ExamGecko
Home Home / Splunk / SPLK-2002

Splunk SPLK-2002 Practice Test - Questions Answers, Page 2

Question list
Search
Search

What does the deployer do in a Search Head Cluster (SHC)? (Select all that apply.)

A.

Distributes apps to SHC members.

A.

Distributes apps to SHC members.

Answers
B.

Bootstraps a clean Splunk install for a SHC.

B.

Bootstraps a clean Splunk install for a SHC.

Answers
C.

Distributes non-search-related and manual configuration file changes.

C.

Distributes non-search-related and manual configuration file changes.

Answers
D.

Distributes runtime knowledge object changes made by users across the SHC.

D.

Distributes runtime knowledge object changes made by users across the SHC.

Answers
Suggested answer: A, C

Explanation:

The deployer distributes apps and non-search related and manual configuration file changes to the search head cluster members. The deployer does not bootstrap a clean Splunk install for a search head cluster, as this is done by the captain. The deployer also does not distribute runtime knowledge object changes made by users across the search head cluster, as this is done by the replication factor. For more information, seeUse the deployer to distribute apps and configuration updatesin the Splunk documentation.

When using the props.conf LINE_BREAKER attribute to delimit multi-line events, the SHOULD_LINEMERGE attribute should be set to what?

A.

Auto

A.

Auto

Answers
B.

None

B.

None

Answers
C.

True

C.

True

Answers
D.

False

D.

False

Answers
Suggested answer: D

Explanation:

When using the props.conf LINE_BREAKER attribute to delimit multi-line events, the SHOULD_LINEMERGE attribute should be set to false. This tells Splunk not to merge events that have been broken by the LINE_BREAKER. Setting the SHOULD_LINEMERGE attribute to true, auto, or none will cause Splunk to ignore the LINE_BREAKER and merge events based on other criteria. For more information, seeConfigure event line breakingin the Splunk documentation.

Which of the following should be included in a deployment plan?

A.

Business continuity and disaster recovery plans.

A.

Business continuity and disaster recovery plans.

Answers
B.

Current logging details and data source inventory.

B.

Current logging details and data source inventory.

Answers
C.

Current and future topology diagrams of the IT environment.

C.

Current and future topology diagrams of the IT environment.

Answers
D.

A comprehensive list of stakeholders, either direct or indirect.

D.

A comprehensive list of stakeholders, either direct or indirect.

Answers
Suggested answer: A, B, C

Explanation:

A deployment plan should include business continuity and disaster recovery plans, current logging details and data source inventory, and current and future topology diagrams of the IT environment. These elements are essential for planning, designing, and implementing a Splunk deployment that meets the business and technical requirements. A comprehensive list of stakeholders, either direct or indirect, is not part of the deployment plan, but rather part of the project charter. For more information, seeDeployment planningin the Splunk documentation.

A multi-site indexer cluster can be configured using which of the following? (Select all that apply.)

A.

Via Splunk Web.

A.

Via Splunk Web.

Answers
B.

Directly edit SPLUNK_HOME/etc./system/local/server.conf

B.

Directly edit SPLUNK_HOME/etc./system/local/server.conf

Answers
C.

Run a Splunk edit cluster-config command from the CLI.

C.

Run a Splunk edit cluster-config command from the CLI.

Answers
D.

Directly edit SPLUNK_HOME/etc/system/default/server.conf

D.

Directly edit SPLUNK_HOME/etc/system/default/server.conf

Answers
Suggested answer: B, C

Explanation:

A multi-site indexer cluster can be configured by directly editing SPLUNK_HOME/etc/system/local/server.conf or running a splunk edit cluster-config command from the CLI. These methods allow the administrator to specify the site attribute for each indexer node and the site_replication_factor and site_search_factor for the cluster. Configuring a multi-site indexer cluster via Splunk Web or directly editing SPLUNK_HOME/etc/system/default/server.conf are not supported methods. For more information, seeConfigure the indexer cluster with server.confin the Splunk documentation.

Which index-time props.conf attributes impact indexing performance? (Select all that apply.)

A.

REPORT

A.

REPORT

Answers
B.

LINE_BREAKER

B.

LINE_BREAKER

Answers
C.

ANNOTATE_PUNCT

C.

ANNOTATE_PUNCT

Answers
D.

SHOULD_LINEMERGE

D.

SHOULD_LINEMERGE

Answers
Suggested answer: B, D

Explanation:

The index-time props.conf attributes that impact indexing performance are LINE_BREAKER and SHOULD_LINEMERGE. These attributes determine how Splunk breaks the incoming data into events and whether it merges multiple events into one. These operations can affect the indexing speed and the disk space consumption. The REPORT attribute does not impact indexing performance, as it is used to apply transforms at search time. The ANNOTATE_PUNCT attribute does not impact indexing performance, as it is used to add punctuation metadata to events at search time. For more information, see [About props.conf and transforms.conf] in the Splunk documentation.

Which of the following are client filters available in serverclass.conf? (Select all that apply.)

A.

DNS name.

A.

DNS name.

Answers
B.

IP address.

B.

IP address.

Answers
C.

Splunk server role.

C.

Splunk server role.

Answers
D.

Platform (machine type).

D.

Platform (machine type).

