During search time, which directory of configuration files has the highest precedence?
A. $SFLUNK_KOME/etc/system/local
B. $SPLUNK_KCME/etc/system/default
C. $SPLUNK_HCME/etc/apps/app1/local
D. $SPLUNK HCME/etc/users/admin/local
Explanation: Adding further clarity and quoting same Splunk reference URL from @giubal"
"To keep configuration settings consistent across peer nodes, configuration files are
managed from the cluster master, which pushes the files to the slave-app directories on the
peer nodes. Files in the slave-app directories have the highest precedence in a cluster
peer's configuration. Here is the expanded precedence order for cluster peers:
A Universal Forwarder is collecting two separate sources of data (A,B). Source A is being routed through a Heavy Forwarder and then to an indexer. Source B is being routed directly to the indexer. Both sets of data require the masking of raw text strings before being written to disk. What does the administrator need to do to ensure that the masking takes place successfully?
A. Make sure that props . conf and transforms . conf are both present on the in-dexer and the search head.
B. For source A, make sure that props . conf is in place on the indexer; and for source B, make sure transforms . conf is present on the Heavy Forwarder.
C. Make sure that props . conf and transforms . conf are both present on the Universal Forwarder.
D. Place both props . conf and transforms . conf on the Heavy Forwarder for source A, and place both props . conf and transforms . conf on the indexer for source B.
Explanation: The correct answer is D. Place both props . conf and transforms . conf on the
Heavy Forwarder for source A, and place both props . conf and transforms . conf on the
indexer for source B.
According to the Splunk documentation1, to mask sensitive data from raw events, you
need to use the SEDCMD attribute in the props.conf file and the REGEX attribute in the
transforms.conf file. The SEDCMD attribute applies a sed expression to the raw data
before indexing, while the REGEX attribute defines a regular expression to match the data
to be masked.You need to place these files on the Splunk instance that parses the data,
which isusually the indexer or the heavy forwarder2. The universal forwarder does not
parse the data, so it does not need these files.
For source A, the data is routed through a heavy forwarder, which can parse the data
before sending it to the indexer. Therefore, you need to place both props.conf and
transforms.conf on the heavy forwarder for source A, so that the masking takes place
before indexing.
For source B, the data is routed directly to the indexer, which parses and indexes the data.
Therefore, you need to place both props.conf and transforms.conf on the indexer for source
B, so that the masking takes place before indexing.
When using a directory monitor input, specific source types can be selectively overridden using which configuration file?
A. sourcetypes . conf
B. trans forms . conf
C. outputs . conf
D. props . conf
Explanation: When using a directory monitor input, specific source types can be selectively overridden using the props.conf file. According to the Splunk documentation1, “You can specify a source type for data based on its input and source. Specify source type for an input. You can assign the source type for data coming from a specific input, such as /var/log/. If you use Splunk Cloud Platform, use Splunk Web to define source types. If you use Splunk Enterprise, define source types in Splunk Web or by editing the inputs.conf configuration file.” However, this method is not very granular and assigns the same source type to all data from an input. To override the source type on a per-event basis, you need to use the props.conf file and the transforms.conf file2. The props.conf file contains settings that determine how the Splunk platform processes incoming data, such as how to segment events, extract fields, and assign source types2. The transforms.conf file contains settings that modify or filter event dataduring indexing or search time2. You can use these files to create rules that match specific patterns in the event data and assign different source types accordingly2. For example, you can create a rule that assigns a source type of apache_error to any event that contains the word “error” in the first line2.
In a distributed environment, which Splunk component is used to distribute apps and configurations to the other Splunk instances?
A. Indexer
B. Deployer
C. Forwarder
D. Deployment server
Explanation: The deployer is a Splunk Enterprise instance that you use to distribute apps and certain other configuration updates to search head cluster members. The set of updates that the deployer distributes is called the configuration bundle.
Which of the following are supported options when configuring optional network inputs?
A. Metadata override, sender filtering options, network input queues (quantum queues)
B. Metadata override, sender filtering options, network input queues (memory/persistent queues)
C. Filename override, sender filtering options, network output queues (memory/persistent queues)
D. Metadata override, receiver filtering options, network input queues (memory/persistent queues)
Page 10 out of 37 Pages |
Previous |