Practice Free SPLK-2002 Exam Online Questions
(Which index does Splunk use to record user activities?)
- A . _internal
- B . _audit
- C . _kvstore
- D . _telemetry
B
Explanation:
Splunk Enterprise uses the _audit index to log and store all user activity and audit-related information. This includes details such as user logins, searches executed, configuration changes, role modifications, and app management actions.
The _audit index is populated by data collected from the Splunkd audit logger and records actions performed through both Splunk Web and the CLI. Each event in this index typically includes fields like user, action, info, search_id, and timestamp, allowing administrators to track activity across all Splunk users and components for security, compliance, and accountability purposes.
The _internal index, by contrast, contains operational logs such as metrics.log and scheduler.log used for system performance and health monitoring. _kvstore stores internal KV Store metadata, and _telemetry is used for optional usage data reporting to Splunk.
The _audit index is thus the authoritative source for user behavior monitoring within Splunk environments and is a key component of compliance and security auditing.
Reference (Splunk Enterprise Documentation):
• Audit Logs and the _audit Index C Monitoring User Activity
• Splunk Enterprise Security and Compliance: Tracking User Actions
• Splunk Admin Manual C Overview of Internal Indexes (_internal, _audit, _introspection)
• Splunk Audit Logging and User Access Monitoring
Which of the following is a best practice to maximize indexing performance?
- A . Use automatic source typing.
- B . Use the Splunk default settings.
- C . Not use pre-trained source types.
- D . Minimize configuration generality.
D
Explanation:
A best practice to maximize indexing performance is to minimize configuration generality. Configuration generality refers to the use of generic or default settings for data inputs, such as source type, host, index, and timestamp. Minimizing configuration generality means using specific and accurate settings for each data input, which can reduce the processing overhead and improve the indexing throughput. Using automatic source typing, using the Splunk default settings, and not using pre-trained source types are examples of configuration generality, which can negatively affect the indexing performance
Which of the following commands is used to clear the KV store?
- A . splunk clean kvstore
- B . splunk clear kvstore
- C . splunk delete kvstore
- D . splunk reinitialize kvstore
A
Explanation:
The splunk clean kvstore command is used to clear the KV store. This command will delete all the collections and documents in the KV store and reset it to an empty state. This command can be useful for troubleshooting KV store issues or resetting the KV store data. The splunk clear kvstore, splunk delete kvstore, and splunk reinitialize kvstore commands are not valid Splunk commands. For more information, see Use the CLI to manage the KV store in the Splunk documentation.
A Splunk instance has the following settings in SPLUNK_HOME/etc/system/local/server.conf:
[clustering]
mode = master
replication_factor = 2
pass4SymmKey = password123
Which of the following statements describe this Splunk instance? (Select all that apply.)
- A . This is a multi-site cluster.
- B . This cluster’s search factor is 2.
- C . This Splunk instance needs to be restarted.
- D . This instance is missing the master_uri attribute.
C,D
Explanation:
The Splunk instance with the given settings in SPLUNK_HOME/etc/system/local/server.conf is missing the master_uri attribute and needs to be restarted. The master_uri attribute is required for the master node to communicate with the peer nodes and the search head cluster. The master_uri attribute specifies the host name and port number of the master node. Without this attribute, the master node cannot function properly. The Splunk instance also needs to be restarted for the changes in the server.conf file to take effect. The replication_factor setting determines how many copies of each bucket are maintained across the peer nodes. The search factor is a separate setting that determines how many searchable copies of each bucket are maintained across the peer nodes. The search factor is not specified in the given settings, so it defaults to the same value as the replication factor, which is 2. This is not a multi-site cluster, because the site attribute is not specified in the clustering stanza. A multi-site cluster is a cluster that spans multiple geographic locations, or sites, and has different replication and search factors for each site.
In a four site indexer cluster, which configuration stores two searchable copies at the origin site, one searchable copy at site2, and a total of four searchable copies?
- A . site_search_factor = origin:2, site1:2, total:4
- B . site_search_factor = origin:2, site2:1, total:4
- C . site_replication_factor = origin:2, site1:2, total:4
- D . site_replication_factor = origin:2, site2:1, total:4
B
Explanation:
In a four site indexer cluster, the configuration that stores two searchable copies at the origin site, one searchable copy at site2, and a total of four searchable copies is site_search_factor = origin:2, site2:1, total:4. This configuration tells the cluster to maintain two copies of searchable data at the site where the data originates, one copy of searchable data at site2, and a total of four copies of searchable data across all sites. The site_search_factor determines how many copies of searchable data are maintained by the cluster for each site. The site_replication_factor determines how many copies of raw data are maintained by the cluster for each site. For more information, see Configure multisite indexer clusters with server.conf in the Splunk documentation.
Which of the following are possible causes of a crash in Splunk? (select all that apply)
- A . Incorrect ulimit settings.
