<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Re: Why would INDEXED_EXTRACTIONS=JSON in props.conf be resulting in duplicate values? in Getting Data In</title>
    <link>https://community.splunk.com/t5/Getting-Data-In/Why-would-INDEXED-EXTRACTIONS-JSON-in-props-conf-be-resulting-in/m-p/317329#M59315</link>
    <description>&lt;P&gt;I think you nailed it.   The props.conf file I'm modifying in this case belongs to a deployment app that's getting pushed to the UF, none of which is going to the Search Head.   I see I need to split these props settings up accordingly.  I'll give that a try.  Thanks for the help and quick reply.  &lt;/P&gt;</description>
    <pubDate>Wed, 19 Jul 2017 18:37:14 GMT</pubDate>
    <dc:creator>pumphreyaw</dc:creator>
    <dc:date>2017-07-19T18:37:14Z</dc:date>
    <item>
      <title>Why would INDEXED_EXTRACTIONS=JSON in props.conf be resulting in duplicate values?</title>
      <link>https://community.splunk.com/t5/Getting-Data-In/Why-would-INDEXED-EXTRACTIONS-JSON-in-props-conf-be-resulting-in/m-p/317327#M59313</link>
      <description>&lt;P&gt;Using Splunk to analyze bro network transaction data in JSON format.  I noticed the stats command and field summary stats would show a count of 2 for unique session ID's, although search results only show one event.  After a lot of verification I'm certain my event source does not contain duplicate events.&lt;/P&gt;

&lt;P&gt;Thanks to this post: &lt;A href="https://answers.splunk.com/answers/223095/why-is-my-sourcetype-configuration-for-json-events.html"&gt;https://answers.splunk.com/answers/223095/why-is-my-sourcetype-configuration-for-json-events.html&lt;/A&gt;, I started messing with my JSON settings in props.conf.  I thought this would be my fix, but I found the opposite scenario to be true for me...  &lt;/P&gt;

&lt;P&gt;In short, I'm seeing that using index-time JSON field extractions are resulting in duplicate field values, where search-time JSON field extractions are not.  &lt;/P&gt;

&lt;P&gt;In props.conf, this produces duplicate values, visible in stats command and field summaries:&lt;/P&gt;

&lt;PRE&gt;&lt;CODE&gt;INDEXED_EXTRACTIONS=JSON
KV_MODE=none
AUTO_KV_JSON=false
&lt;/CODE&gt;&lt;/PRE&gt;

&lt;P&gt;If I disable indexed extractions and use search-time extractions instead, no more duplicate field values:&lt;/P&gt;

&lt;PRE&gt;&lt;CODE&gt;#INDEXED_EXTRACTIONS=JSON
KV_MODE=json
AUTO_KV_JSON=true  
&lt;/CODE&gt;&lt;/PRE&gt;

&lt;P&gt;From what I can tell this behavior is different than what others reported in earlier posts.  I'm running Splunk 6.6.2 Enterprise on a Debian VM and a 6.6.2 Universal Forwarder on another VM.  Maybe there is a deployment client configuration I have wrong somewhere that is causing weird behavior for index-time extractions but no luck so far. &lt;/P&gt;

&lt;P&gt;Using search-time extractions seems to work fine, but wondering if anyone is seeing this or if there are any ideas on root cause.  &lt;/P&gt;

&lt;P&gt;Thanks.&lt;/P&gt;</description>
      <pubDate>Wed, 19 Jul 2017 16:49:41 GMT</pubDate>
      <guid>https://community.splunk.com/t5/Getting-Data-In/Why-would-INDEXED-EXTRACTIONS-JSON-in-props-conf-be-resulting-in/m-p/317327#M59313</guid>
      <dc:creator>pumphreyaw</dc:creator>
      <dc:date>2017-07-19T16:49:41Z</dc:date>
    </item>
    <item>
      <title>Re: Why would INDEXED_EXTRACTIONS=JSON in props.conf be resulting in duplicate values?</title>
      <link>https://community.splunk.com/t5/Getting-Data-In/Why-would-INDEXED-EXTRACTIONS-JSON-in-props-conf-be-resulting-in/m-p/317328#M59314</link>
      <description>&lt;P&gt;Hey pumphreyaw!&lt;/P&gt;

&lt;P&gt;It comes down to WHERE you make these changes. If you use INDEXED_EXTRACTIONS, the props.conf needs to be on the UF ( Universal Forwarder VM ), and the KV_MODE=NONE needs to be on the Search Head (aka your Splunk Enterprise VM). &lt;/P&gt;

&lt;P&gt;From what I read above, setting the INDEXED_EXTRACTIONS and disabling KV_MODE=JSON should work.&lt;/P&gt;

