Splunk Flashcards

Fundamentals 1 and 2

1
Q

Machine data is always structured.

A

False

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

Machine data makes up for more than _____% of the data accumulated by organizations.

A

90

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

Machine data can give you insights into:

A
Application performance
Security
Hardware monitoring
Sales
User Behavior
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

Machine data is only log files on web servers.

A

False

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

Which of these is NOT a main component of Splunk?

A

compress and archive

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

The index does not play a major role in Splunk.

A

False

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

Data is broken into single events by:

A

in a consistent format.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

Which role defines what apps a user will see by default?

A

Admin

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

Which two apps ship with Splunk Enterprise?

A

Search & Reporting

Home App

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

There are ______ components to the Search and Reporting app’s default interface.

A

7

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

What is the most efficient way to filter events in Splunk?

A

reverse chronological order

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

Commands that create statistics or visualizations are called ____________.

A

transforming commands

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

The Search & Reporting App has how many search modes?

A

3

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

Which character acts as a wildcard in the Splunk Search Language?

A

*

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

What are Boolean operators in Splunk?

A

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

Which is not a comparison operator in Splunk?

A

&=

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
17
Q

Field names are _____________.

A

case sensitive

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
18
Q

What could be said of the circled field below:

A dest 4

A

it contains four values
its was extracted at search time
it contains string values

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
19
Q

After a report is saved, you can no longer edit the search.

A

False

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
20
Q

Search commands can be used with search terms to do the following:

A

Create charts
Compute statistics
Format data

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
21
Q

If we want to see events after running a transforming command, we need to switch to this mode.

A

Verbose

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
22
Q

Any search that returns these values can be viewed as a chart.

A

Statistical

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
23
Q

Charts can be based on numbers, time or location.

A

True

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
24
Q

________ are searches gathered together in a single pane of glass.

A

Dashboards

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
25
Q

An alert is an action triggered by a ____________.

A

saved search

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
26
Q

Alerts can send an email.

A

True

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
27
Q

These are knowledge objects that provide the data structure for pivot.

A

data models

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
28
Q

Which roles can create data models?

A

Admin and Power

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
29
Q

You can think of adding child data model objects as an _________ Boolean in the Splunk search language.

A

AND

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
30
Q

The instant pivot button is displayed in the statistics and visualization tabs when a _______ search is used.

A

non-transforming

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
31
Q

Unlike pivot, reports created with instant pivot can not be saved.

A

False

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
32
Q

Splunk breaks data into ___________.

A

events

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
33
Q

Field values are _______.

A

case insensitive

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
34
Q

Which 2 apps ship with Splunk Enterprise?

A

Search & Reporting

Home App

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
35
Q

These searches will return the same results?

password fail

“password fail”

A

False

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
36
Q

Which is not a comparison operator in Splunk?

A

OR

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
37
Q

Data is broken into single events by:

A

sourcetype

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
38
Q

Which is not a comparison operator in Splunk?

A

%=

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
39
Q

A time range picker can be included in a report.

A

True

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
40
Q

Charts can be based on numbers, time or location.

A

True

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
41
Q

Which of these is not a main component of Splunk?

A

Compress and archive

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
42
Q

The index does not play a major role in Splunk.

A

False

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
43
Q

Admin, Power, User

A

Out of the box there are 3 main roles

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
44
Q

How can you view all sourcetypes?

A

Click Data Summary in the Searching & Reporting app

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
45
Q

What is shown in the Data Summary?

A

Host, Sources, and Sourcetypes on separate tabs

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
46
Q

What timezone is data displayed for, in searches?

A

The local timezone set in your profile.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
47
Q

Search terms are case sensitive or insensitive?

A

insensitive

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
48
Q

AND, OR, NOT

A

What booleans are supported in splunk search?

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
49
Q

Symbol for “does not equal”

A

!=

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
50
Q

In what chronological order are events displayed, after a search?

A

Reverse chronological order (newest first)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
51
Q

Each event has these field value pairs.

A

timestamp, host, source, sourcetype

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
52
Q

Time range abbreviations for seconds

A

s

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
53
Q

Time range abbreviations for minutes

A

m

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
54
Q

Time range abbreviations for hours

A

h

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
55
Q

Time range abbreviations for days

A

d

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
56
Q

Time range abbreviations for weeks

A

w

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
57
Q

Time range abbreviations for months

A

mon

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
58
Q

Time range abbreviations for year

A

y

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
59
Q

What are the commands for specifying a time range in a search string?

A

earliest and latest

eg: earliest=-h latest=@d

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
60
Q

Does narrowing the time range by dragging the selection bars across the timeline re-execute the search?

A

No, it only filters the results

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
61
Q

What formats may search results be exported to?

A

CSV, XML, JSON

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
62
Q

What does “event sampling” do?

A

Instead of returning all the results, from a search, it returns a random sampling of events.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
63
Q

What does an event sample of 1:100 indicate?

A

Each event, found in a search, has a 1 in 100, or 1% change of being included in the sample result set.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
64
Q

What is a Field?

A

searchable key/value pairs from event data.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
65
Q

How does Splunk discover fields?

A

Based on sourcetype and key/value pairs found in the data.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
66
Q

What percentage of search results have the fields listed under “Interesting Fields”?

A

20% of events have these fields present in them.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
67
Q

What are the three search modes?

A

Fast, Smart, Verbose

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
68
Q

What is the default search mode?

A

Smart

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
69
Q

Field names are case sensitive or insensitive?

A

Case sensitive

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
70
Q

True/False: Splunk is subnet/CIDR aware for IP fields?

A

True

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
71
Q

How does NOT affect search results?

A

Returns everything except the events matching the NOT boolean

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
72
Q

What is a dashboard?

A

One or more panels displaying data visually in a useful way.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
73
Q

What command changes the name of a field in search?

A

rename

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
74
Q

When should quotes be used around values in search?

A

When including spaces or special characters

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
75
Q

What command allows you to include/exclude fields in your search?

A

fields

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
76
Q

What is the difference between +/- with the fields command?

A

+ (include) occurs before field extraction and improves performance
- (exclude) occurs after field extraction, and no performance improvement

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
77
Q

How can you reduce the returned results with the sort command?

A

The limit option

e.g: | sort limit=20 -categoryID, product_name

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
78
Q

What command finds the most common values of a given field?

A

top

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
79
Q

How many results are returned by the top command, by default?

A

10

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
80
Q

What two columns are automatically returned by the top command?

A

count & percent

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
81
Q

What option changes the number of results returned by the top command?

A

limit (limit=0 returns unlimited results)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
82
Q

What command returns the least common field values?

A

rare

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
83
Q

What command allows you to calculate statistics on data that matches your search criteria?

A

stats

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
84
Q

What option allows you to rename fields, within the stats command?

A

as

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
85
Q

What stats command shows all field values for a given field?

A

list

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
86
Q

What stats command shows all unique field values for a given field?

A

values

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
87
Q

To get multi-series tables you need to set up the underlying search with commands like…

A

chart or timechart

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
88
Q

What are the seven chart types?

A

line, area, column, bar, bubble, scatter, pie

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
89
Q

What eval command allows you to format for currency?

A

tostring

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
90
Q

What command allows you to create a single event from a group of events that share the same value in a given field?

A

transaction

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
91
Q

Max events displayed by transaction command

A

1,000

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
92
Q

What is the transforms.conf flag to switch whether or not a lookup field value is case-sensitive or not?

A

case_sensitive_match

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
93
Q

What is a way to normalize data over any default field?

A

Field Aliases

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
94
Q

What are nicknames that you create for related field/value pairs?

A

Tags

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
95
Q

Where can you view a list of all Tags?

A

Settings > Tags > List by field value pair

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
96
Q

A method of categorizing events based on a search

A

Event Type

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
97
Q

What may be run from an event in your search results to interact with external resources or run another search?

A

Workflow Actions

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
98
Q

Workflow action to pass information to an external web resource.

A

GET

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
99
Q

Workflow action to send field values to an external resource.

A

POST

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
100
Q

Workflow action to use field values to perform a secondary search.

A

Search

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
101
Q

Macros must be surrounded with what character?

A

backticks

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
102
Q

What tool provides a methodology to normalize data?

A

Common Information Model (CIM)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
103
Q

Which search will return the same events as the search in the searchbar?

password failed

A

password AND failed

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
104
Q

What is the most efficient way to filter events in Splunk?

A

By time.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
105
Q

Which is not a comparison operator in Splunk?

A

?=

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
106
Q

How is the asterisk used in Splunk search?

A

As a wildcard

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
107
Q

As general practice, inclusion is better than exclusion in a Splunk search.

A

True

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
108
Q

What command would you use to remove the status field from the returned events?

A

fields -

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
109
Q

Finish the rename command to change the name of the status field to HTTP Status.

sourcetype=access* status=404 | rename ______

A

status as “HTTP Status”

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
110
Q

Would the clientip column be removed in the results of this search? Why or why not?

sourcetype=access* | rename clientip as “user” | table user status | fields - clientip

A

No, because the name was changed.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
111
Q

What is missing from this search?

sourcetype=acc* status=404 | rename clientip as “User ID” | table USer ID status host

A

Quotation marks around User ID

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
112
Q

Which command removes results with duplicate field values?

A

Dedup

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
113
Q

To display the most common values in a specific field, what command would you use?

sourcetype=vendor_sales | ______ Vendor

A

top

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
114
Q

How many events are shown by default when using the top or rare command?

A

10

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
115
Q

Finish this search to return unlimited results.

sourcetype=access_combined action=purchase | rare product_name _________

A

limit=0

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
116
Q

Which of these is NOT a stats function?

A

addtotals

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
117
Q

Which clause would you use to rename the count field?

sourcetype=vendor_sales | stats count(linecount) ______ “Units Sold”

A

as

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
118
Q

Which stats function would you use to find the average value of a field?

A

avg

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
119
Q

If a search returns this, you can view the results as a chart.

A

Statistical values

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
120
Q

When using the chart command, the x-axis should always be numeric.

A

False

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
121
Q

The timechart command clusters data in time intervals dependent on:

A

Time range selected

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
122
Q

Finish this search to remove any results that do not contain a value in the product_name field.

sourcetype=access_c* status>299 | chart count over host by product_name _______

A

usenull=f

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
123
Q

When using the search below, what axis would time be on?

sourcetype=vendor_sales | timechart count(linecount)

A

x

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
124
Q

The Trendline Command requires this many arguments:

A

3

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
125
Q

In the following search, what should the empty argument contain?

sourcetype=linux_secure | iplocation ______

A

An IP address.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
126
Q

The Geostats Command requires both latitude and longitude data to use on a map.

A

True

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
127
Q

Data created using the Iplocation Command can not be used with the Geostats Command.

A

False

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
128
Q

Which command do you use when creating a choropeth map?

A

geom

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
129
Q

Which Splunk search command allows you to perform mathematical functions on field values?

A

Eval

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
130
Q

Which is the correct argument order when using the eval if function?

A

if (Boolean, Is True, Is False)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
131
Q

If you want to format values without changing their characteristics, which would you use?

A

The Fieldformat Command.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
132
Q

By default, the Fillnull Command replaces null values with this:

A

0

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
133
Q

You can only use one Eval Command per search.

A

False

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
134
Q

This command allows you to correlate related events on a field or list of fields that span time.

A

transaction

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
135
Q

Which of these is NOT a field created with the transaction command?

A

maxcount

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
136
Q

__________ should be used when you want to see the results of a calculation, or you need to group events on a field value.

A

Stats

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
137
Q

_________ should be used when you need to see events correlated together, or when events need to be grouped on start and end values.

A

Transactions

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
138
Q

What should you use with the transaction command to set the maximum total time between the earliest and latest events returned.

A

maxspan

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
139
Q

This stats function will return unique values for a given field.

A

Value

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
140
Q

Results of the Eval Commands always replace the existing field.

A

False

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
141
Q

Which roles can create Private Knowledge Objects?

A

User, Power, Admin

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
142
Q

Which roles can create knowledge objects shared across all apps?

A

Admin

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
143
Q

Knowledge objects can be used to normalize data?

A

True

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
144
Q

A Common Information Model (CIM) is supported by Splunk.

A

True

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
145
Q

What are the predefined ways knowledge objects can be shared?

A

All apps
Private
Specifiic App

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
146
Q

When using a .csv file for lookups, the first row in the file represents this.

A

field names

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
147
Q

Which is the correct order to use when creating a lookup?

A

Define a lookup table
Define a lookup
Create and automatic lookup

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
148
Q

Finish this search command so that it displays data from the http_status.csv lookup file.

__________ http_status.csv

A

inputlookup

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
149
Q

Finish this search so that it uses the http_status.csv lookup to return events.

sourcetype=access_c* NOT status=200 | _________ http_status code as status

A

lookup

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
150
Q

You can only have one field alias per field.

A

False

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
151
Q

Field Aliases ___________________

A

Can be referenced by lookup tables.
Are applicable to a specified app context.
Make correlation easier.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
152
Q

Calculated fields are shortcuts for _______________.

A

Eval Commands

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
153
Q

Calculated fields can use lookup tables.

A

False

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
154
Q

The easiest way to extract a field is from ____________, allowing you to skip a few steps.

A

The event actions menu

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
155
Q

When editing a field extraction, you will be working with _________________.

A

The regular expression.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
156
Q

You can extract multiple fields with the field extractor.

A

True

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
157
Q

______________ is a field extraction method for events that contain fields separated by a character.

A

delimiter

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
158
Q

Fields extracted with the field extractor

A

Are persistent
Are specific to a host, source or sourcetype.
Are reusable in multiple searches.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
159
Q

You can only add one tag per field value pair.

A

False

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
160
Q

Which search would limit an “alert” tag to the “host” field?

A

tag::host=alert

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
161
Q

__________ allow you to categorize events based on search terms.

A

Event Types

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
162
Q

Tags can be added to event types.

A

True

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
163
Q

Event types do NOT show up in the field list.

A

False

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
164
Q

Splunk suggests naming your Knowledge Objects using _______ segmented keys.

A

6

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
165
Q

A workflow action can _________________.

A

Send field values to external resources.
Pass variables to a URL.
Execute a secondary search.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
166
Q

This workflow action sends field value to external resources.

A

POST

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
167
Q

This workflow action passes variables in a URL.

A

GET

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
168
Q

To escape the “fieldname” value which command would you use? $_________fieldname$

A

!

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
169
Q

____________ are based on searches that run on a scheduled interval or in real-time.

A

Alerts

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
170
Q

Which actions can be triggered by an alert?

