Splunk SPLK-2002 Splunk Enterprise Certified Architect Exam Practice Test

Page: 1 / 14
Total 160 questions
Question 1

Which instance can not share functionality with the deployer?



Question 2
Question 3

Data for which of the following indexes will count against an ingest-based license?



Answer : B

Splunk Enterprise licensing is based on the amount of data that is ingested and indexed by the Splunk platform per day1.The data that counts against the license is the data that is stored in the indexes that are visible to the users and searchable by the Splunk software2.The indexes that are visible and searchable by default are the main index and any custom indexes that are created by the users or the apps3.The main index is the default index where Splunk Enterprise stores all data, unless otherwise specified4.

Option B is the correct answer because the data for the main index will count against the ingest-based license, as it is a visible and searchable index by default. Option A is incorrect because the summary index is a special type of index that stores the results of scheduled reports or accelerated data models, which do not count against the license. Option C is incorrect because the _metrics index is an internal index that stores metrics data about the Splunk platform performance, which does not count against the license. Option D is incorrect because the _introspection index is another internal index that stores data about the impact of the Splunk software on the host system, such as CPU, memory, disk, and network usage, which does not count against the license.


1:How Splunk Enterprise licensing works - Splunk Documentation2:What data counts against my license? - Splunk Documentation3: [About indexes and indexers - Splunk Documentation]4: [The main index - Splunk Documentation] : [Summary indexing - Splunk Documentation] : [About metrics indexes - Splunk Documentation] : [About the Monitoring Console - Splunk Documentation]

Question 4

Which part of the deployment plan is vital prior to installing Splunk indexer clusters and search head clusters?



Answer : C

According to the Splunk documentation1, the Splunk deployment topology is the part of the deployment plan that is vital prior to installing Splunk indexer clusters and search head clusters. The deployment topology defines the number and type of Splunk components, such as forwarders, indexers, search heads, and deployers, that you need to install and configure for your distributed deployment.The deployment topology also determines the network and hardware requirements, the data flow and replication, the high availability and disaster recovery options, and the security and performance considerations for your deployment2. The other options are false because:

Data source inventory is not the part of the deployment plan that is vital prior to installing Splunk indexer clusters and search head clusters, as it is a preliminary step that helps you identify the types, formats, locations, and volumes of data that you want to collect and analyze with Splunk.Data source inventory is important for planning your data ingestion and retention strategies, but it does not directly affect the installation and configuration of Splunk components3.

Data policy definitions are not the part of the deployment plan that is vital prior to installing Splunk indexer clusters and search head clusters, as they are the rules and guidelines that govern how you handle, store, and protect your data.Data policy definitions are important for ensuring data quality, security, and compliance, but they do not directly affect the installation and configuration of Splunk components4.

Education and training plans are not the part of the deployment plan that is vital prior to installing Splunk indexer clusters and search head clusters, as they are the learning resources and programs that help you and your team acquire the skills and knowledge to use Splunk effectively.Education and training plans are important for enhancing your Splunk proficiency and productivity, but they do not directly affect the installation and configuration of Splunk components5.


Question 5

When using ingest-based licensing, what Splunk role requires the license manager to scale?



Answer : C

When using ingest-based licensing, there are no Splunk roles that require the license manager to scale, because the license manager does not need to handle any additional load or complexity. Ingest-based licensing is a new licensing model that allows customers to pay for the data they ingest into Splunk, regardless of the data source, volume, or use case. Ingest-based licensing simplifies the licensing process and eliminates the need for license pools, license stacks, license slaves, and license warnings. The license manager is still responsible for enforcing the license quota and generating license usage reports, but it does not need to communicate with any other Splunk instances or monitor their license usage. Therefore, option C is the correct answer. Option A is incorrect because search peers are indexers that participate in a distributed search. They do not affect the license manager's scalability, because they do not report their license usage to the license manager. Option B is incorrect because search heads are Splunk instances that coordinate searches across multiple indexers. They do not affect the license manager's scalability, because they do not report their license usage to the license manager. Option D is incorrect because deployment clients are Splunk instances that receive configuration updates and apps from a deployment server.They do not affect the license manager's scalability, because they do not report their license usage to the license manager12

1: https://docs.splunk.com/Documentation/Splunk/9.1.2/Admin/AboutSplunklicensing2: https://docs.splunk.com/Documentation/Splunk/9.1.2/Admin/HowSplunklicensingworks


Question 6

Which of the following is a valid use case that a search head cluster addresses?



Question 7

Several critical searches that were functioning correctly yesterday are not finding a lookup table today. Which log file would be the best place to start troubleshooting?



Answer : B

A lookup table is a file that contains a list of values that can be used to enrich or modify the data during search time1.Lookup tables can be stored in CSV files or in the KV Store1. Troubleshooting lookup tables involves identifying and resolving issues that prevent the lookup tables from being accessed, updated, or applied correctly by the Splunk searches. Some of the tools and methods that can help with troubleshooting lookup tables are:

web_access.log: This is a file that contains information about the HTTP requests and responses that occur between the Splunk web server and the clients2.This file can help troubleshoot issues related to lookup table permissions, availability, and errors, such as 404 Not Found, 403 Forbidden, or 500 Internal Server Error34.

btool output: This is a command-line tool that displays the effective configuration settings for a given Splunk component, such as inputs, outputs, indexes, props, and so on5.This tool can help troubleshoot issues related to lookup table definitions, locations, and precedence, as well as identify the source of a configuration setting6.

search.log: This is a file that contains detailed information about the execution of a search, such as the search pipeline, the search commands, the search results, the search errors, and the search performance. This file can help troubleshoot issues related to lookup table commands, arguments, fields, and outputs, such as lookup, inputlookup, outputlookup, lookup_editor, and so on .

Option B is the correct answer because web_access.log is the best place to start troubleshooting lookup table issues, as it can provide the most relevant and immediate information about the lookup table access and status. Option A is incorrect because btool output is not a log file, but a command-line tool. Option C is incorrect because health.log is a file that contains information about the health of the Splunk components, such as the indexer cluster, the search head cluster, the license master, and the deployment server. This file can help troubleshoot issues related to Splunk deployment health, but not necessarily related to lookup tables. Option D is incorrect because configuration_change.log is a file that contains information about the changes made to the Splunk configuration files, such as the user, the time, the file, and the action. This file can help troubleshoot issues related to Splunk configuration changes, but not necessarily related to lookup tables.


1:About lookups - Splunk Documentation2:web_access.log - Splunk Documentation3:Troubleshoot lookups to the Splunk Enterprise KV Store4:Troubleshoot lookups in Splunk Enterprise Security - Splunk Documentation5:Use btool to troubleshoot configurations - Splunk Documentation6:Troubleshoot configuration issues - Splunk Documentation:Use the search.log file - Splunk Documentation:Troubleshoot search-time field extraction - Splunk Documentation: [Troubleshoot lookups - Splunk Documentation] : [health.log - Splunk Documentation] : [configuration_change.log - Splunk Documentation]

Page:    1 / 14   
Total 160 questions