INTERVIEW PREP Flashcards
What’s minimum replication/search factor for idx cluster and sh cluster? What is replication and search factor?
sh default 2
Default ports?
8000 - web port 8191 - KV store port 8080 - Replication port (idx cluster) 8181 - search head cluster replication 9997 - receiving porg 514 - syslog port 8089 - mgmt port 8088 - hec
How to set up search head cluster, idx cluster, multisite cluster?
IDX cluster:
set up replication factor, search factor, security key, and cluster label in the server.conf of the cluster master
set up manager ip, mode, and pass4symmkey on the peer nodes and search head
SH cluster:
on the deployer set up pass4symmkey, and also label sh cluster;
initialize splunk init shcluster-config command, or use server.conf to set it up
select captain;
How to push configurations from deployers and indexer clusters?
IDX cluster: splunk validate cluster-bundle --check-restart splunk apply cluster-bundle SH clusteR: splunk apply shcluster-bundle
Where to place the configuration bundle on the deployer, DS, and CM?
$SPLUNK_HOME/etc/shcluster/apps
$SPLUNK_HOME/etc/deployment-apps
$SPLUNK_HOME/etc/master-apps/
What is the comapny name?
Symphtech
Splunk web not working and the KV store has errors how do you troubleshoot?
- see mongod.log and splunkd.log, remove mongod.lock file, see permissions for splunk.key
Architect the growth of the cluster while ensuring the
necessary storage requirements are met and retention
policies are set appropriately.
1
Schedule cronjobs using Cron Utility to automate deletion
of syslog data
1
Build syslog servers for network log management
1
Manage Logical Volume Manager (LVM)
1
Troubleshoot disk usage and memory issues on Splunk
indexers
2
Monitoring system health via Monitoring Console and
custom searches and visualizations.
2
Build custom TAs and Apps to ingest and visualize data
from various data sources
2
Review onboarded logs during last phases to ensure no PII
exist, using regex and transforms.conf
2
Manage ingestion on our license by reviewing verbose logs
for necessity of indexing; eliminating extraneous logs by
sending them to null queue or truncating logs
2
Developed 12 dashboards for Financial Board members
annual presentation
2
Built a series of Windows Security Dashboards that included
but are not limited to, Disabled AD Accounts Re-enabled,
AD password change attempts, Brute Force Attacks, Policy
Changes, Changes to Windows Firewalls, Privilege Use, etc.
2
Use advanced dashboard XML and CSS customizations to
achieve specific look on reports
2
Wrote SOPs and established runbooks to document
procedures during incidents
2
Manage the use and deployment of knowledge objects like
macros, tags, eventtypes, calculated fields, field aliases to fit
specific standards of use and avoid duplication
2
Ongoing tuning of the CIM for new data onboarding from
various branches of the organization and develop
preliminary data model searches to kick-off the utilization
of the data when handing off to Security Operations team
2
Actively working with end-users to aid in building efficient
search queries
2
Upgraded entire Splunk infrastructure in both dev and prod -
uction environments
2