System Requirements: This app is tested and working on Ubuntu and OSX 10.11.
The main purpose for this Add-on is to get your data into Splunk in a fast and efficient manner. To visualize your data please also install (https://splunkbase.splunk.com/app/3219/)
To install this add-on, you can can navigate to “Manage Apps” in your Splunk installation and then “Browse More Apps”. From there you can find the Nest Add-on for Splunk and install it.
Distributed Environment requirements: In a distributed environment, this Add-on is only needed on your Indexing tier.
If you’re upgrading this Add-on from a previous version, you might notice you have a nest_tokens.conf file and a passwords.conf file in your Nest Add-on’s local directory. The nest_tokens.conf file is no longer needed and is safe to remove.
From your Splunk installation:
If you no longer want the access_token you've created to be able to access your Nest Account, you can follow the instructions here.
The following command will allow you to check if the scripted input is running. You may see multiple instances of the python script as there are child processes that run to collect the data and ensure the command exits cleanly when Splunk is shutdown or restarted.
ps -ef | grep devices
Ensure you have your $SPLUNK_HOME variable set. More information on this can be found here: https://wiki.archlinux.org/index.php/Splunk
You can also view internal logs about the Add-on by using the following search:
Though this Add-on does use REST Streaming Requests to access data from Nest and store it in Splunk, it is not intended to provide real-time alerts regarding the status of your Nest Protect. You should utilize the official Nest App in order to receive alerts.
If you need assistance with the app you can use the instructions above or reach out on Splunk Answers.
Major overhaul of Add-on.
Add-on now utilizes a Graphical User Interface for setting up connection to Nest.
Add-on now uses an encrypted API Key.
For current users - nest_tokens.conf will no longer be needed after you upgrade.
Splunk AppInspect evaluates Splunk apps against a set of Splunk-defined criteria to assess the validity and security of an app package and components.
As a Splunkbase app developer, you will have access to all Splunk development resources and receive a 50GB license to build an app that will help solve use cases for customers all over the world. Splunkbase has 1000+ apps and add-ons from Splunk, our partners and our community. Find an app or add-on for most any data source and user need, or simply create your own with help from our developer portal.