CN-381 CN-383 refactor : i18n相关设置与修改
This commit is contained in:
@@ -6,22 +6,22 @@
|
|||||||
<div class="row__content">
|
<div class="row__content">
|
||||||
<span
|
<span
|
||||||
class="row__content--link"
|
class="row__content--link"
|
||||||
@click="goDetail('app', detection.app_name)"
|
@click="goDetail('app', detection.appName)"
|
||||||
>{{ detection.app_name }}</span
|
>{{ detection.appName }}</span
|
||||||
>
|
>
|
||||||
<template v-if="detection.eventType === 'dns error'">
|
<template v-if="detection.eventType === 'dns error'">
|
||||||
<span>
|
<span>
|
||||||
’s rate of DNS query errors is abnormally high.
|
{{$t('detections.dnsQueryError')}}
|
||||||
</span>
|
</span>
|
||||||
</template>
|
</template>
|
||||||
<template v-if="detection.eventType === 'http error'">
|
<template v-if="detection.eventType === 'http error'">
|
||||||
<span>
|
<span>
|
||||||
’s rate of HTTP query errors is abnormally high.
|
{{$t('detections.httpQueryError')}}
|
||||||
</span>
|
</span>
|
||||||
</template>
|
</template>
|
||||||
<template v-if="detection.eventType === 'high dns response time'">
|
<template v-if="detection.eventType === 'high dns response time'">
|
||||||
<span>
|
<span>
|
||||||
’s average of DNS response time is abnormally high.
|
{{$t('detections.responseTime')}}
|
||||||
</span>
|
</span>
|
||||||
</template>
|
</template>
|
||||||
</div>
|
</div>
|
||||||
|
|||||||
@@ -11,17 +11,17 @@
|
|||||||
>
|
>
|
||||||
<template v-if="detection.eventType === 'dns error'">
|
<template v-if="detection.eventType === 'dns error'">
|
||||||
<span>
|
<span>
|
||||||
’s rate of DNS query errors is abnormally high.
|
{{$t('detections.dnsQueryError')}}
|
||||||
</span>
|
</span>
|
||||||
</template>
|
</template>
|
||||||
<template v-if="detection.eventType === 'http error'">
|
<template v-if="detection.eventType === 'http error'">
|
||||||
<span>
|
<span>
|
||||||
’s rate of HTTP query errors is abnormally high.
|
{{$t('detections.httpQueryError')}}
|
||||||
</span>
|
</span>
|
||||||
</template>
|
</template>
|
||||||
<template v-if="detection.eventType === 'high dns response time'">
|
<template v-if="detection.eventType === 'high dns response time'">
|
||||||
<span>
|
<span>
|
||||||
’s average of DNS response time is abnormally high.
|
{{$t('detections.responseTime')}}
|
||||||
</span>
|
</span>
|
||||||
</template>
|
</template>
|
||||||
</div>
|
</div>
|
||||||
|
|||||||
@@ -6,22 +6,22 @@
|
|||||||
<div class="row__content">
|
<div class="row__content">
|
||||||
<span
|
<span
|
||||||
class="row__content--link"
|
class="row__content--link"
|
||||||
@click="goDetail('ip', detection.server_ip)"
|
@click="goDetail('ip', detection.serverIp)"
|
||||||
>{{ detection.server_ip }}</span
|
>{{ detection.serverIp }}</span
|
||||||
>
|
>
|
||||||
<template v-if="detection.eventType === 'dns error'">
|
<template v-if="detection.eventType === 'dns error'">
|
||||||
<span>
|
<span>
|
||||||
’s rate of DNS query errors is abnormally high.
|
{{$t('detections.dnsQueryError')}}
|
||||||
</span>
|
</span>
|
||||||
</template>
|
</template>
|
||||||
<template v-if="detection.eventType === 'http error'">
|
<template v-if="detection.eventType === 'http error'">
|
||||||
<span>
|
<span>
|
||||||
’s rate of HTTP query errors is abnormally high.
|
{{$t('detections.httpQueryError')}}
|
||||||
</span>
|
</span>
|
||||||
</template>
|
</template>
|
||||||
<template v-if="detection.eventType === 'high dns response time'">
|
<template v-if="detection.eventType === 'high dns response time'">
|
||||||
<span>
|
<span>
|
||||||
’s average of DNS response time is abnormally high.
|
{{$t('detections.responseTime')}}
|
||||||
</span>
|
</span>
|
||||||
</template>
|
</template>
|
||||||
</div>
|
</div>
|
||||||
|
|||||||
@@ -11,7 +11,7 @@
|
|||||||
>{{ detection.victimIp }}</span
|
>{{ detection.victimIp }}</span
|
||||||
>
|
>
|
||||||
<span>
|
<span>
|
||||||
attempted to access a command&control server (C&C) indicated by
|
{{$t('detection.commandAndControl')}}
|
||||||
</span>
|
</span>
|
||||||
<span class="row__content--link">{{
|
<span class="row__content--link">{{
|
||||||
detection.iocValue
|
detection.iocValue
|
||||||
@@ -24,8 +24,7 @@
|
|||||||
>{{ detection.victimIp }}</span
|
>{{ detection.victimIp }}</span
|
||||||
>
|
>
|
||||||
<span>
|
<span>
|
||||||
attempted to access a malware distribution server (payload
|
{{$t('detection.payloadAndDelivery')}}
|
||||||
delivery) indicated by
|
|
||||||
</span>
|
</span>
|
||||||
<span class="row__content--link">{{
|
<span class="row__content--link">{{
|
||||||
detection.iocValue
|
detection.iocValue
|
||||||
|
|||||||
Reference in New Issue
Block a user