Challenge Yourself with the World's Most Realistic SPLK-2002 Test.
(A customer wishes to keep costs to a minimum, while still implementing Search Head Clustering (SHC). What are the minimum supported architecture standards?)
A. Three Search Heads and One SHC Deployer
B. Two Search Heads with the SHC Deployer being hosted on one of the Search Heads
C. Three Search Heads but using a Deployment Server instead of a SHC Deployer
D. Two Search Heads, with the SHC Deployer being on the Deployment Server
Explanation
This question tests the absolute minimum architectural requirements needed for a supported Splunk Search Head Cluster (SHC) deployment and how quorum is maintained using the Raft consensus algorithm.
Why A is correct
A functional Search Head Cluster requires two fundamental components:
1. Minimum of three (3) Search Heads
SHC relies on the Raft consensus algorithm, which requires a strict majority (quorum) to elect and maintain a captain.
• With 3 nodes, quorum = 2
• If 1 node fails, 2 nodes remain → quorum is still maintained (66%)
• This ensures the cluster continues operating and captain election remains stable
If only 2 nodes are used:
• Quorum would be 2
• Failure of one node leaves 1/2 → no majority → cluster instability or outage
2. A standalone SHC Deployer instance
The Deployer is responsible for distributing apps and configuration bundles to SHC members. It is a mandatory component, even though it is not part of the cluster itself.
Why B is incorrect
The SHC Deployer cannot run on a Search Head that is part of the cluster it manages. It must be a separate, independent instance to avoid circular dependency and configuration conflicts.
Why C is incorrect
A Deployment Server cannot replace an SHC Deployer. They serve completely different purposes:
• Deployment Server → manages forwarders and non-clustered instances
• SHC Deployer → manages app/config distribution for Search Head Clusters
These mechanisms are not interchangeable.
Why D is incorrect
While it is valid in some architectures to co-host the Deployer role on another management system (like a Deployment Server or Cluster Manager), this does not remove the requirement for at least three Search Heads. The SHC still requires a minimum of 3 nodes for quorum.
Key Exam Point
For a supported SHC deployment in Splunk:
• Minimum 3 Search Heads (for quorum and fault tolerance)
• 1 dedicated or co-hosted Deployer (outside the cluster)
Reference
Splunk Docs: Search Head Clustering system requirements
Splunk Enterprise Certified Architect: SHC architecture, quorum mechanics, and component roles
A customer plans to have 20,000 Splunk-managed forwarders. What is a common step to ensure Splunk forwarder management performance is not impacted?
A. Increase the phone-home interval for deployment clients.
B. Use workload management to ensure client pools.
C. Reduce the polling interval for clients on the Deployment Server.
D. Ensure that server classes have no more than 5,000 deployment clients.
Explanation:
When managing a very large number of Splunk forwarders (e.g., 20,000), the Deployment Server can become a performance bottleneck because it must manage configuration distribution (apps and server classes) across all clients. Forwarders periodically “phone home” to check for updates, and excessive load can degrade deployment efficiency.
Why the Correct Answer is to limit server classes to 5,000 clients
Splunk best practices recommend keeping each server class to a maximum of around 5,000 clients. This ensures that:
• Configuration bundle distribution remains efficient
• Phone-home requests are evenly distributed over time
• The Deployment Server is not overwhelmed by simultaneous client connections
• Large environments scale predictably and remain manageable
By splitting 20,000 forwarders into multiple server classes, you reduce load and improve stability of deployment operations.
Why the Other Options Are Incorrect
Increase the phone-home interval
This may reduce how often forwarders contact the Deployment Server, but it does not solve the core scalability limitation of oversized server classes. It only delays load rather than properly distributing it.
Use workload management for client pools
Workload management applies to search workload distribution on search heads, not Deployment Server operations. It has no impact on forwarder management or server class scaling.
Reduce the polling interval for clients
Reducing the polling (phone-home) interval would actually increase the number of requests to the Deployment Server, making performance worse rather than improving scalability.
