Interview Questions Flashcards
When you’re standing up a brand new indexer, what is the overall process for adding it to a cluster?
- Go to settings
- Go to indexer clustering
- Make the instance a peer node
- Connect to the cluster master through management port (8089)
- Indicate the peer replication port (8080)
- Add security key
- Enable peer node
What is the process for adding an index to an environment?
- Go to settings
- Go to Indexes
- Go to new index
- Name the index
- Save
How can you make data CIM compliant?
- Create tags
Example: Let’s say you have Office A, Office B, and Office C. You want to be able to find events quickly that are associated with hosts in Office B. You would create a tag with the IP addresses of all hosts for Office B. The tag would allow you to reference Office B events quickly.
- Create field aliases
Example: My data model has a field called http_fallon. However in my source data, let’s say my name is spelled incorrectly. I would use a field alias to capture the misspelling of my name in the source data and map it to the correct field name
What extension do you use in developing dashboards?
XML extensions which are cascading style sheets
What tools do you use to monitor the health of your system?
Monitoring Console
Where are Splunk logs located in Linux?
splunk_home/var/log/splunk
What is the purpose of a monitoring console?
Allows you to monitor the performance health (or just health) of your Splunk environment
What is the difference between replication factor and search factor?
Replication factor specifies how many total copies of raw data the cluster should maintain. Search factor specifies how many copies are searchable.
What is the purpose of the security key?
Authenticates communication between the cluster nodes.
Walk me through the process of adding a license master and cluster master to an environment.
- Go to settings
- Go to licensing
- Add the license by uploading it into the system (select install)
- Restart Splunk
- To make the server a cluster master go to settings
- Go to indexer clustering
- Select master node
- Select next
- Specify the replication factor and search factor
- specify what the security key is
- enable the master node and restart
Walk me through the process of pointing servers to the license master.
- go to settings
- licensing
- change the instance to a slave instance
- enter the license master URI
- save and restart
Walk me through creating an indexing cluster.
For each indexer, do the following
- settings
- indexer clustering
- enable indexer clustering
- click peer node, click next
- connect the peer node to the cluster master by putting the master URI in and the management port in (8089)
- indicate what the peer replication port is
- specify what the security key is and enable the peer node
How do you configure the indexers to receive logs sent from the forwarders?
- settings
- forwarding and receiving
- configure receiving
- indicate what the listening port is (9997)
- save
How would you troubleshoot if the forwarder is not communicating with the deployment server?
Run splunk status on the forwarder. Then make the sure the IP address in the deployment client.conf file is for your deployment server.
What are two ways to filter out unwanted data?
Send events to null queue in transforms.conf file or black listing.
If you have issues with Splunk where would you go to see what is the problem?
Splunkd.log which is the primary log for the splunk server
Explain the importance of CIM
Splunk CIM is used to normalize data for matching basic or common fields in a dataset
Splunk has stopped indexing your data, and we need to find crash logs. Which internal log file do you check, and what is the path to that log?
splunkd.log, which would be found in: /$SPLUNK_HOME/var/log/splunk/splunkd.log