Splunk Core Certified
Advanced Power User
Exam
,1.If a search contains a subsearch, what is the order of execution?
A. The order of execution depends on whether either search uses a stats command.
B. The inner search executes first.
C. The outer search executes first.
D. The two searches are executed in parallel.
Answer: B
Explanation:
In a Splunk search containing a subsearch, the inner subsearch executes first. The
result of the subsearch is then passed to the outer search, which often depends on
the results of the inner subsearch to complete its execution.
Reference: Splunk Documentation on Subsearches:
https://docs.splunk.com/Documentation/Splunk/latest/Search/Aboutsubsearches
Splunk Documentation on Search Syntax:
tes
en
https://docs.splunk.com/Documentation/Splunk/latest/Search/Usefieldsinsearches
ci
re
ás
m
s
s ta
2.How can the erex and rex commands be used in conjunction to extract fields?
ue
sp
A. The regex generated by the erex command can be edited and used with the rex
re
y
as
command in a subsequent search.
t
un
eg
B. The regex generated by the rex command can be edited and used with the erex
pr
s
command in a
la
n
co
subsequent search.
en
am
C. The regex generated by the erex command can be edited and used with the erex
ex
command in a subsequent search.
su
be
D. The erex and rex commands cannot be used in conjunction under any
ue
pr
circumstances.
-A
4
00
Answer: A
-1
LK
Explanation:
P
S
The erex command in Splunk generates regular expressions based on example data.
ca
ti
ác
These generated regular expressions can then be edited and utilized with the rex
pr
de
command in subsequent searches.
as
nt
gu
re
P
3.What command is used to compute and write summary statistics to a new field in
the event results?
A. tstats
B. stats
C. eventstats
D. transaction
Answer: C
Explanation:
The eventstats command in Splunk is used to compute and add summary statistics to
all events in the search results, similar to stats, but without grouping the results into a
, single event.
4.Which commands can run on both search heads and indexers?
A. Transforming commands
B. Centralized streaming commands
C. Dataset processing commands
D. Distributable streaming commands
Answer: D
Explanation:
In Splunk's processing model, commands are categorized based on how and where
they execute within the search pipeline. Understanding these categories is crucial for
optimizing search performance.
tes
en
Distributable Streaming Commands:
ci
re
Definition: These commands operate on each event individually and do not depend
ás
m
on the context of other events. Because of this independence, they can be executed
s
s ta
on indexers, allowing the processing load to be distributed across multiple nodes.
ue
sp
Execution: When a search is run, distributable streaming commands can process
re
y
as
events as they are retrieved from the indexers, reducing the amount of data sent to
t
un
eg
the search head and improving efficiency.
pr
s
Examples: eval, rex, fields, rename
la
n
co
Other Command Types:
en
am
Dataset Processing Commands: These commands work on entire datasets and often
ex
require all events to be available before processing can begin. They typically run on
su
be
the search head. Centralized Streaming Commands: These commands also operate
ue
pr
on each event but require a centralized view of the data, meaning they usually run on
-A
4
00
the search head after data has been gathered from the indexers.
-1
LK
Transforming Commands: These commands, such as stats or chart, transform event
P
S
data into statistical tables and generally run on the search head.
ca
ti
ác
By leveraging distributable streaming commands, Splunk can efficiently process data
pr
de
closer to its source, optimizing resource utilization and search performance.
as
nt
Reference: Splunk Documentation: Types of commands
gu
re
P
5.What is returned when Splunk finds fewer than the minimum matches for each
lookup value?
A. The default value NULL until the minimum match threshold is reached.
B. The default match value until the minimum match threshold is reached.
C. The first match unless the time_field attribute is specified.
D. Only the first match.
Answer: A
Explanation:
When Splunk's lookup feature finds fewer than the minimum matches for each lookup