icon/x Created with Sketch.

Splunk Cookie Policy

We use our own and third-party cookies to provide you with a great online experience. We also use these cookies to improve our products and services, support our marketing campaigns, and advertise to you on our website and other websites. Some cookies may continue to collect information after you have left our website. Learn more (including how to update your settings) here.
Accept Cookie Policy

Accept License Agreements

This app is provided by a third party and your right to use the app is in accordance with the license provided by that third-party licensor. Splunk is not responsible for any third-party apps and does not provide any warranty or support. If you have any questions, complaints or claims with respect to this app, please contact the licensor directly.

Thank You

Downloading KSCONF
SHA256 checksum (ksconf_076.tgz) 60142fe6a20232eab899dbd9f6b7b0db0f1b3242a506ebf74afc03ddc4f0cf62 SHA256 checksum (ksconf_075.tgz) d75eb6d181b614872799b5af054c039748dd2ebda120c33f0a07a2d936df418e SHA256 checksum (ksconf_074.tgz) 6f62d4e0a2c3666b111e90263653803b42fc2d05852413bb0f7aa8eee2f9343f SHA256 checksum (ksconf_073.tgz) 899a3c007b3a1940ece8e1c52e033c36a2a12ae5ef36b071162d6954d74cd360 SHA256 checksum (ksconf_072.tgz) 4670e324a14763ac4ef969a385c472bc7db1fc176e8882d241b7158c9e49f469 SHA256 checksum (ksconf_071.tgz) ed514548036306dc62a0af6fd5e384eb52d305f76c3d15277dd45c2e4d2c8290 SHA256 checksum (ksconf_070.tgz) ba4b64d90b4e1bb26a30bf464344d7dc0a1b1e086cd915027c67ee2a4b33a5b8 SHA256 checksum (ksconf_062.tgz) a26908ad95ac1d64c1da7feeaec2b3a8815a155b49df90ef3a87b445d99c1e78 SHA256 checksum (ksconf_061.tgz) 305686e444f443d3184b135d4e98f0ce4ceb4ef44d09520d5d634cfb437abd25
To install your download
For instructions specific to your download, click the Details tab after closing this window.

Flag As Inappropriate


Splunk AppInspect Passed
Git and Splunk don't always fit together perfectly. Introducing KSCONF, a tool written to alleviate painful tasks associated with managing Splunk apps in a git repository. This open source tool supports many functions to help both admins and developers manage Splunk content in git in a simple way without getting stuck in the details.


What is KSCONF?

KSCONF is a command-line tool that helps administrators and developers manage their Splunk environments by enhancing control of their configuration files. The interface is modular so that each function (or subcommand) can be learned quickly and used independently. While most users will probably only use a subset of the total capabilities of this tool, it’s reassuring to have a deep toolbox of power goodies ready to be unleashed at a moments notice. Ksconf works with (and does not replace) your existing Splunk deployment mechanisms and version control tools.

KSCONF is open source and an open development effort. Check us out on GitHub

Pronounced: k·s·kȯnf

Design principles

  • Ksconf is a toolbox. - Each tool has a specific purpose and function that works independently. Borrowing from the Unix philosophy, each command should do one small thing well and be easily combined to handle higher-order tasks.
  • When possible, be familiar. - Various commands borrow from popular UNIX command line tools such as “grep” and “diff”. The overall modular nature of the command is similar to the modular interface used by “git” and the “splunk” cli.
  • Don’t impose workflow. - Ksconf works with or without version control and independently of your deployment mechanisms. (If you are looking to implement these things, ksconf is a great building block)
  • Embrace automated testing. - It’s impractical to check every scenarios between each release, but significant work has gone into unittesting the CLI to avoid breaks between releases.

Common uses for ksconf

  • Promote changes from “local” to “default”
  • Maintain multiple independent layers of configurations
  • Reduce duplicate settings in a local file
  • Upgrade apps stored in version control
  • Merge or separate configuration files
  • Push .conf stanzas to a REST endpoint (send custom configs to Splunk Cloud)

What's in the KSCONF App for Splunk?

This Splunk app comes bundled with a CLI tool that helps manage other Splunk apps. While this is not a traditional use case for a Splunk app, it is a very quick and easy way to deploy ksconf.

Why did we make this a Splunk app? Well, while ksconf is technically just a Python package that can be deployed in a variety of ways, we found that the logistics of getting it deployed can be quite difficult due to a packaging issues, legacy cruft, and OS limitations. This approach avoids all that mess.

Getting Started

Full documentation for ksconf and, therefore this app, is hosted at read-the-docs. A full copy of the ksconf documentation is also included, just like how Splunk ships with a fully copy of the docs in the system/README folder. (And all the air-gapped people rejoice! but sadly, no one could hear them.)


Need help?

Get Involved


Additional Splunk UI feature are planned, but currently not implemented.

  • Dashboard to track all changes coordinated by ksconf
  • Configuration snapshot tracking
  • Custom SPL command to give visibility into the what exists in the local folder. (The built-in rest command only shows you the final merged view of your settings; and sometimes you have to look deeper.)

Installation & Configuration

See the Install an add-on in Splunk's official documentation. There is one manual step required to active the CLI portion of this app, if you choose to do so. See the Installation docs for more details.


Community support is available on best-effort basis. For information about commercial support, contact Kintyre
Issues are tracked via GitHub


See the full Change log

Release Notes

Version 0.7.6
Aug. 16, 2019

Version 0.7.5
July 3, 2019

Version 0.7.4
June 8, 2019

Version 0.7.3
June 5, 2019

Version 0.7.2
March 22, 2019

Version 0.7.1
March 14, 2019

Version 0.7.0
Feb. 28, 2019

This release fixes up packaging issues with python package folders that may caused issues after upgrades. Unfortunately, this means everyone who had installed 0.6.x should uninstall and do a fresh install of 0.7.0. Hopefully this issue is resolved and extra steps like this won't be required in the future.

As always, read the full change log here:

Version 0.6.2
Feb. 9, 2019


Version 0.6.1
Feb. 7, 2019


Subscribe Share

AppInspect Tooling

Splunk AppInspect evaluates Splunk apps against a set of Splunk-defined criteria to assess the validity and security of an app package and components.

Are you a developer?

As a Splunkbase app developer, you will have access to all Splunk development resources and receive a 50GB license to build an app that will help solve use cases for customers all over the world. Splunkbase has 1000+ apps and add-ons from Splunk, our partners and our community. Find an app or add-on for most any data source and user need, or simply create your own with help from our developer portal.

Follow Us:
© 2005-2019 Splunk Inc. All rights reserved.
Splunk®, Splunk>®, Listen to Your Data®, The Engine for Machine Data®, Hunk®, Splunk Cloud™, Splunk Light™, SPL™ and Splunk MINT™ are trademarks and registered trademarks of Splunk Inc. in the United States and other countries. All other brand names, product names, or trademarks belong to their respective owners.