ExamGecko
Home Home / Splunk / SPLK-1002

Splunk SPLK-1002 Practice Test - Questions Answers, Page 21

Question list
Search
Search

Which of the following examples would use a POST workflow action?

A.
Perform an external IP lookup based on a domain value found in events.
A.
Perform an external IP lookup based on a domain value found in events.
Answers
B.
Use the field values in an HTTP error event to create a new ticket in an external system.
B.
Use the field values in an HTTP error event to create a new ticket in an external system.
Answers
C.
Launch secondary Splunk searches that use one or more field values from selected events.
C.
Launch secondary Splunk searches that use one or more field values from selected events.
Answers
D.
Open a web browser to look up an HTTP status code.
D.
Open a web browser to look up an HTTP status code.
Answers
Suggested answer: B

Explanation:

The correct answer is B. Use the field values in an HTTP error event to create a new ticket in an external system.

A workflow action is a knowledge object that enables a variety of interactions between fields in events and other web resources. Workflow actions can create HTML links, generate HTTP POST requests, or launch secondary searches based on field values1.

There are three types of workflow actions that can be set up using Splunk Web: GET, POST, and Search2.

GET workflow actions create typical HTML links to do things like perform Google searches on specific values or run domain name queries against external WHOIS databases2.

POST workflow actions generate an HTTP POST request to a specified URI. This action type enables you to do things like creating entries in external issue management systems using a set of relevant field values2.

Search workflow actions launch secondary searches that use specific field values from an event, such as a search that looks for the occurrence of specific combinations of ipaddress and http_status field values in your index over a specific time range2.

Therefore, the example that would use a POST workflow action is B. Use the field values in an HTTP error event to create a new ticket in an external system. This example requires sending an HTTP POST request to the URI of the external system with the field values from the event as arguments.

The other examples would use different types of workflow actions. These examples are:

A) Perform an external IP lookup based on a domain value found in events: This example would use a GET workflow action to create a link to an external IP lookup service with the domain value as a parameter.

C) Launch secondary Splunk searches that use one or more field values from selected events: This example would use a Search workflow action to run another Splunk search with the field values from the event as search terms.

D) Open a web browser to look up an HTTP status code: This example would also use a GET workflow action to create a link to a web page that explains the meaning of the HTTP status code.

Splexicon:Workflowaction

About workflow actions in Splunk Web

Which field will be used to populate the field if the productName and product:d fields have values for a given event?

A.
| eval productINFO=coalesco(productName,productid)
A.
| eval productINFO=coalesco(productName,productid)
Answers
B.
Both field values will be used and the product INFO field will become a multivalue field for the given event.
B.
Both field values will be used and the product INFO field will become a multivalue field for the given event.
Answers
C.
The value for the productName field because it appears first.
C.
The value for the productName field because it appears first.
Answers
D.
Neither field value will be used and the field will be assigned a NULL value for the given event.
D.
Neither field value will be used and the field will be assigned a NULL value for the given event.
Answers
E.
The value for the field because it appears second.
E.
The value for the field because it appears second.
Answers
Suggested answer: B

Explanation:

The correct answer is B. The value for the productName field because it appears first.

The coalesce function is an eval function that takes an arbitrary number of arguments and returns the first value that is not null. A null value means that the field has no value at all, while an empty value means that the field has a value, but it is '''' or zero-length1.

The coalesce function can be used to combine fields that have different names but represent the same data, such as IP address or user name. The coalesce function can also be used to rename fields for clarity or convenience2.

The syntax for the coalesce function is:

coalesce(<field1>,<field2>,...)

The coalesce function will return the value of the first field that is not null in the argument list. If all fields are null, the coalesce function will return null.

For example, if you have a set of events where the IP address is extracted to either clientip or ipaddress, you can use the coalesce function to define a new field called ip, that takes the value of either clientip or ipaddress, depending on which is not null:

| eval ip=coalesce(clientip,ipaddress)

In your example, you have a set of events where the product name is extracted to either productName or productid, and you use the coalesce function to define a new field called productINFO, that takes the value of either productName or productid, depending on which is not null:

| eval productINFO=coalesce(productName,productid)

If both productName and productid fields have values for a given event, the coalesce function will return the value of the productName field because it appears first in the argument list. The productid field will be ignored by the coalesce function.

Therefore, the value for the productName field will be used to populate the productINFO field if both fields have values for a given event.

Search Command> Coalesce

USAGE OF SPLUNK EVAL FUNCTION : COALESCE

Which of the following statements would help a user choose between the transaction and stats commands?

A.
state can only group events using IP addresses.
A.
state can only group events using IP addresses.
Answers
B.
The transaction command is faster and more efficient.
B.
The transaction command is faster and more efficient.
Answers
C.
There is a 1000 event limitation with the transaction command.
C.
There is a 1000 event limitation with the transaction command.
Answers
D.
Use state when the events need to be viewed as a single event.
D.
Use state when the events need to be viewed as a single event.
Answers
Suggested answer: C

Explanation:

One of the statements that would help a user choose between the transaction and stats commands is that there is a 1000 event limitation with the transaction command3.The transaction command is used to group events that share a common value for one or more fields into transactions3.The transaction command has a default limit of 1000 events per transaction, which means that it will not group more than 1000 events into a single transaction3.This limit can be changed by using the maxevents parameter, but it can affect the performance and memory usage of Splunk3. Therefore, option C is correct, while options A, B and D are incorrect because they are not statements that would help a user choose between the transaction and stats commands.

