Knowledge Management

How to move all the data from one index to another?

ayush-choudhary
Explorer

Issue : In the _internal logs we have logs from all Splunk UF and Splunk Enterprise components. The _internal logs from Splunk UF we do not want for more than 15 days. But _internal logs from Splunk Enterprise components such as CM/LM/MC, IDX, SH, SHC, DS, HF we want to store for longer duration for analysis purpose.

Now if we send _internal logs of Splunk enterprise component to different index then a lot of out-of-box searches in MC will not run as it should be. Even the inbuilt license query will be effected.

We have tried using mcollect to send the _internal logs to another index but then sourcetype is changed to Stash. 

Please let me know if there is a way to do it??

Labels (1)
0 Karma

gcusello
SplunkTrust
SplunkTrust

Hi @ayush-choudhary,

it's not so clear for me why you want a different retention period for data of other machines.

Anyway, I didn't tested, but it should run: you could export _raw data in a summary index, running a simple search:

index=_internal host IN (CM_hostname, IDX_hostname, SH_hostname, SHCv, DS_hostname, HF_hostname)
| collect index=summary_internal

Ciao.

Giuseppe

0 Karma
Get Updates on the Splunk Community!

Accelerating Observability as Code with the Splunk AI Assistant

We’ve seen in previous posts what Observability as Code (OaC) is and how it’s now essential for managing ...

Integrating Splunk Search API and Quarto to Create Reproducible Investigation ...

 Splunk is More Than Just the Web Console For Digital Forensics and Incident Response (DFIR) practitioners, ...

Congratulations to the 2025-2026 SplunkTrust!

Hello, Splunk Community! We are beyond thrilled to announce our newest group of SplunkTrust members!  The ...