Key Exam Point
For large Splunk deployments, always design server classes carefully and keep them under ~5,000 clients each to maintain Deployment Server performance and avoid bottlenecks.
Reference
Splunk Docs — Deployment Server scaling guidelines:
“For large environments, limit server classes to 5,000 clients each to avoid performance degradation when managing forwarders.”
(Which command is used to initially add a search head to a single-site indexer cluster?)
A. splunk edit cluster-config -mode searchhead -manager_uri https://10.0.0.1:8089 -secret changeme
B. splunk edit cluster-config -mode peer -manager_uri https://10.0.0.1:8089 -secret changeme
C. splunk add cluster-manager -manager_uri https://10.0.0.1:8089 -secret changeme
D. splunk add cluster-manager -mode searchhead -manager_uri https://10.0.0.1:8089 -secret changeme
Explanation:
To add a search head to an indexer cluster in a single-site deployment, the search head must be configured to communicate with the Cluster Manager (formerly the master node). This allows it to retrieve the list of indexer peers and distribute search requests appropriately.
The correct command is:
splunk edit cluster-config -mode searchhead -manager_uri https://
Key parameters
* -mode searchhead → Defines the instance as a search head in an indexer cluster
* -manager_uri → Specifies the URI of the Cluster Manager (master node)
* -secret → Shared secret used for secure communication with the cluster
After executing this command, Splunk must be restarted. Once restarted, the search head will:
* Retrieve the list of peer indexers from the Cluster Manager
* Dispatch search jobs across cluster peers
* Respect cluster search affinity and bucket distribution rules
Why the other options are incorrect
B — splunk edit cluster-config -mode peer -manager_uri ...
This configures an indexer peer node, not a search head. Peers are responsible for indexing and storing data, so using this mode for a search head is incorrect.
C — splunk add cluster-manager -manager_uri ... -secret ...
This is an invalid command. Splunk does not support add cluster-manager. The correct command is edit cluster-config.
D — splunk add cluster-manager -mode searchhead ...
This option is incorrect because the add cluster-manager command does not exist, and combining it with -mode searchhead is syntactically invalid in Splunk CLI.
Reference
Splunk Docs – Add a search head to an indexer cluster
“Run splunk edit cluster-config -mode searchhead -manager_uri
Splunk Enterprise Certified Architect Lab Guide – Indexer Clustering
“Search heads join the cluster using edit cluster-config with -mode searchhead, not -mode peer.”
(What is the expected performance reduction when architecting Splunk in a virtualized environment instead of a physical environment?)
A. Up to 15%
B. Between 20% and 45%
C. 0
D. 0.5
Explanation:
When deploying Splunk in a virtualized environment such as VMware, Hyper-V, or other hypervisors, performance is generally lower compared to running on physical (bare-metal) hardware. This is due to virtualization overhead, shared resource contention, and additional I/O latency introduced by the hypervisor layer.
Splunk’s official guidance indicates that virtualized environments typically experience a performance reduction of 20% to 45% compared to equivalent physical hardware. This impact must be considered during capacity planning to ensure sufficient CPU, memory, and disk I/O resources for indexing and search workloads.
Why B is correct
A performance degradation range of 20% to 45% aligns with Splunk’s documented expectations for virtualized deployments. This range accounts for overhead introduced by virtualization layers and helps architects properly size infrastructure to maintain stable performance.
Why the other options are incorrect
Up to 15%
This value is too low and does not reflect real-world overhead observed in virtualized Splunk environments. Splunk documentation indicates a higher impact range.
0%
This is unrealistic because virtualization always introduces some level of overhead due to abstraction from physical hardware.
0.5
This is not a valid performance metric in this context and does not correspond to Splunk’s documented sizing guidance.
Reference
Splunk Docs — Virtualization and Splunk
“Splunk deployments in virtualized environments can experience a performance reduction of 20–45% compared to physical hardware.”
(Which of the following data sources are used for the Monitoring Console dashboards?)
