icon/x Created with Sketch.

Splunk Cookie Policy

We use our own and third-party cookies to provide you with a great online experience. We also use these cookies to improve our products and services, support our marketing campaigns, and advertise to you on our website and other websites. Some cookies may continue to collect information after you have left our website. Learn more (including how to update your settings) here.
Accept Cookie Policy

We are working on something new...

A Fresh New Splunkbase
We are designing a New Splunkbase to improve search and discoverability of apps. Check out our new and improved features like Categories and Collections. New Splunkbase is currently in preview mode, as it is under active development. We welcome you to navigate New Splunkbase and give us feedback.

Accept License Agreements

This app is provided by a third party and your right to use the app is in accordance with the license provided by that third-party licensor. Splunk is not responsible for any third-party apps and does not provide any warranty or support. If you have any questions, complaints or claims with respect to this app, please contact the licensor directly.

Thank You

Downloading Infotools for Splunk
SHA256 checksum (infotools-for-splunk_121.tgz) d2bd4b7a201107a94bccd4fff6e2ade95a39a4a9e7b862741e803eddffa86e02 SHA256 checksum (infotools-for-splunk_12.tgz) 3ee38221f8df4fae20fcfd902a62dc41ef53cb85bb3c8b065150a096bb3b793a SHA256 checksum (infotools-for-splunk_111.tgz) 7663cf7c60c0c76fc370152d01389245137f7cc2265fd80d7fa7b1ecc7deae70 SHA256 checksum (infotools-for-splunk_110.tgz) a2466af19e0a7ab2aab0098a4f3f39a4c7448b58f3e45e75df65cbaa0ac2a858 SHA256 checksum (infotools-for-splunk_100.tgz) af56c674de2635fd18c5154b778c8ea20b949b495b3e2f3104857fd14b435c40
To install your download
For instructions specific to your download, click the Details tab after closing this window.

Flag As Inappropriate

splunk

Infotools for Splunk

Splunk Cloud
Splunk Labs
This app is NOT supported by Splunk. Please read about what that means for you here.
Overview
Details
INFOTOOLS

What is/are infotools you ask???

This app is a collection of custom commands that let you see information from the search head that may normally require access to a command shell or file system.

In version 1.2 there are 11 custom commands:

| lookupinfo - see the location size and modtime of lookups

| bundleinfo - see what inside the latest search bundle

| userinfo - lists all files in the etc/users directory with size and modtime

| appinfo - lists all files in the etc/app directory with size and modtime

| btoolinfo - yet another btool output (blocked in Splunk Cloud)

| artifactinfo - view or search the info.csv file in search artifacts

| pinginfo - run a ping from your search head to measure latency or availability

| sslinfo - run the openssl s_client to view certificate details

| varinfo - see the size and modtimes of files in the splunk/var directory

| cliinfo - run the splunk cli commands: status, list, show, display, help (blocked in Splunk Cloud)

| specinfo - view the details of the .conf.spec files

Each of these commands is a generating command (must be first command in the pipeline) and return results about the file objects.

What is the use case for infotools?

Glad you asked...

In Splunk Cloud and with many on-premise deployments most users do not have access to the file system.
It can be very useful to be able to see details about some specific Splunk files to help with troubleshooting.

For example:

One of the most common problems in many environments is large lookups file affecting bundle replication
the restapi commands for lookups do not return information about the file size if the lookup is not defined in transforms.conf, so you need access to the file system to see this information

In a search head cluster, large lookups that are frequently updated can impact performance since the entire file is replicated to all members
since lookupinfo provides the modtime, you can see if a lookup has been recently updated

Instructions

Prerequisites

This app requires python3

Install

Install Infotools on any Search Heads in your environment. Infotools should NOT be installed to any Forwarders, Indexers, or other non-Searching Splunk instances.
Install the app. For Splunk Cloud, refer to Install apps in your Splunk Cloud deployment. For customer managed deployments, refer to the standard methods for Splunk Add-on installs as documented for a Single Server Install or a Distributed Environment Install.