- B . Insufficient disk IOPS.
- C . Insufficient memory.
- D . Running out of disk space.
A,B,C,D
Explanation:
All of the options are possible causes of a crash in Splunk. According to the Splunk documentation1,
incorrect ulimit settings can lead to file descriptor exhaustion, which can cause Splunk to crash or hang. Insufficient disk IOPS can also cause Splunk to crash or become unresponsive, as Splunk relies heavily on disk performance2. Insufficient memory can cause Splunk to run out of memory and crash, especially when running complex searches or handling large volumes of data3. Running out of disk space can cause Splunk to stop indexing data and crash, as Splunk needs enough disk space to store its data and logs4.
1: Configure ulimit settings for Splunk Enterprise
2: Troubleshoot Splunk performance issues
3: Troubleshoot memory usage
4: Troubleshoot disk space issues
A multi-site indexer cluster can be configured using which of the following? (Select all that apply.)
- A . Via Splunk Web.
- B . Directly edit SPLUNK_HOME/etc./system/local/server.conf
- C . Run a Splunk edit cluster-config command from the CLI.
- D . Directly edit SPLUNK_HOME/etc/system/default/server.conf
B,C
Explanation:
A multi-site indexer cluster can be configured by directly editing
SPLUNK_HOME/etc/system/local/server.conf or running a splunk edit cluster-config command from the CLI. These methods allow the administrator to specify the site attribute for each indexer node and the site_replication_factor and site_search_factor for the cluster. Configuring a multi-site indexer cluster via Splunk Web or directly editing SPLUNK_HOME/etc/system/default/server.conf are not supported methods. For more information, see Configure the indexer cluster with server.conf in the Splunk documentation.
A customer currently has many deployment clients being managed by a single, dedicated deployment server. The customer plans to double the number of clients.
What could be done to minimize performance issues?
- A . Modify deploymentclient. conf to change from a Pull to Push mechanism.
- B . Reduce the number of apps in the Manager Node repository.
- C . Increase the current deployment client phone home interval.
- D . Decrease the current deployment client phone home interval.
C
Explanation:
According to the Splunk documentation1, increasing the current deployment client phone home interval can minimize performance issues by reducing the frequency of communication between the clients and the deployment server. This can also reduce the network traffic and the load on the deployment server.
The other options are false because:
Modifying deploymentclient.conf to change from a Pull to Push mechanism is not possible, as Splunk does not support a Push mechanism for deployment server2.
Reducing the number of apps in the Manager Node repository will not affect the performance of the deployment server, as the apps are only downloaded when there is a change in the configuration or a new app is added3.
Decreasing the current deployment client phone home interval will increase the performance issues, as it will increase the frequency of communication between the clients and the deployment server, resulting in more network traffic and load on the deployment server1.
Other than high availability, which of the following is a benefit of search head clustering?
- A . Allows indexers to maintain multiple searchable copies of all data.
- B . Input settings are synchronized between search heads.
- C . Fewer network ports are required to be opened between search heads.
- D . Automatic replication of user knowledge objects.
D
Explanation:
According to the Splunk documentation1, one of the benefits of search head clustering is the automatic replication of user knowledge objects, such as dashboards, reports, alerts, and tags. This ensures that all cluster members have the same set of knowledge objects and can serve the same search results to the users.
The other options are false because:
Allowing indexers to maintain multiple searchable copies of all data is a benefit of indexer clustering, not search head clustering2.
Input settings are not synchronized between search heads, as search head clusters do not collect data from inputs. Data collection is done by forwarders or independent search heads3.
Fewer network ports are not required to be opened between search heads, as search head clusters use several ports for communication and replication among the members4.
When troubleshooting monitor inputs, which command checks the status of the tailed files?
- A . splunk cmd btool inputs list | tail
- B . splunk cmd btool check inputs layer
- C . curl https://serverhost:8089/services/admin/inputstatus/TailingProcessor:FileStatus
- D . curl https://serverhost:8089/services/admin/inputstatus/TailingProcessor:Tailstatus
C
Explanation:
The curl https://serverhost:8089/services/admin/inputstatus/TailingProcessor:FileStatus command is used to check the status of the tailed files when troubleshooting monitor inputs. Monitor inputs are inputs that monitor files or directories for new data and send the data to Splunk for indexing. The TailingProcessor:FileStatus endpoint returns information about the files that are being monitored by the Tailing Processor, such as the file name, path, size, position, and status. The splunk cmd btool inputs list | tail command is used to list the inputs configurations from the inputs.conf file and pipe the output to the tail command. The splunk cmd btool check inputs layer command is used to check the inputs configurations for syntax errors and layering. The curl https://serverhost:8089/services/admin/inputstatus/TailingProcessor:Tailstatus command does not exist, and it is not a valid endpoint.
