Top 100 Splunk Interview Questions 1671145278
Top 100 Splunk Interview Questions 1671145278
Top 100 Splunk Interview Questions 1671145278
com/
1) Define Splunk
It is a software technology that is used for searching, visualizing, and monitoring machine-
generated big data. It monitors and different types of log files and stores data in Indexers.
1 / 15
https://career.guru99.com/
It is a component of Splunk Enterprise which creates and manages indexes. The primary
functions of an indexer are 1) Indexing raw data into an index and 2) Search and manage
Indexed data.
6) What are the pros of getting data into a Splunk instance using forwarders?
The advantages of getting data into Splunk via forwarders are TCP connection, bandwidth
throttling, and secure SSL connection for transferring crucial data from a forwarder to an
indexer.
License master in Splunk ensures that the right amount of data gets indexed. It ensures that the
environment remains within the limits of the purchased volume as Splunk license depends on
the data volume, which comes to the platform within a 24-hour window.
Inputs file
2 / 15
https://career.guru99.com/
Transforms file
Server file
Indexes file
Props file
It is a warning error that occurs when you exceed the data limit. This warning error will persist
for 14 days. In a commercial license, you may have 5 warnings within a 1-month rolling window
before which your Indexer search results and reports stop triggering.
However, in a free version, license violation warning shows only 3 counts of warning.
Alerts can be used when you have to monitor for and respond to specific events. For example,
sending an email notification to the user when there are more than three failed login attempts in
a 24-hour period.
Here map() function is associated with Mapper class and reduce() function is associated with a
Reducer class.
Splunk allows you to keeps track of indexed events in a fish buckets directory. It contains CRCs
and seeks pointers for the files you are indexing, so Splunk can’t if it has read them already.
Pivots are used to create the front views of your output and then choose the proper filter for a
better view of this output. Both options are beneficial for the people from a semi-technical or non-
technical background.
3 / 15
https://career.guru99.com/
Data models are most commonly used for creating a hierarchical model of data. However, it can
also be used when you have a large amount of unstructured data. It helps you make use of that
information without using complicated search queries.
Search factor determines the number of data maintained by the indexer cluster. It determines
the number of searchable copies available in the bucket.
Replication factor determines the number of copies maintained by the cluster as well as the
number of copies that each site maintains.
Lookup command is generally used when you want to get some fields from an external file. It
helps you to narrow the search results as it helps to reference fields in an external file that
match fields in your event data.
There are 5 default fields which are barcoded with every event into Splunk. They are: 1) host, 2)
source, 3) source type, 4) index, and 5) timestamp.
In order to extract fields from either sidebar, event lists or the settings menu using UI.
Another way to extract fields in Splunk is to write your regular expressions in a props
configuration file.
A summary index is a special index that stores that result calculated by Splunk. It is a fast and
cheap way to run a query over a longer period of time.
You can prevent the event from being indexed by Splunk by excluding debug messages by
putting them in the null queue. You have to keep the null queue in transforms.conf file at the
forwarder level itself.
It is a SQL database plugin which enables to import tables, rows, and columns from a database
add the database. Splunk DB connect helps in providing reliable and scalable integration
between databases and Splunk Enterprises.
4 / 15
https://career.guru99.com/
It is the directory used by Splunk enterprise to store data and indexed files into the data. These
index files contain various buckets managed by the age of the data.
The alert manager adds workflow to Splunk. The purpose of alert manager o provides a
common app with dashboards to search for alerts or events.
25) What is the difference between Index time and Search time?
Index time is a period when the data is consumed and the point when it is written to disk.
Search time take place while the search is run as events are composed by the search.
27) Name the command which is used to the "filtering results" category
The command which is used to the "filtering results" category is: "where," "Sort," "rex," and
"search."
Free license
Beta license
Search heads license
Cluster members license
Forwarder license
5 / 15
https://career.guru99.com/
Enterprise license
1) Filtering Results, 2) Sorting Results, 3) Filtering Grouping Results, 4) Adding Fields, and 5)
Reporting Results.
31) Name commands which are included in the reporting results category
Following are the commands which are included in the reporting results category:
Rare
Chart
time chart
Top
Stats
Splunk on Splunk or SOS is a Splunk app that helps you to analyze and troubleshoot Splunk
environment performance and issues.
This command searches and replaces specified field values with replacement values.
34) Name features which are not available in Splunk free version?
Distributed searching
Forwarding in HTTP or TCP
Agile statistics and reporting with Real-time architecture
Offers analysis, search, and visualization capabilities to empower users of all types.
Generate ROI faster
6 / 15
https://career.guru99.com/
A null queue is an approach to filter out unwanted incoming events sent by Splunk enterprise.
37) What is the main difference between source & source type
The source identifies as a source of the event which a particular event originates, while the
sourcetype determines how Splunk processes the incoming data stream into events according
to its nature.
It is used to combine the results of a sub search with the results of the actual search. Here the
fields must be common to each result set. You can also combine a search set of results to itself
using the selfjoin command in Splunk.
To start and stop Splunk serives use can use following commands:
[crayon-5f2d06aa14cf9548944296/]
40) Where to download Splunk Cloud?
