Splunk Dev

Copy (not move) events into another index?

aworkman
Engager

I understand there's no way to do field extraction based on event types, but is there a way to COPY (not move) events into another index?

Tags (1)

shaa
Engager

hello! i was copy some data to new index with collect command but cipied data invisible. what wrong?

many thanks

dstricharz
Engager

Check out the command COLLECT. It allows you to specify a destination index while copying the result in events of your search.

jtrucks
Splunk Employee
Splunk Employee

You could export the results of a search matching the desired events to copy, then export in raw format (best done via CLI). Then you can use splunk add oneshot to index the data into the other index. This avoids messes with filenames et al.

You can export the events and then import them using the same sourcetype with:

splunk add oneshot yourdatafilenamehere -sourcetype yourdesiredsourcetypehere -index yourotherindexhere

Another option is to use a summary index instead, would be as easy as:

your event search here | collect index=yoursummaryindexnamehere

Perhaps elaborate on why you want to copy them to the other index? Also, is this on an ongoing basis or just once to copy historical data?

--
Jesse Trucks
Minister of Magic

mataharry
Communicator

You can copy the buckets from an index to another
- beware to avoid bucket id duplicates.
It will not be selective, all events will be present. But you can hide afterward using the "delete" command.

Get Updates on the Splunk Community!

Introducing the 2024 SplunkTrust!

Hello, Splunk Community! We are beyond thrilled to announce our newest group of SplunkTrust members!  The ...

Introducing the 2024 Splunk MVPs!

We are excited to announce the 2024 cohort of the Splunk MVP program. Splunk MVPs are passionate members of ...

Splunk Custom Visualizations App End of Life

The Splunk Custom Visualizations apps End of Life for SimpleXML will reach end of support on Dec 21, 2024, ...