Splunk SPLK-1001: Splunk Core Certified User

0.0(0)
studied byStudied by 0 people
learnLearn
examPractice Test
spaced repetitionSpaced Repetition
heart puzzleMatch
flashcardsFlashcards
Card Sorting

1/89

flashcard set

Earn XP

Description and Tags

source: https://www.youtube.com/watch?v=-saluqaLOtI

Study Analytics
Name
Mastery
Learn
Test
Matching
Spaced

No study sessions yet.

90 Terms

1
New cards

Inline panel

A panel created when saving a search directly to a dashboard panel instead of saving as a report first

2
New cards

Search job

A process that can be stopped or paused at any point in time

3
New cards

Visualization tab

Displays time charts and bar charts in the search and reporting app

4
New cards

Selected Fields list

Always includes Source type

5
New cards

Time range specifier

Used in search bar with syntax like "earliest=-2h"

6
New cards

Splunk internal field

_raw

7
New cards

Rename command

Used with syntax "rename action as customer_action"

8
New cards

Most efficient search filter

Time

9
New cards

Top command with limit

Limits search results with syntax "top limit=5"

10
New cards

Activity menu

Shows the same events from when the original search was executed

11
New cards

Data summary

A quick comprehensive way to learn what data is present in a Splunk deployment

12
New cards

Editable report elements

Acceleration

13
New cards

Metadata field

Host is a metadata field assigned to every event in Splunk

14
New cards

Most efficient search filters

Time and index

15
New cards

Pipe character

Used before commands in search strings (e.g.

16
New cards

Report scheduling

After saving the report

17
New cards

Numeric field indicator

A hashtag symbol (#) to the left of the field name

18
New cards

Stats command functions

Count

19
New cards

Index time timestamp storage

_time field

20
New cards

Search string best practice

Include search terms at the beginning of the search string

21
New cards

Report saving

Any search can be saved as a report

22
New cards

All field options

None interesting fields

23
New cards

Interesting field

A field that appears in at least 20% of the events

24
New cards

Statistics results export formats

CSV

25
New cards

Events matching search terms

"index=security error fail" matches events containing both error AND fail

26
New cards

Search results item action

Adding the item to the search

27
New cards

Field stored in index

Source

28
New cards

Multiple dashboard creation best practice

Save the search as a report and use it in multiple dashboards as needed

29
New cards

Time range specification

"earliest=-72h@h latest=@d" looks back from 3 days ago up to the beginning of today

30
New cards

Event filtering with multiple fields

"host=www3 status=503" returns all events with host of www3 that also have a status of 503

31
New cards

Alert access permissions

Power user role contains minimum permissions required for alert write access

32
New cards

Top command with by clause

Shows top values for each specified field (e.g.

33
New cards

Splunk apps purpose

Designed for numerous use cases

34
New cards

Dashboard naming convention

GroupObjectDescription

35
New cards

Search result highlighting

Matching search terms are highlighted

36
New cards

Keyword search interactions

You can open a new search

37
New cards

Raw data transformation

Indexer transforms raw data into events and distributes results into an index

38
New cards

Stats values function

Lists unique values of a given field

39
New cards

Lookup table setup

The lookup file must be uploaded to Splunk and a lookup definition must be created

40
New cards

Lookup types

External

41
New cards

Dashboard panel modification

Can modify the chart type displayed in a dashboard panel and drag a panel to a different location

42
New cards

Command modifiers display color

Blue

43
New cards

Search results retention

Scheduling a report keeps search results longer than 7 days

44
New cards

Search best practice

Filter as early as possible

45
New cards

Report-based dashboard panel

Cannot modify the search string but can change and configure the visualization

46
New cards

Top command common constants

Show

47
New cards

Line charts characteristic

Optimal for single and multiple series

48
New cards

Event display order

In reverse chronological order

49
New cards

User account settings

Full name

50
New cards

Scheduled report primary function

Triggering an alert when certain conditions are met

51
New cards

Timeline clicking effect

Filters current search results

52
New cards

Static lookup file review command

Input lookup

53
New cards

Static lookup file display command

Input lookup command

54
New cards

Field name uniqueness indicator

The number directly to the right of the field name indicates the number of unique values for the field

55
New cards

Default search job lifetime

10 minutes

56
New cards

Rare field values search

"rare limit=15 destip" returns the 15 least common field values for the destip field

57
New cards

Alert trigger

When the results of a search meet specifically defined conditions

58
New cards

Main Splunk components

Search head

59
New cards

Field discovery at search time

Splunk automatically discovers only fields directly related to the search results

60
New cards

Index field value pair

"index=security" returns only events found in the index named Security

61
New cards

Default selected field

Host

62
New cards

Lookup creation requirements

The lookup definition must be created

63
New cards

Data origination component

Forwarder typically resides on machines where data originates

64
New cards

Scheduled report scope determination

All data accessible to the owner of the report will appear in the report

65
New cards

Boolean syntax requirement

Boolean operators must be uppercase

66
New cards

Field extraction determination

Splunk automatically discovers many fields based on source type and key/value pairs found in the data

67
New cards

Results export file format

JSON

68
New cards

Most efficient index search

"index=web OR index=sales" provides the most efficient search performance

69
New cards

Report naming best practice

Use a consistent naming convention so reports are easily separated by characteristics such as group and object

70
New cards

No index specified behavior

Events from every index to which the user has access will be returned by default

71
New cards

Statistics table drill down

Clicking on the field value in the table is the way to drill down to see underlying events

72
New cards

Alert filtering characteristics

App

73
New cards

Sort command delimiter

Comma can be used between field names in the search

74
New cards

Real-time events configuration

Real-time with "earliest=30s ago latest=now"

75
New cards

Stats count syntax

"stats count(vendor_action)"

76
New cards

Dashboard panels from reports benefit

Any change to the underlying report will affect every dashboard that utilizes that report

77
New cards

Default interesting field

Index

78
New cards

Case sensitivity rules

Field names are case sensitive

79
New cards

Rare command function

Returns the least common field values of a given field in the results

80
New cards

Alert script location

Splunk looks for scripts in $SPLUNK_HOME/bin/scripts

81
New cards

Implied Boolean operator

AND is always implied between two search terms unless otherwise specified

82
New cards

Stats distinct count function

DC(field) provides a count of how many unique values exist for a given field

83
New cards

By clause purpose with stats command

To group the results by one or more fields

84
New cards

Fields management in results

Use fields+ to add and fields- to remove

85
New cards

Adding field to sidebar

Click All Fields and select the field to add it to Selected Fields

86
New cards

Enterprise components installation

All components are installed and administered in Splunk Enterprise on-premise

87
New cards

Log filtering component

Heavy forwarders can perform log filtering or parsing

88
New cards

Default Splunk Enterprise app

Search and Reporting

89
New cards

Splunk indexing capability

Can index all firewall

90
New cards

Graffix wildcards performance

True - graffix wildcards might cause performance issues