CN-381 CN-383 refactor : i18n相关设置与修改
This commit is contained in:
@@ -6,22 +6,22 @@
|
||||
<div class="row__content">
|
||||
<span
|
||||
class="row__content--link"
|
||||
@click="goDetail('app', detection.app_name)"
|
||||
>{{ detection.app_name }}</span
|
||||
@click="goDetail('app', detection.appName)"
|
||||
>{{ detection.appName }}</span
|
||||
>
|
||||
<template v-if="detection.eventType === 'dns error'">
|
||||
<span>
|
||||
’s rate of DNS query errors is abnormally high.
|
||||
{{$t('detections.dnsQueryError')}}
|
||||
</span>
|
||||
</template>
|
||||
<template v-if="detection.eventType === 'http error'">
|
||||
<span>
|
||||
’s rate of HTTP query errors is abnormally high.
|
||||
{{$t('detections.httpQueryError')}}
|
||||
</span>
|
||||
</template>
|
||||
<template v-if="detection.eventType === 'high dns response time'">
|
||||
<span>
|
||||
’s average of DNS response time is abnormally high.
|
||||
{{$t('detections.responseTime')}}
|
||||
</span>
|
||||
</template>
|
||||
</div>
|
||||
|
||||
@@ -11,17 +11,17 @@
|
||||
>
|
||||
<template v-if="detection.eventType === 'dns error'">
|
||||
<span>
|
||||
’s rate of DNS query errors is abnormally high.
|
||||
{{$t('detections.dnsQueryError')}}
|
||||
</span>
|
||||
</template>
|
||||
<template v-if="detection.eventType === 'http error'">
|
||||
<span>
|
||||
’s rate of HTTP query errors is abnormally high.
|
||||
{{$t('detections.httpQueryError')}}
|
||||
</span>
|
||||
</template>
|
||||
<template v-if="detection.eventType === 'high dns response time'">
|
||||
<span>
|
||||
’s average of DNS response time is abnormally high.
|
||||
{{$t('detections.responseTime')}}
|
||||
</span>
|
||||
</template>
|
||||
</div>
|
||||
|
||||
@@ -6,22 +6,22 @@
|
||||
<div class="row__content">
|
||||
<span
|
||||
class="row__content--link"
|
||||
@click="goDetail('ip', detection.server_ip)"
|
||||
>{{ detection.server_ip }}</span
|
||||
@click="goDetail('ip', detection.serverIp)"
|
||||
>{{ detection.serverIp }}</span
|
||||
>
|
||||
<template v-if="detection.eventType === 'dns error'">
|
||||
<span>
|
||||
’s rate of DNS query errors is abnormally high.
|
||||
{{$t('detections.dnsQueryError')}}
|
||||
</span>
|
||||
</template>
|
||||
<template v-if="detection.eventType === 'http error'">
|
||||
<span>
|
||||
’s rate of HTTP query errors is abnormally high.
|
||||
{{$t('detections.httpQueryError')}}
|
||||
</span>
|
||||
</template>
|
||||
<template v-if="detection.eventType === 'high dns response time'">
|
||||
<span>
|
||||
’s average of DNS response time is abnormally high.
|
||||
{{$t('detections.responseTime')}}
|
||||
</span>
|
||||
</template>
|
||||
</div>
|
||||
|
||||
@@ -11,7 +11,7 @@
|
||||
>{{ detection.victimIp }}</span
|
||||
>
|
||||
<span>
|
||||
attempted to access a command&control server (C&C) indicated by
|
||||
{{$t('detection.commandAndControl')}}
|
||||
</span>
|
||||
<span class="row__content--link">{{
|
||||
detection.iocValue
|
||||
@@ -24,8 +24,7 @@
|
||||
>{{ detection.victimIp }}</span
|
||||
>
|
||||
<span>
|
||||
attempted to access a malware distribution server (payload
|
||||
delivery) indicated by
|
||||
{{$t('detection.payloadAndDelivery')}}
|
||||
</span>
|
||||
<span class="row__content--link">{{
|
||||
detection.iocValue
|
||||
|
||||
Reference in New Issue
Block a user