": "packetbeat-*",

View file

@ -1,7 +1,7 @@
{
"id": "siem_winlogbeat",
"title": "SIEM Winlogbeat",
"description": "Detect unusual processes and network activity in Winlogbeat data (beta)",
"description": "Detect unusual processes and network activity in Winlogbeat data (beta).",
"type": "Winlogbeat data",
"logoFile": "logo.json",
"defaultIndexPattern": "winlogbeat-*",

View file

@ -1,7 +1,7 @@
{
"id": "siem_winlogbeat_auth",
"title": "SIEM Winlogbeat Authentication",
"description": "Detect suspicious authentication events in Winlogbeat data (beta)",
"description": "Detect suspicious authentication events in Winlogbeat data (beta).",
"type": "Winlogbeat data",
"logoFile": "logo.json",
"defaultIndexPattern": "winlogbeat-*",

View file

@ -10252,7 +10252,6 @@
"xpack.ml.newJob.wizard.jobType.singleMetricTitle": "シングルメトリック",
"xpack.ml.newJob.wizard.jobType.useSuppliedConfigurationDescription": "データのフィールドが既知のカテゴリーと一致することが認識されました。選択して一連の機械学習ジョブと関連ダッシュボードを作成します。",
"xpack.ml.newJob.wizard.jobType.useSuppliedConfigurationTitle": "提供された構成を使用",
"xpack.ml.newJob.wizard.jobType.useWizardDescription": "ウィザードの 1 つを使用し、データの異常を検知する機械学習ジョブを作成します。",
"xpack.ml.newJob.wizard.jobType.useWizardTitle": "ウィザードを使用",
"xpack.ml.newJob.wizard.jsonFlyout.closeButton": "閉じる",
"xpack.ml.newJob.wizard.jsonFlyout.datafeed.title": "データフィード構成 JSON",

View file

@ -10258,7 +10258,6 @@
"xpack.ml.newJob.wizard.jobType.singleMetricTitle": "单一指标",
"xpack.ml.newJob.wizard.jobType.useSuppliedConfigurationDescription": "数据中的字段已被识别为匹配已知配置。选择并创建一组 Machine Learning 作业和关联的仪表板。",
"xpack.ml.newJob.wizard.jobType.useSuppliedConfigurationTitle": "使用提供的配置",
"xpack.ml.newJob.wizard.jobType.useWizardDescription": "使用其中一个向导创建 Machine Learning 作业,以查找数据中的异常。",
"xpack.ml.newJob.wizard.jobType.useWizardTitle": "使用向导",
"xpack.ml.newJob.wizard.jsonFlyout.closeButton": "关闭",
"xpack.ml.newJob.wizard.jsonFlyout.datafeed.title": "数据馈送配置 JSON",