A

List in triggered alerts
Send Email
Run a script

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
171
Q

Alerts can be shared to all apps.

A

True

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
172
Q

Once an alert is created, you can no longer edit its defining search/

A

False

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
173
Q

A real-time alert type is useful when you want to know as soon as your trigger condition is met.

A

True

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
174
Q

Search Macros _______________

A

Allow you to store entire search strings, including pipes and eval statements.
Are time range independent.
Can pass arguments to the search.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
175
Q

What is the proper syntax for using a macro called “dostuff”

sourcetype=gamelog |

A

‘dostuff’

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
176
Q

You can pipe the results of a Macro to other commands.

A

True

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
177
Q

What is the correct way to name a macro with two arguments?

A

dostuff(2)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
178
Q

Validating macro arguments can be done with which type of command?

A

Add a root object

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
179
Q

Root search objects benefit from acceleration.

A

False

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
180
Q

_________ objects can be added to a root event object to narrow down the search.

A

Child

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
181
Q

What attributes can be added to an object?

A
Auto-Extracted
Eval Expression
Lookup
Regular Expression
Geo IP
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
182
Q

You can add additional child objects to either existing objects or the root object.

A

True

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
183
Q

After you configure a lookup, its fields can be found in the fields sidebar and you can use them in a search.

A

True

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
184
Q

No matter what user role creates the field alias, it is always set to Private by default.

A

True

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
185
Q

Running concurrent reports and the searches behind them puts very low demand on your system hardware.

A

False

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
186
Q

Search macros can only be used once in a given search.

A

False

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
187
Q

The results of a macro can not be piped to other commands.

A

False

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
188
Q

When building your data model, Splunk suggests you use root search objects whenever possible.

A

False

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
189
Q

What are the 3 main processing components of Splunk?

A

Forwarders
Indexers
Search Heads

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
190
Q

Raw data in an index is stored in a ________ form.

A

compressed

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
191
Q

Forwarders are typically installed on _____________.

A

Machines where the data originates

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
192
Q

The ___________ handle search management while ___________ perform the searches.

A
  1. search heads

2. indexers

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
193
Q

A group of indexers configured to replicate each other’s data is called a ________.

A

Index Cluster

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
194
Q

__________ is often the biggest bottle neck in the Splunk indexing pipeline.

A

Disk I/O

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
195
Q

Search heads do not require as much ______ as indexers but require more _________.

A
  1. disk space

2. CPU power

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
196
Q

Adding more machines no matter the hardware will make your deployment perform better.

A

False

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
197
Q

Splunk indexers and Search Heads on virtual machines should have ____ of the vCPU reserved to them.

A

100%

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
198
Q

Keeping ____ synchronized across your deployment, makes sure events are returned in the proper order.

A

time

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
199
Q

What command is used to start the Splunk Enterprise server?

A

./splunk start

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
200
Q

This command can be used to make Splunk start each time the server is booted.

A

./splunk enable boot-start

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
201
Q

When logging into Splunk Enterprise for the first time, a username of ______ and a password of are used.

A
  1. admin

2. changeme

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
202
Q

The _______ folder inside the Splunk Enterprise installation directory contains licenses and configuration files.

A

etc

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
203
Q

Splunk Enterprise commands are executed from the ________ directory.

A

bin

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
204
Q

The following are Splunk Enterprise processing tiers.

A

Data input
Indexing
Search Management

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
205
Q

Event separation happens during the ________ segment of the data pipeline.

A

parsing

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
206
Q

Events are written to disk during the _______ segment of the data pipeline.

A

Indexing

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
207
Q

The functions of the data pipeline vary drastically depending on the deployment.

A

False

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
208
Q

Splunk Enterprise licenses specify how much data you can index per __________.

A

day

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
209
Q

Any editing done to .conf files should be done in the ________ directory.

A

local

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
210
Q

The ________ index is used when an index is not specified at input time.

A

main

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
211
Q

Having multiple indexes allows:

A

Faster searches
Access limiting
Multiple retention policies

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
212
Q

As data is input into Splunk Enterprise, it is first placed into a ________ bucket.

A

hot

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
213
Q

Some differences between hot and warm buckets are:

A

Hot buckets are writable, warm buckets are not.
Hot buckets are searched first.
The naming convention.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
214
Q

When a bucket is frozen, by default it is moved to a different location before deleting.

A

False

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
215
Q

The timezone setting in a user’s account will effect the timestamp shown in events.

A

True

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
216
Q

_______________ define what users can do in Splunk.

A

Roles

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
217
Q

Only the ________ role can use the Delete Command by default.

A

can_delete

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
218
Q

The ______ role has the most capabilities of the predefined splunk roles.

A

admin

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
219
Q

When mixing authentication sources, scripted authentication will always take precedence.

A

False

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
220
Q

In most production environments, _______ will be used as your main source of data input.

A

forwarders

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
221
Q

Splunk uses ____________ to categorize the type of data being indexed.

A

sourcetypes

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
222
Q

The server that data is forwarded to is called the ______________.

A

receiver

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
223
Q

Indexing on a Heavy Forwarder does not affect your license.

A

False

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
224
Q

The following can be used to build apps for Splunk:

A

Simple XML
Splunk JavaScript
SDKs

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
225
Q

When migrating from a single instance deployment to a distributed environment, you will want to use the existing instance as an _______.

A

indexer

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
226
Q

An indexer in a distributed search environment is called a __________.

A

search peer

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
227
Q

It is a best practice to ____________ forwarders across all indexers in a search peer group.

A

load balance

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
228
Q

The management port is required when adding a search peer to a search head.

A

True

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
229
Q

DMC stands for

A

Distributed Management Console

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
230
Q

In most Splunk deployments, _________ serve as the primary way data is supplied for indexing.

A

forwarders

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
231
Q

Search strings are sent from the

A

Search head

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
232
Q

Forwarders are typically installed on __________

A

Machines where the data originates

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
233
Q

A server acting as a ___________ require the same hardware as a single deployment server.

A

Indexer

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
234
Q

Splunk Enterprise can be installed virtual environments.

A

True

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
235
Q

In a windows environment, a local system user will have access to:

A

all data on the local system

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
236
Q

Search requests are processed by the ____________.

A

Indexer

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
237
Q

____________ is the system process that handles indexing, searching, forwarding and the web interface for Splunk Enterprise.

A

Splunkd

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
238
Q

Splunk Enterprise should always be run as root in a *NIX environment.

A

False

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
239
Q

It is suggested that you have a single deployment instance available for _________.

A

testing and development

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
240
Q

A total of ____ cores are recommended per search head.

A

16

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
241
Q

This component is NOT installed from the Splunk Enterprise Package.

A

Universal Forwarder

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
242
Q

Splunk Enterprise deployment typically has ___ processing tiers.

A

3

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
243
Q

The segment of the data pipeline that stores user’s knowledge objects is the _______ segment.

A

indexing

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
244
Q

Any editing done to .conf files should be done in the _____ directory.

A

local

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
245
Q

The default management port for Splunkd is:

A

8089

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
246
Q

Search Heads require more _____ than indexers.

A

CPU Power

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
247
Q

The .conf files can only be edited using the Splunk web interface.

A

False

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
248
Q

Event separation happens during the __________ segment of the data pipeline.

A

parsing

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
249
Q

Events are written to disk during the ____ segment of the data pipeline.

A

indexing

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
250
Q

A license violation causes all data to stop being indexed.

A

False

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
251
Q

The functions of the data pipeline vary drastically depending on the deployment.

A

False

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
252
Q

Parsing and Indexing are both part of the ____ processing tier.

A

Indexing

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
253
Q

You can click a search term in the results to add it to the search class.

A

True

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
254
Q

The Splunk search language supports the ? wildcard.

A

False

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
255
Q

Using the export function, you can export an unlimited number of results.

A

True

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
256
Q

Field NAMES are case sensitive

A

True

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
257
Q

This search user=* displays only events that contain a value for user

A

True

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
258
Q

The following searches will return the same results: SEARCH 1: web AND error SEARCH 2: web and error

A

False

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
259
Q

Field names are case…

A

sensitive

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
260
Q

Use this command to exclude fields used in the search to make the results easier to read.

A

fields -

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
261
Q

These users can create objects that are shared across ALL apps

A

admin

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
262
Q

Machine data is always structured

A

False

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
263
Q

Machine data makes up __% of the data accumulated by organizations

A

90

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
264
Q

Machine data is only log files on web servers

A

False

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
265
Q

The index does not play a major role in Splunk

A

False

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
266
Q

Data is broken into single events by ___

A

Sourcetype

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
267
Q

Time stamp are stored ____

A

in a consistent format

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
268
Q

which role defines what apps a user will see by default

A

admin

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
269
Q

which two apps ship with Splunk Enterprise

A

Search & Reporting, Home App

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
270
Q

What is the most efficient way to filter events in Splunk?

A

By time

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
271
Q

When search is run, events are returned in ____

A

reverse chronological order

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
272
Q

which is not a valid option when editing a report?

A

Rename

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
273
Q

Wildcards can be used with field value searches

A

True

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
274
Q

A power user can allow read/write permissions on a report

A

True

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
275
Q

If we want to see events after running a transforming command, we need to switch to this mode.

A

Verbose

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
276
Q

Charts can be based on numbers, time or location

A

True

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
277
Q

_____ are searches gathered together into a single pane of glass

A

Dashboards

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
278
Q

Pivots can not be saved as reports or dashboard panels

A

False

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
279
Q

The instant pivot button is displayed in the statistics and visualization tabs when a ____ search is used

A

non-transforming

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
280
Q

These are knowledge objects that provide the data structure for pivot

A

Data models

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
281
Q

You can think of adding child data model objects as an ___ boolean in the Splunk search engine

A

AND

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
282
Q

Unlike pivot, reports created with instant pivot can not be saved.

A

False

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
283
Q

which role can create data models?

A

admin

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
284
Q

Splunk breaks down data input into individual ___

A

events

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
285
Q

From the search jobs page, you can click the job link to ___

A

view the results of the instance of that search

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
286
Q

Fields are searchable key/value pairs

A

True

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
287
Q

Field have names

A

True

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
288
Q

Default Fields are added to every event

A

True

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
289
Q

Administrators CANNOT configure default fields

A

True

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
290
Q

The interesting fields in the field sidebar will be the same for every search against the same index

A

False

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
291
Q

Interesting fields are those that have values in over 20% of events

A

True

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
292
Q

which search mode returns all event and field data?

A

verbose mode

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
293
Q

Select this in the field sidebar to automatically pipe your search results to the timechart command

A

top values by time

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
294
Q

How can you view all sourcetypes?

A

Click Data Summary in the Searching & Reporting app

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
295
Q

What is shown in the Data Summary?

A

Host, Sources, and Sourcetypes on separate tabs

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
296
Q

What timezone is data displayed for, in searches?

A

The local timezone set in your profile.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
297
Q

Search terms are case sensitive or insensitive?

A

insensitive

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
298
Q

What booleans are supported in splunk search?

A

AND, OR, NOT

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
299
Q

Symbol for “does not equal”

A

!=

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
300
Q

Current search time is 09:37:12. What is the time range equation to search back 5 minutes on the minute?

A

-5m@m

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
301
Q

What are the commands for specifying a time range in a search string?

A

earliest and latest

eg: earliest=-h latest=@d

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
302
Q

Does narrowing the time range by dragging the selection bars across the timeline re-execute the search?

A

No, it only filters the results

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
303
Q

How does Splunk discover fields?

A

Based on sourcetype and key/value pairs found in the data.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
304
Q

What is the default search mode?

A

Smart

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
305
Q

True/False: Splunk is subnet/CIDR aware for IP fields?

A

True

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
306
Q

When should quotes be used around values in search?

A

When including spaces or special characters

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
307
Q

What command allows you to include/exclude fields in your search?

A

fields

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
308
Q

How can you reduce the returned results with the sort command?

A

The limit option

e.g: | sort limit=20 -categoryID, product_name

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
309
Q

What command returns the least common field values?

A

rare

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
310
Q

What command allows you to calculate statistics on data that matches your search criteria?

A

stats

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
311
Q

What option allows you to rename fields, within the stats command?

A

as

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
312
Q

What stats command shows all field values for a given field?

A

list

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
313
Q

What stats command shows all unique field values for a given field?

A

values

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
314
Q

To get multi-series tables you need to set up the underlying search with commands like…

A

chart or timechart

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
315
Q

What is the transforms.conf flag to switch whether or not a lookup field value is case-sensitive or not?

A

case_sensitive_match

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
316
Q

Where can you view a list of all Tags?

A

Settings > Tags > List by field value pair

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
317
Q

A method of categorizing events based on a search

A

Event Type

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
318
Q

True/False. Machine data is always structured.

A

False

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
319
Q

True/False. Machine data is only generated by web servers.

A

False

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
320
Q

What are the three main processing components of Splunk?

A

Indexers, Forwarders, Search Heads

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
321
Q

What are search requests processed by?

A

Indexer

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
322
Q

Which function is not a part of a single instance deployment?

A

Clustering

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
323
Q

In most Splunk deployments, ________ serve as the primary way data is supplied for indexing.

A

Forwarders

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
324
Q

What does a single-instance deployment of Splunk Enterprise handle?

A

Input, Parsing, Indexing, and Searching

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
325
Q

_________ define what users can do in Splunk.

A

Roles

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
326
Q

This role will only see their own knowledge objects and those that have been shared with them.

A

User

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
327
Q

Splunk uses ________ to categorize the type of data being indexed.

A

source type

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
328
Q

True/False. The monitor input option will allow you to continuously monitor files.

A

True

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
329
Q

Files indexed using the the upload input option get indexed _____.

A

once

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
330
Q

Splunk knows where to break the event, where the time stamp is located and how to automatically create field value pairs using these.

A

Source types

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
331
Q

In most production environments, _______ will be used as your the source of data input.

A

forwarders

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
332
Q

Which following search mode toggles behavior based on the type of search being run?

A

Smart

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
333
Q

True/False. The time stamp you see in the events is based on the time zone in your user account.

A

True

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
334
Q

Having separate indexes allows:

A

Multiple retention policies, ability to limit access, and faster searches.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
335
Q

True/False. Time to search can only be set by the time range picker.

A

False

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
336
Q

This symbol is used in the “Advanced” section of the time range picker to round down to nearest unit of specified time.

A

@

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
337
Q

As a general practice, exclusion is better than inclusion in a Splunk search.

A

False

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
338
Q

True/False. Excluding fields using the Fields Command will benefit performance.

A

False

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
339
Q

Would the ip column be removed in the results of this search? sourcetype=a* | rename IP as “User” | fields - ip

A

No, because the name was changed.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
340
Q

Which command removes results with duplicate field values?

