A security team needs to ingest a static file for a specific incident. The log file has not been collected previously and future updates to the file must not be indexed.
Which command would meet these needs?
The correct answer is A. splunk add one shot / opt/ incident [data . log ---index incident
splunk add one shot <file> -index <index_name>
The file parameter specifies the path to the file or directory to be indexed. The index parameter specifies the name of the index where the data will be stored. If the index does not exist, Splunk will create it automatically.
Option B is incorrect because the splunk edit monitor command modifies an existing monitor input, which is used for ingesting files or directories that change or update over time. This command does not create a new monitor input, nor does it stop monitoring after indexing.
Option C is incorrect because the splunk add monitor command creates a new monitor input, which is also used for ingesting files or directories that change or update over time. This command does not stop monitoring after indexing.
Option D is incorrect because the splunk edit oneshot command does not exist. There is no such command in the Splunk CLI.
Joseph
3 months agoAnnice
3 months agoRebeca
3 months agoJestine
4 months agoRuthann
4 months agoCaprice
4 months agoChau
4 months agoKarl
4 months agoOzell
5 months agoEliseo
5 months agoAnnmarie
5 months agoTanja
5 months agoHarley
5 months agoJoni
5 months agoDelmy
1 year agoSamuel
1 year agoFabiola
1 year agoAnnelle
1 year agoEvan
1 year agoJennifer
1 year agoCarry
1 year agoSunshine
1 year agoRene
1 year agoRasheeda
1 year agoDelfina
1 year agoParis
1 year agoDorsey
1 year agoRosendo
1 year agoBrandee
1 year agoAlonso
1 year agoCharlene
1 year ago