Answers
Suggested answer: A, B, D

Explanation:

The client filters available in serverclass.conf are DNS name, IP address, and platform (machine type). These filters allow the administrator to specify which forwarders belong to a server class and receive the apps and configurations from the deployment server. The Splunk server role is not a valid client filter in serverclass.conf, as it is not a property of the forwarder. For more information, see [Use forwarder management filters] in the Splunk documentation.

What log file would you search to verify if you suspect there is a problem interpreting a regular expression in a monitor stanza?

A.

btool.log

A.

btool.log

Answers
B.

metrics.log

B.

metrics.log

Answers
C.

splunkd.log

C.

splunkd.log

Answers
D.

tailing_processor.log

D.

tailing_processor.log

Answers
Suggested answer: D

Explanation:

The tailing_processor.log file would be the best place to search if you suspect there is a problem interpreting a regular expression in a monitor stanza. This log file contains information about how Splunk monitors files and directories, including any errors or warnings related to parsing the monitor stanza. The splunkd.log file contains general information about the Splunk daemon, but it may not have the specific details about the monitor stanza. The btool.log file contains information about the configuration files, but it does not log the runtime behavior of the monitor stanza. The metrics.log file contains information about the performance metrics of Splunk, but it does not log the event breaking issues. For more information, seeAbout Splunk Enterprise loggingin the Splunk documentation.

Which Splunk tool offers a health check for administrators to evaluate the health of their Splunk deployment?

A.

btool

A.

btool

Answers
B.

DiagGen

B.

DiagGen

Answers
C.

SPL Clinic

C.

SPL Clinic

Answers
D.

Monitoring Console

D.

Monitoring Console

Answers
Suggested answer: D

Explanation:

The Monitoring Console is the Splunk tool that offers a health check for administrators to evaluate the health of their Splunk deployment. The Monitoring Console provides dashboards and alerts that show the status and performance of various Splunk components, such as indexers, search heads, forwarders, license usage, and search activity. The Monitoring Console can also run health checks on the deployment and identify any issues or recommendations. The btool is a command-line tool that shows the effective settings of the configuration files, but it does not offer a health check. The DiagGen is a tool that generates diagnostic snapshots of the Splunk environment, but it does not offer a health check. The SPL Clinic is a tool that analyzes and optimizes SPL queries, but it does not offer a health check. For more information, seeAbout the Monitoring Consolein the Splunk documentation.

In a four site indexer cluster, which configuration stores two searchable copies at the origin site, one searchable copy at site2, and a total of four searchable copies?

A.

site_search_factor = origin:2, site1:2, total:4

A.

site_search_factor = origin:2, site1:2, total:4

Answers
B.

site_search_factor = origin:2, site2:1, total:4

B.

site_search_factor = origin:2, site2:1, total:4

Answers
C.

site_replication_factor = origin:2, site1:2, total:4

C.

site_replication_factor = origin:2, site1:2, total:4

Answers
D.

site_replication_factor = origin:2, site2:1, total:4

D.

site_replication_factor = origin:2, site2:1, total:4

Answers
Suggested answer: B

Explanation:

In a four site indexer cluster, the configuration that stores two searchable copies at the origin site, one searchable copy at site2, and a total of four searchable copies is site_search_factor = origin:2, site2:1, total:4. This configuration tells the cluster to maintain two copies of searchable data at the site where the data originates, one copy of searchable data at site2, and a total of four copies of searchable data across all sites. The site_search_factor determines how many copies of searchable data are maintained by the cluster for each site. The site_replication_factor determines how many copies of raw data are maintained by the cluster for each site. For more information, seeConfigure multisite indexer clusters with server.confin the Splunk documentation.

Which of the following is true regarding Splunk Enterprise's performance? (Select all that apply.)

A.

Adding search peers increases the maximum size of search results.

A.

Adding search peers increases the maximum size of search results.

Answers
B.

Adding RAM to existing search heads provides additional search capacity.

B.

Adding RAM to existing search heads provides additional search capacity.

Answers
C.

Adding search peers increases the search throughput as the search load increases.

C.

Adding search peers increases the search throughput as the search load increases.

Answers
D.

Adding search heads provides additional CPU cores to run more concurrent searches.

D.

Adding search heads provides additional CPU cores to run more concurrent searches.

Answers
Suggested answer: C, D

Explanation:

The following statements are true regarding Splunk Enterprise performance:

Adding search peers increases the search throughput as search load increases. This is because adding more search peers distributes the search workload across more indexers, which reduces the load on each indexer and improves the search speed and concurrency.

Adding search heads provides additional CPU cores to run more concurrent searches. This is because adding more search heads increases the number of search processes that can run in parallel, which improves the search performance and scalability. The following statements are false regarding Splunk Enterprise performance:

Adding search peers does not increase the maximum size of search results. The maximum size of search results is determined by the maxresultrows setting in the limits.conf file, which is independent of the number of search peers.

Adding RAM to an existing search head does not provide additional search capacity. The search capacity of a search head is determined by the number of CPU cores, not the amount of RAM. Adding RAM to a search head may improve the search performance, but not the search capacity. For more information, seeSplunk Enterprise performancein the Splunk documentation.

Total 160 questions
Go to page: of 16