A

dedup

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
341
Q

What command would you use to remove the status field from the returned events? sourcetype=a* status=404 | ________ status

A

fields -

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
342
Q

How would you show the top five vendors without showing the percentage field?

A

… | top Vendor limit=5 showperc=f

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
343
Q

How would you show the top five vendors, rename the count field to “Number of Sales”, and add a row for the number of sales of vendors not listed in the top five?

A

… | top Vendor limit=5 countfield=”Number of Sales” userother=t

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
344
Q

How would you search for the top three products sold by each vendor?

A

… | top product_name by Vendor limit=3 countfield=”Number of Sales” showperc=f

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
345
Q

How would you show the top five vendors that sold the least amount of product?

A

… | rare Vendor limit=5 showcount”Number of Sales” showperc=f useother=t

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
346
Q

How would you show the five games that sold the least by each of the vendors?

A

… | rare product_name by Vendor limit=5 showcount=”Number of Sales” showperc=f useother=t

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
347
Q

How would you count the number of failed logins? Change the column name to “Potential Issues”.

A

… | stats count as “Potential Issues”

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
348
Q

How would you count the number of events that contain a vendor action field? Also count the total number of events.

A

… | stats count(vendor_action) as ActionEvents, count as TotalEvents

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
349
Q

How would you count the number of events by user, app, and vendor?

A

… | stats count by user, app, vendor_action

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
350
Q

How many unique websites have your employees visited, displayed as “Websites visited”?

A

… | stats dc(s_hostname) as “Websites visited:”

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
351
Q

How much bandwidth did employees spend at each website? This needs to be sorted in descending order.

A

… | stats sum(sc_bytes) as Bandwidth by s_hostname | sort -Bandwidth

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
352
Q

How would you show the number of units sold by a vendor for each specific product as well as the average selling price?

A

… | stats count as “Units Sold” avg(sale_price) as “Average Selling Price” by product_name

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
353
Q

How would you show each unique website a user has visited?

A

… | stats value(s_hostname) by cs_username

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
354
Q

Which stats function would you use to find the average value of a field?

A

avg

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
355
Q

To display the most common values in a specific field, what command would you use?

A

top

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
356
Q

True/False. A time range picker can be included in a report.

A

True

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
357
Q

True/False. Charts can be based on numbers, time, or location.

A

True

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
358
Q

If a search returns this, you can view the results as a chart.

A

Statistical Values

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
359
Q

The instant pivot button is displayed in the statistics and visualization tabs when a _______ search is run.

A

non-transforming

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
360
Q

True/False. A lookup is categorized as a dataset.

A

True

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
361
Q

To keep from overwriting exiting fields with your Lookup you can use the ____________ clause.

A

outputnew

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
362
Q

In a dashboard, a time range picker will only work on panels that include a(n) __________ search.

A

inline

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
363
Q

True/False. Pivots can be saved as dashboards panels.

A

True

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
364
Q

These are knowledge objects that provide the data structure for pivot.

A

Data models

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
365
Q

External data used by a Lookup can come from sources like:

A

CSV, scripts, geospatial data

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
366
Q

True/False. When zooming on the event timeline, a new search is run.

A

False

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
367
Q

Search strings are sent from the _________.

A

search head

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
368
Q

True/False. Events are always returned in chronological order.

A

False

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
369
Q

These roles can create reports:

A

Admin, Power, User

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
370
Q

Which role(s) can create data models?

A

Admin, power

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
371
Q

Adding child data model objects is like the ______ Boolean in the Splunk search language.

A

AND

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
372
Q

When using a .csv file for Lookups, the first row in the file represents this.

A

field names

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
373
Q

True/False. Alerts can be shared to all apps.

A

True

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
374
Q

True/False. Alerts can send an email.

A

True

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
375
Q

The default username and password for a newly installed Splunk instance is:

A

admin and changeme

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
376
Q

When a search is sent to splunk, it becomes a _____.

A

search job

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
377
Q

True/False. Field values are case sensitive.

A

False

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
378
Q

Which clause would you use to rename the count field?

A

as

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
379
Q

True/False. Real-time alerts will run the search continuously in the background.

A

True

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
380
Q

True/False. Alerts can run uploaded scripts.

A

True

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
381
Q

A search job will remain active for ___ minutes after it is run.

A

10

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
382
Q

True/False. You can launch and manage apps from the home app.

A

True

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
383
Q

The User role cannot create reports.

A

False

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
384
Q

Shared search jobs remain active for _______ by default.

A

7 days

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
385
Q

Pivots cannot be saved as reports panels. T/F

A

False

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
386
Q

Once an alert is created, you can no longer edit its defining search. T/F

A

False

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
387
Q

Returns a multivalued field that contains a list of the commands used in X

Basic example
The following example returns a multivalued field X, that contains ‘search’, ‘stats’, and ‘sort’.

… | eval x=commands(“search foo | stats count | sort count”)

A

commands(x)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
388
Q

Returns a multivalue result based on all of values specified.

Basic example
… | eval fullName=mvappend(initial_values, “middle value”, last_values)

A

mvcount(MVFIELD)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
389
Q

Removes all of the duplicate values from a multivalue field.

Basic example
… | eval s=mvdedup(mvfield)

A

mvdedup(X)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
390
Q

Filters a multivalue field based on an arbitrary Boolean expression X.

Basic examples
The following example returns all of the values in field email that end in .net or .org.

… | eval n=mvfilter(match(email, “.net$”) OR match(email, “.org$”))

A

mvfilter(X)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
391
Q

Finds the index of a value in a multivalue field that matches the REGEX.

Basic example
… | eval n=mvfind(mymvfield, “err\d+”)

A

mvfind(MVFIELD,”REGEX”)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
392
Q

Returns a set of values from a multivalue field described by STARTINDEX and ENDINDEX.

Basic examples
Because indexes start at zero, the following example returns the third value in “multifield”, if the value exists.

… | eval n=mvindex(multifield, 2)

A

mvindex(MVFIELD,STARTINDEX,ENDINDEX)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
393
Q

Takes all of the values in a multivalue field and appends them together delimited by STR.

The following search creates the base field with the values. The search then creates the joined field by using the result of the mvjoin function.

… | eval base=mvrange(1,6), joined=mvjoin(‘base’,” OR “)

A

mvjoin(MVFIELD,STR)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
394
Q

Creates a multivalue field with a range of numbers between X and Y, incrementing by Z.

Basic examples
The following example returns a multivalue field with the values 1, 3, 5, 7, 9.

… | eval mv=mvrange(1,11,2)

A

mvrange(X,Y,Z)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
395
Q

Returns the values of a multivalue field sorted lexicographically.

Basic example
… | eval s=mvsort(mvfield)

A

mvsort(X)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
396
Q

Takes two multivalue fields, X and Y, and combines them by stitching together the first value of X with the first value of field Y, then the second with the second, and so on. The third argument, Z, is optional and is used to specify a delimiting character to join the two values. The default delimiter is a comma.

Basic example
… | eval nserver=mvzip(hosts,ports)

A

mvzip(X,Y,”Z”)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
397
Q

Returns an mvfield spitting X by the delimited character Y

Basic example
… | eval n=split(foo, “;”)

A

split(X,”Y”)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
398
Q

In most production environments, _______ will be used as your the source of data input.

A

Forwarders

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
399
Q

Splunk knows where to break the event, where the time stamp is located and how to automatically create field value pairs using these.

A

Source types

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
400
Q

Splunk uses ________ to categorize the type of data being indexed.

A

Sourcetypes

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
401
Q

The monitor input option will allow you to continuously monitor files.

A

True

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
402
Q

When zooming in on the event time line, a new search is run.

A

False

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
403
Q

When a search is sent to splunk, it becomes a _____.

A

Search job

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
404
Q

The time stamp you see in the events is based on the time zone in your user account.

A

True

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
405
Q

These are booleans in the Splunk Search Language.

A

And
Not
Or

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
406
Q

Having separate indexes allows:

A

Multiple retention policies
Ability to limit access
Faster Searches

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
407
Q

Which command removes results with duplicate field values?

A

Dedup

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
408
Q

Which one of these is not a stats function?

A

addtotals

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
409
Q

Data models are made up of ___________.

A

Datasets

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
410
Q

Which role(s) can create data models?

A

Power

Admin

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
411
Q

A lookup is categorized as a dataset.

A

True

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
412
Q

When using a .csv file for Lookups, the first row in the file represents this.

A

Field names

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
413
Q

Finish this search command so that it displays data from the http_status.csv Lookup file.

A

inputlookup

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
414
Q

External data used by a Lookup can come from sources like:

A

Geospatial data
CSV files
Scripts

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
415
Q

To keep from overwriting existing fields with your Lookup you can use the ____________ clause.

A

outputnew

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
416
Q

Real-time alerts will run the search continuously in the background.

A

True

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
417
Q

Once an alert is created, you can no longer edit its defining search.

A

False

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
418
Q

Alerts can be shared to all apps.

A

True

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
419
Q

Alerts can send an email.

A

True

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
420
Q

How do you use exact phrases?

A

Double quotes around the exact word or phrase (CS)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
421
Q

What are the properties of Fields?

A

Field value pairs are used to search an extracted field (Field name CS, Field value CI)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
422
Q

What are the comparison operators available to use in Splunk search language and what a…….

A

=, !=, , >=

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
423
Q

What are Splunk Search Terms

A
  • Keywords
  • Booleans
  • Phrases
  • Fields
  • Wildcards
  • Comparison Operators
  • time
  • specificity - the more you tell the search engine, the better your results
  • inclusion is better than exclusion
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
424
Q

What are Commands?

A

Commands tell Splunk what we want to do with the search results such as:

  • creating charts
  • computing statistics
  • formatting
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
425
Q

True/False. Machine data is always structured.

A

False

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
426
Q

True/False. Machine data is only generated by web servers.

A

False

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
427
Q

What are search requests processed by?

A

Indexer

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
428
Q

In most Splunk deployments, ________ serve as the primary way data is supplied for indexing.

A

Forwarders

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
429
Q

What does a single-instance deployment of Splunk Enterprise handle?

A

Input, Parsing, Indexing, and Searching

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
430
Q

True/False. The monitor input option will allow you to continuously monitor files.

A

True

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
431
Q

How would you show the top five vendors without showing the percentage field?

A

… | top Vendor limit=5 showperc=f

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
432
Q

How would you show the top five vendors, rename the count field to “Number of Sales”, and add a row for the number of sales of vendors not listed in the top five?

A

.. | top Vendor limit=5 countfield=”Number of Sales” userother=t

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
433
Q

How would you search for the top three products sold by each vendor?

A

… | top product_name by Vendor limit=3 countfield=”Number of Sales” showperc=f

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
434
Q

How would you show the top five vendors that sold the least amount of product?

A

… | rare Vendor limit=5 showcount”Number of Sales” showperc=f useother=t

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
435
Q

How would you show the five games that sold the least by each of the vendors?

A

… | rare product_name by Vendor limit=5 showcount=”Number of Sales” showperc=f useother=t

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
436
Q

How would you count the number of failed logins? Change the column name to “Potential Issues”.

A

… | stats count as “Potential Issues”

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
437
Q

How would you count the number of events that contain a vendor action field? Also count the total number of events.

A

… | stats count(vendor_action) as ActionEvents, count as TotalEvents

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
438
Q

How would you count the number of events by user, app, and vendor?

A

… | stats count by user, app, vendor_action

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
439
Q

How many unique websites have your employees visited, displayed as “Websites visited”?

A

… | stats dc(s_hostname) as “Websites visited:”

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
440
Q

How much bandwidth did employees spend at each website? This needs to be sorted in descending order.

A

… | stats sum(sc_bytes) as Bandwidth by s_hostname | sort -Bandwidth

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
441
Q

How would you show the number of units sold by a vendor for each specific product as well as the average selling price?

A

… | stats sum(sc_bytes) as Bandwidth by s_hostname | sort -Bandwidth

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
442
Q

How would you show each unique website a user has visited?

A

… | stats value(s_hostname) by cs_username

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
443
Q

What attributes describe the field: a dest 4

A

String value, contains 4 values

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
444
Q

True/False. You can launch and manage apps from the home app.

A

True

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
445
Q

The User role cannot create reports.

A

False

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
446
Q

A Splunk Enterprise term that describes any Unix or Linux-based system.

A

nix

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
447
Q

A type of custom alert action that conforms to the common action model.

A

adaptive response action

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
448
Q

A type of app that runs on the Splunk platform and provides specific capabilities to other apps, such as getting data in, mapping data, or providing saved searches and macros. An add-on is not typically run as a standalone app. Instead, an add-on is a reusable component that supports other apps across a number of different use cases.

A

add-on

449
Q

An unscheduled search

A

ad hoc search

450
Q

Uses a saved search to look for events in real time or on a schedule.

A

alerts

451
Q

A response, such as an email notification or webhook, to alert triggering or report completion.

A

alert action

452
Q

An alternate name that you assign to a field, allowing you to use that name to search for events that contain that field.

A

alias

453
Q

An application that runs on Splunk Enterprise and typically addresses several use cases.

A

app

454
Q

Provides a way to save and retrieve data within your Splunk apps as collections of key-value pairs, letting you manage and maintain the state of your apps and store additional information.

A

App Key Value Store

455
Q

a file generated by the Packaging Toolkit to describe a Splunk app, including dependencies and input groups.

A

app manifest

456
Q

The action of adding to and maintaining a collection of historical data.

A

archiving

457
Q

An event generated when an audited activity is performed in Splunk Enterprise.

A

audit event

458
Q

A type of field extraction that uses the KV_MODE attribute in props.conf to automatically extract fields for events associated with a specific host, source, or source type.

A

Automatic key value field

459
Q

A search on which you can base multiple similar searches.

A

base search

460
Q

A filtering rule that excludes one or more members from a set.

A

blacklist

461
Q

A data structure that you use to test whether an element is a member of a set.

A

bloom filter

462
Q

A file system directory containing a portion of a Splunk Enterprise index.

A

bucket

463
Q

is the remedial activity that occurs when a peer node goes offline.

A

bucket fixing

464
Q

A tool which dynamically creates event types based on the analysis of a selected event.

A

Build Event Type utility

465
Q

A field that represents the output of an eval expression.

A

calculated field

466
Q

A user action within Splunk Enterprise.

A

capability

467
Q

A method for displaying and working with language characters on computer systems.

A

character set encoding

468
Q

The container for a set of data in an App Key Value Store, similar to a database table where each record has a unique key. Collections exist within the context of a given app.

