A security team needs to ingest a static file for a specific incident. The log file has not been collected previously and future updates to the file must not be indexed.
Which command would meet these needs?
The correct answer is A. splunk add one shot / opt/ incident [data . log ---index incident
splunk add one shot <file> -index <index_name>
The file parameter specifies the path to the file or directory to be indexed. The index parameter specifies the name of the index where the data will be stored. If the index does not exist, Splunk will create it automatically.
Option B is incorrect because the splunk edit monitor command modifies an existing monitor input, which is used for ingesting files or directories that change or update over time. This command does not create a new monitor input, nor does it stop monitoring after indexing.
Option C is incorrect because the splunk add monitor command creates a new monitor input, which is also used for ingesting files or directories that change or update over time. This command does not stop monitoring after indexing.
Option D is incorrect because the splunk edit oneshot command does not exist. There is no such command in the Splunk CLI.
Delmy
10 months agoSamuel
10 months agoFabiola
9 months agoAnnelle
9 months agoEvan
9 months agoJennifer
9 months agoCarry
10 months agoSunshine
10 months agoRene
9 months agoRasheeda
9 months agoDelfina
10 months agoParis
10 months agoDorsey
9 months agoRosendo
9 months agoBrandee
9 months agoAlonso
10 months agoCharlene
10 months ago