SPLK-1002: Splunk Core Certified Power User
Related questions
Which are valid ways to create an event type? (select all that apply)
Event types are custom categories of events that are based on search criteria. Event types can be used to label events with meaningful names, such as error, success, login, logout, etc. Event types can also be used to create transactions, alerts, reports, dashboards, etc. Event types can be created in two ways:
By going to the Settings menu and clicking Event Types > New. This will open a form where you can enter the name, description, search string, app context, and tags for the event type.
By selecting an event in search results and clicking Event Actions > Build Event Type. This will open a dialog box where you can enter the name and description for the event type. The search string will be automatically populated based on the selected event.
Event types cannot be created by using the searchtypes command in the search bar, as this command does not exist in Splunk. Event types can also be created by editing the event_type stanza in the transforms.conf file, not the props.conf file.
The fields sidebar does not show________. (Select all that apply.)
The fields sidebar is a panel that shows the fields that are present in your search results2.The fields sidebar does not show all extracted fields, which are fields that are extracted from your raw data using various methods such as regular expressions, delimiters or key-value pairs2.The fields sidebar only shows selected fields and interesting fields2.Selected fields are fields that you choose to display in your search results by clicking on them in the fields sidebar or by using the fields command2.Interesting fields are fields that appear in at least 20 percent of events or have high variability among values2. Therefore, option C is correct, while options A and B are incorrect because they are types of fields that the fields sidebar does show.
Which syntax is used to represent an argument in a macro definition?
A Splunk app is configured to extract domain names in web service logs and specify them as a field named domain.
What workflow action would return an external IP lookup for the field named domain?
Which of the following statements best describes a macro?
This is what Splunk uses to categorize the data that is being indexed.
When using timechart, how many fields can be listed after a by clause?
The timechart command is used to create a time-series chart of statistical values based on your search results2.You can use the timechart command with a by clause to split the results by one or more fields and create multiple series in the chart2.However, you can only list one field after the by clause when using the timechart command because _time is already implied as the x-axis of the chart2. Therefore, option B is correct, while options A, C and D are incorrect.
What are the two parts of a root event dataset?
A root event dataset is the base dataset for a data model that defines the source or sources of the data and the constraints and fields that apply to the data1.A root event dataset has two parts: constraints and fields1.Constraints are filters that limit the data to a specific index, source, sourcetype, host or search string1.Fields are the attributes that describe the data and can be extracted, calculated or looked up1. Therefore, option C is correct, while options A, B and D are incorrect.
Which tool uses data models to generate reports and dashboard panels without using SPL?
Use this command to use lookup fields in a search and see the lookup fields in the field sidebar.
Question