All Apps and Add-ons

How to update an add-on in Splunk store.

SudarshanS
Explorer

I'm a novice developer in Splunk based add-on. I created an add-on 1 year back and wanted to upgrade the add-on, after upgrading the add-on to a newer version. I tried to upload the add-on to Splunk store and I got this error

The "id" field found in app.conf is already in use by another application.
of course, it's used by the same application and I want to upgrade the add-on. Can someone help me and mention what field I'm missing ?.

Thanks,
Sudarshan

0 Karma
1 Solution

ragedsparrow
Contributor

Go to your app in at splunkbase.splunk.com while logged into your Splunk.com account. If you are the owner of that app, you will have a bar with Administrator Tool options:
alt text

When you click on Manage App you will be taken to your app management page. You can then select to add a new version on the Hosting page.

Direct link: https://splunkbase.splunk.com/app/**APPID**/edit/#/hosting

View solution in original post

ragedsparrow
Contributor

Go to your app in at splunkbase.splunk.com while logged into your Splunk.com account. If you are the owner of that app, you will have a bar with Administrator Tool options:
alt text

When you click on Manage App you will be taken to your app management page. You can then select to add a new version on the Hosting page.

Direct link: https://splunkbase.splunk.com/app/**APPID**/edit/#/hosting

SudarshanS
Explorer

Thank you so much. It worked.

0 Karma
Get Updates on the Splunk Community!

More Ways To Control Your Costs With Archived Metrics | Register for Tech Talk

Tuesday, May 14, 2024  |  11AM PT / 2PM ET Register to Attend Join us for this Tech Talk and learn how to ...

.conf24 | Personalize your .conf experience with Learning Paths!

Personalize your .conf24 Experience Learning paths allow you to level up your skill sets and dive deeper ...

Threat Hunting Unlocked: How to Uplevel Your Threat Hunting With the PEAK Framework ...

WATCH NOWAs AI starts tackling low level alerts, it's more critical than ever to uplevel your threat hunting ...