<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Re: help on splunk index not working in Splunk Dev</title>
    <link>https://community.splunk.com/t5/Splunk-Dev/help-on-splunk-index-not-working/m-p/658821#M11186</link>
    <description>&lt;P&gt;We think that you need some maintenance because you're running out of disk space.&lt;/P&gt;&lt;P&gt;Anyway, searching for raw events across all indexes (index=*) is very ineffective and generally should not be used at all. Typically you either look for some high-level stats which can be obtained much more effectively with tstats command or you should be way way more specific about your searching criteria.&lt;/P&gt;</description>
    <pubDate>Wed, 27 Sep 2023 07:26:37 GMT</pubDate>
    <dc:creator>PickleRick</dc:creator>
    <dc:date>2023-09-27T07:26:37Z</dc:date>
    <item>
      <title>help on splunk index not working</title>
      <link>https://community.splunk.com/t5/Splunk-Dev/help-on-splunk-index-not-working/m-p/658772#M11183</link>
      <description>&lt;P&gt;hi&lt;/P&gt;&lt;P&gt;we have create new index on our platform but they collect any data&lt;/P&gt;&lt;P&gt;The inputs.conf stanza are welll configurated with the new index name but our index are empty&lt;/P&gt;&lt;P&gt;So i try to list the check to do in order to make our index working&lt;/P&gt;&lt;P&gt;thanks&lt;/P&gt;</description>
      <pubDate>Tue, 26 Sep 2023 15:45:37 GMT</pubDate>
      <guid>https://community.splunk.com/t5/Splunk-Dev/help-on-splunk-index-not-working/m-p/658772#M11183</guid>
      <dc:creator>jip31</dc:creator>
      <dc:date>2023-09-26T15:45:37Z</dc:date>
    </item>
    <item>
      <title>Re: help on splunk index not working</title>
      <link>https://community.splunk.com/t5/Splunk-Dev/help-on-splunk-index-not-working/m-p/658776#M11184</link>
      <description>&lt;P&gt;How and where did you create the index?&amp;nbsp; It must be on the indexers and (optionally) on the search heads.&amp;nbsp; If the index was added by editing indexes.conf then the Splunk instances must be restarted.&lt;/P&gt;&lt;P&gt;Ensure the inputs.conf files use the *exact* same index name that was created.&amp;nbsp; Also, be sure to use the right index name when searching for data.&lt;/P&gt;&lt;P&gt;Check splunkd.log to see if the indexers are reporting errors writing to the new index.&lt;/P&gt;</description>
      <pubDate>Tue, 26 Sep 2023 16:59:24 GMT</pubDate>
      <guid>https://community.splunk.com/t5/Splunk-Dev/help-on-splunk-index-not-working/m-p/658776#M11184</guid>
      <dc:creator>richgalloway</dc:creator>
      <dc:date>2023-09-26T16:59:24Z</dc:date>
    </item>
    <item>
      <title>Re: help on splunk index not working</title>
      <link>https://community.splunk.com/t5/Splunk-Dev/help-on-splunk-index-not-working/m-p/658819#M11185</link>
      <description>&lt;P&gt;They have been created on indexers and the instance has been restarted&lt;/P&gt;&lt;P&gt;The index name is the same&lt;/P&gt;&lt;P&gt;Now i have a message issue when I am doing index=*&lt;/P&gt;&lt;P&gt;Message "Serach not executed: The minimum free disk space (5000MB) reached for opt/splunk/var/run/splunk/dispatch/&lt;/P&gt;&lt;P&gt;What do you think about this?&lt;/P&gt;</description>
      <pubDate>Wed, 27 Sep 2023 07:16:48 GMT</pubDate>
      <guid>https://community.splunk.com/t5/Splunk-Dev/help-on-splunk-index-not-working/m-p/658819#M11185</guid>
      <dc:creator>jip31</dc:creator>
      <dc:date>2023-09-27T07:16:48Z</dc:date>
    </item>
    <item>
      <title>Re: help on splunk index not working</title>
      <link>https://community.splunk.com/t5/Splunk-Dev/help-on-splunk-index-not-working/m-p/658821#M11186</link>
      <description>&lt;P&gt;We think that you need some maintenance because you're running out of disk space.&lt;/P&gt;&lt;P&gt;Anyway, searching for raw events across all indexes (index=*) is very ineffective and generally should not be used at all. Typically you either look for some high-level stats which can be obtained much more effectively with tstats command or you should be way way more specific about your searching criteria.&lt;/P&gt;</description>
      <pubDate>Wed, 27 Sep 2023 07:26:37 GMT</pubDate>
      <guid>https://community.splunk.com/t5/Splunk-Dev/help-on-splunk-index-not-working/m-p/658821#M11186</guid>
      <dc:creator>PickleRick</dc:creator>
      <dc:date>2023-09-27T07:26:37Z</dc:date>
    </item>
  </channel>
</rss>

