What type of data is counted against the Enterprise license at a fixed 150 bytes per event?
A. License data
B. Metricsdata
C. Internal Splunk data
D. Internal Windows logs
Which of the following are methods for adding inputs in Splunk? (select all that apply)
A. CLI
B. Splunk Web
C. Editing inputs. conf
D. Editing monitor. conf
Explanation:
https://docs.splunk.com/Documentation/Splunk/8.2.2/Data/Configureyourinputs
Add your data to Splunk Enterprise. With Splunk Enterprise, you can add data using Splunk Web or Splunk Apps. In addition to these methods, you also can use the following methods. -The Splunk Command Line Interface (CLI) -The inputs.conf configuration file. When you specify your inputs with Splunk Web or the CLI, the details are saved in a configuartion file on Splunk Enterprise indexer and heavy forwarder instances.
Which layers are involved in Splunk configuration file layering? (select all that apply)
A. App context
B. User context
C. Global context
D. Forwarder context
Explanation:
https://docs.splunk.com/Documentation/Splunk/latest/Admin/Wheretofindtheconfigurationfiles
To determine the order of directories for evaluating configuration file precedence, Splunk software considers each file's context. Configuration files operate in either a global context or in the context of the current app and user: Global. Activities like indexing take place in a global context. They are independent of any app or user.
For example, configuration files that determine monitoring or indexing behavior occur outside of the app and user context and are global in nature. App/user. Some activities, like searching, take place in an app or user context. The app and user context is vital to search-time processing, where certain knowledge objects or actions might be valid only for specific users in specific apps.
In a customer managed Splunk Enterprise environment, what is the endpoint URI used to collect data?
A. services/ collector
B. services/ inputs ? raw
C. services/ data/ collector
D. data/ collector
Explanation:
The answer to your question is C. services/data/collector. This is the endpoint URI used to collect data in a customer managed Splunk Enterprise environment. According to the Splunk documentation1, “The HTTP Event Collector REST API endpoint is /services/data/collector. You can use this endpoint to send events to HTTP Event Collector on a Splunk Enterprise or Splunk Cloud Platform deployment.” You can also use this endpoint to send events to a specific token or index1. For example, you can use the following curl command to send an event with the token 578254cc-05f5-46b5-957b-910d1400341a and the index main:
curl -k https://localhost:8088/services/data/collector -H 'Authorization: Splunk 578254cc-05f5-46b5-957b-910d1400341a' -d '{"index":"main","event":"Hello, world!"}'
A log file contains 193 days worth of timestamped events. Which monitor stanza would be used to collect data 45 days old and newer from that log file?
A. followTail = -45d
B. ignore = 45d
C. includeNewerThan = -35d
D. ignoreOlderThan = 45d
Explanation:
Reference:
[https://docs.splunk.com/Documentation/Splunk/8.2.1/Data/Configuretimestamprecognition, ]
Page 4 out of 37 Pages |
Previous |