A security team needs to ingest a static file for a specific incident. The log file has not been collected previously and future updates to the file must not be indexed.
Which command would meet these needs?
The correct answer is A. splunk add one shot / opt/ incident [data . log ---index incident
splunk add one shot <file> -index <index_name>
The file parameter specifies the path to the file or directory to be indexed. The index parameter specifies the name of the index where the data will be stored. If the index does not exist, Splunk will create it automatically.
Option B is incorrect because the splunk edit monitor command modifies an existing monitor input, which is used for ingesting files or directories that change or update over time. This command does not create a new monitor input, nor does it stop monitoring after indexing.
Option C is incorrect because the splunk add monitor command creates a new monitor input, which is also used for ingesting files or directories that change or update over time. This command does not stop monitoring after indexing.
Option D is incorrect because the splunk edit oneshot command does not exist. There is no such command in the Splunk CLI.
Delmy
1 months agoSamuel
1 months agoFabiola
15 days agoAnnelle
20 days agoEvan
30 days agoJennifer
1 months agoCarry
2 months agoSunshine
2 months agoRene
30 days agoRasheeda
1 months agoDelfina
1 months agoParis
2 months agoDorsey
21 days agoRosendo
26 days agoBrandee
1 months agoAlonso
2 months agoCharlene
2 months ago