A. REST API calls
B. Splunk btool
C. Splunk diag
D. metrics.log
Explanation:
The Splunk Monitoring Console (MC) gathers data from multiple sources to populate its dashboards, such as Indexing Performance, Search Performance, License Usage, and System Health. These sources allow it to provide a centralized view of the entire Splunk deployment.
A — REST API calls
The Monitoring Console uses Splunk’s REST management endpoints (under /services/...) to retrieve real-time and historical information from various Splunk components such as indexers, search heads, license managers, and cluster managers.
Examples include:
* /services/server/info
* /services/admin/licenseusage
* /services/cluster/master/peers
These REST calls provide structured data that the MC uses to build dashboards and system health views.
D — metrics.log
The metrics.log file, located at $SPLUNK_HOME/var/log/splunk/metrics.log, contains detailed performance metrics from each Splunk instance.
It includes information such as:
* CPU and memory usage
* Disk I/O statistics
* Indexing throughput
* Search concurrency
* Queue and pipeline performance metrics
The Monitoring Console collects and aggregates this data from multiple nodes to generate performance dashboards and health reports.
Why the other options are incorrect
B — Splunk btool
btool is a configuration inspection and debugging utility used manually via CLI. It is not a continuously polled data source and does not provide runtime metrics to the Monitoring Console.
C — splunk diag
The splunk diag command is used to generate diagnostic bundles (logs, configurations, and system state) for troubleshooting and support cases. It is not used as a live data source for Monitoring Console dashboards.
Reference
Splunk Docs – Monitoring Console data sources
“The Monitoring Console gathers data from two primary sources: internal logs (especially metrics.log) and REST API calls to Splunk instances.”
SPLK-2002 Blueprint – Monitoring and Troubleshooting
“MC dashboards rely on REST endpoints and aggregated metrics.log data from across the deployment.”
(How can a Splunk admin control the logging level for a specific search to get further debug information?)
A. Configure infocsv_log_level = DEBUG in limits.conf.
B. Insert | noop log_debug=* after the base search.
C. Open the Search Job Inspector in Splunk Web and modify the log level.
D. Use Settings > Server settings > Server logging in Splunk Web.
Explanation:
The correct way to increase logging verbosity for a single Splunk search is by using the noop command directly within the SPL query. This allows targeted debugging without affecting global system settings.
Why B is correct
The noop command is an internal Splunk utility used to influence search behavior without altering results. By appending:
| noop log_debug=*
to a search, Splunk increases logging verbosity for that specific search job only. This causes additional debug-level information to be written into the search.log of that job, which can then be viewed in the Search Job Inspector.
Key benefits of this approach:
* Applies only to the current search job
* Does not require system restart
* Does not modify global logging configuration
* Useful for precise, per-search troubleshooting
Why A is incorrect
Setting infocsv_log_level = DEBUG in limits.conf enables debug logging globally across the Splunk instance. While it can expose detailed logs, it affects all searches, not just a single one.
This approach can also significantly increase log volume and negatively impact system performance, making it unsuitable for targeted troubleshooting.
Why C is incorrect
The Search Job Inspector is a diagnostic tool used to view details of a completed or running search, including execution statistics and logs. However, it does not provide any mechanism to modify or increase logging levels dynamically for a search job.
It is purely observational and not a configuration or control interface.
Why D is incorrect
The Splunk Web path Settings → Server settings → Server logging changes logging levels at the system level. These changes apply globally to Splunk components such as splunkd.
This method cannot isolate logging changes to a single search and therefore is not suitable for per-search debugging.
Reference
Splunk Docs: Internal search commands and noop command reference
Splunk Enterprise Certified Architect: Search troubleshooting and Job Inspector usage
How can internal logging levels in a Splunk environment be changed to troubleshoot an issue? (select all that apply)
A. Use the Monitoring Console (MC).
B. Use Splunk command line.
C. Use Splunk Web.
D. Edit log-local. cfg.
Explanation:
Splunk provides multiple supported methods to change internal logging levels, giving administrators flexibility to troubleshoot issues across different environments. All four options listed are valid ways to adjust logging verbosity in Splunk Enterprise.