When can a pipe follow a macro?

A.
A pipe may always follow a macro.
A.
A pipe may always follow a macro.
Answers
B.
The current user must own the macro.
B.
The current user must own the macro.
Answers
C.
The macro must be defined in the current app.
C.
The macro must be defined in the current app.
Answers
D.
Only when sharing is set to global for the macro.
D.
Only when sharing is set to global for the macro.
Answers
Suggested answer: A

Explanation:

A macro is a way to save a segment of a search string as a variable and reuse it in other searches2.A macro can be followed by a pipe, which is a symbol that separates commands in a search pipeline2.A pipe may always follow a macro, regardless of who owns the macro, where the macro is defined or how the macro is shared2.For example, if you have a macro called us_sales that returns events from the US region, you can use it in a search like this:us_sales | stats sum(price) by product2.This search will use the macro to filter the events and then calculate the total price for each product2. Therefore, option A is correct, while options B, C and D are incorrect because they are not conditions that affect whether a pipe can follow a macro.

Which of the following statements describes the use of the Filed Extractor (FX)?

A.
The Field Extractor automatically extracts all field at search time.
A.
The Field Extractor automatically extracts all field at search time.
Answers
B.
The Field Extractor uses PERL to extract field from the raw events.
B.
The Field Extractor uses PERL to extract field from the raw events.
Answers
C.
Field extracted using the Extracted persist as knowledge objects.
C.
Field extracted using the Extracted persist as knowledge objects.
Answers
D.
Fields extracted using the Field Extractor do not persist and must be defined for each search.
D.
Fields extracted using the Field Extractor do not persist and must be defined for each search.
Answers
Suggested answer: C

Explanation:

The Field Extractor (FX) is a tool that helps you extract fields from your events using a graphical interface or by manually editing the regular expression2.The FX allows you to create field extractions that persist as knowledge objects, which are entities that you create to add knowledge to your data and make it easier to search and analyze2.Field extractions are methods that extract fields from your raw data using various techniques such as regular expressions, delimiters or key-value pairs2.When you create a field extraction using the FX, you can save it as a knowledge object that applies to your data at search time2.You can also manage and share your field extractions with other users in your organization2. Therefore, option C is correct, while options A, B and D are incorrect because they do not describe the use of the FX.

Which of the following searches would return a report of sales by product-name?

A.
chart sales by product_name
A.
chart sales by product_name
Answers
B.
chart sum(price) as sales by product_name
B.
chart sum(price) as sales by product_name
Answers
C.
stats sum(price) as sales over product_name
C.
stats sum(price) as sales over product_name
Answers
D.
timechart list(sales), values(product_name)
D.
timechart list(sales), values(product_name)
Answers
Suggested answer: B

Explanation:

https://docs.splunk.com/Documentation/Splunk/8.1.0/SearchReference/Chart

https://docs.splunk.com/Documentation/Splunk/8.1.0/SearchReference/Stats

A data model consists of which three types of datasets?

A.
Constraint, field, value.
A.
Constraint, field, value.
Answers
B.
Events, searches, transactions.
B.
Events, searches, transactions.
Answers
C.
Field extraction, regex, delimited.
C.
Field extraction, regex, delimited.
Answers
D.
Transaction, session ID, metadata.
D.
Transaction, session ID, metadata.
Answers
Suggested answer: B

Explanation:

The building block of adata model. Each data model is composed of one or more data model datasets. Each dataset within a data model defines a subset of the dataset represented by the data model as a whole.

Data model datasets have a hierarchical relationship with each other, meaning they have parent-child relationships. Data models can contain multiple dataset hierarchies. There are three types of dataset hierarchies: event, search, and transaction.

https://docs.splunk.com/Splexicon:Datamodeldataset

Which workflow uses field values to perform a secondary search?

A.
POST
A.
POST
Answers
B.
Action
B.
Action
Answers
C.
Search
C.
Search
Answers
D.
Sub-Search
D.
Sub-Search
Answers
Suggested answer: C

Explanation:

https://docs.splunk.com/Documentation/Splunk/8.0.2/Knowledge/CreateworkflowactionsinSplunkWeb

When using the transaction command, what does the argument maxspan do?

A.
Sets the maximum total time between events in a transaction.
A.
Sets the maximum total time between events in a transaction.
Answers
B.
Sets the maximum length of all events within a transaction.
B.
Sets the maximum length of all events within a transaction.
Answers
C.
Sets the maximum total time between the earliest and latest events in a transaction.
C.
Sets the maximum total time between the earliest and latest events in a transaction.
Answers
D.
Sets the maximum length that any single event can reach to be included in the transaction.
D.
Sets the maximum length that any single event can reach to be included in the transaction.
Answers
Suggested answer: C

In most large Splunk environments, what is the most efficient command that can be used to group events by fields/

A.
join
A.
join
Answers
B.
stats
B.
stats
Answers
C.
streamstats
C.
streamstats
Answers
D.
transaction
D.
transaction
Answers
Suggested answer: B

Explanation:

https://docs.splunk.com/Documentation/Splunk/8.0.2/Search/Abouttransactions

In other cases, it's usually better to use thestatscommand, which performs more efficiently, especially in a distributed environment. Often there is a unique ID in the events andstatscan be used.

Total 291 questions
Go to page: of 30