I read many articles about it but no one knows how to fix it.
so how can I fix it?
Error in 'IndexScopedSearch': The search failed. More than 1000000 events were found at time 1675957850.
Hi @abedcx
The issue is the timestamp. i believe you found out some details from @richgalloway 's replies.
the Actual issue.. when you are searching, there are sooo many events with same timestamp, so Splunk is not able to do the searching.
May we know what your search query(SPL).. we can fine-tune it, so that the Splunk will need not look into sooo many events. please suggest, thanks.
There are more than 1 million events indexed with the same timestamp - February 9, 2023 15:50:50 UTC.
Double-check the inputs.conf and props.conf settings to ensure events are being onboarded correctly.
Searching this data will be a challenge, if it can be done at all. Add index, source, sourcetype, and host fields to the base query to narrow the scope of the search as much as possible.
Thank you so much for your time ,
But i noticed that the splunk read the date from my csv and this date is for me not for splunk time
how can i tell splunk to not use this date (that is in my csv ) and make splunk to generate a date when indexing the data
in other words and as you can see in my bellow screenshot my date is the same and duplicated and i have more than 3 billion recoreds most of them same date and this date it's for me so how can i tell splunk to not use this date
To tell Splunk to use for the date, include a DATETIME_CONFIG setting in a props.conf file. Depending on your needs, either
DATETIME_CONFIG = current
or
DATETIME_CONFIG = none