Understanding Logging Levels
Splunk logging levels determine how much detail is written to logs. They are ordered from least to most verbose as follows:
FATAL → ERROR → WARN → INFO → DEBUG → TRACE
Higher verbosity levels such as DEBUG and TRACE generate significantly more log data and can impact system performance. They should only be used temporarily during troubleshooting and reverted back to INFO afterward.
A — Monitoring Console (MC)
The Monitoring Console provides a GUI-based method to manage logging levels across Splunk deployments.
Navigation path:
Monitoring Console → Settings → Logging
Capabilities:
Change log levels for specific components or channels
Apply changes without restarting Splunk
Centralized management in distributed environments
This method is especially useful for large deployments where multiple nodes must be monitored and adjusted from a single interface.
B — Splunk Command Line Interface (CLI)
The Splunk CLI allows direct control over logging levels from the command line.
Examples:
splunk list log-level
splunk set log-level SearchScheduler -level DEBUG
splunk set log-level TcpInputProc -level TRACE
splunk set log-level LicenseManager -level WARN
splunk set log-level SearchScheduler -level INFO
Key characteristics:
Changes take effect immediately without restart
Can target specific components precisely
Useful for remote troubleshooting via SSH
Typically temporary unless persisted in configuration files
C — Splunk Web
Splunk Web provides a GUI method for adjusting logging levels.
Navigation path:
Settings → Server Settings → Server Logging
Capabilities:
View all logging channels/components
Adjust logging levels using dropdown menus
Apply changes immediately without restart
This method is commonly used by administrators who prefer UI-based configuration over CLI.
D — Edit log-local.cfg
The log-local.cfg file provides a persistent, file-based method of configuring logging levels.
File location:
$SPLUNK_HOME/etc/log-local.cfg
Key characteristics:
Changes persist across restarts
Requires restart to take effect
Overrides default log.cfg settings
Useful for long-term or permanent logging configuration changes
Example:
[SearchScheduler]
rootCategory = DEBUG, splunkd
[TcpInputProc]
rootCategory = TRACE, splunkd
Method Comparison Summary
Monitoring Console: No restart, temporary changes
Splunk CLI: No restart, temporary changes
Splunk Web: No restart, temporary changes
log-local.cfg: Requires restart, persistent changes
Key Considerations
Always revert logging back to INFO after troubleshooting
High verbosity can significantly increase disk usage
In distributed environments, changes may need to be applied per node
log-local.cfg changes are not automatically propagated across clusters
Reference
Splunk Docs: Set logging levels using Splunk Web
Splunk Docs: splunk set log-level CLI command
(Which indexes.conf attribute would prevent an index from participating in an indexer cluster?)
A. available_sites = none
B. repFactor = 0
C. repFactor = auto
D. site_mappings = default_mapping
Explanation:
In Splunk Enterprise, the repFactor setting in indexes.conf controls whether an index participates in indexer cluster replication. It determines how bucket replication behaves across clustered indexers.
When configured as:
repFactor = 0
the index is excluded from indexer cluster replication entirely.
What repFactor = 0 means
When an index is configured with repFactor = 0, Splunk treats it as a non-replicated index. This results in the following behavior:
* Buckets are not replicated to other indexers
* The index does not participate in cluster redundancy mechanisms
* Data remains only on the local indexing peer where it was ingested
This configuration is typically used for non-critical or special-purpose data such as:
* Transient or temporary data
* Summary indexes
* Local-only or non-redundant datasets
Why the other options are incorrect
available_sites = none
This is not a valid configuration setting in indexes.conf and has no effect on cluster replication behavior.
repFactor = auto
This is the default behavior in clustered environments, where replication is controlled by the cluster’s global replication factor settings. It does not disable replication.
site_mappings = default_mapping
This setting is related to multisite cluster site assignment and bucket placement, not to disabling replication or excluding an index from clustering.
Key Exam Point
For SPLK-2002, remember that:
repFactor = 0 means the index is excluded from replication and does not participate in indexer clustering redundancy.
