Splunk Dev

help on splunk index not working

jip31
Motivator

hi

we have create new index on our platform but they collect any data

The inputs.conf stanza are welll configurated with the new index name but our index are empty

So i try to list the check to do in order to make our index working

thanks

Tags (1)
0 Karma
1 Solution

richgalloway
SplunkTrust
SplunkTrust

How and where did you create the index?  It must be on the indexers and (optionally) on the search heads.  If the index was added by editing indexes.conf then the Splunk instances must be restarted.

Ensure the inputs.conf files use the *exact* same index name that was created.  Also, be sure to use the right index name when searching for data.

Check splunkd.log to see if the indexers are reporting errors writing to the new index.

---
If this reply helps you, Karma would be appreciated.

View solution in original post

0 Karma

richgalloway
SplunkTrust
SplunkTrust

How and where did you create the index?  It must be on the indexers and (optionally) on the search heads.  If the index was added by editing indexes.conf then the Splunk instances must be restarted.

Ensure the inputs.conf files use the *exact* same index name that was created.  Also, be sure to use the right index name when searching for data.

Check splunkd.log to see if the indexers are reporting errors writing to the new index.

---
If this reply helps you, Karma would be appreciated.
0 Karma

jip31
Motivator

They have been created on indexers and the instance has been restarted

The index name is the same

Now i have a message issue when I am doing index=*

Message "Serach not executed: The minimum free disk space (5000MB) reached for opt/splunk/var/run/splunk/dispatch/

What do you think about this?

0 Karma

PickleRick
SplunkTrust
SplunkTrust

We think that you need some maintenance because you're running out of disk space.

Anyway, searching for raw events across all indexes (index=*) is very ineffective and generally should not be used at all. Typically you either look for some high-level stats which can be obtained much more effectively with tstats command or you should be way way more specific about your searching criteria.

Got questions? Get answers!

Join the Splunk Community Slack to learn, troubleshoot, and make connections with fellow Splunk practitioners in real time!

Meet up IRL or virtually!

Join Splunk User Groups to connect and learn in-person by region or remotely by topic or industry.

Get Updates on the Splunk Community!

Index This | What travels the world but is also stuck in place?

April 2026 Edition  Hayyy Splunk Education Enthusiasts and the Eternally Curious!   We’re back with this ...

Discover New Use Cases: Unlock Greater Value from Your Existing Splunk Data

Realizing the full potential of your Splunk investment requires more than just understanding current usage; it ...

Continue Your Journey: Join Session 2 of the Data Management and Federation Bootcamp ...

As data volumes continue to grow and environments become more distributed, managing and optimizing data ...