A

collection

469
Q

The Splunk Enterprise command-line interface (CLI) is a text interface that you use to enter system commands, edit configuration files, and run searches.

A

command-line interface

470
Q

A Splunk utility that can be run from the command-line interface (CLI) to troubleshoot a Splunk Enterprise deployment.

A

command-line tool

471
Q

A set of preconfigured data models that you can apply to your data at search time.

A

Common Information Model (CIM)

472
Q

A support service level that entitles the user to public information sources for questions about Splunk Enterprise.

A

Community support

473
Q

A data routing scenario where a forwarder selectively sends event data to receivers based on patterns in the event data.

A

conditional routing

474
Q

How does Splunk help with Machine Data?

A

Index Data, Search and Investigate, Add Knowledge, Monitor and Alert, and Report & Analyze

475
Q

Index

A

Collects data from any source. As data enters, inspectors go to work. Determines how to process the data. When it is matched it is labeled with a source type. Data is then broken into single events. Time stamps are identified and normalized to a consistent format. Events then stored in Splunk index where they can be searched.

476
Q

Search

A

Find values across multiple sources allowing to analyze and run statistics.

477
Q

Knowledge

A

Add knowledge objects to data. Effects how data is interpreted. Classified and enriched, and normalized for future use.

478
Q

Monitor & Alert

A

Can Monitor infrastructure in real time to identify issues, problems, and attacks before they impact customers and services. Create alerts and automatically respond with a variety of actions.

479
Q

Reports

A

Provides reports and the ability to do dashboards empowering groups in the organization by giving them the information they need organized into a single pane.

480
Q

Forwarder Characteristics

A

(1) Require minimal resources, (2)little impact on performance, (3) Reside on the machine where the data originates.

481
Q

Splunk Deployment Scalibility

A

Single Instance to a full distributed infrastructure.

482
Q

Single Instance Deployment Splunk Instance

A

Input, Parsing, Indexing and Searching

483
Q

When would you use a single-instance deployment

A

Perfect environment for proof of concept, personal use, learning, and night serve the need of small department-sized environments.

484
Q

What would we have to do in a Full Scale Infrastructure Deployment?

A

Split the functionality across multiple specialized instances of Splunk enterprise. Add forwarders to send data to our indexers and eventually add multiple search heads and indexers to increase our indexing and search capacity. Search heads and indexes can also be clustered making sure data is always available and searchable.

485
Q

Search requests are processed by?

A

Indexers

486
Q

In most Splunk Deployments, this servers as the primary way data is supplied for indexing.

A

Forwarder

487
Q

Reasons to Split Indexes

A

Separate indexes can make searches faster. Limits data amount Splunk searches. Returns events only from that index.Multiple indexes allow limiting access by user role in order to control who sees what data. Also helps with retention policies

488
Q

Search

A

Limiting a search to time frame is a best practice.

489
Q

Commands that Create Statistics and Visualizations

A

Called Transforming Commands which transform data into data tables.

490
Q

Time for Search Job

A

By default will remain active for 10 minutes

491
Q

Time for Shared Search Job

A

Remain active for 7 days

492
Q

Escaping characters in Search

A

add backslash info=”keyword1"keyword2"not in db”

493
Q

Best Practices

A

Search by Time, inclusion is better than exclusion,filter command as early as possible in search,

494
Q

Splunk Search Language Sytnax

A
  1. Search Terms. 2. Commands. 3. Functions 4. Arguments 5. Clauses
495
Q

Commands

A

Tells Splunk what we want to do with Search Results such as creating charts, computing statisitcs, and formatting

496
Q

Functins

A

Explain how we want to chart, compute, and evaluate the results.

497
Q

Arguments

A

Variables we want to apply to the functions

498
Q

Clauses

A

Explain how we want the results grouped or defined.

499
Q

Search Language Example

A

Search Term, Commands, Functions

500
Q

Splunk has four important components, what are they?

A

Indexer - It indexes the machine data
Forwarder - Refers to Splunk instances that forward data to the remote indexers
Search Head - Provides GUI for searching
Deployment Server -Manages the Splunk components like indexer, forwarder, and search head in computing environment

501
Q

What are the types of Splunk forwarder?

A

Universal Forwarders - It performs processing on the incoming data before forwarding it to the indexer.
Heavy Forwarders - It parses the data before forwarding them to the indexer works as an intermediate forwarder, remote collector.

502
Q

What are the categories of SPL commands?

A
Sorting Results
Filtering Results
Grouping Results.
Filtering, Modifying and Adding Fields
Reporting Results
503
Q

What are common port numbers used by Splunk?

A
Splunk Management Port 8089
Splunk Index Replication Port 8080
KV store 8191
Splunk Web Port 8000
Splunk Indexing Port 9997
Splunk network port 514
504
Q

What are Splunk buckets?

A

A directory that contains indexed data is known as a Splunk bucket. It also contains events of a certain period.

505
Q

Explain the bucket lifecycle ?

A

Bucket lifecycle includes following stages:
Hot - It contains newly indexed data and is open for writing. For each index, there are one or more hot buckets available
Warm - Data rolled from hot
Cold - Data rolled from warm
Frozen - Data rolled from cold. The indexer deletes frozen data by default but users can also archive it.
Thawed - Data restored from an archive. If you archive frozen data , you can later return it to the index by thawing (defrosting) it.

506
Q

Define a Sample Failed password query

A

fail* password | stats count by src, dest, user, sourcetype | sort - count | where count > 2

507
Q

In Linux, how do you start Splunk from a command line?

A

bin Directory, ./splunk start

508
Q

Which command is used to create chart for map?

A

geostats

509
Q

Which chart is not used for single value?

A

bar

510
Q

Which tag is not the part to implement drilldown?

A

lable

511
Q

Which tag is used to create input in form in simple xml?

A

fieldset

512
Q

Which tag is used for search string in simplexml for dashboard?

A

query

513
Q

What are the 3 main Splunk Bucket Types and their read/write and Backup abilities?

A

Hot -R/W-NoBackups | Warm-ROnly-YesBackups | Cold-ROnly-YesBackups

514
Q

Storage Bucket locations?

A

Host & Warm: $SPLUNK_HOME/var/lib/splunk/defaultdb/db/*
Cold ~defaultdb/colddb/*
Thawed ~ defualtdb/thaweddb/*

515
Q

Where does frozen bucket get stored?

A

N/A Frozen data gets deleted or archived into a directory location you specify.

516
Q

The location where Splunk log files are stored?

A

$SPLUNK_HOME/var/log/splunk

517
Q

True/False: Splunk stores log file in splunkd.log under $SPLUNK_HOME/var/log/splunk/

A

True - Splunk stores log file in splunkd.log under $SPLUNK_HOME/var/log/splunk/

518
Q

Parsing can be done in which conf file? Inputs, Props Only? Transforms only? Props & transforms?

A

Parsing can be done in Props & transforms.

519
Q

If I want to change the default Splunk data store location, I need to modify which file?

A

Modify the splunk-launch.conf to change the defualt splunk data store location.

520
Q

Which conf file is used to create index in splunk? [Index.conf, indexes.conf, indexes, index]

A

indexes.conf is used to create index in splunk

521
Q

In which file we need to add LDAP group details for authentication? Authorize.conf or Authentication.conf?

A

Authentication.conf is used to add LDAP groups.

522
Q

In which files are role mappings done?

A

authorize.conf

523
Q

What are macros in Splunk?

A

Search macros are reusable chunks of Search Processing Language (SPL) that you can insert into other searches. Macros you define, are stored in macros.conf

524
Q

How much disk space is required to store data in Splunk?

A

Splunk stores data in 2 type of files/directories 1) actual data in zip files takes ~15% of file size 2) index files takes ~35% of file size So around 50% of files size require to store that file and other than this space is required to store search results.

525
Q

what is summary index in splunk?

A

Summary index is used to give fast result of report/dashboard. You can store any cron/save search result in summary index so that you can reduce the data in summary index.

526
Q

What kind of information can we pull in via inputs.conf?

A
BATCH ("Upload a file" in Splunk Web):
TCP:
Data distribution:
UDP:
FIFO (First In, First Out queue):
Scripted Input:
File system change monitor (fschange monitor)
File system monitoring filters:
http: (HTTP Event Collector)
HTTP Event Collector (HEC) - Local stanza for each token
WINDOWS INPUTS:
Performance Monitor
Windows Event Log Monitor
Event Log whitelist and blacklist formats
Active Directory Monitor
Remote Queue Monitor
SQS specific settings
Windows Registry Monitor
Windows Host Monitoring
527
Q

Command to setup splunk heavy forwarder?

A

splunk enable app SplunkForwarder -auth :

528
Q

What is the Splunk precedence order Globally?

A

System local, App local, App default, System default.

529
Q

What is the Splunk precedence order within app or user context?

A

User Directories for current user, App Directories for current running app, App Dirs for all other apps, System Dirs.

530
Q

Migration: After moving Splunk index db, what would you edit to reflect this new location?

A

Edit $SPLUNK_HOME/etc/splunk-launch.conf

531
Q

What file sets limits on disk usage?

A

server.conf
[diskUsage]
minFreeSpace =

532
Q

What is the minimum free space in splunk?

A

5000MB or 5GB

533
Q

What is TSIDX file and how is it used?

A

A time-series index file; A tsidx file associates each unique keyword in your data with location references to events, which are stored in a companion rawdata file. Together, the rawdata file and its related tsidx files make up the contents of an index bucket.

Each search you run scans tsidx files for the search keywords and uses their location references to retrieve from the rawdata file the events to which those keywords refer. To speed up searches, bloom filters narrow the set of tsidx files that Splunk Enterprise must search to get accurate results.

534
Q

What Splunk file would be used to reduce TSIDX disk usage?

A

indexes.conf
[indexname]
enableTsidxreduction=True
timePeriodInSecBeforeTsidxReduction=86400

535
Q

What is a Bloom Filter?

A

A data structure that you use to test whether an element is a member of a set. Splunk Enterprise uses bloom filters to decrease the time it requires to retrieve events from the index. This strategy is effective when you search for rare terms.

In Splunk Enterprise, bloom filters work at the index bucket level. The filters rule out buckets that do not contain keywords from the search being run. Splunk Enterprise saves time searching by focusing on the tsidx files within the bucket where the search keywords exist.

536
Q

What Splunk files are used to manage Bloom filter retention and set Bloom Filter for specific index?

A

Retention is managed via limits.conf

Create bloom filter for specific index via indexes.conf

537
Q

Which file is used for role and mapping ?

A

Authorize.conf

538
Q

[True or False]You can not search the data in frozen stage of bucket?

A

True

539
Q

Attributes in indexes.conf to freeze data when it grows too old?

A

frozenTimePeriodInSecs

540
Q

Which splunk License does not exist?

Search head, forwarder, free, Splunk Enterprise?

A

Search head

541
Q

Which command is used only to delete index web data ?

A

splunk clean eventdata -index web

542
Q

What is the use of Add-on in splunk?

A

To Extract fields, parsing etc but do not provide dashboards.

543
Q

What rights does power role have?

A

Can Edit all saved searches, alerts, objects, ect

544
Q

What does can_delete role do?

A

Delete search or keyword

545
Q

Which function is not a part of a single instance deployment?

A

Clustering

546
Q

What does a single-instance deployment of Splunk Enterprise handle?

A

Input, Parsing, Indexing, and Searching

547
Q

What are the three main default roles in Splunk Enterprise?

A

User, Power, Admin

548
Q

_________ define what users can do in Splunk.

A

Roles

549
Q

Splunk uses ________ to categorize the type of data being indexed.

A

Source Type

550
Q

True/False. The monitor input option will allow you to continuously monitor files.

A

True

551
Q

Which following search mode toggles behavior based on the type of search being run?

A

Smart

552
Q

What is the order of evaluation for Boolean operations in Splunk?

A

NOT, OR, AND

553
Q

What file needs to be configured on Indexer to start receiving data and what port?

A

inputs.conf for port 9997

554
Q

Where is the servercalss.conf file stored and what does it do?

A

$SPLUNK_HOME/etc/system/local
Server classes are essentially categories. They use filters to control what clients they apply to, contain a set of applications, and may define deployment server behavior for the management of those applications.

555
Q

What is a fishbucket?

A

Used to decipher file input issues.
A subdirectory where Splunk software tracks how far into a file indexing has progressed, to enable the software to detect when data has been added to the file and resume indexing. The fishbucket subdirectory contains seek pointers and CRCs for indexed files.
default location /opt/splunk/var/lib/splunk

556
Q

How does the indexer store indexes?

A

As the indexer indexes your data, it creates a number of files. These files contain two types of data: The raw data in compressed form (rawdata) Indexes that point to the raw data, plus some metadata files (index files) Together, these files constitute the Splunk Enterprise index.

557
Q

[True/False]Deployment server push configuration files to deployment client

A

False

558
Q

Deployment client uses which configuration files to connect deployment server ?
serverclass.conf, deploymentclient.conf, inputs.conf, outputs.conf

A

deploymentclient.conf

559
Q

[True/False]The deployment server does not automatically deploy apps in response to direct edits of serverclass.conf

A

True

560
Q

A dedicated deployment server can handle how many clients ?

A

500 - 1000 Clients, even more than this and it depends of the periodicity, and the size of the bundles to deploy.

561
Q

What is Splunk DMC?

A

Distributed Management Console;
Dashboard providing insight to your deployment. Install on Search head(not rec for prod), License master, or Deployment server.

562
Q

Which stanza can be used to destroy a file after reading the file?[ fschange, monitor, batch, destroy ]

A

Batch - Use batch to set up a one time, destructive input of data from a source. For continuous, non-destructive inputs, use monitor. Remember, after the batch input is indexed, Splunk Enterprise deletes the file.

563
Q

To receive data from forwarder in indexer in inputs.conf file, which is used in stanza ? [ tcp, splunktcp, udp, forwardertcp ]

A

splunktcp

564
Q

What is splunk?

A

An application that ingests machine data, indexes it, and visualizes it for users to

565
Q

Why would I want to learn splunk?

A

The money in the field is great, the amount of data that can be analyzed is incredible, 70% of companies are transitioning into splunk, allows you to gain new insight, there is a community called ninjas that allows you to be interactive with, and its fun!

566
Q

What are the different flavors of spunk?

A

Enterprise, Cloud, Light

567
Q

What is a forwarder

A

A script that sends data from a device to the splunk device

568
Q

What is an event

A

A single entity such as an row in a table.