Configuration

There is no configuration requirement for Infotools. You may wish to restrict access to the commands to certain roles: admin, sc_admin. This is done via: Settings | All Configurations. Select the App: Info Tools (infotools) then click on the Permissions link for the command you wish to restrict.

Usage

lookupinfo

Version 1.2

usage:

| lookupinfo
| lookupinfo2

lookupinfo is a custom search command that will return information about the files contained in lookups directory for all apps on the search head where it is run
lookupinfo is a generating command and must be the first command in the pipeline
lookupinfo has no arguments
lookupinfo requires python3 to run
lookupinfo returns the following results:

app - the name of the app folder
name - the name of a file in the lookup folder
size - the size in bytes of the file
mtime - the modtime of the file in epoch format

lookupinfo returns ALL files found in the lookups folder, mostly this will be .csv files but also other files such as .gz, .kmz and the occasional README

Note: There can be another lookupinfo command on a search head (Enterprise Security, or the lookup editor) that will cause the web ui to hang, so there is an alias for this lookupinfo: lookupinfo2

bundleinfo

Version 1.2

usage:

| bundleinfo

bundleinfo is a custom search command that will return information about all the files contained in the most current search bundle (.bundle) on the search head where it is run
bundleinfo is a generating command and must be the first command in the pipeline
bundleinfo has no arguments
bundleinfo requires python3 to run
bundleinfo returns the following results:

bundlename - the full path and name of the bundle file
file - the name of a file in the bundle
size - the size in bytes of the file
mtime - the modtime of the file in epoch format

Note: In a search head cluster you must run this on the captain node to get the most current bundle.

userinfo

Version 1.2

usage:

| userinfo

userinfo is a custom search command that will return information about all the user folders and files on the search head where it is run
userinfo is a generating command and must be the first command in the pipeline
userinfo has no arguments
userinfo requires python3 to run
userinfo returns the following results:

user - the user name (foldername) from the etc/users directory
app - the name of the app folder
fileobject - the path and name of a file(s) below the app
size - the size in bytes of the file
mtime - the modtime of the file in epoch format

appinfo

Version 1.2

usage:

| appinfo (app=appname)

appinfo is a custom search command that will return information about all the app folders and files on the search head where it is run
appinfo is a generating command and must be the first command in the pipeline
appinfo has an optional argument: app which is a app folder name. This can also be a wildcard: */local will return only local folders in apps
appinfo requires python3 to run
appinfo returns the following results:

file - the path and name of a file(s) below the app
size - the size in bytes of the file
mtime - the modtime of the file in epoch format

btoolinfo

Version 1.2

usage:

| btoolinfo conf="conf file name"

example:

| btoolinfo conf="props"

btoolinfo will run a btool command with the --debug option for conf files on the search head where it is run
btoolinfo is a generating command and must be the first command in the pipeline
btoolinfo has an arguement conf= that should be the name of a valid .conf file - invalid names will return no results
btoolinfo requires python3 to run
btoolinfo returns the following results:

confpath - the full path the .conf file for the property
stanza - the name of the stanza with square brackets included
property - the name of the property
value - the value of the property

Note: btoolinfo is blocked from running on Splunk Cloud due to the app jail feature.

artifactinfo

Version 1.2

| artifactinfo <sid, search, regex>=<option_value>

example:

| artifactinfo sid=1679956099.1578
| artifactinfo search="really bad error"
| artifactinfo regex="\w+Searches"

artifactinfo is a custom search command that will return the contents of an info.csv file from a search artifact on the search head where it is run
artifactinfo is a generating command and must be the first command in the pipeline
artifactinfo requires 1 of 3 arguments: sid, search, regex
sid = search id of the artifact
search = a search string (case sensitive) to find in the info.csv file of any artifact
regex = a regex expression to use to search the info.csv file of any search artifact

artifactinfo requires python3 to run
artifactinfo returns the contents of the search artifact info.csv file

