Splunk Enterprise Certified Admin Practice Test

Disable ads (and more) with a membership for a one time $2.99 payment

Prepare for the Splunk Enterprise Certified Admin Exam. Access flashcards and multiple-choice questions, each question comes with insights and explanations. Ace your exam with confidence!

Each practice test/flash card set has 50 randomly selected questions from a bank of over 500. You'll get a new set of questions each time!

Practice this question and more.


What component manages the collection of Windows logs in Splunk?

  1. Props.conf

  2. Inputs.conf

  3. Server.conf

  4. Cluster.conf

The correct answer is: Inputs.conf

The collection of Windows logs in Splunk is managed by the Inputs.conf file. This configuration file defines the data inputs for the Splunk instance and specifies where and how data is collected from various sources, including Windows event logs. When you want to collect logs from a Windows system, you typically configure the Inputs.conf file to specify the data source, such as Windows Event Log. This involves defining the input type, path, and any relevant parameters that determine how Splunk will gather and manage that data. The other configuration files serve different purposes within Splunk. Props.conf is used for data transformation, such as setting the time format and defining field extractions. Server.conf controls server-wide settings such as instance capabilities and communication between Splunk components. Cluster.conf is involved in managing configurations for indexer and search head clustering, which is not directly related to the collection of logs. Hence, Inputs.conf is the correct choice for managing the collection of Windows logs.