Managing app and add-on configurations and properties
You can manage the configurations and properties for apps installed in your Splunk Enterprise instance from the Apps menu. Click on Apps in the User bar to select one of your installed apps or manage an app. From the Manage Apps page, you can do the following:
- Edit permissions for an app or add-on
- Enable or disable an app or add-on
- Perform actions, such as launch the app, edit the properties, and view app objects
Edit app and add-on properties
The edits you make to configuration and properties depend on whether you are the owner of the app or a user.
Select Apps > Manage Apps then click Edit properties for the app or add-on you want to edit. You can make the following edits for apps installed in this Splunk Enterprise instance.
- Name: Change the display name of the app or add-on in Splunk Web.
- Update checking: By default, update checking is enabled. You can override the default and disable update checking. See Checking for app an add-on updates below for details.
- Visible: Apps with views should be visible. Add-ons, which often do not have a view, should disable the visible property.
Refer to Apps and add-ons: An Introduction for details on the configuration and properties of apps and add-ons.
Checking for updates
You can configure Splunk Enterprise whether to check Splunkbase for updates to an app or add-on. By default, checking for updates is enabled. You can disable checking for updates for an app by editing this property from Settings > Apps > Edit properties.
However, if this property is not available in Splunk Web, you can also manually edit the apps
app.conf file to disable checking for updates. Create or edit the following stanza in
$SPLUNK_HOME/etc/apps/<app_name>/local/app.conf to disable checking for updates:
[package] check_for_updates = 0
Note: Edit the local version of
app.conf, not the default version. This avoids overriding your setting with the next update of the app.
Manage app and add-on objects
About users and roles
This documentation applies to the following versions of Splunk® Enterprise: 6.0, 6.0.1, 6.0.2, 6.0.3, 6.0.4, 6.0.5, 6.0.6, 6.0.7, 6.0.8, 6.0.9, 6.0.10, 6.0.11, 6.0.12, 6.0.13, 6.0.14, 6.0.15, 6.1, 6.1.1, 6.1.2, 6.1.3, 6.1.4, 6.1.5, 6.1.6, 6.1.7, 6.1.8, 6.1.9, 6.1.10, 6.1.11, 6.1.12, 6.1.13, 6.1.14, 6.2.0, 6.2.1, 6.2.2, 6.2.3, 6.2.4, 6.2.5, 6.2.6, 6.2.7, 6.2.8, 6.2.9, 6.2.10, 6.2.11, 6.2.12, 6.2.13, 6.2.14, 6.2.15, 6.3.0, 6.3.1, 6.3.2, 6.3.3, 6.3.4, 6.3.5, 6.3.6, 6.3.7, 6.3.8, 6.3.9, 6.3.10, 6.3.11, 6.3.12, 6.3.13, 6.3.14, 6.4.0, 6.4.1, 6.4.2, 6.4.3, 6.4.4, 6.4.5, 6.4.6, 6.4.7, 6.4.8, 6.4.9, 6.4.10, 6.4.11