icon/x Created with Sketch.

Splunk Cookie Policy

We use our own and third-party cookies to provide you with a great online experience. We also use these cookies to improve our products and services, support our marketing campaigns, and advertise to you on our website and other websites. Some cookies may continue to collect information after you have left our website. Learn more (including how to update your settings) here.
Accept Cookie Policy

Accept License Agreements

This app is provided by a third party and your right to use the app is in accordance with the license provided by that third-party licensor. Splunk is not responsible for any third-party apps and does not provide any warranty or support. If you have any questions, complaints or claims with respect to this app, please contact the licensor directly.

Thank You

Downloading Optimate Integrator for PI System to Splunk.
SHA256 checksum (optimate-integrator-for-pi-system-to-splunk_221.tgz) 04753b597122aa846fbbf7be7ce911da88d340487fedce757019508d0e557200 SHA256 checksum (optimate-integrator-for-pi-system-to-splunk_219.tgz) f749013414aa220c64eb33a40558dd5b4f8fd61c047085937fc35a91d6cf6bf7 SHA256 checksum (optimate-integrator-for-pi-system-to-splunk_216.tgz) 50dd759ecaf20020c70e7bbacc6e5ec87085d60b2110e3228049fb3e671c3fd6 SHA256 checksum (optimate-integrator-for-pi-system-to-splunk_10507b.tgz) b0ef55aa6026c11c7741b0372995d0f3053cb3a8563ebcd954117c8f9b400915
To install your download
For instructions specific to your download, click the Details tab after closing this window.

Flag As Inappropriate

Optimate Integrator for PI System to Splunk.

Admins: Please read about Splunk Enterprise 8.0 and the Python 2.7 end-of-life changes and impact on apps and upgradeshere.
The Optimate Integrator for PI System to Splunk, installs into the Splunk environment and allows you to run Splunk searches against an OSIsoft PI Data Archive, Asset Framework or Collective via the OSIsoft PI WebAPI. The Integrator has been developed in Java so it supports both Linux and Windows Splunk environments. The Integrator comes with custom commands as well the ability to run PI expressions, giving you significant data extraction capabilities to leverage Splunk’s reporting, alerting, dashboarding and the machine learning tool kit. By incorporating PI expressions into your searches you can aggregate and filter the raw PI data to reduce your data ingestion into Splunk.

Installation Help

+ Installation Guide

Documentation / Links

+ Command Reference Guide
+ Known Issues
+ Release History

All documentation can be found on our products page


Release Notes

Version 2.2.1
July 31, 2018

• ERP code modified to return fixed tags if applicable.
• Returns full path of elements in ‘tagname’ field.
• Added ability to reference any AF child attribute.
• Changed attribute syntax (“:” to “|”) and (“,” to “;”).
• Now checks brackets and parentheses in “query” and “attribute” terms.
• Fixed some low impact bugs.
• Modified some warning messages to give more relevant detail.
• Added ability to access element child metadata and attribute metadata.
• Updated ‘Help’ page documentation to match release changes.

Version 2.1.9
July 16, 2018

Enhanced search support for OSIsoft PI static attributes. If a static attribute forms a part of a
search, the current value of the static attribute is returned irrespective of the search date range.

Version 2.1.6
June 27, 2018

• Fixed search speed issues, an estimated 45% increase for the annual version and 15% for the trial version.
(The trial version has been speed governed by design)
• Added support for OSIsoft PI AF metadata searches.
• Added support for OSIsoft PI AF data searches.
• Added additional automated testing for Linux, both root and non-root access.
• Added additional automated testing for the new AF searching functions.
• Added host only licencing support.
• Added licencing support for PI collectives.
• Modified licencing to constrain the trial licence to one server only.
• Fixed issues with licencing on Linux installations of Splunk.
• Fixed issues with licencing on Windows installations of Splunk.
• Modified licencing to constrain events returned from the trial licence to 100 events.

Version 1.0.507B
Nov. 21, 2017

• Fixed issue with the licencing page not behaving as expected on Linux, access to the machine
identification functions was limited to root access only.
Initial release.


Subscribe Share

AppInspect Tooling

Splunk AppInspect evaluates Splunk apps against a set of Splunk-defined criteria to assess the validity and security of an app package and components.

Are you a developer?

As a Splunkbase app developer, you will have access to all Splunk development resources and receive a 10GB license to build an app that will help solve use cases for customers all over the world. Splunkbase has 1000+ apps and add-ons from Splunk, our partners and our community. Find an app or add-on for most any data source and user need, or simply create your own with help from our developer portal.

Follow Us:
© 2005-2020 Splunk Inc. All rights reserved.
Splunk®, Splunk>®, Listen to Your Data®, The Engine for Machine Data®, Hunk®, Splunk Cloud™, Splunk Light™, SPL™ and Splunk MINT™ are trademarks and registered trademarks of Splunk Inc. in the United States and other countries. All other brand names, product names, or trademarks belong to their respective owners.