Or if you have an alert that comes into splunk which will be timestamped

569
Q

What is SPL

A

Splunk Processing Language

570
Q

and

A

a space is an implied ____ in a search string

571
Q

by default, search results are NOT returned in ____ order.

A

chronological, alphabetical, ascii

572
Q

Search controls that will NOT re-run a search

A
  1. selecting a range of bars on the timeline
  2. selecting a bar on the timeline
  3. deselect
573
Q

Using the export function, you can export a maximum of 2000 results

A

false

574
Q

default fields are NOT added to every event in Splunk at INDEX time

A

false

575
Q

these kinds of fields are identified in your data at INDEX time.

A

default fields

576
Q

field discovery occurs at _____ time

A

search

577
Q

the fields sidebar does NOT show________

A

all extracted fields

578
Q

fast, optimized, verbose are all selectable search modes

A

false (fast, smart, verbose)

579
Q

only splunk admninistrators can assign selected fields

A

false

580
Q

which search mode automatically decides how to return fields based on your search?

A

smart

581
Q

splunk alerts are based on historical searches only

A

false

582
Q

splunk alerts can be based on searches that run ______

A
  1. on a regular schedule

2. in real-time

583
Q

A real-time alert is __________

A

constantly running in the background

584
Q

dashboards are

A

views

585
Q

Running a scheduled saved report ___________

A

returns a fresh result set

586
Q

Once you create a report you can

A
  1. add the report to a dashboard
  2. open the report and edit it
  3. accelerate slow running reports
587
Q

the stats command will create a _______ by default

A

table

588
Q

A pivot table is a _______

A

table, chart or visualization based on a datamodel set

589
Q

after you create a pivot you can save it as a ___________

A
  1. dashboard panel

2. report

590
Q

which of the following would match this search? SEARCH: “accounting response”

A

accounting response for TradeID

591
Q

true about Splunk search language

A
  1. treats field values in a case-INsensitive manner

2. allows searching on a keyword

592
Q

the following searches will NOT return the same results: search 1 purchase ==== search 2 action=purchase

A

true

593
Q

use this command to control which fields are extracted at search time and to (typically) improve search

A

fields -

594
Q

this command displays the least common values in a specific field

A

rare

595
Q

this command returns an unlimited number of results. search: error | top host limit =9999

A

false

596
Q

this list clause is used to group the output of a stats command by a specific name

A

rex

597
Q

which of the following will show the maximum bytes?

A

sourcetype=access_* | stats max(bytes)

598
Q

when a search returns _________, you can view the results as a list

A

statistical values

599
Q

clicking a segment on a chart ________________

A

adds the highlighted value to the search criteria

600
Q

lookups can be private for a user

A

true

601
Q

use this command to use lookup fields in a search and see the lookup fields in the field sidebar

A

inputlookup

602
Q

what is the correct order of steps for creating a new lookup?

A
  1. create the lookup table
  2. define the lookup
  3. configure the lookup to run automatically
603
Q

in automatic lookup definitions, you can only have 3 output fields maximum

A

false

604
Q

lookups allow you to overwrite your raw event

A

true

605
Q

which of the following are responsible for collecting data and sending it for further processing?

A

forwarders

606
Q

which of the following are responsible for parsing incoming data and storing data on disc?

A

indexers

607
Q

which of the following are responsible for dispatching a search request?

A

search head

608
Q

it is not possible for a single instance of Splunk to manage the input, parsing, and indexing of machine data.

A

false

609
Q

two types of splunk indexes

A
raw data (full log files) 
index files (key keywords from logs)
610
Q

raw data

A

full log files

611
Q

index files

A

key keywords from logs

612
Q

splunk preconfigured indexes

A

main
_internal
_audit:

613
Q

_internal

A

Stores Splunk Enterprise internal logs and processing metrics.

614
Q

_audit

A

Contains events related to the file system change monitor, auditing, and all user search history

615
Q

main

A

This is the default Splunk Enterprise index. All processed data is stored here unless otherwise specified.

616
Q

Splunk indexer working can be divided in two stages:

A

parsing phase and indexing phase

617
Q

Parsing stage

A

While parsing splunk performs and extracts a set of default for each event like host, source, and sourcetype.

618
Q

Source

A

The source of an event is the name of the file, stream, or other input from which the event originates

619
Q

Sourcetype

A

The source type of an event is the format of the data input from which it originates like for windows .evt files from event viewer

620
Q

Host

A

An event’s host value is typically the hostname, IP address, or fully qualified domain name of the network host from which the event originated

621
Q

Configuring character set encoding

A

Its nothing but way of storing character/words in memory

622
Q

Identifying line termination using linebreaking rules

A

if your logs are very long or messy then it will break them in small parts easy to understand

623
Q

Identifying timestamps or creating them if they don’t exis

A

sort logs as per time or as they occurred.

624
Q

Indexing stage

A

Splunk indexing process:

a) Breaking all events into segments called buckets that can then be searched upon. You can determine the level of segmentation, which affects indexing and searching speed, search capability, and efficiency of disk compression.
b) Building the index data structures.

c) Writing the raw data and index files to disk, where post-indexing compression occurs
Splunk parsing and indexing phases

625
Q

How splunk stores Data?

A

Splunk stores all its data in directories on server called buckets. Buckets are nothing but directories on servers. A bucket moves through several stages as it ages - hot,warm,cold,frozen

626
Q

Hot

A

this is the directory where all data is written and the most recent data is kept here.
Warm - the next tier down, read only and likely still searched

627
Q

Cold

A
  • rarely searched data as it has aged or been archived (rolled) to this bucket. While read only and still searchable, this is considered the archive tier.
628
Q

Frozen

A

this is data that is pushed to a dead media like tape or deleted. There is a thawing process possible if not deleted completely to allow data to be pushed back into higher tier buckets

629
Q

Freeze data when an index grows too large

A

Set maxTotalDataSizeMB

630
Q

How to create new index in splunk?

A

There are multiple ways to create new index in splunk indexer. You can achieve it t through GUI/CLI or simply editing index.conf at
$splunk home/etc/system/local.

Simplest way is through GUI (front-end). If number of index are more then simply edit inputs.conf and add all index name to it. Below are steps for the same.

631
Q

How to create a new index using index.conf?

A

To add a new index, add a stanza to indexes.conf in $SPLUNK_HOME/etc/system/local, identified by the name of the new index.

For example:
[newindex] homePath= coldPath= thawedPath= …

632
Q

Props.conf is used to define following configurations

A

Configuring timestamp recognition
Convertig timeformat to our default timeformat
Configuring linebreaking for multiline events.
Setting up character set encoding
Defining manual filed extarction regex
Allowing processing of binary files.
Configuring event segmentation.
Overriding Splunk’s automated host and source type matching
Defining where to lookup for lookup table etc

633
Q

Location of props.conf:

A

/opt/splunk/etc/system/default/props.conf —>never edit this file as its conatians default configuration

/opt/splunk/etc/system/local/props.conf —–>We can edit this file for configurations

634
Q

How to configure props.conf in splunk?

A

There happens to be seven attributes you want to set in props.conf every time you bring data into Splunk

635
Q

TIME_PREFIX

A

This is the first attribute is used to tell Splunk where to start to look for the timestamp in your event.

636
Q

MAX_TIMESTAMP_LOOKAHEAD

A

Setting this attribute makes Splunk happy and run more efficiently because it will not have to spend any extra time and resources to find the time stamp. You can tell Splunk that your timestamp is 20 characters into your event so Splunk will not waste any time looking through the entire event.

637
Q

TIME_FORMAT

A

Many people “sleep” on this attribute and shouldn’t. It is very important to help Splunk interpret your data. With this attribute you are telling Splunk the format your time stamp is in using strptime Splunk will not have to try to figure out if 10/2/12 is October 2, 2012, February 10, 2012, or even something weird like December 2, 2010.

638
Q

SHOULD_LINEMERGE

A

this attribute is the leader and decision maker of the group. Depending on the value of this attribute, other attributes are required. This setting should be set to “false” and used along with the LINE_BREAKER attribute, which can greatly increase processing speed.

639
Q

LINE_BREAKER

A

This attribute looks the toughest and most intimidating. It identifies how your events should be broken apart. This is important because if this is not set correctly you can have data that is spread across multiple events. Using regular expressions, Splunk will look for that specific pattern and break up your events accordingly, and as mentioned before, this should be used in conjunction with SHOULD_LINEMERGE = false.

640
Q

TRUNCATE

A
  • This attribute is nothing to sneeze at. Measured in bytes, this attribute limits the length of an event (line of data), and will break when the limit is met. The default value is 10000 so set this to 999999 bytes or more depending on the size of your event. Because your data is not being broken up into multiline events (given SHOULD_LINEMERGE = false) you will want to ensure your events do not get broken up incorrectly.
641
Q

TZ

A

the time zone attribute is probably the most forgotten of the group. You will want to set the time zone for each host in your Splunk environment. This will ensure the time is displayed correctly on your search head.

642
Q

what is a bucket in splunk?

A
  • a bucket are directories on servers in splunk: hot, warm, cold, frozen, thawed.
  • events within splunk are broken down into
    segments called buckets
  • inside indexes, files, collection of databases, subdirectories
643
Q

9997

A

port open for indexing

644
Q

metadata

A

host, source, source type, time stamp

645
Q

case(X,”Y”,…)

A

Works like a case statement in shell scripting. This function takes pairs of arguments X and Y. The X arguments are Boolean expressions that will be evaluated from first to last. When the first X expression is encountered that evaluates to TRUE, the corresponding Y argument will be returned. The function defaults to NULL if none are true.

646
Q

An admin does what?

A

Install apps, create knowledge objects for all users (what apps a user will see by default)

647
Q

A power user does what?

A

Creates and shares knowledge objects for users of app, real-time searches

648
Q

A Splunk user does what?

A

Only see own knowledge objects and those shared to them.

649
Q

The seven main components in splunk searching and reporting?

A
  1. Splunk bar
  2. App bar
  3. Search bar
  4. Time range picker
  5. How to search panel
  6. What to search panel
  7. Search History
650
Q

The time range picker is set to _________ by default.

A

All-time

651
Q

________ tab is default tab for searches

A

Event

652
Q

_______ mode discovery off for event searches. No event or field data for stats searches.

A

Fast

653
Q

______ mode all events and field data; switches to this mode after visualization

A

Verbose

654
Q

______ mode (default-based on search string data). Field discovery ON for event searches. No event or field data for stats searches.

A

Smart

655
Q

This search action button “Job V” does what?

A

Edit job settings, send job to background, inspect and delete job.

656
Q

Saved searches are set to ______ by default.

A

private

657
Q

________boolean is used if none is implied.

A

AND

658
Q

Exact phrases use______

A

quotes

659
Q

Use a _______ for searching a string with quotes in the string.

A

Backslash

Example: info=”user “chrisV4” not in database” info=”user"chrisV4" not in database “

660
Q

Three default search fields automatically selected?

A

Source, Host, Sourcetype

661
Q

_______ sidebar shows all field extracted at search time.

A

Fields

662
Q

_______ Fields appear in event, default-host, sourcetype, source

A

Selected

663
Q

Clicking on a field shows a list of _______, ________, and ________.

A

values, count, and percentage

664
Q

These fields can launch a quick report by clicking on them (4)

A

top values, top values by time, rare values, events with this field

665
Q

Use ______ to limit search to only one sourcetype

A

sourcetype=

666
Q

Field names _____ case sensitive- Values _______ case sensitive

A

are, are not

667
Q

The field operators are used with numerical string values (symbols)

A

= != –>

668
Q

These symbols are only used with numerical values?

A

> > = < <= –>

669
Q

Using _____ and ____ (symbols) would return the same results.

A

NOT, !=

670
Q

Use _______ to nest boolean searches

A

parenthesis

671
Q

When creating reports you can edit, clone, embed, and delete under the ______ tab

A

report

672
Q

What are the three ways to create visualizations?

A
  1. Select a field from the fields sidebar
  2. Use the pivot interface
  3. Use the Splunk search language commands in the search bar with statistics and visualization tabs
673
Q

Save visual reports as _______ or _______

A

report or dashboard pannel

674
Q

Dashboards are searches gathered together and can use _______input or ________ visualization

A

form or custom

675
Q

Default time for pivot is ______

A

all the time

676
Q

_______ object is the main source of data

A

Root

677
Q

_______ object acts like an AND boolean

A

Child

678
Q

_________ pivot allows instant access to data without having a data model

A

Instant

679
Q

Search terms include (6)

A

Keywords, booleans, phrases, fields, wildcards, and comparisons.

680
Q

Comparison symbols

A

=, !=, <=, >, >=

681
Q

Best practices to use while searching in Splunk (4)

A
  1. Time is the most efficient filter
  2. More you tell search the better your results
  3. Inclusion is better than exclusion
  4. Filter as early as possible
682
Q

_____ are case insensitive.

components of search language

A

Search terms

683
Q

______ tell Splunk what we want to do with results (ex. stats)
(components of search language)

A

Commands

684
Q

______how we want to deal with results (ex. list)

components of search language

A

Functions

685
Q

______ variables to apply to function (ex. Product name)

components of search language

A

Arguments

686
Q

_______ how we want results defined.

components of search language

A

Clauses

687
Q

_____ is used to pass current results to the next component

A

Pipe

688
Q

_________ command works from left to right

A

Search

689
Q

Once and item is filtered _____ it is no longer available in the search string

A

Out

690
Q

_____ command include or exclude fields from search results.

A

Fields

691
Q

Exclude a field by using ______ symbol

A

minus (-)

692
Q

Primary fields _______ and _______ will always be extracted, but can also be removed by using the minus symbol

A

_time & _raw

693
Q

Field_____happens after field______only affecting displayed results.

A

exclusion, extraction

694
Q

________ command retains searched data in a tabulated format

A

table

695
Q

In regards to a rename command, once a field is renamed the ______ name is not available to later search commands

A

original

696
Q

This command removes events with duplicate values

A

Dedup

697
Q

This command displays results in ascending or descending order.

A

Sort

698
Q

This command combine fields from external sources to searched events, based on event field

A

Lookup

699
Q

This command produces statistics of a search result

A

Stats command

700
Q

This command shows number of events matching search criteria

A

Stats count

701
Q

This command is the sum of numerical value

A

Stats Sum command

702
Q

This is a command that preforms stats aggregation against time

A

Timechart command

703
Q

___ split data by an additional field

A

by

704
Q

Usenull = _____ will remove NULL values

A

f

705
Q

5 Main components of Splunk ES

A

Index Data, Search & investigate, Add knowledge, Monitor & Alert, Report & Analyze.

