A site has a single existing search head which hosts a mix of both CIM and non-CIM compliant applications. All of the applications are mission-critical. The customer wants to carefully control cost, but wants good ES performance.What is the best practice for installing ES?
Enterprise Security's dashboards primarily pull data from what type of knowledge object?
To which of the following should the ES application be uploaded?
If a username does not match the `˜identity' column in the identities list, which column is checked next?
Which of the following features can the Add-on Builder configure in a new add-on?
The Add-On Builder creates Splunk Apps that start with what?