0% found this document useful (0 votes)
34 views

Splunk troubleshooting

Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as TXT, PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
34 views

Splunk troubleshooting

Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as TXT, PDF, TXT or read online on Scribd
You are on page 1/ 7

Question: What are common port numbers used by Splunk?

Common port numbers on which default services run are:


Service Port Number
Splunk Management Port 8089
Splunk Index Replication Port 8080
KV store 8191
Splunk Web Port 8000
Splunk Indexing Port 9997
Splunk network port 514
Question: What Are Splunk Buckets? Explain The Bucket
Lifecycle?
A directory that contains indexed data is known as a Splunk bucket. It also
contains events
of a certain period. Bucket lifecycle includes following stages:
Hot – It contains newly indexed data and is open for writing. For each index, there
are one or more hot buckets available
Warm – Data rolled from hot
Cold – Data rolled from warm
Frozen – Data rolled from cold. The indexer deletes frozen data by default but
users
can also archive it.
Thawed – Data restored from an archive. If you archive frozen data , you can later
return it to the index by thawing (defrosting) it.
Question: Explain Data Models and Pivot?
54/71
Data models are used for creating a structured hierarchical model of data. It can
be used
when you have a large amount of unstructured data, and when you want to make use of
that information without using complex search queries.
A few use cases of Data models are:
Create Sales Reports: If you have a sales report, then you can easily create the
total
number of successful purchases, below that you can create a child object containing
the list of failed purchases and other views
Set Access Levels: If you want a structured view of users and their various access
levels, you can use a data model
On the other hand with pivots, you have the flexibility to create the front views
of your
results and then pick and choose the most appropriate filter for a better view of
results.
Question: What Is File Precedence In Splunk?
File precedence is an important aspect of troubleshooting in Splunk for an
administrator,
developer, as well as an architect.
All of Splunk’s configurations are written in .conf files. There can be multiple
copies present
for each of these files, and thus it is important to know the role these files play
when a
Splunk instance is running or restarted. To determine the priority among copies of
a
configuration file, Splunk software first determines the directory scheme. The
directory
schemes are either a) Global or b) App/user. When the context is global (that is,
where
there’s no app/user context), directory priority descends in this order:
1. System local directory — highest priority
2. App local directories
3. App default directories
4. System default directory — lowest priority
When the context is app/user, directory priority descends from user to app to
system:
1. User directories for current user — highest priority
2. App directories for currently running app (local, followed by default)
3. App directories for all other apps (local, followed by default) — for exported
settings
only
4. System directories (local, followed by default) — lowest priority
Question: Difference Between Search Time And Index Time Field
Extractions?
Search time field extraction refers to the fields extracted while performing
searches.
Whereas, fields extracted when the data comes to the indexer are referred to as
Index time
field extraction.
55/71
You can set up the indexer time field extraction either at the forwarder level or
at the
indexer level.
Another difference is that Search time field extraction’s extracted fields are not
part of the
metadata, so they do not consume disk space.
Whereas index time field extraction’s extracted fields are a part of metadata and
hence
consume disk space.
Question: What Is Source Type In Splunk?
Source type is a default field which is used to identify the data structure of an
incoming
event. Source type determines how Splunk Enterprise formats the data during the
indexing
process.
Source type can be set at the forwarder level for indexer extraction to identify
different data
formats.Question: What are common port numbers used by Splunk?
Common port numbers on which default services run are:
Service Port Number
Splunk Management Port 8089
Splunk Index Replication Port 8080
KV store 8191
Splunk Web Port 8000
Splunk Indexing Port 9997
Splunk network port 514
Question: What Are Splunk Buckets? Explain The Bucket
Lifecycle?
A directory that contains indexed data is known as a Splunk bucket. It also
contains events
of a certain period. Bucket lifecycle includes following stages:
Hot – It contains newly indexed data and is open for writing. For each index, there
are one or more hot buckets available
Warm – Data rolled from hot
Cold – Data rolled from warm
Frozen – Data rolled from cold. The indexer deletes frozen data by default but
users
can also archive it.
Thawed – Data restored from an archive. If you archive frozen data , you can later
return it to the index by thawing (defrosting) it.
Question: Explain Data Models and Pivot?
54/71
Data models are used for creating a structured hierarchical model of data. It can
be used
