Splunk Dev

Searching Index error

agom390
New Member

I have been attempting to search my index on my linux vm. I have already added the data files associated with the corresponding index, however, when I go to search the index it keeps giving me an error of no events. Once I add the data again, it will find events but it will only last for one search. I'm not sure how to fix this error, I have followed all instructions on how to install indexes and the data but it's still not working. 

Labels (1)
0 Karma

richgalloway
SplunkTrust
SplunkTrust

Check the time picker against the time of the events you added.  It's possible the data is too old for the selected time window.

---
If this reply helps you, Karma would be appreciated.
0 Karma

agom390
New Member

I used the time picker for all time and it still doesn't show. 

0 Karma

isoutamo
SplunkTrust
SplunkTrust
Try to use index=* on your query if it's in some other index than you are expecting.

One other issue could be that you haven't right to index where data is stored? Based on your question this is not an issue at this time (as you have seen some data).

Splunk's default is show newest events first in your query. If you want another order you must use sort.
r. Ismo
0 Karma
Get Updates on the Splunk Community!

Unlock Database Monitoring with Splunk Observability Cloud

  In today’s fast-paced digital landscape, even minor database slowdowns can disrupt user experiences and ...

Purpose in Action: How Splunk Is Helping Power an Inclusive Future for All

At Cisco, purpose isn’t a tagline—it’s a commitment. Cisco’s FY25 Purpose Report outlines how the company is ...

[Upcoming Webinar] Demo Day: Transforming IT Operations with Splunk

Join us for a live Demo Day at the Cisco Store on January 21st 10:00am - 11:00am PST In the fast-paced world ...