Splunk Fundamentals 1 Flashcards
Splunk allows you to _____, analyze, and get _____ from your machine data.
aggregate, answers
What are the 3 main components of Splunk?
search head, indexer, forwarder
What are the 2 different types of Splunk deployment?
Splunk Enterprise and Splunk Cloud
Splunk components are installed and administered on premises with this type of Splunk deployment.
Splunk Enterprise
Splunk Enterprise is used as a scalable service and requires minimal infrastructure with this type of deployment.
Splunk Cloud
A ____ ___ is designed to address a wide variety of use cases and to extend the power of Splunk.
Splunk app
What do you use to download Splunk apps?
Splunkbase
True or False. There are 1,000 + ready-made apps available on Splunkbase.
True
Out of the box, what are the 3 main roles used in Splunk?
admin, power, user
What is the default app that comes with Splunk?
Search & Reporting
The ______ app provides a default interface for searching and analyzing data.
Search & Reporting
A _____ is unique identifier identifying where Splunk events originated (whether it’s from a laptop, phone, etc). In other words, this is the actual device that’s generating the data.
a. source
b. host
c. sourcetype
b. host
The name of a file (ie. Word file named “Splunk Class”), stream, or other input (where data is specifically coming from – i.e. “picture” folder on a phone) is the ______.
a. source
b. host
c. sourcetype
a. source
In the Search & Reporting app, the Data Summary contains three summary tabs. Select all that apply.
a. host
b. source
c. index
d. sourcetype
a. host
b. source
d. sourcetype
True or false: Search term values are case sensitive.
False
NOT, OR and AND are called ____ in Splunk.
booleans
The Boolean ____ is implied between terms.
AND
_____ are locations where Splunk stores and searches for event data
Indexes
Splunk admins _____ data into separate indexes in order to establish different retention policies on different types of data, improve search performance, and limit access by role.
segregate
Improving search ____ is one reason why Splunk admins segregate data into separate indexes.
performance
Limiting ____ by role is one reason why Splunk admins segregate data into separate indexes.
access
Establishing ___ policies (how long data is kept) on different types of data is one reason why Splunk admins segregate data into separate indexes.
retention
An ____ is a Splunk component that processes machine data. Information within ____ are stored in _____, enabling fast search and analysis. (visual example: file folder with separate files within the file folder)
indexer, indexers, indexes
What Boolean can you use to search against multiple indexes?
OR
____ ____ shows a list of commands that can be entered into the search string
Search Assistant
When search results display in Splunk do they display in reverse chronological order (newest first), or chronological order (oldest first) by default?
reverse chronological order
True or False. Matching search terms are not highlighted in Splunk.
False
Each event in Splunk contains the following metadata: timestamp, _____, index, ____ and host.
source, sourcetype
The results that come up in a search of Splunk are called _____.
events
The 3 layout options for displaying search results (or 3 ways to view results) are ____, ____ and ____.
list, table, raw
The ___ symbol “snaps” to the time unit that you specify in Splunk, and rounds down to the nearest specified unit. For example, if the current time was 09:37:12 on March 31st, and you want to look back to 30 minutes ago, you would type -30m___h.
@
After search results come up in Splunk, to select across a narrower time range on the timeline, what would you need to do?
click/drag across a series of bars
Every search in Splunk is called a ____. By default, how long is each ____ available for?
job, 10 minutes
The job bar in a search allows you to ___ a job (toggle to resume a search), or ____ (finalizes the search in progress).
pause, stop
What in Splunk shows the distribution of events in the time range?
timeline
The ____ tool allows you to examine the following:
Overall stats of the search (e.g., records processed/returned, processing time)
How the search was processed
Where Splunk spent its time
Search Job Inspector tool
There are 3 types of search modes that you can use in Splunk. Which search mode emphasizes speed over completeness?
fast
There are 3 types of search modes that you can use in Splunk. Which search mode balances speed and completeness, and is the default search mode?
smart
There are 3 types of search modes that you can use in Splunk. The ____ search mode emphasizes completeness over speed. It also allows access to underlying events when using transforming commands (in addition to totals and stats)
verbose
There are ___ types of read permissions. The default mode which is ____, only allows the creator access. If a read permission is set to ____, all app users can access search results.
private, everyone
___ is the most efficient factor to use as a filter in Splunk. ____is the second most efficient item to use as a Splunk filter.
time, index
After time and index, what are the 3 next filters that are the most efficient?
host, source, sourcetype
Is inclusion or exclusion generally better when it comes to search practices? Meaning including or excluding information?
inclusion
You should avoid using ____ at the beginning or middle of a string. ____ at the beginning of a string scan all events within timeframe, while ____ in the middle of string may return inconsistent results.
What should be used instead?
wildcards (all 3 blanks)
Use instead: OR, IN
True or false: Search term values are case sensitive.
False
Current time when the search starts is 08:31:15. -30m@h looks back to:
a. 8:00:00
b. 8:01:15
c. 9:00:00
b. 8:01:15
When you specify the following time range:
earliest=-2d@d
latest=@d
a. Looks back from two days ago, up to the beginning of today
b. Looks back exactly 48 hours ago
c. Looks back two days ago up to now
a. Looks back from two days ago, up to the beginning of today
Select one of the following that uses Splunk search best practices as it relates to wildcards.
a. fail
b. fal
c. fail*
c. fail*
Between search terms, ____ is implied unless otherwise specified
AND
Host, index, source, sourcetype, splunk_server, and timestamp are ___ fields that are already stored with the events in indexes.
default
____ fields that are listed within an index include _raw, and _time.
internal
The fields sidebar includes two types of fields. What are they?
selected, interesting
What type of fields occur in at least 20% of resulting events in Splunk?
interesting
By default, the selected fields are what 3 metadata fields?
host, source, sourcetype
What does the following mean?
status=404
error message for a webpage
What does the following mean?
area_code=404
for a specific area code
If a value contains a space, it must be enclosed in ____ ____.
i.e. VendorCountry= “United States”
double quotes
Field ____ are case sensitive, while field ____ are not.
Take a look at the following example? Would it return results?
HOST=ww3
names, values
no
Search for multiple values for a given field
by using the _____ operator.
i.e.
VendorCountry=”United States” ____ VendorCountry=”Canada”)
Alternatively, you can use the ___ operator
i.e. VendorCountry \_\_\_ ("United States", "Canada")
OR, IN
Both ! and NOT ____ events from your search, but can produced different results.
exclude
NOT status=200 returns events where status field exists and value in field doesn’t equal 200. However it ALSO returns events where status field ___ exist.
doesn’t
status!=200 returns events where status field ___ and value in field ____ equal 200.
exists, doesn’t