Splunk Fundamentals 1 Flashcards
Machine data makes up for more than __% of data accumulated by organizations
90%
Index Data
Collects events and normalizes it with discrete time stamps into different sourcetypes
Describe functions of indexers, search heads, and forwarders
The Indexer processes machine data from the Forwarders, and the search heads distributes searches to the indexers and extracts field value pairs.
In most Splunk deployments, ________ serve as the primary way data is supplied for indexing.
Forwarders
What are the three main processing components of Splunk?
Indexers, Forwarders, Search Heads
Search strings are sent from the _________.
Search Head
Which of these is not a main component of Splunk?
- Add knowledge
- Compress and archive
- Search and investigate
- Collect and index data
Compress and archive
This role will only see their own knowledge objects and those that have been shared with them.
User
What are the 3 roles in Splunk, from most to least powerful?
Admin, Power, User
Which apps ship with Splunk Enterprise?
Home App, Search & Reporting
You can launch and manage apps from the home app.
True
_________ define what users can do in Splunk.
Roles
The monitor input option will allow you to continuously monitor files.
True
Splunk knows where to break the event, where the time stamp is located and how to automatically create field value pairs using these.
Source Types
Splunk uses ________ to categorize the type of data being indexed.
Source Types
In most production environments, _______ will be used as the source of data input.
Forwarders
Files indexed using the the upload input option get indexed _____.
Once
What are commands that create statistics and visualizations called?
Transforming Commands
What booleans are used to tie events together in search?
AND OR NOT
What is the order of operations for boolean evaluation?
- Parenthesis() 1. NOT 2. OR 3. AND
How do you search exact phrases?
place terms in quotes “”
How do you escape quotes from being interpreted in a search?
Use a backslash character, eg info=”user "chrisv4" not in db”
This searches for the exact phrase user “chrisv4 not in db
A search job will remain active for ___ minutes after it is run.
10 Minutes
Shared search jobs remain active for _______ by default.
7 Days
How is the asterisk used in splunk search?
As a wildcard
What is the time stamp seen in events based on?
Your user account time zone
Field names are ______ while values are not
Case sensitive
What is the difference between != field operator and NOT
!= returns events where the contents of the field is not equal to the specified value
eg status !=200 shows all the events where the status field is not 200
NOT returns all events where there is no field status=200
NOT is more inclusing than !=, and will return events that don’t include the specified field
What does the field operator IN do?
Alternative to chaining together operators inside parenthesis, Searches field for results inside parenthesis eg
index = web status IN(“500, “503”, “505”)
is the same as
index = web (status=500 AND status =503 AND status=505)
Field Values are Case sensitive. T/F?
False, only field names are case sensitive
Which is not a comparison operator in Splunk?
<= ?= > != =
?= is not a comparison operator
Can wildcards be used in field searches?
Yes
What are the 5 main components of Splunk ES
Index Data, Search & investigate, Add knowledge, Monitor & Alert, Report & Analyze.
What attributes describe this field?
a dest 4
It contains 4 values, and it contains string values
What is the most efficient way to filter events in a search?
Time
Search best practices
- Index host sourcetype
- Inclusion better than exclusion
- Apply filtering commands as early as possible in search to limit events
- Only search index containing events you need
- Can also limit access with indexes, possible to search multiple indexes at the same time
What 4 default fields are extracted at index time, and are the most powerful to search to limit events (disregarding time)?
index, source, host, sourcetype
These fields do not need to be extracted during search
Which is better in a search, inclusion or exclusion?
Inclusion
What is -30mon?
time modifier for 30 months in search
How do you specify a time range in search?
By using earliest= latest=
eg: earliest=-2h latest=-1h
What privileges does an admin user have?
Install apps, create knowledge objects for all users
What privileges does a power user have?
Real time searches, create and share knowledge objects for users
What app(s) does splunk come with by default?
Search and reporting
What does the search and reporting app do?
Create knowledge objects, reports, and dashboards
What is a knowledge object in splunk?
Everything outside the basic data – A user creation that enriches existing data, such as a saved search, event types, tags, field extractions, lookups, reports, alerts, data models, transactions, workflow actions, and fields
The seven main components in splunk searching and reporting?
- Splunk bar
- App bar
- Search bar
- Time range picker
- How to search panel
- What to search panel
- Search History
The time range picker is set to ___ by default
All time
What are the three main search modes?
Fast, smart, verbose
_______ mode has discovery off for event searches. No event or field data for stats searches.
Fast
______ mode has all events and field data; switches to this mode after visualization
Verbose
______ mode (default-based on search string data) has field discovery ON for event searches. No event or field data for stats searches.
Smart
What does the “Job V” action button do
Edits job settings, sends jobs to the background, inspects and deletes job.
Saved searches are set to ___ by default
private
Exact phrases use
quotes
What boolean is implied if none is used?
AND
_______ fields have values in at least 20% of the events
Interesting
Clicking on a field shows a list of _______, ________, and ________.
Values, count, percentage
These fields can launch a quick report by clicking on them (4)
top values, top values by time, rare values, events with this field
What five components are the splunk search language made of?
Search terms commands functions arguments clauses
What is the Fields command?
Allows you to include or exclude specific fields from results
Would the ip column be removed in the results of this search? Why or why not?
sourcetype=a* | rename ip as “User” | fields - ip
No, because the name was changed
Finish the rename command to change the name of the status field to HTTP Status.
status as “HTTP Status”
What is missing from this search?
sourcetype=a* | rename ip as “User IP” | table User IP
Quotation marks around User IP
What command would you use to remove the status field from the returned events?
sourcetype=a* status=404 | ________ status
fields -
Which symbols are only used with numerical values?
> > = < <= –>
Top command returns top ____ results with a count and percentage
10
________ is an action that a saved search triggers based on the results of the search
Alert
________ designs reports into a simple interface without having to craft a search string
Pivot
The default time value for pivot is ______
All time
_______ object is the main source of data
Root
_______ object acts like an AND boolean
Child