Splunk System Admin Flashcards
Do Splunk “Data” Admins or Splunk “System” Admins install, manage, and configure Splunk components?
System Admins
Do Splunk “Data” Admins or Splunk “System” Admins works with users requesting new data sources?
Data Admins
Input, parse, index, search are the four ____ of Splunk
stages
All functions are in a single Splunk instance in this type of deployment:
a. distributed
b. basic
c. standalone
c. standalone
This type of Splunk deployment is usually used for testing, proof of concept, personal use, and learning:
a. distributed
b. basic
c. standalone
c. standalone
This type of Splunk deployment is similar to the standalone configuration, but manages the deployment of forwarder configurations.
a. distributed
b. basic
c. standalone
b. basic
With this type of Splunk deployment, indexers are added to handle more inputs and searching. Search heads are also added to handle more searching.
a. distributed
b. basic
c. standalone
a. distributed
With this type of Splunk deployment, forwarder configurations with are managed with a dedicated deployment server.
a. distributed
b. basic
c. standalone
a. distributed
This Splunk component allows users to submit search requests using SPL, distributes search requests to indexers, consolidates results and renders visualizations of results, and stores search-time knowledge objects (such as field extractions, alerts, and dashboards).
a. forwarders
b. indexers
c. search heads
d. deployment server
c. search heads
This Splunk component receives incoming data from forwarders, indexes and stores data in Splunk indexes, and searches data in response to requests from search heads.
a. forwarders
b. indexers
c. search heads
d. deployment server
b. indexers
Which Splunk component is responsible for parsing data into events?
a. forwarders
b. indexers
c. search heads
d. deployment server
b. indexers
This Splunk component is responsible for monitoring configured inputs and forwarding the data to the indexers, requires minimal resources, and is typically installed on the machines that produce data.
a. forwarders
b. indexers
c. search heads
d. deployment server
a. forwarders
Are forwarders responsible for searching, indexing/parsing, input, or management?
input
Which Splunk component is responsible for managing the deployment clients in a Splunk Enterprise?
a. forwarders
b. indexers
c. search heads
d. deployment server
d. deployment server
This Splunk component acts as a centralized configuration manager for any number of deployment clients and requires running on a Splunk Enterprise license.
a. forwarders
b. indexers
c. search heads
d. deployment server
d. deployment server
What are the default network ports for both the Splunk Enterprise and universal forwarders?
a. 8191
b. 8000
c. 8089
d. 8065
c. 8089
What is the default Splunk Enterprise network port for Splunk Web?
a. 8191
b. 8000
c. 8089
d. 8065
b. 8000
What is the default Splunk Enterprise network port for the Web app-server proxy?
a. 8191
b. 8000
c. 8089
d. 8065
d. 8065
What is the default Splunk Enterprise network port for KV Store?
a. 8191
b. 8000
c. 8089
d. 8065
a. 8191
True or False. Splunk Web, Web app-server proxy, and KV Store do not have default network ports for universal forwarders.
True
True or False. S2S receiving port(s), network/http input(s), index replication port(s), and search replication port(s) have default network ports.
False
NTP or ____ ___ ___ ensures that there is a standardized time configuration on Splunk servers. This is important because clock skew between hosts can affect the timestamp of events, and search results.
Network Time Protocol
The ____ process spawns and controls Splunk child processes such as web proxy, KV store, and introspection services. It also accesses, processes, and indexes incoming data, and handles all search requests and returns results.
splunkd
Splunk web ____ settings are used to set server configuration and server options.
server
/opt/splunk/var/lib/splunk is the path to the existing _____ in a Splunk environment.
indexes
What is the minimum amount of free disk space required for an index? (Note: If the disk space is less than the minimum amount, Splunk pauses indexing)
5000
Do you use the Splunk Enterprise installer, or the Universal Forwarder installer to install indexers, search heads, the license master, the deployment server, the heavy forwarder, and the cluster manager?
Splunk Enterprise installer
Do you use the Splunk Enterprise installer, or the Universal Forwarder installer to install your deployment client?
Universal forwarder installer
The ___ ____ (MC) in Splunk is an admin-only app used to monitor and investigate data Splunk collects about itself, such as performance and resource usage.
Monitoring Console
Is the Monitoring Console configured or un-configured by default in standalone mode? Can you enable it?
un-configured
yes
Monitoring Console Alerts Setup provides preconfigured platform alerts. Are they enabled or disabled by default?
disabled
The four types of Splunk _____ are Enterprise trial, Enterprise, Free, and Forwarder.
licenses
This type of Splunk license comes with the product, is valid for 60 days, requires activation of another license type after the 60 day period, and has a 500 MB/day limit.
a. free license
b. Enterprise trial license
c. forwarder license
d. Enterprise license
b. Enterprise trial license
This type of Splunk license is purchased from Splunk, sets the daily indexing volume amount, has full functionality for indexing, search head, deployment server, etc., and allows searching even if you are in a license violation period.
