Discount Offer
Go Back on SPLK-1003 Exam
Available in 1, 3, 6 and 12 Months Free Updates Plans
PDF: $15 $60

Test Engine: $20 $80

PDF + Engine: $25 $99



Pass exam with Dumps4free or we will provide you with three additional months of access for FREE.

SPLK-1003 Practice Test


Page 10 out of 37 Pages

During search time, which directory of configuration files has the highest precedence?


A. $SFLUNK_KOME/etc/system/local


B. $SPLUNK_KCME/etc/system/default


C. $SPLUNK_HCME/etc/apps/app1/local


D. $SPLUNK HCME/etc/users/admin/local





D.
  $SPLUNK HCME/etc/users/admin/local

Explanation: Adding further clarity and quoting same Splunk reference URL from @giubal" "To keep configuration settings consistent across peer nodes, configuration files are managed from the cluster master, which pushes the files to the slave-app directories on the peer nodes. Files in the slave-app directories have the highest precedence in a cluster peer's configuration. Here is the expanded precedence order for cluster peers:

  1. Slave-app local directories -- highest priority
  2. System local directory
  3. App local directories
  4. Slave-app default directories
  5. App default directories
  6. System default directory --lowest priority

A Universal Forwarder is collecting two separate sources of data (A,B). Source A is being routed through a Heavy Forwarder and then to an indexer. Source B is being routed directly to the indexer. Both sets of data require the masking of raw text strings before being written to disk. What does the administrator need to do to ensure that the masking takes place successfully?


A. Make sure that props . conf and transforms . conf are both present on the in-dexer and the search head.


B. For source A, make sure that props . conf is in place on the indexer; and for source B, make sure transforms . conf is present on the Heavy Forwarder.


C. Make sure that props . conf and transforms . conf are both present on the Universal Forwarder.


D. Place both props . conf and transforms . conf on the Heavy Forwarder for source A, and place both props . conf and transforms . conf on the indexer for source B.





D.
  Place both props . conf and transforms . conf on the Heavy Forwarder for source A, and place both props . conf and transforms . conf on the indexer for source B.

Explanation: The correct answer is D. Place both props . conf and transforms . conf on the Heavy Forwarder for source A, and place both props . conf and transforms . conf on the indexer for source B.
According to the Splunk documentation1, to mask sensitive data from raw events, you need to use the SEDCMD attribute in the props.conf file and the REGEX attribute in the transforms.conf file. The SEDCMD attribute applies a sed expression to the raw data before indexing, while the REGEX attribute defines a regular expression to match the data to be masked.You need to place these files on the Splunk instance that parses the data, which isusually the indexer or the heavy forwarder2. The universal forwarder does not parse the data, so it does not need these files.
For source A, the data is routed through a heavy forwarder, which can parse the data before sending it to the indexer. Therefore, you need to place both props.conf and transforms.conf on the heavy forwarder for source A, so that the masking takes place before indexing.
For source B, the data is routed directly to the indexer, which parses and indexes the data.
Therefore, you need to place both props.conf and transforms.conf on the indexer for source B, so that the masking takes place before indexing.

When using a directory monitor input, specific source types can be selectively overridden using which configuration file?


A. sourcetypes . conf


B. trans forms . conf


C. outputs . conf


D. props . conf





D.
  props . conf

Explanation: When using a directory monitor input, specific source types can be selectively overridden using the props.conf file. According to the Splunk documentation1, “You can specify a source type for data based on its input and source. Specify source type for an input. You can assign the source type for data coming from a specific input, such as /var/log/. If you use Splunk Cloud Platform, use Splunk Web to define source types. If you use Splunk Enterprise, define source types in Splunk Web or by editing the inputs.conf configuration file.” However, this method is not very granular and assigns the same source type to all data from an input. To override the source type on a per-event basis, you need to use the props.conf file and the transforms.conf file2. The props.conf file contains settings that determine how the Splunk platform processes incoming data, such as how to segment events, extract fields, and assign source types2. The transforms.conf file contains settings that modify or filter event dataduring indexing or search time2. You can use these files to create rules that match specific patterns in the event data and assign different source types accordingly2. For example, you can create a rule that assigns a source type of apache_error to any event that contains the word “error” in the first line2.

In a distributed environment, which Splunk component is used to distribute apps and configurations to the other Splunk instances?


A. Indexer


B. Deployer


C. Forwarder


D. Deployment server





D.
  Deployment server

Explanation: The deployer is a Splunk Enterprise instance that you use to distribute apps and certain other configuration updates to search head cluster members. The set of updates that the deployer distributes is called the configuration bundle.

Which of the following are supported options when configuring optional network inputs?


A. Metadata override, sender filtering options, network input queues (quantum queues)


B. Metadata override, sender filtering options, network input queues (memory/persistent queues)


C. Filename override, sender filtering options, network output queues (memory/persistent queues)


D. Metadata override, receiver filtering options, network input queues (memory/persistent queues)





B.
  Metadata override, sender filtering options, network input queues (memory/persistent queues)


Page 10 out of 37 Pages
Previous