&lt;P&gt;Where did you disable the KV_MODE configs?&lt;/P&gt;</description>
      <pubDate>Tue, 29 Sep 2020 14:57:11 GMT</pubDate>
      <guid>https://community.splunk.com/t5/Getting-Data-In/Why-would-INDEXED-EXTRACTIONS-JSON-in-props-conf-be-resulting-in/m-p/317328#M59314</guid>
      <dc:creator>mattymo</dc:creator>
      <dc:date>2020-09-29T14:57:11Z</dc:date>
    </item>
    <item>
      <title>Re: Why would INDEXED_EXTRACTIONS=JSON in props.conf be resulting in duplicate values?</title>
      <link>https://community.splunk.com/t5/Getting-Data-In/Why-would-INDEXED-EXTRACTIONS-JSON-in-props-conf-be-resulting-in/m-p/317329#M59315</link>
      <description>&lt;P&gt;I think you nailed it.   The props.conf file I'm modifying in this case belongs to a deployment app that's getting pushed to the UF, none of which is going to the Search Head.   I see I need to split these props settings up accordingly.  I'll give that a try.  Thanks for the help and quick reply.  &lt;/P&gt;</description>
      <pubDate>Wed, 19 Jul 2017 18:37:14 GMT</pubDate>
      <guid>https://community.splunk.com/t5/Getting-Data-In/Why-would-INDEXED-EXTRACTIONS-JSON-in-props-conf-be-resulting-in/m-p/317329#M59315</guid>
      <dc:creator>pumphreyaw</dc:creator>
      <dc:date>2017-07-19T18:37:14Z</dc:date>
    </item>
    <item>
      <title>Re: Why would INDEXED_EXTRACTIONS=JSON in props.conf be resulting in duplicate values?</title>
      <link>https://community.splunk.com/t5/Getting-Data-In/Why-would-INDEXED-EXTRACTIONS-JSON-in-props-conf-be-resulting-in/m-p/317330#M59316</link>
      <description>&lt;P&gt;awesome, I have converted the comment to answer. Let me know if it works!&lt;/P&gt;</description>
      <pubDate>Wed, 19 Jul 2017 18:43:17 GMT</pubDate>
      <guid>https://community.splunk.com/t5/Getting-Data-In/Why-would-INDEXED-EXTRACTIONS-JSON-in-props-conf-be-resulting-in/m-p/317330#M59316</guid>
      <dc:creator>mattymo</dc:creator>
      <dc:date>2017-07-19T18:43:17Z</dc:date>
    </item>
    <item>
      <title>Re: Why would INDEXED_EXTRACTIONS=JSON in props.conf be resulting in duplicate values?</title>
      <link>https://community.splunk.com/t5/Getting-Data-In/Why-would-INDEXED-EXTRACTIONS-JSON-in-props-conf-be-resulting-in/m-p/317331#M59317</link>
      <description>&lt;P&gt;Yep, that worked perfectly.  Oversight on my part, just needed to put things in the right place.  &lt;/P&gt;

&lt;P&gt;Thanks mmodestino!&lt;/P&gt;</description>
      <pubDate>Thu, 20 Jul 2017 12:44:54 GMT</pubDate>
      <guid>https://community.splunk.com/t5/Getting-Data-In/Why-would-INDEXED-EXTRACTIONS-JSON-in-props-conf-be-resulting-in/m-p/317331#M59317</guid>
      <dc:creator>pumphreyaw</dc:creator>
      <dc:date>2017-07-20T12:44:54Z</dc:date>
    </item>
    <item>
      <title>Re: Why would INDEXED_EXTRACTIONS=JSON in props.conf be resulting in duplicate values?</title>
      <link>https://community.splunk.com/t5/Getting-Data-In/Why-would-INDEXED-EXTRACTIONS-JSON-in-props-conf-be-resulting-in/m-p/317332#M59318</link>
      <description>&lt;P&gt;I cannot get this to work for the life of me. I can get the json events to only index once if I upload the file and select the sourcetype. If I set it as a monitor input for the same sourcetype and the same files, I get duplicate events. Initially I was getting duplicate events(same event listed twice) and duplicate field extractions(1 field, 2 identical values). Adding INDEXED_EXTRACTIONS = JSON seemed to fix the duplicate field extractions &lt;/P&gt;

&lt;P&gt;Its on a single server install on my local machine and I have tried creating the props.conf entry below in both C:\Program Files\Splunk\etc\system\local and C:\Program Files\Splunk\etc\apps\INSERTAPPNAMEHERE\local and no dice.&lt;/P&gt;

