<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Re: How to move search history? in Splunk Search</title>
    <link>https://community.splunk.com/t5/Splunk-Search/How-to-move-search-history/m-p/371319#M109283</link>
    <description>&lt;P&gt;Stopping and starting the Windows service or the Linux daemon would work.&lt;/P&gt;

&lt;P&gt;This will also work:&lt;BR /&gt;
    $SPLUNK_HOME/bin/splunk restart&lt;/P&gt;</description>
    <pubDate>Wed, 14 Feb 2018 00:43:32 GMT</pubDate>
    <dc:creator>gjanders</dc:creator>
    <dc:date>2018-02-14T00:43:32Z</dc:date>
    <item>
      <title>How to move search history?</title>
      <link>https://community.splunk.com/t5/Splunk-Search/How-to-move-search-history/m-p/371316#M109280</link>
      <description>&lt;P&gt;I am trying to copy the search history (not the saved searches) from my old computer to the new one. &lt;/P&gt;

&lt;P&gt;I found  CSV files containing all the search history of a Splunk user (in Windows environment): &lt;/P&gt;

&lt;P&gt;C:\Program Files\Splunk\etc\users\admin\search\history &lt;/P&gt;

&lt;P&gt;Let's assume that the old computer's searches are inside "old.csv" and the new computer's searches are in "new.csv". I tried concatenating "new.csv" with the entries of "old.csv". Splunk sees only the entries from "new.csv" and reverts "new.csv" to its automatically generated version (so that only the searches from the new computer are there). &lt;/P&gt;

&lt;P&gt;I tried substituting "old.csv" with "new.csv" and renaming "new.csv" to the name of "old.csv". Again, Splunk reverts to the original "new.csv". &lt;/P&gt;

&lt;P&gt;In the directory "C:\Program Files\Splunk\etc\users\admin\search\metadata" there is a file "local.meta": &lt;/P&gt;

&lt;P&gt;[history/.dummy_history]&lt;BR /&gt;
version = 7.0.2&lt;BR /&gt;
modtime = 1517937609.995129100&lt;/P&gt;

&lt;P&gt;[ui-tour/search-tour]&lt;BR /&gt;
version = 7.0.2&lt;BR /&gt;
modtime = 1517937609.996605600&lt;/P&gt;

&lt;P&gt;[ui-prefs/search]&lt;BR /&gt;
version = 7.0.2&lt;BR /&gt;
modtime = 1518105949.173788200&lt;/P&gt;

&lt;P&gt;I tried editing the modtimes in various ways corresponding to the times in the CSV-file but this does not have a noticeable effect. &lt;/P&gt;

&lt;P&gt;I assume that Splunk has a place for keeping track of search history that is not the file in the directory "history" of the corresponding user. However, I have only Fund1 and I am not aware of Splunk's internals. &lt;/P&gt;

&lt;P&gt;Please tell me how I can take the search history of one machine and add it to the search history of another one. Additionally, this is a feature suggestion. &lt;/P&gt;</description>
      <pubDate>Fri, 09 Feb 2018 07:29:48 GMT</pubDate>
      <guid>https://community.splunk.com/t5/Splunk-Search/How-to-move-search-history/m-p/371316#M109280</guid>
      <dc:creator>vader_akbarhan</dc:creator>
      <dc:date>2018-02-09T07:29:48Z</dc:date>
    </item>
    <item>
      <title>Re: How to move search history?</title>
      <link>https://community.splunk.com/t5/Splunk-Search/How-to-move-search-history/m-p/371317#M109281</link>
      <description>&lt;P&gt;Are you shutting down the Splunk instance before modifying the (new) Splunk instances search history file?&lt;/P&gt;</description>
      <pubDate>Sat, 10 Feb 2018 22:02:14 GMT</pubDate>
      <guid>https://community.splunk.com/t5/Splunk-Search/How-to-move-search-history/m-p/371317#M109281</guid>
      <dc:creator>gjanders</dc:creator>
      <dc:date>2018-02-10T22:02:14Z</dc:date>
    </item>
    <item>
      <title>Re: How to move search history?</title>
      <link>https://community.splunk.com/t5/Splunk-Search/How-to-move-search-history/m-p/371318#M109282</link>
      <description>&lt;P&gt;About shutting down the Splunk instance -- I am simply closing the browser where I have a session in Splunk. &lt;BR /&gt;
How should I shut the instance down? (This was not covered in Fund. I.) Would stopping and starting its Windows/Linux deamon do it? I guess there is a better way to restart an instance. &lt;/P&gt;</description>
      <pubDate>Tue, 13 Feb 2018 12:40:20 GMT</pubDate>
      <guid>https://community.splunk.com/t5/Splunk-Search/How-to-move-search-history/m-p/371318#M109282</guid>
      <dc:creator>vader_akbarhan</dc:creator>
      <dc:date>2018-02-13T12:40:20Z</dc:date>
    </item>
    <item>
      <title>Re: How to move search history?</title>
      <link>https://community.splunk.com/t5/Splunk-Search/How-to-move-search-history/m-p/371319#M109283</link>
      <description>&lt;P&gt;Stopping and starting the Windows service or the Linux daemon would work.&lt;/P&gt;

&lt;P&gt;This will also work:&lt;BR /&gt;
    $SPLUNK_HOME/bin/splunk restart&lt;/P&gt;</description>
      <pubDate>Wed, 14 Feb 2018 00:43:32 GMT</pubDate>
      <guid>https://community.splunk.com/t5/Splunk-Search/How-to-move-search-history/m-p/371319#M109283</guid>
      <dc:creator>gjanders</dc:creator>
      <dc:date>2018-02-14T00:43:32Z</dc:date>
    </item>
  </channel>
</rss>