7 / 15
https://career.guru99.com/
Time zone property provides the output for a specific time zone. Splunk takes the default time
zone from browser settings. The browser takes the current time zone from the computer
system, which is currently in use. Splunk takes that time zone when users are searching and
correlating bulk data coming from other sources.
Splunk sound unit is a plugin which allows adding info data with Splunk reports. It helps in
providing reliable and ascendible integration between relative databases and Splunk
enterprises.
You can make use of a bash script in order to install forwarder remotely.
Syslog server is used to collect data from various devices like routers and switches and
application logs from the web server. You can use R syslog or syslog NG command to configure
a Syslog server.
Use the forwarder tab available on the DMC (Distributed Management Console) to monitor the
status of forwarders and the deployment server to manage them.
Sumo logic
Loglogic
Loggy
Logstash
Key Value( KV) allows to store and obtain data inside Splunk. KV also helps you to:
8 / 15
https://career.guru99.com/
Deployer is a Splunk enterprise instant which is used to deploy apps to the cluster head. It can
also be used to configure information for app and user.
It is used when the indexes are of high volume, i.e., 10GB of data.
Regex command removes results which do not match with desired regular expression.
Output lookup command searches the result for a lookup table on the hard disk.
Hot
Warm
Cold
Frozen
Thawed
Input
Parsing
Indexing
Searching
9 / 15
https://career.guru99.com/
The first phase: It generates data and solves query from various sources.
The second phase: It uses the data to solve the query.
Third phase: it displays the answers via graph, report, or chart which is understood by
audiences.
Splunk is available in three different versions. These versions are 1) Splunk enterprise, 2)
Splunk light, 3) Splunk cloud.
Splunk cloud: Splunk Cloud is a SaaS (Software as a Service) It offers almost similar
features as the enterprise version, including APIs, SDKs, and apps.
Splunk light: Splunk light is a free version which allows, to make a report, search and
edit your log data. Splunk light version has limited functionalities and features compared
to other versions.
Cisco
Facebook
Bosch
Adobe
IBM
Walmart
Salesforce
10 / 15
https://career.guru99.com/
Search Processing Language or SLP is a language which contains functions, commands, and
arguments. It is used to get the desired output from the database.
Application Monitoring
Employee Management
Physical Security
Network Security
Yes, the search result can be used to make changes in an existing search.
List
Table
Raw
The search result can be exported into JSON, CSV, XML, and PDF.
AND: It is implied between two terms, so you do not need to write it.
OR: It determines that either one of the two arguments should be true.
11 / 15
https://career.guru99.com/
The top command is used to display the common values of a field, with their percentage and
count.
It calculates aggregate statistics over a dataset, such as count, sum, and average.
Scheduled alert: It is an alert that is based on a historical search. It runs periodically with
a set schedule.
Per result alert: This alert is based on a real time search which runs overall time.
Rolling window alert: An alert that is based on real-time search. This search is set to run
within a specific rolling time window that you define.
They are used to assign names to specific filed and value pairs. The filed can be event type,
source, source type, and host.
In order to increase the size of data storage, you can either add more space to index or add
more indexers.
There is only one difference between Splunk apps, and add-ons that is Splunk apps contains
built-in reports, configurations, and dashboards. However, Splunk add-ons contain only built-in
configurations they do not contain dashboards or reports.
12 / 15
https://career.guru99.com/
80) What is the primary difference between stats and eventstats commands
Stats command provides summary statistics of existing fields available in search output, and
then it stores them as values in new fields. On the other hand, in eventstats command
aggregation results are added so that every event only if the aggregation applies to that
particular event.
Source field is a default field that finds the data structure of an event. It determines how Splunk
formats the data while indexing.
Calculated fields are the fields which perform the calculation which the values of two fields
available in a specific event.
Abstract
Erex
Addtotals
Accum
Filldown
Typer
Rename
Anomalies
xyseries command converts the search results into a format that is suitable for graphing.
spath command is used to extract fields from structured data formats like JSON and XML.
You can create knowledge, objects, reports, and dashboards in reporting and search app.
13 / 15
https://career.guru99.com/
They are results saved from a search action that shows the visualization and statistic of a
particular event.
The dashboard is defined as a collection of views that are made of various panels.
94) How is it possible to use the host value and not IP address or the DNS name for a
TCP input?
Under stanza in the input configuration file, set the connection_host to none and mention the
host value.
It is a group of servers connected with each other. These servers are used to share
configuration, user data, and load.
It is a group of Splunk enterprise search heads that serves as a central resource for searching.
14 / 15
https://career.guru99.com/
Splunk SDKs are written on the base of Splunk REST APIs. Various languages supported by
SDKs are: 1) Java, 2) Python, 3) JavaScript, and 4) C#.
The Splunk REST API offers various processes for accessing every feature available in the
product. Your program communicates to Splunk enterprise using HTTP or HTTPS. It uses the
same protocols that any web browser uses to interact with web pages.
Splunk Enterprise Security accelerates data model provides a panel, dashboard, and correlation
search results. It uses the indexers for processing and storage. The accelerated data is stored
within each index by default.
Indexers create various files which contain two types of data: 1) Raw data and 2) metadata
index file. Both these files are used to constitute Splunk enterprise index.
15 / 15
Powered by TCPDF (www.tcpdf.org)