btool provides a scripted input that indexes configuration file introspection for your Splunk instance.
btool.sh configuration_file [splunk_home] [sudo_user]
Runs $splunk_home/bin/splunk btool $configuration_file --debug
, sudoing as the $sudo_user if any.
splunk_home defaults to $SPLUNK_HOME.
If you are running the btool script from one splunk instance against another, then you need to specify splunk_home.
You'll also want to set a sudo_user (and configure sudoers appropriately) if the foreign splunk instance runs as a
different user than the calling splunk instance.
Starting with version 2.0.0, btool will only index a configuration if there has been a change in output since the last run, or if 24 hours have passed since the last change. This means you can run btool frequently without wasting your license, and that you can always get a complete configuration if you search over the last 24h.
The following fields are extracted * app_folder (apps, master-apps, slave-apps) * app (app folder or "system") * conf (e.g. props.conf) * SPLUNK_HOME * stanza
Added icons to address appInspect failures
As a Splunkbase app developer, you will have access to all Splunk development resources and receive a 10GB license to build an app that will help solve use cases for customers all over the world. Splunkbase has 1000+ apps from Splunk, our partners and our community. Find an app for most any data source and user need, or simply create your own with help from our developer portal.