How are HTTP Event Collector (HEC) tokens configured in a managed Splunk Cloud environment?
The following Apache access log is being ingested into Splunk via a monitor input:How does Splunk determine the time zone for this event?
What syntax is required in inputs.conf to ingest data from files or directories?
A user has been asked to mask some sensitive data without tampering with the structure of the file /var/log/purchases/transactions.log that has the following format:2020-01-01 00:01:20 User=bob SuperSecretNumber=123456789012 Operation=purchase2020-01-01 16:15:32 User=alice SuperSecretNumber=123456789012 Operation=purchaseWhich of the stanzas below will achieve this?
Which of the following are valid settings for file and directory monitor inputs?
When monitoring directories that contain mixed file types, which setting should be omitted from inputs.conf and instead be overridden in props.conf?