A financial services client has a 3-site indexer cluster (NYC, LON, TOK) configured for disaster recovery. The `server.conf` on the master node has `site_replication_factor = origin:1, total:2` and `site_search_factor = origin:1, total:2`. The LON site experiences a complete network outage. A critical, real-time search that is NOT site-aware is executed from the NYC search head. What is the expected behavior of the search results?
Q2
A consultant is designing a data onboarding solution for a high-volume, custom binary log format from a proprietary manufacturing system. The logs must be parsed on a Heavy Forwarder (HF) before being sent to indexers. To ensure data integrity and prevent data loss during potential HF restarts or network issues, which configuration is most critical in `outputs.conf` on the HF?
Q3Multiple answers
A large retail company is using a 5-node Search Head Cluster (SHC). During a major holiday sale, users report that dashboards are intermittently failing to load and saved searches are being skipped. A review of `splunkd.log` on the SHC members reveals messages related to KV Store contention and replication failures. The consultant suspects that a high frequency of lookups and summary updates from multiple apps are overwhelming the KV Store. Which TWO of the following actions represent a robust, long-term solution to this problem? (Select TWO)
Q4
A consultant is optimizing search performance. They have identified several inefficient searches that use `join` with a large result set. They plan to replace these with the `stats` command. Which of the following is a primary advantage of using `stats` over `join` for correlating data from multiple sourcetypes?
Q5
During a Splunk deployment, a client requires that data from their PCI-compliant systems be stored in a specific, encrypted index with a 365-day retention policy, while all other data goes to a general index with a 90-day retention. Both data types arrive on the same port of a Heavy Forwarder. What is the most appropriate method to route this data to the correct indexes?
Q6
A new Monitoring Console (MC) is being set up on a dedicated instance to monitor a large, multi-site Splunk environment. The administrator observes that several indexers are not appearing in the MC dashboards. All instances are communicating with the MC instance, and firewall rules are correct. What is a likely cause for the missing indexers?
Q7
True or False: In a multi-site indexer cluster, setting `site=site0` in a peer's `server.conf` effectively makes that peer's data available to all sites, overriding any site-specific replication policies for that node.
Q8
A consultant needs to configure a universal forwarder to send different log sources to two separate indexer clusters: one for security data (`sec_cluster`) and one for operations data (`ops_cluster`). How should `outputs.conf` be configured on the universal forwarder to achieve this?
Q9
A client's Splunk Enterprise environment is integrated with SAML for single sign-on. A new requirement is to allow a small group of emergency administrators to log in with local Splunk credentials if the SAML identity provider is unavailable. Which setting in `authentication.conf` allows this dual-login capability?
Q10
A deployment server is managing over 1,000 universal forwarders. The Splunk administrator notices that when a new app is pushed, it takes a very long time for all forwarders to receive the update. The server hardware has ample CPU and memory. Which `serverclass.conf` parameter can be tuned to increase the number of forwarders that can simultaneously download configurations?