Splunk SPLK-1004 Exam Questions

Questions for the SPLK-1004 were updated on : Dec 01 ,2025

Page 1 out of 8. Viewing questions 1-15 out of 120

Question 1

Which of the following is true about Log Event alerts?

  • A. They must be used with other alert actions.
  • B. They cannot use tokens to reference event fields.
  • C. They require at least Power User role.
  • D. They create new searchable events.
Answer:

D

User Votes:
A
50%
B
50%
C
50%
D
50%

Explanation:
Log Event alerts in Splunk are designed to create new events in the index when specific conditions
are met. These events are then searchable like any other event, allowing for further analysis and
correlation.
This functionality is particularly useful for tracking occurrences of specific conditions over time or
triggering additional workflows based on the logged events.
Reference: Splunk Documentation on Alert Actions

Discussions
vote your answer:
A
B
C
D
0 / 1000

Question 2

Which of the following will best optimize dashboard performance?

  • A. Use inline searches.
  • B. Use base searches.
  • C. Use accelerated data models.
  • D. Use scheduled reports.
Answer:

C

User Votes:
A
50%
B
50%
C
50%
D
50%

Explanation:
Accelerated data models in Splunk create summaries of data that can be queried more efficiently,
significantly improving dashboard performance. By precomputing and storing results, dashboards
can retrieve data faster, reducing load times and resource consumption.
According to Splunk Documentation:
"Data model acceleration speeds up reporting for the entire set of fields that you define in a data
model and which you and your Pivot users want to report on."
Reference: Accelerate Data Models - Splunk Documentation

Discussions
vote your answer:
A
B
C
D
0 / 1000

Question 3

Which SPL command converts the hour into a user's local time based upon the user's time zone
preference setting?

  • A. time(_time, "%H")
  • B. local_time(_time, "%H")
  • C. relative_time(_time, "%H")
  • D. strftime(_time, "%H")
Answer:

D

User Votes:
A
50%
B
50%
C
50%
D
50%

Explanation:
The strftime function in Splunk is used to format timestamps into human-readable strings. When you
use strftime(_time, "%H"), it converts the _time field into the hour (00 to 23) based on the user's
time zone preference setting.
Splunk stores all timestamps in Coordinated Universal Time (UTC). However, when displaying time, it
adjusts according to the user's time zone preference set in their profile. Therefore, using strftime will
reflect the local time for the user.
Reference: Splunk Community Discussion on Time Zone Conversion

Discussions
vote your answer:
A
B
C
D
0 / 1000

Question 4

How is a multivalue field created from product="a, b, c, d"?

  • A. ... | mvexpand product
  • B. ... | eval mvexpand(makemv(product, ","))
  • C. ... | makemv delim="," product
  • D. ... | makemv delim(product)
Answer:

C

User Votes:
A
50%
B
50%
C
50%
D
50%

Explanation:
To create a multivalue field from a single string with comma-separated values, the makemv
command is used with the delim parameter to specify the delimiter.
The correct syntax is:
... | makemv delim="," product
This command splits the product field into multiple values wherever a comma is found, effectively
creating a multivalue field.
Reference:
makemv - Splunk Documentation

Discussions
vote your answer:
A
B
C
D
0 / 1000

Question 5

What does it mean when a command is run and the is_exact column is 0?

  • A. The distinct count of values for that field is exactly 0.
  • B. The distinct count of fields in the field summary is 1.
  • C. The distinct count of values in that field is approximated.
  • D. The distinct count of values for that field is exact.
Answer:

C

User Votes:
A
50%
B
50%
C
50%
D
50%

Explanation:
In Splunk, the is_exact field indicates whether the count of distinct values for a particular field is
exact or estimated. A value of:
1 means the count is exact.
0 means the count is an approximation.
Therefore, when is_exact is 0, it signifies that the distinct count of values for that field is an estimate,
not an exact count.
Reference:
fields - Splunk Documentation

Discussions
vote your answer:
A
B
C
D
0 / 1000

Question 6

When working with an accelerated data model acc_datmodel and an unaccelerated data model
unacc_datmodel, what tstats query could be used to search one of these data models?