when you have a large amount of unstructured data, and when you want to make use of
that information without using complex search queries.
A few use cases of Data models are:
Create Sales Reports: If you have a sales report, then you can easily create the
total
number of successful purchases, below that you can create a child object containing
the list of failed purchases and other views
Set Access Levels: If you want a structured view of users and their various access
levels, you can use a data model
On the other hand with pivots, you have the flexibility to create the front views
of your
results and then pick and choose the most appropriate filter for a better view of
results.
Question: What Is File Precedence In Splunk?
File precedence is an important aspect of troubleshooting in Splunk for an
administrator,
developer, as well as an architect.
All of Splunk’s configurations are written in .conf files. There can be multiple
copies present
for each of these files, and thus it is important to know the role these files play
when a
Splunk instance is running or restarted. To determine the priority among copies of
a
configuration file, Splunk software first determines the directory scheme. The
directory
schemes are either a) Global or b) App/user. When the context is global (that is,
where
there’s no app/user context), directory priority descends in this order:
1. System local directory — highest priority
2. App local directories
3. App default directories
4. System default directory — lowest priority
When the context is app/user, directory priority descends from user to app to
system:
1. User directories for current user — highest priority
2. App directories for currently running app (local, followed by default)
3. App directories for all other apps (local, followed by default) — for exported
settings
only
4. System directories (local, followed by default) — lowest priority
Question: Difference Between Search Time And Index Time Field
Extractions?
Search time field extraction refers to the fields extracted while performing
searches.
Whereas, fields extracted when the data comes to the indexer are referred to as
Index time
field extraction.
55/71
You can set up the indexer time field extraction either at the forwarder level or
at the
indexer level.
Another difference is that Search time field extraction’s extracted fields are not
part of the
metadata, so they do not consume disk space.
Whereas index time field extraction’s extracted fields are a part of metadata and
hence
consume disk space.
Question: What Is Source Type In Splunk?
Source type is a default field which is used to identify the data structure of an
incoming
event. Source type determines how Splunk Enterprise formats the data during the
indexing
process.
Source type can be set at the forwarder level for indexer extraction to identify
different data
formats.Question: What are common port numbers used by Splunk?
Common port numbers on which default services run are:
Service Port Number
Splunk Management Port 8089
Splunk Index Replication Port 8080
KV store 8191
Splunk Web Port 8000
Splunk Indexing Port 9997
Splunk network port 514
Question: What Are Splunk Buckets? Explain The Bucket
Lifecycle?
A directory that contains indexed data is known as a Splunk bucket. It also
contains events
of a certain period. Bucket lifecycle includes following stages:
Hot – It contains newly indexed data and is open for writing. For each index, there
are one or more hot buckets available
Warm – Data rolled from hot
Cold – Data rolled from warm
Frozen – Data rolled from cold. The indexer deletes frozen data by default but
users
can also archive it.
Thawed – Data restored from an archive. If you archive frozen data , you can later
return it to the index by thawing (defrosting) it.
Question: Explain Data Models and Pivot?
54/71
Data models are used for creating a structured hierarchical model of data. It can
be used
when you have a large amount of unstructured data, and when you want to make use of
that information without using complex search queries.
A few use cases of Data models are:
Create Sales Reports: If you have a sales report, then you can easily create the
total
number of successful purchases, below that you can create a child object containing
the list of failed purchases and other views
Set Access Levels: If you want a structured view of users and their various access
levels, you can use a data model
On the other hand with pivots, you have the flexibility to create the front views
of your
results and then pick and choose the most appropriate filter for a better view of
results.
Question: What Is File Precedence In Splunk?
File precedence is an important aspect of troubleshooting in Splunk for an
administrator,
developer, as well as an architect.
All of Splunk’s configurations are written in .conf files. There can be multiple
copies present
for each of these files, and thus it is important to know the role these files play
when a
Splunk instance is running or restarted. To determine the priority among copies of
a
configuration file, Splunk software first determines the directory scheme. The
directory
schemes are either a) Global or b) App/user. When the context is global (that is,
where
there’s no app/user context), directory priority descends in this order:
1. System local directory — highest priority
2. App local directories
