From 68ec5cf3585cb867deb4d9804392e85ceadbb2fb Mon Sep 17 00:00:00 2001
From: Sean Whalen
Date: Sat, 29 Sep 2018 17:52:59 -0400
Subject: [PATCH] 2.7.3
---
_sources/index.rst.txt | 12 ++++++------
index.html | 12 ++++++------
2 files changed, 12 insertions(+), 12 deletions(-)
diff --git a/_sources/index.rst.txt b/_sources/index.rst.txt
index 1433469..01562ea 100644
--- a/_sources/index.rst.txt
+++ b/_sources/index.rst.txt
@@ -16,9 +16,9 @@ parsedmarc documentation - Open source DMARC report analyzer and visualizer
:target: _static/screenshots/dmarc-summary-charts.png
``parsedmarc`` is a Python module and CLI utility for parsing DMARC reports.
-When used with Elasticsearch and Kibana, it works as a self-hosted open source
-alternative to commercial DMARC report processing services such as Agari,
-Dmarcian, and OnDMARC.
+When used with Elasticsearch and Kibana (or Splunk), it works as a self-hosted
+open source alternative to commercial DMARC report processing services such
+as Agari, Dmarcian, and OnDMARC.
Features
========
@@ -371,7 +371,7 @@ Elasticsearch and Kibana
.. note::
- Splunk is also supported starting with ``parsedmarc`` 4.1.1
+ Splunk is also supported starting with ``parsedmarc`` 4.1.3
To set up visual dashboards of DMARC data, install Elasticsearch and Kibana.
@@ -603,7 +603,7 @@ select ``dmarc_aggregate`` for the other saved objects, as shown below.
Splunk
------
-Starting in version 4.1.1 ``parsedmarc`` supports sending aggregate and/or
+Starting in version 4.1.3 ``parsedmarc`` supports sending aggregate and/or
forensic DMARC data to a Splunk `HTTP Event collector (HEC)`_. Simply use the
following command line options, along with ``--save-aggregate`` or
``save-forensic``:
@@ -631,7 +631,7 @@ editor.
.. warning::
- Change all occurrences of ``"index=email"`` in the XML to
+ Change all occurrences of ``index="email"`` in the XML to
match your own index name
Running parsedmarc as a systemd service
diff --git a/index.html b/index.html
index 57f398b..62c51e0 100644
--- a/index.html
+++ b/index.html
@@ -187,9 +187,9 @@

parsedmarc is a Python module and CLI utility for parsing DMARC reports.
-When used with Elasticsearch and Kibana, it works as a self-hosted open source
-alternative to commercial DMARC report processing services such as Agari,
-Dmarcian, and OnDMARC.
+When used with Elasticsearch and Kibana (or Splunk), it works as a self-hosted
+open source alternative to commercial DMARC report processing services such
+as Agari, Dmarcian, and OnDMARC.
Features
@@ -497,7 +497,7 @@ tags in your DMARC record, separated by commas.
Elasticsearch and Kibana
Note
-
Splunk is also supported starting with parsedmarc 4.1.1
+
Splunk is also supported starting with parsedmarc 4.1.3
To set up visual dashboards of DMARC data, install Elasticsearch and Kibana.
@@ -655,7 +655,7 @@ select dmarc_aggreg
Splunk
-
Starting in version 4.1.1 parsedmarc supports sending aggregate and/or
+
Starting in version 4.1.3 parsedmarc supports sending aggregate and/or
forensic DMARC data to a Splunk HTTP Event collector (HEC). Simply use the
following command line options, along with --save-aggregate or
save-forensic:
@@ -679,7 +679,7 @@ Copy and paste the contents of each file into a separate Splunk dashboard XML
editor.
Warning
-
Change all occurrences of "index=email" in the XML to
+
Change all occurrences of index="email" in the XML to
match your own index name