ExamGecko
Home Home / Splunk / SPLK-2002

Splunk SPLK-2002 Practice Test - Questions Answers, Page 4

Question list
Search
Search

To activate replication for an index in an indexer cluster, what attribute must be configured in indexes.conf on all peer nodes?

A.

repFactor = 0

A.

repFactor = 0

Answers
B.

replicate = 0

B.

replicate = 0

Answers
C.

repFactor = auto

C.

repFactor = auto

Answers
D.

replicate = auto

D.

replicate = auto

Answers
Suggested answer: C

Explanation:

To activate replication for an index in an indexer cluster, the repFactor attribute must be configured in indexes.conf on all peer nodes. This attribute specifies the replication factor for the index, which determines how many copies of raw data are maintained by the cluster. Setting the repFactor attribute to auto will enable replication for the index. The replicate attribute in indexes.conf is not a valid Splunk attribute. The repFactor attribute in outputs.conf and the replicate attribute in deploymentclient.conf are not related to replication for an index in an indexer cluster. For more information, seeConfigure indexes for indexer clustersin the Splunk documentation.

Which of the following clarification steps should be taken if apps are not appearing on a deployment client? (Select all that apply.)

A.

Check serverclass.conf of the deployment server.

A.

Check serverclass.conf of the deployment server.

Answers
B.

Check deploymentclient.conf of the deployment client.

B.

Check deploymentclient.conf of the deployment client.

Answers
C.

Check the content of SPLUNK_HOME/etc/apps of the deployment server.

C.

Check the content of SPLUNK_HOME/etc/apps of the deployment server.

Answers
D.

Search for relevant events in splunkd.log of the deployment server.

D.

Search for relevant events in splunkd.log of the deployment server.

Answers
Suggested answer: A, B, D

Explanation:

The following clarification steps should be taken if apps are not appearing on a deployment client:

Check serverclass.conf of the deployment server. This file defines the server classes and the apps and configurations that they should receive from the deployment server. Make sure that the deployment client belongs to the correct server class and that the server class has the desired apps and configurations.

Check deploymentclient.conf of the deployment client. This file specifies the deployment server that the deployment client contacts and the client name that it uses. Make sure that the deployment client is pointing to the correct deployment server and that the client name matches the server class criteria.

Search for relevant events in splunkd.log of the deployment server. This file contains information about the deployment server activities, such as sending apps and configurations to the deployment clients, detecting client check-ins, and logging any errors or warnings. Look for any events that indicate a problem with the deployment server or the deployment client.

Checking the content of SPLUNK_HOME/etc/apps of the deployment server is not a necessary clarification step, as this directory does not contain the apps and configurations that are distributed to the deployment clients. The apps and configurations for the deployment server are stored in SPLUNK_HOME/etc/deployment-apps. For more information, seeConfigure deployment server and clientsin the Splunk documentation.

What is the minimum reference server specification for a Splunk indexer?

A.

12 CPU cores, 12GB RAM, 800 IOPS

A.

12 CPU cores, 12GB RAM, 800 IOPS

Answers
B.

16 CPU cores, 16GB RAM, 800 IOPS

B.

16 CPU cores, 16GB RAM, 800 IOPS

Answers
C.

24 CPU cores, 16GB RAM, 1200 IOPS

C.

24 CPU cores, 16GB RAM, 1200 IOPS

Answers
D.

28 CPU cores, 32GB RAM, 1200 IOPS

D.

28 CPU cores, 32GB RAM, 1200 IOPS

Answers
Suggested answer: A

Explanation:

The minimum reference server specification for a Splunk indexer is 12 CPU cores, 12GB RAM, and 800 IOPS. This specification is based on the assumption that the indexer will handle an average indexing volume of 100GB per day, with a peak of 300GB per day, and a typical search load of 1 concurrent search per 1GB of indexing volume. The other specifications are either higher or lower than the minimum requirement. For more information, see [Reference hardware] in the Splunk documentation.

Which of the following security options must be explicitly configured (i.e. which options are not enabled by default)?

A.

Data encryption between Splunk Web and splunkd.

A.

Data encryption between Splunk Web and splunkd.

Answers
B.

Certificate authentication between forwarders and indexers.

B.

Certificate authentication between forwarders and indexers.

Answers
C.

Certificate authentication between Splunk Web and search head.

C.

Certificate authentication between Splunk Web and search head.

Answers
D.

Data encryption for distributed search between search heads and indexers.

D.

Data encryption for distributed search between search heads and indexers.

Answers
Suggested answer: B

Explanation:

The following security option must be explicitly configured, as it is not enabled by default:

Certificate authentication between forwarders and indexers. This option allows the forwarders and indexers to verify each other's identity using SSL certificates, which prevents unauthorized data transmission or spoofing attacks. This option is not enabled by default, as it requires the administrator to generate and distribute the certificates for the forwarders and indexers. For more information, see [Secure the communication between forwarders and indexers] in the Splunk documentation. The following security options are enabled by default:

Data encryption between Splunk Web and splunkd. This option encrypts the communication between the Splunk Web interface and the splunkd daemon using SSL, which prevents data interception or tampering. This option is enabled by default, as Splunk provides a self-signed certificate for this purpose. For more information, see [About securing Splunk Enterprise with SSL] in the Splunk documentation.

