What does Field Auto-Extraction do?
Splunk automatically discovers many fields based on source type and key/value pairs found in the data?
Prior to search time, some fields are already stored with the event in the index, what are those fields?
- Internal fields: _time and _raw
At search time what does the field discovery do?
It discovers fields directly related to the search’s results
True or False: Splunk may also extract other fields from raw event data that aren’t directly related to the search.
True
What allows you to extract your own fields in Splunk?
Using the Field Extractor (FX)
When should you use the Field Extractor (FX)?
Use Field Extractor (FX) to extract fields that are static and that you use often in searches
How can you access the Field Extractor?
When should you use the Field Extraction method Regex?
When should you use the Field Extraction method Delimiter?
How to do you get to Regex Field Extractions from settings?
After you open up the Field Extractor for Regex what are the next steps?
What events are included in the extraction?
Only events with the highlighted string are extracted
True or False: An extractions name is provided by default.
True, however, this name can be changed.
How do you edit a regex for Field Extraction?
True or False: After you edit the regular expression, you cannot go back to the Field Extractor UI.
True
When should you use Delimited Field Extractions?
Use delimited field extractions when the event log does not have a header and fields are separated by spaces, commas, or characters
Delimited field extractions from settings.
After opening field extractor what do you do next to finish?