a. free license
b. Enterprise trial license
c. forwarder license
d. Enterprise license
d. Enterprise license
This type of Splunk license disables alerts, scheduled searches, authentication, clustering, distributed search, summarization, and forwarding to non-Splunk servers. It also allows 500 MB/day of indexing and forwarding to other Splunk instances.
a. free license
b. Enterprise trial license
c. forwarder license
d. Enterprise license
a. free license
This Splunk license applies to non-indexing forwarders sets a server up as a heavy forwarder, and allows authentication, but no indexing.
a. free license
b. Enterprise trial license
c. forwarder license
d. Enterprise license
c. forwarder license
____ occur when indexing exceeds the allocated daily quota in a pool, they’re viewed in Splunk Web > Messages (as a “pool warning”), and may eventually result in a Warning.
a. alert
b. violation
c. warning
a. alert
_____ occurs if an alert is triggered, and license capacity is not increased by midnight (by adding new license or moving capacity from another pool).
a. alert
b. violation
c. warning
c. warning
_____ occurs after 5 warnings on an Enterprise license in a rolling 30-day period and requires a reset key from Splunk Support or Sales Team.
a. alert
b. violation
c. warning
b. violation
True or False. These instances DO count against the daily license quota of Splunk:
–replicated data (Index Clusters)
– summary indexes
– Splunk internal logs (_internal, _audit, etc. indexes)
–Structural components of an index (metadata, tsidx, etc.)
False. They DO NOT count against the daily license quota of Splunk.
True or False. These instances DO NOT count against the daily license quota of Splunk:
– data from all sources that that are indexed
– events: measured as the data (full size) that flows through the parsing pipeline per day
– metrics: measurement capped at 150 bytes per metric event
False. They DO count against the daily license quota of Splunk.
____ _____ allows licenses to be subdivided and assigned to indexer groups. For example, a total stack of 500GB, would be distributed differently in a single pool of indexers vs. a multiple pool environment.
license pooling
There are two types of pricing when it comes to Splunk licensing: Ingest-Based and Infrastructure-Based. ____ ____ is based on data volume and is the traditional licensing method.
Ingest-Based
There are two types of pricing when it comes to Splunk licensing: Ingest-Based and Infrastructure-Based. ____ ____ is based on compute capacity and provides more control over searching and indexing.
Infrastructure-Based
Splunk ____ gathers data and provides insight into instances. You can get information on server specs (i.e. OS version, current open connections) and the Spluk platform (i.e. contents of SPLUNK_HOME/etc such as app configurations and Splunk log files).
diag
True or False. Splunk provides separate licenses for metrics andevents data.
False. Metrics data draws from the same license quota as event data.
True or False. Search Heads also need an Enterprise License (directly orthrough a License Master) even without configuring any inputs.
True
True or False. If the indexing exceeds the daily license quota in a pool,your license will go into a violation.
False. Indexing that exceeds the allocated daily quota in a pool is analert. An alert not fixed by midnight turns into a warning.
Splunk ____ are a collection of configuration files, scripts, web assets, etc. They may be focused on specific types of data, vendor, OS, industry, or business needs.
apps
Splunk ____ are installed under SPLUNK_HOME/etc/apps.
apps
This type of Splunk app permission allows a user to see an app and use it, add knowledge objects (KOs), and modify KOs they own.
a. write permissions
b. read permissions
b. read permissions
This type of Splunk app permission allows a user to share KOs they own and delete KOs used in the app.
a. read permissions
b. write permissions
b. write permissions
A Splunk ___- ____ is a reusable component that supports other apps. It is also often used for data collection, and DOES NOT contain Splunk Web UI components (reports or dashboards).
add-on
____ add-ons (TAs) are specialized add-ons that help collect, transform, and normalize data feeds from specific sources.
Technology
True or False. Write permissions to an app means that the user’srole is able to modify the app.
False. User roles with write permission can add/delete/modify knowledge objects used in the app.
True or False. Universal forwarders don’t have a web interface, butthey can still benefit from an app.
True
____ files govern an aspect of Splunk functionality. They are saved under SPLUNK_HOME/etc.
configuration
Do configuration text files generally use a case-sensitive [stanza] and have a format of attribute = value?
Yes
There are three ways that you can edit Splunk ____. In Splunk Web, using Splunk CLI, or editing .conf files.
configurations
What components of the Splunk environment generally use the outputs.conf configuration file? Choose all that apply.
a. indexer
b. forwarder
c. search head
b. forwarder
c. search head
Which configuration file is responsible for where to forward data?
a. outputs.conf
b. inputs.conf
c. props.conf
a. outputs.conf
This Splunk component uses props.conf for search-time field extractions, lookups, etc. However, ____ use props.conf for parsing, and ____ use props.conf for limited parsing. (Note: All answers below are used. Place them in the correct blanks above)
a. indexer
b. forwarder
c. search head
c. search head
a. indexer
b. forwarder
Which configuration file is responsible for what data is collected?