Certificate authentication between Splunk Web and search head. This option allows the Splunk Web interface and the search head to verify each other's identity using SSL certificates, which prevents unauthorized access or spoofing attacks. This option is enabled by default, as Splunk provides a self-signed certificate for this purpose. For more information, see [About securing Splunk Enterprise with SSL] in the Splunk documentation.

Data encryption for distributed search between search heads and indexers. This option encrypts the communication between the search heads and the indexers using SSL, which prevents data interception or tampering. This option is enabled by default, as Splunk provides a self-signed certificate for this purpose. For more information, see [Secure your distributed search environment] in the Splunk documentation.

Which of the following artifacts are included in a Splunk diag file? (Select all that apply.)

A.

OS settings.

A.

OS settings.

Answers
B.

Internal logs.

B.

Internal logs.

Answers
C.

Customer data.

C.

Customer data.

Answers
D.

Configuration files.

D.

Configuration files.

Answers
Suggested answer: B, D

Explanation:

The following artifacts are included in a Splunk diag file:

Internal logs. These are the log files that Splunk generates to record its own activities, such as splunkd.log, metrics.log, audit.log, and others. These logs can help troubleshoot Splunk issues and monitor Splunk performance.

Configuration files. These are the files that Splunk uses to configure various aspects of its operation, such as server.conf, indexes.conf, props.conf, transforms.conf, and others. These files can help understand Splunk settings and behavior. The following artifacts are not included in a Splunk diag file:

OS settings. These are the settings of the operating system that Splunk runs on, such as the kernel version, the memory size, the disk space, and others. These settings are not part of the Splunk diag file, but they can be collected separately using the diag --os option.

Customer data. These are the data that Splunk indexes and makes searchable, such as the rawdata and the tsidx files. These data are not part of the Splunk diag file, as they may contain sensitive or confidential information. For more information, seeGenerate a diagnostic snapshot of your Splunk Enterprise deploymentin the Splunk documentation.

Which command will permanently decommission a peer node operating in an indexer cluster?

A.

splunk stop -f

A.

splunk stop -f

Answers
B.

splunk offline -f

B.

splunk offline -f

Answers
C.

splunk offline --enforce-counts

C.

splunk offline --enforce-counts

Answers
D.

splunk decommission --enforce counts

D.

splunk decommission --enforce counts

Answers
Suggested answer: C

Explanation:

The splunk offline --enforce-counts command will permanently decommission a peer node operating in an indexer cluster. This command will remove the peer node from the cluster and delete its data. This command should be used when the peer node is no longer needed or is being replaced by another node. The splunk stop -f command will stop the Splunk service on the peer node, but it will not decommission it from the cluster. The splunk offline -f command will take the peer node offline, but it will not delete its data or enforce the replication and search factors. The splunk decommission --enforce-counts command is not a valid Splunk command. For more information, seeRemove a peer node from an indexer clusterin the Splunk documentation.

Which CLI command converts a Splunk instance to a license slave?

A.

splunk add licenses

A.

splunk add licenses

Answers
B.

splunk list licenser-slaves

B.

splunk list licenser-slaves

Answers
C.

splunk edit licenser-localslave

C.

splunk edit licenser-localslave

Answers
D.

splunk list licenser-localslave

D.

splunk list licenser-localslave

Answers
Suggested answer: C

Explanation:

The splunk edit licenser-localslave command is used to convert a Splunk instance to a license slave. This command will configure the Splunk instance to contact a license master and receive a license from it. This command should be used when the Splunk instance is part of a distributed deployment and needs to share a license pool with other instances. The splunk add licenses command is used to add a license to a Splunk instance, not to convert it to a license slave. The splunk list licenser-slaves command is used to list the license slaves that are connected to a license master, not to convert a Splunk instance to a license slave. The splunk list licenser-localslave command is used to list the license master that a license slave is connected to, not to convert a Splunk instance to a license slave. For more information, seeConfigure license slavesin the Splunk documentation.

Splunk Enterprise platform instrumentation refers to data that the Splunk Enterprise deployment logs in the _introspection index. Which of the following logs are included in this index? (Select all that apply.)

A.

audit.log

A.

audit.log

Answers
B.

metrics.log

B.

metrics.log

Answers
C.

disk_objects.log

C.

disk_objects.log

Answers
D.

resource_usage.log

D.

resource_usage.log

Answers
Suggested answer: C, D

Explanation:

The following logs are included in the _introspection index, which contains data that the Splunk Enterprise deployment logs for platform instrumentation:

disk_objects.log. This log contains information about the disk objects that Splunk creates and manages, such as buckets, indexes, and files. This log can help monitor the disk space usage and the bucket lifecycle.

resource_usage.log. This log contains information about the resource usage of Splunk processes, such as CPU, memory, disk, and network. This log can help monitor the Splunk performance and identify any resource bottlenecks. The following logs are not included in the _introspection index, but rather in the _internal index, which contains data that Splunk generates for internal logging:

audit.log. This log contains information about the audit events that Splunk records, such as user actions, configuration changes, and search activity. This log can help audit the Splunk operations and security.

metrics.log. This log contains information about the performance metrics that Splunk collects, such as data throughput, data latency, search concurrency, and search duration. This log can help measure the Splunk performance and efficiency. For more information, seeAbout Splunk Enterprise loggingand [About the _introspection index] in the Splunk documentation.

