icon/x Created with Sketch.

Splunk Cookie Policy

We use our own and third-party cookies to provide you with a great online experience. We also use these cookies to improve our products and services, support our marketing campaigns, and advertise to you on our website and other websites. Some cookies may continue to collect information after you have left our website. Learn more (including how to update your settings) here.
Accept Cookie Policy

We are working on something new...

A Fresh New Splunkbase
We are designing a New Splunkbase to improve search and discoverability of apps. Check out our new and improved features like Categories and Collections. New Splunkbase is currently in preview mode, as it is under active development. We welcome you to navigate New Splunkbase and give us feedback.

Accept License Agreements

This app is provided by a third party and your right to use the app is in accordance with the license provided by that third-party licensor. Splunk is not responsible for any third-party apps and does not provide any warranty or support. If you have any questions, complaints or claims with respect to this app, please contact the licensor directly.

Thank You

Downloading Splunk on Splunk (S.o.S) add-on for Unix and Linux
SHA256 checksum (splunk-on-splunk-sos-add-on-for-unix-and-linux_205.tgz) 3841d030c1e082207cb03dfc20a88f8f5649834f4c58cedaf2e440ccfc8addcf SHA256 checksum (splunk-on-splunk-sos-add-on-for-unix-and-linux_204.tgz) 5fe9528f0a5d600512a9e941356b82079300dc209e8883793b420487492ed2b4 SHA256 checksum (splunk-on-splunk-sos-add-on-for-unix-and-linux_203.tgz) 2efa8e79db2b7d3b90b145d3f6c54b1bec9133f59a02c4464153413f44d0d900 SHA256 checksum (splunk-on-splunk-sos-add-on-for-unix-and-linux_202.tgz) 18f2560a4c07d67809f6b11f10021969c5bd444de987422d63cf33d8aa1221bf SHA256 checksum (splunk-on-splunk-sos-add-on-for-unix-and-linux_201.tgz) f7aa3bfa4c3abe5e700aae2aa39c2882e1da8a28473d0042a1b387b3557126e1 SHA256 checksum (splunk-on-splunk-sos-add-on-for-unix-and-linux_200.tgz) 802ba36375db8c70c0350211decdc0c49ff255f4511634bd07f6884f2209dc19
To install your download
For instructions specific to your download, click the Details tab after closing this window.

Flag As Inappropriate

splunk

Splunk on Splunk (S.o.S) add-on for Unix and Linux

Splunk Labs
This app has been archived. Learn more about app archiving.
This app is NOT supported by Splunk. Please read about what that means for you here.
Overview
Details
On April 8, 2019, this add-on has been deprecated and reached its End of Life on July 7, 2019. For more information about the end of availability and support for this add-on, see https://www.splunk.com/blog/2019/03/18/end-of-availability-splunk-built-apps-and-add-ons.html?April.

The Splunk on Splunk Add-on is a collection of inputs for the Splunk on Splunk (SoS) app - http://www.splunk.com/goto/sos

Important: You do not need to install the S.o.S add-on on a Splunk instance where the S.o.S app is already installed. The S.o.S app ships with the same data inputs.

What is this add-on for, then?

This S.o.St add-on allows you to pull in resource usage data from remote Splunk instances running on Linux or Unix for display in your existing instance of the Splunk on Splunk app. To enable this, install and configure this S.o.S add-on on Linux and Unix search-peers or forwarders to track the resource usage of Splunk.

NOTE: You must enable the data inputs included in this add-on before they can report resource usage information. By default, these inputs are disabled. Refer to the README file for more information.

For more details on how to set up S.o.S and its add-on to monitor Splunk's system resource usage, please refer to the following Splunk Answers:

Release Notes

Version 2.0.5
May 6, 2014

Bugs Fixed in version 2.0.5

  • [SUP-845] Replaced all mentions of the S.o.S "technology add-on" with
    "add-on".
Version 2.0.4
May 6, 2013

Bugs Fixed in version 2.0.4

  • [SUP-672] Added an index definition for 'sos_summary_daily index' to indexes.conf.

  • [SUP-627] Fixed an issue where the ps_sos.sh scripted input would no longer print out full process arguments when executed by Splunk 5.x on Solaris.

  • [SUP-573] A new scripted input is now available to monitor the I/O usage of pooled search-heads on the shared NFS device: nfs-iostat_sos.py

  • [SUP-541] Updated the app icon.

Version 2.0.3
Dec. 16, 2012

Bugs fixed in version 2.0.3

  • [SUP-617] Removed an undesirable carriage return in the app.conf description string.

  • [SUP-568] Added an outputs.conf file with configuration that, if enabled, ensures that _internal events are forwarded.

  • [SUP-558] Synched up lsof_sos.sh with the version shipping in the SoS app.

  • [SUP-545] Adapted the ps_sos.sh scripted input to the new splunkd process command line format in 5.x.

Version 2.0.2
Aug. 25, 2012
  • [SUP-365] Added an app icon for the S.o.S TA for Unix and Linux.
Version 2.0.1
Dec. 16, 2011

Small changes to the README file.

Version 2.0.0
Dec. 15, 2011

Subscribe Share

Are you a developer?

As a Splunkbase app developer, you will have access to all Splunk development resources and receive a 10GB license to build an app that will help solve use cases for customers all over the world. Splunkbase has 1000+ apps from Splunk, our partners and our community. Find an app for most any data source and user need, or simply create your own with help from our developer portal.

Follow Us:
Splunk, Splunk>,Turn Data Into Doing, Data-to-Everything, and D2E are trademarks or registered trademarks of Splunk Inc. in the United States and other countries. All other brand names,product names,or trademarks belong to their respective owners.