706
Q

len(x)

A

Description: This function returns the character length of a string X.

Basic example
… | eval n=len(field)

707
Q

lower(x)

A

Description: This function takes one string argument and returns the string in lowercase.

Basic example
The following example returns the value provided by the field username in lowercase.

… | eval username=lower(username)

708
Q

ltrim(x,y)

A

Description: This function takes one or two arguments X and Y, and returns X with the characters in Y trimmed from the left side. If Y is not specified, spaces and tabs are removed.

Basic example
The following example trims the leading spaces and all of the occurrences of the letter Z from the left side of the string. The value that is returned is x=”abcZZ “.

… | eval x=ltrim(“ ZZZZabcZZ “, “ Z”)

709
Q

replace(x,y,z)

A

Description: This function returns a string formed by substituting string Z for every occurrence of regex string Y in string X. The third argument Z can also reference groups that are matched in the regex.

Basic example: The following example returns date, with the month and day numbers switched. If the input is 1/14/2017 the return value would be 14/1/2017.

… | eval n=replace(date, “^(\d{1,2})/(\d{1,2})/”, “\2/\1/”)

710
Q

rtrim(x,y)

A

Description: This function takes one or two arguments X and Y, and returns X with the characters in Y trimmed from the right side. If Y is not specified, spaces and tabs are removed.

Basic example: The following example returns n=”ZZZZabc”.
… | eval n=rtrim(“ ZZZZabcZZ “, “ Z”)

711
Q

spath(x,y)

A

Description: This function takes two arguments, an input source field X and an spath expression Y, that is the XML or JSON formatted location path to the value that you want to extract from X.

Basic example: The following example returns the hashtags from a twitter event.

index=twitter | eval output=spath(_raw, “entities.hashtags”)

712
Q

substr(x,y,z)

A

Description: This function returns a substring of X, starting at the index specified by Y with the number of characters specified by Z. If Z is not provided, the function returns the rest of the string

Basic example: The following example concatenates “str” and “ing” together, returning “string”:

… | eval n=substr(“string”, 1, 3) + substr(“string”, -3)

713
Q

trim(x,y)

A

Description: This function takes one or two arguments X and Y and returns X with the characters in Y trimmed from both sides. If Y is not specified, spaces and tabs are removed.

Basic example: The following example returns “abc”.

… | eval n=trim(“ ZZZZabcZZ “, “ Z”)

714
Q

upper(x)

A

Description: This function takes one string argument and returns the string in uppercase.

Basic example: The following example returns the value provided by the field username in uppercase.

… | eval n=upper(username)

715
Q

urldecode(x)

A

Description: This function takes one URL string argument X and returns the unescaped or decoded URL string.

Basic example
The following example returns “http://www.splunk.com/download?r=header”.

… | eval n=urldecode(“http%3A%2F%2Fwww.splunk.com%2Fdownload%3Fr%3Dheader”)

716
Q

A group of indexers configured to replicate each other’s data is called a ________.

A

Index Cluster

717
Q

__________ is often the biggest bottle neck in the Splunk indexing pipeline.

A

Disk I/O

718
Q

Search heads do not require as much ______ as indexers but require more _________.

A
  1. disk space

2. CPU power

719
Q

Adding more machines no matter the hardware will make your deployment perform better.

A

False

720
Q

Splunk indexers and Search Heads on virtual machines should have ____ of the vCPU reserved to them.

A

100%

721
Q

Keeping ____ synchronized across your deployment, makes sure events are returned in the proper order.

A

time

722
Q

What command is used to start the Splunk Enterprise server?

A

./splunk start

723
Q

This command can be used to make Splunk start each time the server is booted.

A

./splunk enable boot-start

724
Q

When logging into Splunk Enterprise for the first time, a username of ______ and a password of are used.

A
  1. admin

2. changeme

725
Q

The functions of the data pipeline vary drastically depending on the deployment.

A

False

726
Q

Splunk Enterprise licenses specify how much data you can index per __________.

A

day

727
Q

Any editing done to .conf files should be done in the ________ directory.

A

local

728
Q

The ________ index is used when an index is not specified at input time.

A

main

729
Q

Having multiple indexes allows:

A

Faster searches
Access limiting
Multiple retention policies

730
Q

As data is input into Splunk Enterprise, it is first placed into a ________ bucket.

A

hot

731
Q

Some differences between hot and warm buckets are:

A

Hot buckets are writable, warm buckets are not.
Hot buckets are searched first.
The naming convention.

732
Q

When a bucket is frozen, by default it is moved to a different location before deleting.

A

False

733
Q

The timezone setting in a user’s account will effect the timestamp shown in events.

A

True

734
Q

Only the ________ role can use the Delete Command by default.

A

can_delete

735
Q

When mixing authentication sources, scripted authentication will always take precedence.

A

False

736
Q

In most production environments, _______ will be used as your main source of data input.

A

forwarders

737
Q

Splunk uses ____________ to categorize the type of data being indexed.

A

sourcetypes

738
Q

The server that data is forwarded to is called the ______________.

A

receiver

739
Q

Indexing on a Heavy Forwarder does not affect your license.

A

False

740
Q

The following can be used to build apps for Splunk:

A

Simple XML
Splunk JavaScript
SDKs

741
Q

When migrating from a single instance deployment to a distributed environment, you will want to use the existing instance as an _______.

A

indexer

742
Q

An indexer in a distributed search environment is called a __________.

A

search peer

743
Q

It is a best practice to ____________ forwarders across all indexers in a search peer group.

A

load balance

744
Q

The management port is required when adding a search peer to a search head.

A

True

745
Q

Splunk Enterprise can be installed virtual environments.

A

True

746
Q

____________ is the system process that handles indexing, searching, forwarding and the web interface for Splunk Enterprise.

A

Splunkd

747
Q

Splunk Enterprise should always be run as root in a *NIX environment.

A

False

748
Q

It is suggested that you have a single deployment instance available for _________.

A

testing and development

749
Q

A total of ____ cores are recommended per search head.

A

16

750
Q

Forwarders should never be installed on Windows servers.

A

False

751
Q

SplunkWeb is accessed on port _______ by default.

A

8000

752
Q

Properties in the _______ file allow you to configure how data is transformed as it is processed.

A

not later

753
Q

The segment of the data pipeline that stores user’s knowledge objects is the __________ segment.

A

not indexing
not data ainput
not parsing

754
Q

This component is NOT installed from the Splunk Enterprise Package.

A

Universal Forwarder

755
Q

Splunk Enterprise deployment typically has ___ processing tiers.

A

3

756
Q

The segment of the data pipeline that stores user’s knowledge objects is the _______ segment.

A

not parsing not data input

757
Q

The default management port for Splunkd is:

A

8089

758
Q

Search Heads require more _____ than indexers.

A

CPU Power

759
Q

Splunk uses the ________ index when indexing it’s own logs and metrics.

A

_internal

760
Q

Event separation happens during the __________ segment of the data pipeline.

A

parsing

761
Q

A license violation causes all data to stop being indexed.

A

False

762
Q

The functions of the data pipeline vary drastically depending on the deployment.

A

False

763
Q

properties in the _______ file allow you to configure how data is transformed as it is processed.

A

not alter.conf

764
Q

Which Splunk search command allows you to perform mathematical functions on field values?

A

Eval

765
Q

If you want to format values without changing their characteristics, which would you use?

A

The Fieldformat Command.

766
Q

By default, the Fillnull Command replaces null values with this:

A

0

767
Q

You can only use one Eval Command per search.

A

False

768
Q

Knowledge objects can be used to normalize data?

A

True

769
Q

A Common Information Model (CIM) is supported by Splunk.

A

True

770
Q

What are the predefined ways knowledge objects can be shared?

A

All apps
Private
Specifiic App

771
Q

Field aliases are used to __________ data.

A

normalize

772
Q

You can only have one field alias per field.

A

False

773
Q

Field Aliases ___________________

A

Can be referenced by lookup tables.
Are applicable to a specified app context.
Make correlation easier.

774
Q

Calculated fields are shortcuts for _______________.

A

Eval Commands

775
Q

Calculated fields can use lookup tables.

A

False

776
Q

The easiest way to extract a field is from ____________, allowing you to skip a few steps.

A

The event actions menu

777
Q

When editing a field extraction, you will be working with _________________.

A

The regular expression.

778
Q

You can extract multiple fields with the field extractor.

A

True

779
Q

______________ is a field extraction method for events that contain fields separated by a character.

A

delimiter

780
Q

Fields extracted with the field extractor

A

Are persistent
Are specific to a host, source or sourcetype.
Are reusable in multiple searches.

781
Q

You can only add one tag per field value pair.

A

False

782
Q

Which search would limit an “alert” tag to the “host” field?

A

tag::host=alert

783
Q

__________ allow you to categorize events based on search terms.

A

Event Types

784
Q

Tags can be added to event types.

A

True

785
Q

Event types do NOT show up in the field list.

A

False

786
Q

Splunk suggests naming your Knowledge Objects using _______ segmented keys.

A

6

787
Q

A workflow action can _________________.

A

Send field values to external resources.
Pass variables to a URL.
Execute a secondary search.

788
Q

To escape the “fieldname” value which command would you use? $_________fieldname$

A

!

789
Q

Which actions can be triggered by an alert?

A

List in triggered alerts
Send Email
Run a script

790
Q

What is the correct way to name a macro with two arguments?

A

dostuff(2)

791
Q

Validating macro arguments can be done with which type of command?

A

boolean expressions

eval expressions

792
Q

After creating your data model, the next step is to ___________

A

Add a root object

793
Q

Root search objects benefit from acceleration.

A

False

794
Q

_________ objects can be added to a root event object to narrow down the search.

A

Child

795
Q

What attributes can be added to an object?

A
Auto-Extracted
Eval Expression
Lookup
Regular Expression
Geo IP
796
Q

You can add additional child objects to either existing objects or the root object.

A

True

797
Q

After you configure a lookup, its fields can be found in the fields sidebar and you can use them in a search.

A

True

798
Q

No matter what user role creates the field alias, it is always set to Private by default.

A

True

799
Q

Running concurrent reports and the searches behind them puts very low demand on your system hardware.

A

False

800
Q

Search macros can only be used once in a given search.

A

False

801
Q

The results of a macro can not be piped to other commands.

A

False

802
Q

When building your data model, Splunk suggests you use root search objects whenever possible.

A

False

803
Q

Some differences between hot and warm buckets are:

A

Hot buckets are writable, warm buckets are not.
Hot buckets are searched first.
The naming convention.

804
Q

When a bucket is frozen, by default it is moved to a different location before deleting.

A

False

805
Q

The timezone setting in a user’s account will effect the timestamp shown in events.

A

True

806
Q

Only the ________ role can use the Delete Command by default.

A

can_delete

807
Q

The ______ role has the most capabilities of the predefined splunk roles.

A

admin`

808
Q

When mixing authentication sources, scripted authentication will always take precedence.

A

False

809
Q

An indexer in a distributed search environment is called a __________.

A

search peer

810
Q

It is a best practice to ____________ forwarders across all indexers in a search peer group.

A

load balance

811
Q

The management port is required when adding a search peer to a search head.

A

True

812
Q

DMC stands for

A

Distributed Management Console

813
Q

The segment of the data pipeline that stores user’s knowledge objects is the __________ segment.

A

not indexing
not data ainput
not parsing

814
Q

The default management port for Splunkd is:

A

8089

815
Q

The following searches will return the same results: SEARCH 1: web AND error SEARCH 2: web and error

A

False

816
Q

Time stamp are stored ____

A

in a consistent format

817
Q

Max events displayed by transaction command

A

1,000

818
Q

5 Main components of Splunk ES

A

Index Data, Search & investigate, Add knowledge, Monitor & Alert, Report & Analyze.

819
Q

What does index data do? (3)

A
  1. Collects data
  2. Label data with source type
  3. Stored in splunk index
820
Q

Usenull = _____ will remove NULL values

A

f

821
Q

append

A

Appends subsearch results to current results.

822
Q

appendcols

A

Appends the fields of the subsearch results to current results. first results to first result. second to second etc.

823
Q

appendpipe

A

Appends the result of the subpipeline applied to the current result set to results.

824
Q

arules

A

Finds association rules between field values.

825
Q

associate

A

Identifies correlations between fields.

826
Q

contingency

A

Builds a contingency table for two fields.

827
Q

counttable

A

Builds a contingency table for two fields.

828
Q

ctable

A

Builds a contingency table for two fields.

829
Q

correlate

A

Calculates the correlation between different fields.

830
Q

diff

A

Returns the difference between two search results.

831
Q

join

A

SQL-like joining of results from the main results pipeline with the results from the subpipeline.

832
Q

selfjoin

A

Joins results with itself.

833
Q

set

A

Performs set operations (union diff intersect) on subsearches.

834
Q

stats

A

Provides statistics grouped optionally by fields. See Functions for stats chart and timechart in the Splunk Enterprise Search Reference.

835
Q

transaction

A

Groups search results into transactions.

836
Q

audit

A

Returns audit trail information that is stored in the local audit index.

837
Q

dbinspect

A

Returns information about the specified index.

838
Q

eventcount

A

Returns the number of events in an index.

839
Q

metadata

A

Returns a list of source sourcetypes or hosts from a specified index or distributed search peer.

840
Q

typeahead

A

Returns typeahead information on a specified prefix.

841
Q

crawl

A

Crawls the filesystem for new sources to add to an index.

842
Q

delete

A

Delete specific events or search results.

843
Q

input

A

Adds sources to Splunk or disables sources from being processed by Splunk.

844
Q

accum

A

Keeps a running total of the specified numeric field.

845
Q

addinfo

A

Add fields that contain common information about the current search.

846
Q

addtotals

A

Computes the sum of all numeric fields for each result.

847
Q

delta

A

Computes the difference in field value between nearby results.

848
Q

eval

A

Calculates an expression and puts the value into a field. See Functions for eval and where in the Splunk Enterprise Search Reference.

849
Q

iplocation

A

Adds location information such as city country latitude longitude and so on based on IP addresses.

850
Q

multikv

A

Extracts field-values from table-formatted events.

851
Q

rangemap

A

Sets RANGE field to the name of the ranges that match.

852
Q

relevancy

A

Adds a relevancy field which indicates how well the event matches the query.

853
Q

strcat

A

Concatenates string values and saves the result to a specified field.

854
Q

erex

A

Allows you to specify example or counter example values to automatically extract fields that have similar values.

855
Q

extract and kv

A

Extracts field-value pairs from search results.

856
Q

kvform

A

Extracts values from search results using a form template.

