Search peer denpda3log01 has the following message: received event for unconfigured/disabled index='new' with source='source::/opt/splunk/var/spool/splunk/1460650797_events.stash_new' host='host::denpda3log02' sourcetype='sourcetype::stash' (1 missing total). Could somebody relate me the issue.
Either you haven't (yet) created the index called 'new', or it has been disabled. Fix that first, then it should work just fine. Splunk does not auto-create indexes.