icon/x Created with Sketch.

Splunk Cookie Policy

We use our own and third-party cookies to provide you with a great online experience. We also use these cookies to improve our products and services, support our marketing campaigns, and advertise to you on our website and other websites. Some cookies may continue to collect information after you have left our website. Learn more (including how to update your settings) here.
Accept Cookie Policy

Accept License Agreements

This app is provided by a third party and your right to use the app is in accordance with the license provided by that third-party licensor. Splunk is not responsible for any third-party apps and does not provide any warranty or support. If you have any questions, complaints or claims with respect to this app, please contact the licensor directly.

Thank You

Downloading Nest Add-on for Splunk
SHA256 checksum (nest-add-on-for-splunk_200.tgz) c67ad888ffe02047ee17755daeeb5521305ab01915fc5e838b0926775bbd9b72
To install your download
For instructions specific to your download, click the Details tab after closing this window.

Flag As Inappropriate

Nest Add-on for Splunk

Admins: Please read about Splunk Enterprise 8.0 and the Python 2.7 end-of-life changes and impact on apps and upgradeshere.
From Nest Thermostats to the Nest Protect, this app can monitor it all. A very clean and simple app, Nest Add-on for Splunk contains one python script that can actively pull data from many different Nest devices and accounts using REST streaming requests. To visualize your data from this Add-on please also install the Nest App for Splunk (https://splunkbase.splunk.com/app/3219/)

Nest Add-on for Splunk Documentation

System Requirements: This app is tested and working on Ubuntu and OSX 10.11.

The main purpose for this Add-on is to get your data into Splunk in a fast and efficient manner. To visualize your data please also install (https://splunkbase.splunk.com/app/3219/)


To install this add-on, you can can navigate to “Manage Apps” in your Splunk installation and then “Browse More Apps”. From there you can find the Nest Add-on for Splunk and install it.

Distributed Environment requirements: In a distributed environment, this Add-on is only needed on your Indexing tier.


If you’re upgrading this Add-on from a previous version, you might notice you have a nest_tokens.conf file and a passwords.conf file in your Nest Add-on’s local directory. The nest_tokens.conf file is no longer needed and is safe to remove.


From your Splunk installation:

  1. Go to Manage Apps
  2. Find the the "Setup" link for the Nest Add-on for Splunk.
  3. There you will be provided with a Graphical User Interface for configuring the Add-on.

Deauthorizing an access token

If you no longer want the access_token you've created to be able to access your Nest Account, you can follow the instructions here.



  1. The following command will allow you to check if the scripted input is running. You may see multiple instances of the python script as there are child processes that run to collect the data and ensure the command exits cleanly when Splunk is shutdown or restarted.

    ps -ef | grep devices

  2. Ensure you have your $SPLUNK_HOME variable set. More information on this can be found here: https://wiki.archlinux.org/index.php/Splunk

  3. You can also view internal logs about the Add-on by using the following search:

    index=_internal source=*nest.log


Though this Add-on does use REST Streaming Requests to access data from Nest and store it in Splunk, it is not intended to provide real-time alerts regarding the status of your Nest Protect. You should utilize the official Nest App in order to receive alerts.

If you need assistance with the app you can use the instructions above or reach out on Splunk Answers.

Release Notes

Version 2.0.0
Aug. 14, 2017

Major overhaul of Add-on.
Add-on now utilizes a Graphical User Interface for setting up connection to Nest.
Add-on now uses an encrypted API Key.
For current users - nest_tokens.conf will no longer be needed after you upgrade.


Subscribe Share

AppInspect Tooling

Splunk AppInspect evaluates Splunk apps against a set of Splunk-defined criteria to assess the validity and security of an app package and components.

Are you a developer?

As a Splunkbase app developer, you will have access to all Splunk development resources and receive a 10GB license to build an app that will help solve use cases for customers all over the world. Splunkbase has 1000+ apps and add-ons from Splunk, our partners and our community. Find an app or add-on for most any data source and user need, or simply create your own with help from our developer portal.

Follow Us:
© 2005-2020 Splunk Inc. All rights reserved.
Splunk®, Splunk>®, Listen to Your Data®, The Engine for Machine Data®, Hunk®, Splunk Cloud™, Splunk Light™, SPL™ and Splunk MINT™ are trademarks and registered trademarks of Splunk Inc. in the United States and other countries. All other brand names, product names, or trademarks belong to their respective owners.