857
Q

rex

A

Specify a Perl regular expression named groups to extract fields while you search.

858
Q

spath

A

Provides a straightforward means for extracting fields from structured data formats XML and JSON.

859
Q

xmlkv

A

Extracts XML key-value pairs.

860
Q

convert

A

Converts field values into numerical values.

861
Q

filldown

A

Replaces NULL values with the last non-NULL value.

862
Q

fillnull

A

Replaces null values with a specified value.

863
Q

makemv

A

Change a specified field into a multivalued field during a search.

864
Q

nomv

A

Changes a specified multivalued field into a single-value field at search time.

865
Q

reltime

A

Converts the difference between ‘now’ and ‘_time’ to a human-readable value and adds adds this value to the field ‘reltime’ in your search results.

866
Q

rename

A

Renames a specified field; wildcards can be used to specify multiple fields.

867
Q

replace

A

Replaces values of specified fields with a specified new value.

868
Q

analyzefields and af

A

Analyze numerical fields for their ability to predict another discrete field.

869
Q

anomalies

A

Computes an “unexpectedness” score for an event.

870
Q

anomalousvalue

A

Finds and summarizes irregular or uncommon search results.

871
Q

cluster

A

Clusters similar events together.

872
Q

kmeans

A

Performs k-means clustering on selected fields.

873
Q

outlier

A

Removes outlying numerical values.

874
Q

rare

A

Displays the least common values of a field.

875
Q

iplocation

A

returns location information such as city country latitude longitude and so on based on IP addresses.

876
Q

geostats

A

Generate statistics which are clustered into geographical bins to be rendered on a world map.

877
Q

predict

A

Enables you to use time series algorithms to predict future values of fields.

878
Q

trendline

A

Computes moving averages of fields.

879
Q

x11

A

Enables you to determine the trend in your data by removing the seasonal pattern.

880
Q

addtotals

A

Computes the sum of all numeric fields for each result.

881
Q

bin and discretize

A

Puts continuous numerical values into discrete sets.

882
Q

chart

A

Returns results in a tabular output for charting. See Statistical and charting functions in the Splunk Enterprise Search Reference.

883
Q

contingency and counttable and ctable

A

Builds a contingency table for two fields.

884
Q

correlate

A

Calculates the correlation between different fields.

885
Q

eventcount

A

Returns the number of events in an index.

886
Q

eventstats

A

Adds summary statistics to all search results.

887
Q

gauge

A

Transforms results into a format suitable for display by the Gauge chart types.

888
Q

makecontinuous

A

Makes a field that is supposed to be the x-axis continuous (invoked by chart/timechart)

889
Q

outlier

A

Removes outlying numerical values.

890
Q

rare

A

Displays the least common values of a field.

891
Q

stats

A

Provides statistics grouped optionally by fields. See Statistical and charting functions in the Splunk Enterprise Search Reference.

892
Q

streamstats

A

Adds summary statistics to all search results in a streaming manner.

893
Q

timechart

A

Create a time series chart and corresponding table of statistics. See Statistical and charting functions in the Splunk Enterprise Search Reference.

894
Q

top

A

Displays the most common values of a field.

895
Q

trendline

A

Computes moving averages of fields.

896
Q

untable

A

Converts results from a tabular format to a format similar to stats output. Inverse of xyseries and maketable.

897
Q

xyseries

A

Converts results into a format suitable for graphing.

898
Q

sendemail

A

Emails search results, either inline or as an attachment, to

one or more specified email addresses

899
Q

mvcombine

A

Combines events in search results that have a single differing field value into one result with a multivalue field of the differing field.

900
Q

regex

A

Removes results that do not match the specified regular expression.

901
Q

searchtxn

A

Finds transaction events within specified search constraints.

902
Q

table

A

Creates a table using the specified fields.

903
Q

uniq

A

Removes any search that is an exact duplicate with a previous result.

904
Q

where

A

Performs arbitrary filtering on your data. See Evaluation functions in the Splunk Enterprise Search Reference.

905
Q

untable

A

Converts results from a tabular format to a format similar to stats output. Inverse of xyseries and maketable.

906
Q

gentimes

A

Returns results that match a time-range.

907
Q

mvexpand

A

Expands the values of a multivalue field into separate events for each value of the multivalue field.

908
Q

savedsearch

A

Returns the search results of a saved search.

909
Q

search

A

Searches Splunk indexes for matching events. This command is implicit at the start of every search pipeline that does not begin with another generating command.

910
Q

loadjob

A

Loads events or results of a previously completed search job.

911
Q

typer

A

Calculates the eventtypes for the search results.

912
Q

head

A

Returns the first number n of specified results.

913
Q

reverse

A

Reverses the order of the results.

914
Q

sort

A

Sorts search results by the specified fields.

915
Q

tail

A

Returns the last number N of specified results

916
Q

inputcsv

A

Loads search results from the specified CSV file.

917
Q

loadjob

A

Loads events or results of a previously completed search job.

918
Q

outputcsv

A

Outputs search results to a specified CSV file.

919
Q

outputtext

A

Ouputs the raw text field (_raw) of results into the _xml field.

920
Q

sendemail

A

Emails search results either inline or as an attachment to one or more specified email addresses.

921
Q

map

A

A looping operator, performs a search over each search result.

922
Q

search

A

Searches Splunk indexes for matching events. This command is implicit at the start of every search pipeline that does not begin with another generating command.

923
Q

format

A

Takes the results of a subsearch and formats them into a single result.

924
Q

join

A

SQL-like joining of results from the main results pipeline with the results from the subpipeline.

925
Q

return

A

Specify the values to return from a subsearch.

926
Q

set

A

Performs set operations (union diff intersect) on subsearches.

927
Q

localize

A

Returns a list of the time ranges in which the search results were found.

928
Q

reltime

A

Converts the difference between ‘now’ and ‘_time’ to a human-readable value and adds adds this value to the field ‘reltime’ in your search results.

929
Q

analyzefields

A

Analyze numerical fields for their ability to predict another discrete field. See Also anomalousvalue.

930
Q

anomalies

A

Computes an “unexpectedness” score for an event. See Also anomalousvalue & cluster & kmeans & outlier.

931
Q

anomalousvalue

A

Finds and summarizes irregular or uncommon search results. See Also analyzefields & anomalies & cluster & kmeans & outlier.

932
Q

append

A

Appends subsearch results to current results. See Also appendcols & appendcsv & join & set.

933
Q

appendcols

A

Appends the fields of the subsearch results to current results first results to first result second to second etc. See Also append & appendcsv & join & set.

934
Q

appendpipe

A

Appends the result of the subpipeline applied to the current result set to results. See Also append & appendcols & join & set.

935
Q

arules

A

Finds association rules between field values. See Also associate & correlate.

936
Q

associate

A

Identifies correlations between fields. See Also correlate and contingency.

937
Q

audit

A

Returns audit trail information that is stored in the local audit index.

938
Q

autoregress

A

Sets up data for calculating the moving average. See Also accum & autoregress & delta & trendline & streamstats.

939
Q

bin and discretize

A

Puts continuous numerical values into discrete sets. See Also chart and timechart.

940
Q

bucketdir

A

Replaces a field value with higher-level grouping such as replacing filenames with directories. See Also cluster and dedup.

941
Q

chart

A

Returns results in a tabular output for charting. See Functions for stats chart and timechart in the Splunk Enterprise Search Reference. See Also timechart

942
Q

cluster

A

Clusters similar events together. See Also anomalies anomalousvalue cluster kmeans outlier

943
Q

concurrency

A

Uses a duration field to find the number of “concurrent” events for each event. See Also timechart

944
Q

contingency and counttable and ctable

A

Builds a contingency table for two fields. See Also associate correlate

945
Q

convert

A

Converts field values into numerical values. See Also eval

946
Q

correlate

A

Calculates the correlation between different fields. See Also associate & contingency

947
Q

dbinspect

A

Returns information about the specified index.

948
Q

delta

A

Computes the difference in field value between nearby results. See Also accum & autoregress & trendline & streamstats

949
Q

diff

A

Returns the difference between two search results.

950
Q

erex

A

Allows you to specify example or counter example values to automatically extract fields that have similar values. See Also extract & kvform & multikv & regex & rex & xmlkv

951
Q

eventcount

A

Returns the number of events in an index. See Also dbinspect

952
Q

eventstats

A

Adds summary statistics to all search results. See Also stats

953
Q

extract and kv

A

Extracts field-value pairs from search results. See Also kvform & multikv & xmlkv & rex

954
Q

fieldformat

A

Expresses how to render a field at output time without changing the underlying value. See Also eval & where

955
Q

fields

A

Removes fields from search results.

956
Q

fieldsummary

A

Generates summary information for all or a subset of the fields. See Also af & anomalies & anomalousvalue & stats

957
Q

filldown

A

Replaces NULL values with the last non-NULL value. See Also fillnull

958
Q

fillnull

A

Replaces null values with a specified value.

959
Q

findtypes

A

Generates a list of suggested event types. See Also typer

960
Q

foreach

A

Run a templatized streaming subsearch for each field in a wildcarded field list. See Also eval

961
Q

format

A

Takes the results of a subsearch and formats them into a single result.

962
Q

from

A

Retrieves data from a dataset such as a data model dataset a CSV lookup a KV Store lookup a saved search or a table dataset.

963
Q

gauge

A

Transforms results into a format suitable for display by the Gauge chart types.

964
Q

gentimes

A

Generates time-range results.

965
Q

geostats

A

Generate statistics which are clustered into geographical bins to be rendered on a world map. See Also stats & xyseries

966
Q

head

A

Returns the first number n of specified results. See Also reverse & tail

967
Q

highlight

A

Causes Splunk Web to highlight specified terms.

968
Q

history

A

Returns a history of searches formatted as an events list or as a table. See Also search

969
Q

input

A

Adds sources to Splunk or disables sources from being processed by Splunk.

970
Q

inputcsv

A

Loads search results from the specified CSV file. See Also loadjob & outputcsv

971
Q

iplocation

A

Extracts location information from IP addresses.

972
Q

join

A

SQL-like joining of results from the main results pipeline with the results from the subpipeline. See Also selfjoin & appendcols

973
Q

kmeans

A

Performs k-means clustering on selected fields. See Also anomalies & anomalousvalue & cluster & outlier

974
Q

kvform

A

Extracts values from search results using a form template. See Also extract & kvform & multikv & xmlkv & rex

975
Q

loadjob

A

Loads events or results of a previously completed search job. See Also inputcsv

976
Q

localize

A

Returns a list of the time ranges in which the search results were found. See Also map & transaction

977
Q

makecontinuous

A

Makes a field that is supposed to be the x-axis continuous (invoked by chart/timechart) See Also chart & timechart

978
Q

makemv

A

Change a specified field into a multivalued field during a search. See Also mvcombine & mvexpand & nomv

979
Q

map

A

A looping operator performs a search over each search result.

980
Q

metadata

A

Returns a list of source sourcetypes or hosts from a specified index or distributed search peer. See Also dbinspect

981
Q

metasearch

A

Retrieves event metadata from indexes based on terms in the logical expression. See Also metadata & search

982
Q

mstats

A

Calculates statistics for the measurement metric_name and dimension fields in metric indexes. See Also stats

983
Q

multikv

A

Extracts field-values from table-formatted events.

984
Q

multisearch

A

Run multiple streaming searches at the same time. See Also append & join

985
Q

mvcombine

A

Combines events in search results that have a single differing field value into one result with a multivalue field of the differing field. See Also mvexpand & makemv & nomv

986
Q

mvexpand

A

Expands the values of a multivalue field into separate events for each value of the multivalue field. See Also mvcombine & makemv & nomv

987
Q

nomv

A

Changes a specified multivalued field into a single-value field at search time. See Also makemv & mvcombine & mvexpand

988
Q

outlier

A

Removes outlying numerical values. See Also anomalies & anomalousvalue & cluster & kmeans

989
Q

outputcsv

A

Outputs search results to a specified CSV file. See Also inputcsv & outputtext

990
Q

outputtext

A

Ouputs the raw text field (_raw) of results into the _xml field. See Also outputtext

991
Q

predict

A

Enables you to use time series algorithms to predict future values of fields. See Also x11

992
Q

rangemap

A

Sets RANGE field to the name of the ranges that match.

993
Q

rare

A

Displays the least common values of a field. See Also stats & top

994
Q

regex

A

Removes results that do not match the specified regular expression. See Also rex & search

995
Q

relevancy

A

Calculates how well the event matches the query.

996
Q

reltime

A

Converts the difference between ‘now’ and ‘_time’ to a human-readable value and adds adds this value to the field ‘reltime’ in your search results. See Also convert

997
Q

rename

A

Renames a specified field; wildcards can be used to specify multiple fields.

998
Q

replace

A

Replaces values of specified fields with a specified new value.

999
Q

rest

A

Access a REST endpoint and display the returned entities as search results.

1000
Q

return

A

Specify the values to return from a subsearch. See Also format & search

1001
Q

reverse

A

Reverses the order of the results. See Also head & sort & tail

1002
Q

rex

A

Specify a Perl regular expression named groups to extract fields while you search. See Also extract & kvform & multikv & xmlkv & regex

1003
Q

rtorder

A

Buffers events from real-time search to emit them in ascending time order when possible.

1004
Q

savedsearch

A

Returns the search results of a saved search.

1005
Q

script and run

A

Runs an external Perl or Python script as part of your search.

1006
Q

scrub

A

Anonymizes the search results.

1007
Q

search

A

Searches Splunk indexes for matching events.

1008
Q

searchtxn

A

Finds transaction events within specified search constraints. See Also transaction

1009
Q

selfjoin

A

Joins results with itself. See Also join

1010
Q

sendemail

A

Emails search results to a specified email address.

1011
Q

set

A

Performs set operations (union, diff, intersect) on subsearches. See Also append & appendcols & join & diff

1012
Q

setfields

A

Sets the field values for all results to a common value. See Also eval & fillnull & rename

1013
Q

sort

A

Sorts search results by the specified fields. See Also reverse

1014
Q

spath

A

Provides a straightforward means for extracting fields from structured data formats, XML and JSON. See Also xpath

1015
Q

stats

A

Provides statistics, grouped optionally by fields. See Functions for stats, chart, and timechart in the Splunk Enterprise Search Reference. See Also eventstats & top & rare

1016
Q

strcat

A

Concatenates string values.