Example
[summary]
repFactor = 0
Buttercup is deploying Splunk IT Service Intelligence (ITSI). The IT department provides the following
information:
Item Count
KPIs 900
Entities 1500
Glass Tables 10
Service Definitions 20
Which ITSI component is the primary factor influencing Splunk deployment sizing?
A. The number of KPIs tracked
B. The number of glass tables present
C. The number of entities
D. The number of service definitions
Explanation:
In Splunk IT Service Intelligence (ITSI), deployment sizing is primarily driven by the number of KPIs (Key Performance Indicators) being monitored. Each KPI represents a scheduled search that continuously runs to collect, evaluate, and aggregate performance data, which directly impacts system resources such as CPU, memory, and storage.
Why KPIs (900) are the correct answer
KPIs are the most significant factor in ITSI sizing because each one generates recurring scheduled searches and calculations. As the number of KPIs increases, the workload on search heads and supporting infrastructure increases proportionally. This makes KPIs the primary driver for capacity planning in ITSI environments.
Why the other options are less significant
Entities (1500)
Entities represent infrastructure or business components being monitored. While they are essential for service modeling, they do not generate the same level of continuous search load as KPIs, so they have a smaller impact on sizing.
Glass Tables (10)
Glass Tables are visualization dashboards in ITSI. They depend on KPI data but do not themselves generate significant processing load, so they have minimal impact on sizing decisions.
Service Definitions (20)
Services are logical groupings of KPIs and entities. While they organize monitoring logic, they do not directly drive search execution load like KPIs do, making them less critical for sizing.
Conclusion
Among all ITSI components, KPIs are the dominant factor influencing deployment sizing because they directly determine the volume of scheduled searches and system processing requirements.
Reference
Splunk Docs — ITSI Deployment Planning
“The number of KPIs is the primary factor in determining ITSI deployment sizing. Each KPI represents a scheduled search that consumes system resources.”
(A customer has converted a CSV lookup to a KV Store lookup. What must be done to make it available for an automatic lookup?)
A. Add the repFactor=true attribute in collections.conf.
B. Add the replicate=true attribute in lookups.conf.
C. Add the replicate=true attribute in collections.conf.
D. Add the repFactor=true attribute in lookups.conf.
Explanation:
When converting a CSV lookup to a KV Store lookup in Splunk, it is important to understand how KV Store collections behave in a Search Head Cluster (SHC) environment.
KV Store collections are defined in collections.conf. By default, these collections are local to the search head where they are created and are not automatically shared across other search head cluster members.
To make a KV Store collection available across all search heads for automatic lookups, you must enable replication using the replicate=true attribute in collections.conf.
Why replicate=true is correct
Setting replicate=true ensures that the KV Store collection is replicated across all members of the Search Head Cluster using the KV Store replication mechanism.
Once replication is enabled, any search head in the cluster can access the same KV Store data, making automatic lookups consistent and available cluster-wide.
Important note: The KV Store collection must also be included in an app that is deployed to all search heads in the cluster to ensure consistency.
Why the other options are incorrect
A. Add repFactor=true attribute in collections.conf
This is incorrect because repFactor is not a valid attribute in collections.conf. The correct attribute for KV Store replication is replicate.
Also, repFactor is used in indexer clustering (for replication factor settings), not KV Store configurations.
B. Add replicate=true attribute in lookups.conf
This is incorrect because lookups.conf defines lookup definitions (such as CSV or KV Store lookup definitions), but replication behavior is controlled in collections.conf, not in lookup definitions.
Therefore, placing replicate=true in lookups.conf has no effect on KV Store replication.
D. Add repFactor=true attribute in lookups.conf
This option is incorrect for two reasons: it uses the wrong file (lookups.conf) and the wrong attribute name (repFactor, which is not valid for KV Store or lookups).
Reference
Splunk Docs – Configure KV Store replication
Splunk Docs – collections.conf specification (replicate attribute)
SPLK-2002 Exam Guide – KV Store replication in SHC environments
| Page 1 out of 21 Pages |