icon/x Created with Sketch.

Splunk Cookie Policy

We use our own and third-party cookies to provide you with a great online experience. We also use these cookies to improve our products and services, support our marketing campaigns, and advertise to you on our website and other websites. Some cookies may continue to collect information after you have left our website. Learn more (including how to update your settings) here.
Accept Cookie Policy

We are working on something new...

A Fresh New Splunkbase
We are designing a New Splunkbase to improve search and discoverability of apps. Check out our new and improved features like Categories and Collections. New Splunkbase is currently in preview mode, as it is under active development. We welcome you to navigate New Splunkbase and give us feedback.
Log4Shell Vulnerability: Information and guidance for you. Get resources.

Accept License Agreements

This app is provided by a third party and your right to use the app is in accordance with the license provided by that third-party licensor. Splunk is not responsible for any third-party apps and does not provide any warranty or support. If you have any questions, complaints or claims with respect to this app, please contact the licensor directly.

Thank You

Downloading Splunk on Splunk (S.o.S) add-on for Unix and Linux
SHA256 checksum (splunk-on-splunk-sos-add-on-for-unix-and-linux_205.tgz) b55b94c4cc65c16842ce5494175bd972fc0ba96853a5de4277d7423225633282 SHA256 checksum (splunk-on-splunk-sos-add-on-for-unix-and-linux_204.tgz) e69bfb5bb3523fc1a05eebd1cc3feacbee1a45344ae955fc629546115e45b25d SHA256 checksum (splunk-on-splunk-sos-add-on-for-unix-and-linux_203.tgz) 931ca8ab1c08c04bb323008e10fe4b6a2b7145eaa258d4aa96a3192898b8e7d6 SHA256 checksum (splunk-on-splunk-sos-add-on-for-unix-and-linux_202.tgz) 50f80e44266ffec244a602b73155d39103f6d7e8b7beb4bb334e6fe0f3bb3ce0 SHA256 checksum (splunk-on-splunk-sos-add-on-for-unix-and-linux_201.tgz) 168b5c3d6020c2c39ee32fa7be4db70823dda895bcdc346ea491c425f4e1bdbc SHA256 checksum (splunk-on-splunk-sos-add-on-for-unix-and-linux_200.tgz) 8754e9306843d8613cf005f9bab8694dfb82f680cb8737409d320fdac605dab6
To install your download
For instructions specific to your download, click the Details tab after closing this window.

Flag As Inappropriate


Splunk on Splunk (S.o.S) add-on for Unix and Linux

Splunk Labs
This app has been archived. Learn more about app archiving.
This app is NOT supported by Splunk. Please read about what that means for you here.
On April 8, 2019, this add-on has been deprecated and reached its End of Life on July 7, 2019. For more information about the end of availability and support for this add-on, see https://www.splunk.com/blog/2019/03/18/end-of-availability-splunk-built-apps-and-add-ons.html?April.

The Splunk on Splunk Add-on is a collection of inputs for the Splunk on Splunk (SoS) app - http://www.splunk.com/goto/sos

Important: You do not need to install the S.o.S add-on on a Splunk instance where the S.o.S app is already installed. The S.o.S app ships with the same data inputs.

What is this add-on for, then?

This S.o.St add-on allows you to pull in resource usage data from remote Splunk instances running on Linux or Unix for display in your existing instance of the Splunk on Splunk app. To enable this, install and configure this S.o.S add-on on Linux and Unix search-peers or forwarders to track the resource usage of Splunk.

NOTE: You must enable the data inputs included in this add-on before they can report resource usage information. By default, these inputs are disabled. Refer to the README file for more information.

For more details on how to set up S.o.S and its add-on to monitor Splunk's system resource usage, please refer to the following Splunk Answers:

Release Notes

Version 2.0.5
May 6, 2014

Bugs Fixed in version 2.0.5

  • [SUP-845] Replaced all mentions of the S.o.S "technology add-on" with
Version 2.0.4
May 6, 2013

Bugs Fixed in version 2.0.4

  • [SUP-672] Added an index definition for 'sos_summary_daily index' to indexes.conf.

  • [SUP-627] Fixed an issue where the ps_sos.sh scripted input would no longer print out full process arguments when executed by Splunk 5.x on Solaris.

  • [SUP-573] A new scripted input is now available to monitor the I/O usage of pooled search-heads on the shared NFS device: nfs-iostat_sos.py

  • [SUP-541] Updated the app icon.

Version 2.0.3
Dec. 16, 2012

Bugs fixed in version 2.0.3

  • [SUP-617] Removed an undesirable carriage return in the app.conf description string.

  • [SUP-568] Added an outputs.conf file with configuration that, if enabled, ensures that _internal events are forwarded.

  • [SUP-558] Synched up lsof_sos.sh with the version shipping in the SoS app.

  • [SUP-545] Adapted the ps_sos.sh scripted input to the new splunkd process command line format in 5.x.

Version 2.0.2
Aug. 25, 2012
  • [SUP-365] Added an app icon for the S.o.S TA for Unix and Linux.
Version 2.0.1
Dec. 16, 2011

Small changes to the README file.

Version 2.0.0
Dec. 15, 2011

Subscribe Share

Are you a developer?

As a Splunkbase app developer, you will have access to all Splunk development resources and receive a 10GB license to build an app that will help solve use cases for customers all over the world. Splunkbase has 1000+ apps from Splunk, our partners and our community. Find an app for most any data source and user need, or simply create your own with help from our developer portal.

Follow Us:
Splunk, Splunk>,Turn Data Into Doing, Data-to-Everything, and D2E are trademarks or registered trademarks of Splunk Inc. in the United States and other countries. All other brand names,product names,or trademarks belong to their respective owners.