1017
Q

streamstats

A

Adds summary statistics to all search results in a streaming manner. See Also eventstats & stats

1018
Q

table

A

Creates a table using the specified fields. See Also fields

1019
Q

tags

A

Annotates specified fields in your search results with tags. See Also eval

1020
Q

tail

A

Returns the last number n of specified results. See Also head & reverse

1021
Q

timechart

A

Create a time series chart and corresponding table of statistics. See Functions for stats, chart, and timechart in the Splunk Enterprise Search Reference. See Also chart & bucket

1022
Q

top

A

Displays the most common values of a field. See Also rare & stats

1023
Q

transaction

A

Groups search results into transactions.

1024
Q

transpose

A

Reformats rows of search results as columns.

1025
Q

trendline

A

Computes moving averages of fields. See Also timechart

1026
Q

typeahead

A

Returns typeahead information on a specified prefix.

1027
Q

typer

A

Calculates the eventtypes for the search results. See Also typelearner

1028
Q

uniq

A

Removes any search that is an exact duplicate with a previous result. See Also dedup

1029
Q

untable

A

Converts results from a tabular format to a format similar to stats output. Inverse of xyseries and maketable.

1030
Q

where

A

Performs arbitrary filtering on your data. See Functions for eval and where in the Splunk Enterprise Search Reference. See Also eval

1031
Q

x11

A

Extracts XML key-value pairs. See Also extract & kvform & multikv & rex

1032
Q

xmlkv

A

Unescapes XML.

1033
Q

xpath

A

Redefines the XML path.

1034
Q

xyseries

A

Converts results into a format suitable for graphing.

1035
Q

What is the Difference between NOT and !=

A

Suppose you have the following fields: fieldA, FieldB, fieldC – If you search for fieldB!=value3
You will get Results fieldB=value1, fieldB=value2

If fieldB does not exist, nothing is returned.

Searching with NOT:

If you search for NOT fieldB=value3, the search returns everything except fieldB=value3:

fieldA=value1, fieldA=value2, fieldA=value3
fieldB=value1, fieldB=value2
fieldC=value1, fieldC=value2, fieldC=value3

If fieldB does not exist, NOT fieldB=value3 returns:
fieldA=value1, fieldA=value2, fieldA=value3
fieldC=value1, fieldC=value2, fieldC=value3

1036
Q

seconds

A

s, sec, secs, second, seconds

1037
Q

minutes

A

m, min, minute, minutes

1038
Q

hours

A

h, hr, hrs, hour, hours

1039
Q

days

A

d, day, days

1040
Q

weeks

A

w, week, weeks

1041
Q

months

A

mon, month, months

1042
Q

quarters

A

q, qtr, qtrs, quarter, quarters

1043
Q

years

A

y, yr, yrs, year, years

1044
Q

For exact time ranges, the syntax for the time modifiers is %m/%d/%Y:%H:%M:%S. For example, the following search specifies a time range from 12 A.M. October 19, 2016 to 12 A.M. October 27, 2016.

A

earliest=10/19/2016:0:0:0 latest=10/27/2016:0:0:0

1045
Q

The syntax for the snap to time unit is

A

[+|-]@.

1046
Q

When snapping to the nearest or latest time

A

Splunk software always snaps backwards or rounds down to the latest time that is not after the specified time. For example, the current time is 15:45:00 and the snap to time is earliest=-h@h. The time modifier snaps to 14:00.

1047
Q

You can also define the relative time modifier using only the snap to time unit.

A

to snap to a specific day of the week, use @w0 for Sunday, @w1 for Monday, and so forth. For Sunday, you can specify either w0 or w7.

1048
Q

if you want to search for events in the previous month

A

specify earliest=-mon@mon latest=@mon. This example begins at the start of the previous month and ends at the start of the current month.

1049
Q

Difference between relative time and relative snap to time

A

On April 28th, you decide to run a search at 14:05.

If you specify earliest=-2d, the search goes back exactly two days, starting at 14:05 on April 26th.

If you specify earliest=-2d@d, the search goes back to two days and snaps to the beginning of the day. The search looks for events starting from 00:00 on April 26th.

1050
Q

earliest=1

A

If you want to search events from the start of UTC epoch time, use earliest=1. (earliest=0 in the search string indicates that time is not used in the search.)
When earliest=1 and latest=now or latest=<a>, the search will run over all time. The difference is that:</a>

Specifying latest=now (which is the default) does not return future events.
Specifying latest=</a><a> returns future events, which are events that contain timestamps later than the current time, now.</a>

</a>

1051
Q

latest=now

A

Specify that the search starts or ends at the current time.

1052
Q

@q, @qtr, or @quarter

A

Specify a snap to the beginning of the most recent quarter: Jan 1, Apr 1, July 1, or Oct 1.

1053
Q

w0, w1, w2, w3, w4, w5, w6, and w7

A

Specify “snap to” days of the week; where w0 is Sunday, w1 is Monday, etc. When you snap to a week, @w or @week, it is equivalent to snapping to Sunday or @w0. You can use either w0 or w7 for Sunday.

1054
Q

now

A

Now, the current time

Wednesday, 05 February 2017, 01:37:05 P.M. now

1055
Q

-60m

A

60 minutes ago
Wednesday, 05 February 2017, 12:37:05 P.M.
Equivalent modifiers -60m@s

1056
Q

-1h@h

A

1 hour ago, to the hour

Wednesday, 05 February 2017, 12:00:00 P.M.

1057
Q

-1d@d

A

Yesterday

Tuesday, 04 February 2017, 12:00:00 A.M.

1058
Q

-24h

A

24 hours ago (yesterday)

Tuesday, 04 February 2017, 01:37:05 P.M. Equivalent modifiers -24h@s

1059
Q

-7d@d

A

7 days ago, 1 week ago today

Wednesday, 28 January 2017, 12:00:00 A.M.

1060
Q

-7d@m

A

7 days ago, snap to minute boundary Wednesday, 28 January 2017, 01:37:00 P.M.

1061
Q

@w0

A

Beginning of the current week

Sunday, 02 February 2017, 12:00:00 A.M.

1062
Q

+1d@d

A

Tomorrow

Thursday, 06 February 2017, 12:00:00 A.M.

1063
Q

+24h

A

24 hours from now, tomorrow

Thursday, 06 February 2017, 01:37:05 P.M. Equivalent modifiers +24h@s

1064
Q

chained relative time offsets

A

You can also specify offsets from the snap-to-time or “chain” together the time modifiers for more specific relative time definitions.

1065
Q

@d-2h

A

Snap to the beginning of today (12 A.M.) and subtract 2 hours from that time.
Resulting Time 10 P.M. last night.

1066
Q

-mon@mon+7d

A

One month ago, snapped to the first of the month at midnight, and add 7 days.
Resulting Time The 8th of last month at 12 A.M.

1067
Q

searches with relative time modifiers.

A

Example 1: Web access errors from the beginning of the week to the current time of your search (now).

eventtype=webaccess error earliest=@w0

Example 2: Web access errors from the current business week (Monday to Friday).

eventtype=webaccess error earliest=@w1 latest=+7d@w6

This search returns matching events starting from 12:00 A.M. of the Monday of the current week and ending at 11:59 P.M. of the Friday of the current week.

If you run this search on Monday at noon, you will only see events for 12 hours of data. Whereas, if you run this search on Friday, you will see events from the beginning of the week to the current time on Friday. The timeline however, will display for the full business week.

Example 3: Web access errors from the last full business week.

eventtype=webaccess error earliest=-7d@w1 latest=@w6

This search returns matching events starting from 12:00 A.M. of last Monday and ending at 11:59 P.M. of last Friday

1068
Q

access_combined

A

NCSA combined format http web server logs (can be generated by apache or other web servers)

Example:
10.1.1.43 - webdev [08/Aug/2005:13:18:16 -0700] “GET / HTTP/1.0” 200 0442 “-“ “check_http/1.10 (nagios-plugins 1.4)”

1069
Q

access_combined_wcookie

A

NCSA combined format http web server logs (can be generated by apache or other web servers), with cookie field added at end

Example:
“66.249.66.102.1124471045570513” 59.92.110.121 - - [19/Aug/2005:10:04:07 -0700] “GET /themes/splunk_com/images/logo_splunk.png HTTP/1.1” 200 994 “http://www.splunk.org/index.php/docs” “Mozilla/5.0 (X11; U; Linux i686; en-US; rv:1.7.8) Gecko/20050524 Fedora/1.0.4-4 Firefox/1.0.4” “61.3.110.148.1124404439914689”

1070
Q

access_common

A

NCSA common format http web server logs (can be generated by apache or other web servers)

Examples:
10.1.1.140 - - [16/May/2005:15:01:52 -0700] “GET /themes/ComBeta/images/bullet.png HTTP/1.1” 404 304

1071
Q

apache_error

A

Standard Apache web server error log

Example:
[Sun Aug 7 12:17:35 2005] [error] [client 10.1.1.015] File does not exist: /home/reba/public_html/images/bullet_image.gif

1072
Q

access_combined

A

NCSA combined format http web server logs (can be generated by apache or other web servers)

1073
Q

access_combined_wcookie

A

NCSA combined format http web server logs (can be generated by apache or other web servers) with cookie field added at end

1074
Q

access_common

A

NCSA common format http web server logs (can be generated by apache or other web servers)

1075
Q

asterisk_cdr

A

Standard Asterisk IP PBX call detail record

1076
Q

asterisk_event

A

Standard Asterisk event log (management events)

1077
Q

asterisk_messages

A

Standard Asterisk messages log (errors and warnings)

1078
Q

asterisk_queue

A

Standard Asterisk queue log

1079
Q

cisco_syslog

A

Standard Cisco syslog produced by all Cisco network devices including PIX firewalls routers ACS etc. usually via remote syslog to a central log host

1080
Q

db2_diag

A

Standard IBM DB2 database administrative and error log

1081
Q

exim_main

A

Exim MTA mainlog

1082
Q

exim_reject

A

Exim reject log

1083
Q

linux_messages_syslog

A

Standard linux syslog (/var/log/messages on most platforms)

1084
Q

linux_secure

A

Linux securelog

1085
Q

log4j

A

Log4j standard output produced by any J2EE server using log4j

1086
Q

mysqld_error

A

Standard mysql error log

1087
Q

mysqld

A

Standard MySQL query log; also matches the MySQL binary log following conversion to text

1088
Q

postfix_syslog

A

Standard Postfix MTA log reported via the Unix/Linux syslog facility

1089
Q

sendmail_syslog

A

Standard Sendmail MTA log reported via the Unix/Linux syslog facility

1090
Q

sugarcrm_log4php

A

Standard Sugarcrm activity log reported using the log4php utility

1091
Q

weblogic_stdout

A

Weblogic server log in the standard native BEA format

1092
Q

websphere_activity

A

Websphere activity log also often referred to as the service log

1093
Q

websphere_core

A

Corefile export from Websphere

1094
Q

websphere_trlog_syserr

A

Standard Websphere system error log in the IBM native trlog format

1095
Q

websphere_trlog_sysout

A

Standard Websphere system out log in the IBM native trlog format; similar to the log4j server log for Resin and Jboss sample format as the system error log but containing lower severity and informational events

1096
Q

windows_snare_syslog

A

Standard windows event log reported through a 3rd party Intersect Alliance Snare agent to remote syslog on a Unix or Linuxserver

1097
Q

Differentiators

A
Real Time Architecture
Universal Machine Data Platform
Schema on the Fly
Agile Reporting and Analytics 
Scales from Desktop to Enterprise 
Fast Time to Value 
Passionate and Vibrant Community
1098
Q

Splunk Offerings (core products)

A

Splunk Enterprise
Splunk Cloud
Splunk Light

1099
Q

Real Time Architecture

A

Real-time collection, search, monitoring and analysis across massive streams of machine data in a single solution

1100
Q

Universal Machine Data Platform

A

Open, extensible platform delivering integrated, end-to-end data collection, management and analysis

1101
Q

Schema on the Fly

A

Search-time schema delivers flexibility to interact with the data and change perspective on the fly at search time

1102
Q

Agile Reporting and Analytics

A

Interactive search and reporting, enabling rapid, interactive analysis and visualization of data.

1103
Q

Market Segments

A

IT Operations
Application Delivery
Security and Compliance

1104
Q

Splunk Premium Products

A

Splunk Enterprise Security
Splunk IT Service Intelligence
Splunk User Behavior Analytics (UBA)
Premium Apps

1105
Q

Splunk Enterprise Security

A

Analytics driven SIEM: user to monitor, detect, analyze, investigate and repond to threats and attacks
Complimentary product. Customers must have an equivalent license of Core Splunk (same GB Volume)

1106
Q

Splunk IT Service Intelligence

A

Data Driven service insight for root cause isolation and improved service operations
Complimentary Product. Customers must have an equivalent license of Core Splunk (same GB Volume)

1107
Q

Splunk User Behavior Analytics (UBA)

A

Detect cyber-attacks and insider threats using data science, machine learning, behavior baseline, peer group analytics, and advanced correlation

Licensing: Number of authorized users(the number of users or system accounts in Microsoft AD, lightweight directory access protocol (LDAP) or an similar service that is used to authenticate users inside the network.
needs to be sold with content subscription packs

1108
Q

Splunk Services

A

Community
Standard
Enterprise and Global Support
PS and CSM

1109
Q

Splunk Sale Stages

A
Business Qualification 
Technical Interlock 
Champion Tested
Proof Completed
Mutually Agreed Closed Plan
1110
Q

Splunk Value Stack

A
Corporate Objectives
Business Strategy 
Initiatives
Risks and Critical Capabilities 
C Level Commercial Insights
1111
Q

4 Key Assets in Every Sales Play

A

Prospecting Guide
Meeting Guide
Differentiation Pitch
Champion Guide

1112
Q

Splunks Core Selling Tools

A

Value Stack
Whiteboard
Differentiators
best used together

1113
Q

Splunk Market

A

Vertical and Segments

1114
Q

Splunk Light

A

Delivers a light version of Splunk for Small IT environment
5 users
Cheaper
20GB of daily data indexing

1115
Q

What is Machine Data

A

Machine data is one of the fastest, growing, most complex and most valuable segments of big data

1116
Q

Splunk Cloud

A

All the power of Splunk Enterprise, delivered as a service. Runs in an Amazon Web Service
AWS GovCloud-Splunk Cloud solution hosted in secure enviornment for public sector
1.33X more expensive but its in the cloud and support is included

1117
Q

Passionate and Vibrant Community

A

Splunk online communities include splunk base, splunk answers, and spunk dev
Active communities including Facebook and Linkedin; regional customer events, user group meetings and annual user conference.

1118
Q

Scales from Desktop to Enterprise

A

Flexible data engine that scales to index terabytes of data per day and permits thousands of users to concurrently search petabytes of data