Module 4 Flashcards

(12 cards)

1
Q

name/value pairs

A

Ex: index=main, source=eventgen, sourcetype=evntgen

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

Field extractions (index time extractions)

A

Metadata field: host, source, sourcertype, index
internal field: _time, _raw
Custom fields

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

Search time extractions

A

Delimiter based
RegEx Based

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

Field Discovery

A

Splunk automatically discovers fields using key value pairs
When Fast search mode is active, this disables field discovery

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

Default selected fields

A

host, source, sourcetype

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

What are interesting fields

A

Fields that appear in atleast 20% of events

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

Where do you go when a field that isnt in atleast 20% of data

A

All fields above the selected fields

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

Syntax

A

field_name=field_value
Use “” for fields with spaces ex: “Jean Claude”
Splunk can use CIDR notation

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

Are Field names case sensitive?

A

Yes
action=addtocart (Yes)
ACTION=addtocart (no)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

Are Field values case sensitive?

A

No
action=addtocart (Yes)
action=ADDTOCART (Yes)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

Comparison Operators

A

=. !=, >, <, >=, <=

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q
A
How well did you know this?
1
Not at all
2
3
4
5
Perfectly