Note: In a search head cluster not all search artifacts will likely be on all nodes of the cluster depending on the
replication factor.

pinginfo

Version 1.2

| pinginfo address="ip address or name" (count=n)

example:

| pinginfo address="google.com" count=5

pinginfo is a custom search command that will run the OS ping command to the ip address or hostname specified
pinginfo is a generating command and must be the first command in the pipeline
ping info requires a host or ip address and optionally a count (max count is 10, default count is 3)
pinginfo requires python3 to run

pinginfo returns a field: pingdata that is the output of the OS ping command that was run

sslinfo

Version 1.2

| sslinfo hostport="host:port" (timeout=n)

example:

| sslinfo hostport=google.com:443" timeout=10

sslinfo is a custom search command that will run the openssl sclient command to return info about ssl certificate found at the address and port specified
sslinfo is a generating command and must be the first command in the pipeline
sslinfo requires a host or ip address and port be specified and optionally a timeout value in seconds for the command (default 5) maximum of 30
sslinfo requires python3 to run

sslinfo will return a field: data that is the output of the openssl s_client -connect command

varinfo

Version 1.2

| varinfo (<subdir>=<subdirectory under $SPLUNK_HOME/var>)

example:

| varinfo subdir="run/splunk/csv"

varinfo is a custom search command that will generates a list of files under $SPLUNK_HOME/var
varinfo is a generating command and must be the first command in the pipeline
varinfo has an optional argument: subdir that can be any valid subdirectory under $SPLUNK_HOME/var - if not specified all files are listed (may be a lot of files)
varinfo will return the following fields: file (including full path), size (bytes), mtime (epoch format)

Note: upward recursion is not allowed

cliinfo

Version 1.2

| cliinfo clicmd=<status, list, show, display, help command and options>

example:

| cliinfo clicmd="show kvstore-status"

cliinfo is a custom search command that will generate the output of certain display only splunk cli commands if you have the proper capability (list_settings) or role to run them (admin, sc_admin)
cliinfo is a generating command and must be the first command in the pipeline
cliinfo returns a field: cmdout that is the stdout from the command that was run

Note: if you try to run a command not listed you will get the message "not allowed" in the cmdout field

Note: the cliinfo command is blocked from running on Splunk Cloud by the app jail feature.

specinfo

Version 1.2

| specinfo spec=<spec file name>

example:

| specinfo spec=server

specinfo is a custom search command that will display the contents of a spec file from $SPLUNK_HOME/etc/system/README
specinfo is a generating command and must be the first command in the pipeline
specinfo returns a field: contents that is a complete listing of the .spec file requested

Note: a bad spec file name will return: .spec file not found

Release Notes

Version 1.2.1
June 28, 2024

Minor change to README

Version 1.2
June 26, 2024

Version 1.2 has been tested for compatibility with python 3.9 and Splunk version 9.3.
The splunklib library has been updated to version 2.0.1

The btoolinfo command option has been changed to conf= to be consistent with the documentation (it was confname=).

Version 1.1.1
Sept. 25, 2023

A new command has been added: appinfo that will display filename, size and modtimes of files in etc/apps

An alias has been added to the lookupinfo command: lookupinfo2 to allow it's execution when there is another lookupinfo python command installed

Note about Splunk Cloud: the btoolinfo and cliinfo commands are blocked from execution by the app jail function

Version 1.1.0
April 11, 2023

the remainder of the commands have been added - original was very old

Version 1.0.0
Feb. 15, 2022

New app release


Subscribe Share

Are you a developer?

As a Splunkbase app developer, you will have access to all Splunk development resources and receive a 10GB license to build an app that will help solve use cases for customers all over the world. Splunkbase has 1000+ apps from Splunk, our partners and our community. Find an app for most any data source and user need, or simply create your own with help from our developer portal.

Follow Us:
Splunk, Splunk>,Turn Data Into Doing, Data-to-Everything, and D2E are trademarks or registered trademarks of Splunk Inc. in the United States and other countries. All other brand names,product names,or trademarks belong to their respective owners.