a. outputs.conf
b. inputs.conf
c. props.conf
b. inputs.conf
Inputs.conf configuration files in ___ ___ collect internal Splunk log data. ____ inputs.conf configuration files collect data AND determine which ports to listen to. Inputs.conf configuration files on ____ collect production data. (Note: All answers below are used. Place them in the correct blanks above)
a. indexer
b. forwarder
c. search head
c. search head
a. indexer
b. forwarder
_____ configuration files come with Splunk out of the box. ____ configuration files do not.
a. local
b. default
b. default
a. local
____ configuration files are overwritten when updates apply. They SHOULD NOT be modified. On the other hand, ____ configuration files keep changes. Changes are preserved when updates occur. Also, this is the only file of the two that you should modify, and the settings override default settings.
a. local
b. default
b. default
a. local
Configuration files fall into either of two file contexts –App/User Context or Global Context. Global Context configuration files are used during ____ time, while App/User Context configuration files are used during ____ time.
a. index time
b. search time
a. index time
b. search time
Which three configuration files are examples of Global Context files?
a. macros.conf
b. savedsearches.conf
c. outputs.conf
d. props.conf
e. inputs.conf
c. outputs.conf
d. props.conf
e. inputs.conf
Which three configuration files are examples of App/User Context files?
a. macros.conf
b. savedsearches.conf
c. outputs.conf
d. props.conf
e. inputs.conf
a. macros.conf
b. savedsearches.conf
d. props.conf
Which use case below is an example of a Global Context configuration use case? Which case is an example of a App/User Context configuration use case?
a. a private report in the Search app
b. a network input to collect syslog data
b. a network input to collect syslog data
a. a private report in the Search app
_____ ____ configuration are background tasks, include input, parsing, and indexing, and are user independent tasks. ____ ____ configuration files are connected to user-related activity, and include searching and search time processing. (Answer: Choose from either Global Context or App/User Context)
Global Context, App/User Context
The Splunk ____ shows on-disk configuration for a requested file. It’s useful for checking configuration scope and permission rules.
tool
Which configuration file tells a Splunk instance to ingest data?
inputs.conf
True or False. btoolshows on-disk configuration for requested file.
True
True or False. The best place to add a parsing configuration on an indexer would be the SPLUNK_HOME/etc/system/local directory, as it has the highest precedence.
False. The best place to put the configuration is in an app’s local directory (SPLUNK_HOME/etc/apps//local).
_____ store input data as events. main, and __internal are examples of these that are included by default with the Splunk application.
indexes
____ can be used to limit the scope of a search, and allow the ability to limit access by user.
indexes
____ are found in the following location: SPLUNK_DB (SPLUNK_HOME/var/lib/splunk)
indexes
This type of index contains network data.
a. security
b. proxy
c. web
b. proxy
_internal, _audit, _introspection, _thefishbucket, summary, and main are all examples of _____ indexes.
preconfigured
This preconfigured index consists of Splunk’s own logs and metrics.
a. summary
b. _introspection
c. _internal
d. main
e. _thefishbucket
f. _audit
c. _internal
This preconfigured index stores Splunk audit trails and other optional auditing information.
a. summary
b. _introspection
c. _internal
d. main
e. _thefishbucket
f. _audit
f. _audit
This preconfigured index tracks system performance, Splunk resource usage data, and provides the Monitoring Console (MC) with performance data.
a. summary
b. _introspection
c. _internal
d. main
e. _thefishbucket
f. _audit
b. _introspection
This preconfigured index contain checkpoint information for file monitoring inputs.
a. summary
b. _introspection
c. _internal
d. main
e. _thefishbucket
f. _audit
e. _thefishbucket
This preconfigured index is the default index for summary indexing system.
a. summary
b. _introspection
c. _internal
d. main
e. _thefishbucket
f. _audit
a. summary
This preconfigured index is the default index for inputs and is in the defaultdb directory.
a. summary
b. _introspection
c. _internal
d. main
e. _thefishbucket
f. _audit
d. main
____ are part of an index that stores events, and are directories containing a set of raw data.
buckets
What is the default index size?
500GB
____ are a set of measurements containing timestamp, metric name, value, and a dimension.
metrics
True or False. Splunk, by default, automatically sets the frozen path when you create an index.
False. Frozen path is not set by default. Data is set to delete bydefault.
True or False. When hot buckets roll to warm they go to a differentdirectory.
False, Hot and warm buckets stay in the same directory by default. When hot buckets roll to warm they are renamed.
True or False. _introspectionindex tracks system performanceand Splunk resource usage data.
True
By default, Splunk ____ are stored in SPLUNK_HOME/var/lib/splunk/
indexes
For undesired events that are in an _____, you can either let the events age out normally, use the delete command to make the unwanted events not show up in searches, or run the splunkcleancommand to delete ALL events from an ____. (Note: Same answer for both blanks)
index
When there are undesired events in an index, you have one of three options. The first option is to let an event age out normally. The second option prevents “deleted” events from showing in future searches by using the ____ command. The third option permanently destroys events and is done so by using the ____ command.
delete, clean