  • A. | tstats count from datamodel=acc_datmodel summariesonly=false
  • B. | tstats count where datamodel=acc_datmodel summariesonly=false
  • C. | tstats count where index=datamodel by index, datamodel
  • D. | tstats count from datamodel=unacc_datmodel summariesonly=true
Answer:

A

User Votes:
A
50%
B
50%
C
50%
D
50%

Explanation:
The tstats command in Splunk is optimized for performance and is typically used with accelerated
data models. The summariesonly parameter determines whether the search should use only the
summarized (accelerated) data or fall back to raw data if necessary.
Setting summariesonly=false allows the search to use both summarized and raw data, making it
suitable for both accelerated and unaccelerated data models.
Setting summariesonly=true restricts the search to only summarized data, which would result in no
data returned if the data model is not accelerated.
Therefore, to search an accelerated data model and allow fallback to raw data if needed, the correct
query is:
| tstats count from datamodel=acc_datmodel summariesonly=false
Reference:
tstats - Splunk Documentation

Discussions
vote your answer:
A
B
C
D
0 / 1000

Question 7

What is the value of base lispy in the Search Job Inspector for the search index=sales
clientip=170.192.178.10?

  • A. [ index::sales 192 AND 10 AND 178 AND 170 ]
  • B. [ index::sales AND 469 10 702 390 ]
  • C. [ 192 AND 10 AND 178 AND 170 index::sales ]
  • D. [ AND 10 170 178 192 index::sales ]
Answer:

A

User Votes:
A
50%
B
50%
C
50%
D
50%

Explanation:
In Splunk, the "base lispy" is an internal representation of the search query used by the Search Job
Inspector. It breaks down the search into its fundamental components for processing. For the search
index=sales clientip=170.192.178.10, Splunk tokenizes the IP address into its individual octets and
combines them with the index specification.
Therefore, the base lispy representation would be:
[ index::sales 192 AND 10 AND 178 AND 170 ]
This indicates that the search is constrained to the sales index and is looking for events containing all
the specified IP address components.

Discussions
vote your answer:
A
B
C
D
0 / 1000

Question 8

Consider the following search:
(index=_internal log group=tcpin connections) earliest
| stats count as _count by sourceHost guid fwdType version
| eventstats dc(sourceHost) as dc_sourceHost by guid
| where dc_sourceHost > 1
| fields - dc_sourceHost
| xyseries guid fwdType sourceHost
| search guid="00507345-CE09-4A5E-428-D3E8718CB065"
| appendpipe [ stats count | eval "Duplicate GUID" = if(count==0, "Yes", "No") ]
Which of the following are transforming commands?

  • A. where and search
  • B. fields and appendpipe
  • C. stats and xyseries
  • D. eval and eventstats
Answer:

C

User Votes:
A
50%
B
50%
C
50%
D
50%

Explanation:
In Splunk, transforming commands are those that process events to produce statistical summaries,
often changing the shape of the data. Among the commands listed:
stats is a transforming command that computes aggregate statistics, such as count, sum, average,
etc., and transforms the data into a tabular format.
xyseries is also a transforming command that reshapes the data into a matrix format suitable for
charting, converting three columns into a two-dimensional table.
The other commands:
where and search are filtering commands.
fields is a field selector command.
appendpipe is a generating command.
eval is an evaluation command.
eventstats is a reporting command that adds summary statistics to each event.
Reference:
stats - Splunk Documentation
xyseries - Splunk Documentation

Discussions
vote your answer:
A
B
C
D
0 / 1000

Question 9

When should the fill_summary_index.py script be used?

  • A. To create a summary index.
  • B. To backfill gaps in a summary index.
  • C. To reset a summary index that includes overlapping data.
  • D. To populate a summary index from a saved report.
Answer:

B

User Votes:
A
50%
B
50%
C
50%
D
50%

Explanation:
The fill_summary_index.py script is a utility provided by Splunk to backfill data into a summary index.
It's particularly useful when there are gaps in the summary index due to missed scheduled searches
or when initializing a summary index with historical data.
According to Splunk Documentation:
"You can use the fill_summary_index.py script, which backfills gaps in summary index collection by
running the saved searches that populate the summary index as they would have been executed at
their regularly scheduled times for a given time range."
Reference: Manage summary index gaps - Splunk Documentation

Discussions
vote your answer:
A
B
C
D
0 / 1000

Question 10

Which of the following is a valid event action in Splunk?

  • A. Execute an eval statement.
  • B. Edit an event in the raw data.
  • C. Execute a stats statement.
  • D. Create a new REST API endpoint.
Answer:

A

User Votes:
A
50%
B
50%
C
50%
D
50%

Explanation:
In Splunk, event actions are operations that can be performed on events within the Search &
Reporting app. One valid event action is executing an eval statement, which allows users to compute
and add new fields to events dynamically.
According to Splunk Documentation:
"You can define workflow actions that perform tasks such as running a search, opening a URL, or
executing an eval expression."
Reference: Control workflow action appearance in field and event menus - Splunk Documentation

Discussions
vote your answer:
A
B
C
D
0 / 1000

Question 11

What is one way to troubleshoot dashboards?