Which of the following can a Splunk diag contain?

A.

Search history, Splunk users and their roles, running processes, indexed data

A.

Search history, Splunk users and their roles, running processes, indexed data

Answers
B.

Server specs, current open connections, internal Splunk log files, index listings

B.

Server specs, current open connections, internal Splunk log files, index listings

Answers
C.

KV store listings, internal Splunk log files, search peer bundles listings, indexed data

C.

KV store listings, internal Splunk log files, search peer bundles listings, indexed data

Answers
D.

Splunk platform configuration details, Splunk users and their roles, current open connections, index listings

D.

Splunk platform configuration details, Splunk users and their roles, current open connections, index listings

Answers
Suggested answer: B

Explanation:

The following artifacts are included in a Splunk diag file:

Server specs. These are the specifications of the server that Splunk runs on, such as the CPU model, the memory size, the disk space, and the network interface. These specs can help understand the Splunk hardware requirements and performance.

Current open connections. These are the connections that Splunk has established with other Splunk instances or external sources, such as forwarders, indexers, search heads, license masters, deployment servers, and data inputs. These connections can help understand the Splunk network topology and communication.

Internal Splunk log files. These are the log files that Splunk generates to record its own activities, such as splunkd.log, metrics.log, audit.log, and others. These logs can help troubleshoot Splunk issues and monitor Splunk performance.

Index listings. These are the listings of the indexes that Splunk has created and configured, such as the index name, the index location, the index size, and the index attributes. These listings can help understand the Splunk data management and retention. The following artifacts are not included in a Splunk diag file:

Search history. This is the history of the searches that Splunk has executed, such as the search query, the search time, the search results, and the search user. This history is not part of the Splunk diag file, but it can be accessed from the Splunk Web interface or the audit.log file.

Splunk users and their roles. These are the users that Splunk has created and assigned roles to, such as the user name, the user password, the user role, and the user capabilities. These users and roles are not part of the Splunk diag file, but they can be accessed from the Splunk Web interface or the authentication.conf and authorize.conf files.

KV store listings. These are the listings of the KV store collections and documents that Splunk has created and stored, such as the collection name, the collection schema, the document ID, and the document fields. These listings are not part of the Splunk diag file, but they can be accessed from the Splunk Web interface or the mongod.log file.

Indexed data. These are the data that Splunk indexes and makes searchable, such as the rawdata and the tsidx files. These data are not part of the Splunk diag file, as they may contain sensitive or confidential information. For more information, seeGenerate a diagnostic snapshot of your Splunk Enterprise deploymentin the Splunk documentation.

Which of the following are true statements about Splunk indexer clustering?

A.

All peer nodes must run exactly the same Splunk version.

A.

All peer nodes must run exactly the same Splunk version.

Answers
B.

The master node must run the same or a later Splunk version than search heads.

B.

The master node must run the same or a later Splunk version than search heads.

Answers
C.

The peer nodes must run the same or a later Splunk version than the master node.

C.

The peer nodes must run the same or a later Splunk version than the master node.

Answers
D.

The search head must run the same or a later Splunk version than the peer nodes.

D.

The search head must run the same or a later Splunk version than the peer nodes.

Answers
Suggested answer: A, D

Explanation:

The following statements are true about Splunk indexer clustering:

All peer nodes must run exactly the same Splunk version. This is a requirement for indexer clustering, as different Splunk versions may have different data formats or features that are incompatible with each other. All peer nodes must run the same Splunk version as the master node and the search heads that connect to the cluster.

The search head must run the same or a later Splunk version than the peer nodes. This is a recommendation for indexer clustering, as a newer Splunk version may have new features or bug fixes that improve the search functionality or performance. The search head should not run an older Splunk version than the peer nodes, as this may cause search errors or failures. The following statements are false about Splunk indexer clustering:

The master node must run the same or a later Splunk version than the search heads. This is not a requirement or a recommendation for indexer clustering, as the master node does not participate in the search process. The master node should run the same Splunk version as the peer nodes, as this ensures the cluster compatibility and functionality.

The peer nodes must run the same or a later Splunk version than the master node. This is not a requirement or a recommendation for indexer clustering, as the peer nodes do not coordinate the cluster activities. The peer nodes should run the same Splunk version as the master node, as this ensures the cluster compatibility and functionality. For more information, see [About indexer clusters and index replication] and [Upgrade an indexer cluster] in the Splunk documentation.

Total 160 questions
Go to page: of 16