3. App default directories
4. System default directory — lowest priority
When the context is app/user, directory priority descends from user to app to
system:
1. User directories for current user — highest priority
2. App directories for currently running app (local, followed by default)
3. App directories for all other apps (local, followed by default) — for exported
settings
only
4. System directories (local, followed by default) — lowest priority
Question: Difference Between Search Time And Index Time Field
Extractions?
Search time field extraction refers to the fields extracted while performing
searches.
Whereas, fields extracted when the data comes to the indexer are referred to as
Index time
field extraction.
55/71
You can set up the indexer time field extraction either at the forwarder level or
at the
indexer level.
Another difference is that Search time field extraction’s extracted fields are not
part of the
metadata, so they do not consume disk space.
Whereas index time field extraction’s extracted fields are a part of metadata and
hence
consume disk space.
Question: What Is Source Type In Splunk?
Source type is a default field which is used to identify the data structure of an
incoming
event. Source type determines how Splunk Enterprise formats the data during the
indexing
process.
Source type can be set at the forwarder level for indexer extraction to identify
different data
formats.Question: What are common port numbers used by Splunk?
Common port numbers on which default services run are:
Service Port Number
Splunk Management Port 8089
Splunk Index Replication Port 8080
KV store 8191
Splunk Web Port 8000
Splunk Indexing Port 9997
Splunk network port 514
Question: What Are Splunk Buckets? Explain The Bucket
Lifecycle?
A directory that contains indexed data is known as a Splunk bucket. It also
contains events
of a certain period. Bucket lifecycle includes following stages:
Hot – It contains newly indexed data and is open for writing. For each index, there
are one or more hot buckets available
Warm – Data rolled from hot
Cold – Data rolled from warm
Frozen – Data rolled from cold. The indexer deletes frozen data by default but
users
can also archive it.
Thawed – Data restored from an archive. If you archive frozen data , you can later
return it to the index by thawing (defrosting) it.
Question: Explain Data Models and Pivot?
54/71
Data models are used for creating a structured hierarchical model of data. It can
be used
when you have a large amount of unstructured data, and when you want to make use of
that information without using complex search queries.
A few use cases of Data models are:
Create Sales Reports: If you have a sales report, then you can easily create the
total
number of successful purchases, below that you can create a child object containing
the list of failed purchases and other views
Set Access Levels: If you want a structured view of users and their various access
levels, you can use a data model
On the other hand with pivots, you have the flexibility to create the front views
of your
results and then pick and choose the most appropriate filter for a better view of
results.
Question: What Is File Precedence In Splunk?
File precedence is an important aspect of troubleshooting in Splunk for an
administrator,
developer, as well as an architect.
All of Splunk’s configurations are written in .conf files. There can be multiple
copies present
for each of these files, and thus it is important to know the role these files play
when a
Splunk instance is running or restarted. To determine the priority among copies of
a
configuration file, Splunk software first determines the directory scheme. The
directory
schemes are either a) Global or b) App/user. When the context is global (that is,
where
there’s no app/user context), directory priority descends in this order:
1. System local directory — highest priority
2. App local directories
3. App default directories
4. System default directory — lowest priority
When the context is app/user, directory priority descends from user to app to
system:
1. User directories for current user — highest priority
2. App directories for currently running app (local, followed by default)
3. App directories for all other apps (local, followed by default) — for exported
settings
only
4. System directories (local, followed by default) — lowest priority
Question: Difference Between Search Time And Index Time Field
Extractions?
Search time field extraction refers to the fields extracted while performing
searches.
Whereas, fields extracted when the data comes to the indexer are referred to as
Index time
field extraction.
55/71
You can set up the indexer time field extraction either at the forwarder level or
at the
indexer level.
Another difference is that Search time field extraction’s extracted fields are not
part of the
metadata, so they do not consume disk space.
Whereas index time field extraction’s extracted fields are a part of metadata and
hence
consume disk space.
Question: What Is Source Type In Splunk?
Source type is a default field which is used to identify the data structure of an
incoming
event. Source type determines how Splunk Enterprise formats the data during the
indexing
process.
Source type can be set at the forwarder level for indexer extraction to identify
different data
formats.

You might also like