Knowledge Management

Issues moving data from one index to another

byu168
Path Finder

I was attempting to move events from one index to another using this command

index=main host=gpm source=/var/log/gpm/gpm.log | collect index=gpm sourcetype=gpm

I checked the initial search to verify all the events I want are there, however, after running the entire command and checking index=gpm there are no events stored in it. gpm is a newly created index that has no events in it at all. Is there any reason that this issue is occurring?

0 Karma
1 Solution

byu168
Path Finder

I wasn't able to figure out the cause of the issue, however, since the size of data I was moving was relatively small I found it easier to simply reindex the data

View solution in original post

0 Karma

woodcock
Esteemed Legend

If you are moving 100% of the contents of the index, you can easily just rename it from the OS. You need to stop splunk, find the indexes.conf file that contains the current index definition, change the name of the index there, go find the directory on disk and change the name there, too, then restart splunk.

0 Karma

byu168
Path Finder

Thanks for the information! I was selectively moving data but this information could be useful in the future.

0 Karma

byu168
Path Finder

I wasn't able to figure out the cause of the issue, however, since the size of data I was moving was relatively small I found it easier to simply reindex the data

0 Karma

ddrillic
Ultra Champion
0 Karma
Get Updates on the Splunk Community!

Splunk AI Assistant for SPL | Key Use Cases to Unlock the Power of SPL

Splunk AI Assistant for SPL | Key Use Cases to Unlock the Power of SPL  The Splunk AI Assistant for SPL ...

Buttercup Games: Further Dashboarding Techniques (Part 5)

This series of blogs assumes you have already completed the Splunk Enterprise Search Tutorial as it uses the ...

Customers Increasingly Choose Splunk for Observability

For the second year in a row, Splunk was recognized as a Leader in the 2024 Gartner® Magic Quadrant™ for ...