  • A. Create an HTML panel using tokens to verify that they are set.
  • B. Run the | previous_searches command to your SPL queries.
  • C. Go to the Troubleshooting dashboard of the Searching and Reporting app.
  • D. Delete the dashboard and start over.
Answer:

A

User Votes:
A
50%
B
50%
C
50%
D
50%

Explanation:
When troubleshooting dashboards in Splunk, it's essential to verify that tokens are being set and
passed correctly, especially when using dynamic inputs. Creating an HTML panel that displays token
values can help confirm that tokens are populated as expected.
For example, you can add a panel with the following Simple XML to display token values:
xml
Copy
<panel>
<html>
<p>Token value: $your_token$</p>
</html>
</panel>
This approach allows you to see the current value of your_token directly on the dashboard, aiding in
debugging issues related to token usage.
Reference:
Master Splunk Dashboards: Expert Guide to Troubleshooting Tokens!

Discussions
vote your answer:
A
B
C
D
0 / 1000

Question 12

How can an underlying search be optimized to improve dashboard performance?

  • A. Limit the results to a specific time window.
  • B. Convert the search to an inline search.
  • C. Use NOT expressions to filter results.
  • D. Use the transaction command instead of stats.
Answer:

A

User Votes:
A
50%
B
50%
C
50%
D
50%

Explanation:
One of the most effective ways to enhance dashboard performance in Splunk is by narrowing the
time range of the underlying searches. Limiting the search to a specific time window reduces the
amount of data Splunk needs to process, leading to faster search execution and improved dashboard
responsiveness.
According to Splunk Documentation:
"One of the most effective ways to limit the data that is pulled off from disk is to limit the time range.
Use the time range picker or specify time modifiers in your search to identify the smallest window of
time necessary for your search."
Reference: Quick tips for optimization - Splunk Documentation

Discussions
vote your answer:
A
B
C
D
0 / 1000

Question 13

Which of the following correctly uses mvfilter?

  • A. mvfilter(isnotnull(X))
  • B. mvfilter(x, isnotnull)
  • C. where mvfilter(isnotnull(X))
  • D. eval new_field=mvfilter(*)
Answer:

A

User Votes:
A
50%
B
50%
C
50%
D
50%

Explanation:
The mvfilter function in Splunk is used to filter the values of a multivalue field based on a Boolean
expression. The correct syntax is:
mvfilter(expression)
Where expression is a condition applied to each value in the multivalue field. For instance:
eval filtered_field = mvfilter(isnotnull(X))
This command filters out null values from the multivalue field X.
Reference: mvfilter - Splunk Documentation

Discussions
vote your answer:
A
B
C
D
0 / 1000

Question 14

When using the bin command, what attributes are used to define the size and number of sets?

  • A. bins and minspan
  • B. bins and span
  • C. bins and start and end
  • D. bins and limit
Answer:

B

User Votes:
A
50%
B
50%
C
50%
D
50%

Explanation:
The bin command in Splunk is used to group continuous numerical values into discrete buckets or
bins. The span attribute defines the size of each bin, while the bins attribute specifies the number of
bins to create.
For example:
spl
Copy
... | bin span=10ms bins=5 duration
This command creates 5 bins, each spanning 10 milliseconds, for the duration field.
Reference: bin - Splunk Documentation

Discussions
vote your answer:
A
B
C
D
0 / 1000

Question 15

Which of the following attributes only applies to the form element, and not the dashboard root
element of a SimpleXML dashboard?

  • A. hideEdit
  • B. hideTitle
  • C. hideFilters
  • D. hideChrome
Answer:

C

User Votes:
A
50%
B
50%
C
50%
D
50%

Explanation:
In Splunk's Simple XML, certain attributes are specific to the <form> element and do not apply to the
<dashboard> root element. The hideFilters attribute is one such attribute that is exclusive to the
<form> element. It controls the visibility of form input elements (filters) in the dashboard.
Setting hideFilters="true" within the <form> element hides the input fields, allowing for a cleaner
dashboard view when inputs are not necessary.
Reference: Simple XML Reference - Splunk Documentation

Discussions
vote your answer:
A
B
C
D
0 / 1000
To page 2