&lt;P&gt;[FishNPickles]&lt;BR /&gt;
INDEXED_EXTRACTIONS = JSON&lt;BR /&gt;
TIMESTAMP_FIELDS = properties.LastUpdateTime&lt;BR /&gt;
TZ = UTC&lt;BR /&gt;
AUTO_KV_JSON = false&lt;BR /&gt;
DATETIME_CONFIG = &lt;BR /&gt;
KV_MODE = none&lt;BR /&gt;
SHOULD_LINEMERGE = false&lt;BR /&gt;
category = Custom&lt;BR /&gt;
description = PicklesNFish&lt;BR /&gt;
disabled = false&lt;BR /&gt;
pulldown_type = true&lt;/P&gt;

&lt;P&gt;Is there some secret sauce to this I'm missing? It just straight up ignores the KV_MODE settings and is still indexing my entities twice. &lt;/P&gt;

&lt;P&gt;Any direction you could provide would be ultra awesome and greatly appreciated!&lt;/P&gt;</description>
      <pubDate>Tue, 29 Sep 2020 15:40:11 GMT</pubDate>
      <guid>https://community.splunk.com/t5/Getting-Data-In/Why-would-INDEXED-EXTRACTIONS-JSON-in-props-conf-be-resulting-in/m-p/317332#M59318</guid>
      <dc:creator>jperry_intact</dc:creator>
      <dc:date>2020-09-29T15:40:11Z</dc:date>
    </item>
    <item>
      <title>Re: Why would INDEXED_EXTRACTIONS=JSON in props.conf be resulting in duplicate values?</title>
      <link>https://community.splunk.com/t5/Getting-Data-In/Why-would-INDEXED-EXTRACTIONS-JSON-in-props-conf-be-resulting-in/m-p/317333#M59319</link>
      <description>&lt;P&gt;I have apparently done something horrible to my local install. I brought up a new host the your solution works great. &lt;/P&gt;

&lt;P&gt;Who knows...&lt;/P&gt;</description>
      <pubDate>Thu, 07 Sep 2017 14:53:50 GMT</pubDate>
      <guid>https://community.splunk.com/t5/Getting-Data-In/Why-would-INDEXED-EXTRACTIONS-JSON-in-props-conf-be-resulting-in/m-p/317333#M59319</guid>
      <dc:creator>jperry_intact</dc:creator>
      <dc:date>2017-09-07T14:53:50Z</dc:date>
    </item>
    <item>
      <title>Re: Why would INDEXED_EXTRACTIONS=JSON in props.conf be resulting in duplicate values?</title>
      <link>https://community.splunk.com/t5/Getting-Data-In/Why-would-INDEXED-EXTRACTIONS-JSON-in-props-conf-be-resulting-in/m-p/317334#M59320</link>
      <description>&lt;P&gt;hi @mmodestino [Splunk] ♦ &lt;/P&gt;

&lt;P&gt;By removing the INDEXED_EXTRACTIONS = json from the props.conf on the UF has fixed the issue of duplicates. But it started giving another issue that is sometimes its missing few json event lines.&lt;/P&gt;

&lt;P&gt;KV_MODE = none&lt;BR /&gt;
NO_BINARY_CHECK = true&lt;BR /&gt;
TIMESTAMP_FIELDS = requests.Time&lt;BR /&gt;
category = Structured&lt;BR /&gt;
disabled = false&lt;BR /&gt;
pulldown_type = true&lt;/P&gt;

&lt;P&gt;Any idea how to fix this issue.&lt;/P&gt;</description>
      <pubDate>Wed, 30 Sep 2020 01:29:44 GMT</pubDate>
      <guid>https://community.splunk.com/t5/Getting-Data-In/Why-would-INDEXED-EXTRACTIONS-JSON-in-props-conf-be-resulting-in/m-p/317334#M59320</guid>
      <dc:creator>mallempati</dc:creator>
      <dc:date>2020-09-30T01:29:44Z</dc:date>
    </item>
    <item>
      <title>Re: Why would INDEXED_EXTRACTIONS=JSON in props.conf be resulting in duplicate values?</title>
      <link>https://community.splunk.com/t5/Getting-Data-In/Why-would-INDEXED-EXTRACTIONS-JSON-in-props-conf-be-resulting-in/m-p/523291#M88384</link>
      <description>&lt;P&gt;Any easy to read lists exist of WHERE to use each of these options in the props.conf? I run into this from time to time and its not 100% clear to me WHERE they need to go.&lt;/P&gt;&lt;P&gt;Sometimes it clears says "input time" on this reference (&lt;A href="https://docs.splunk.com/Documentation/Splunk/7.2.4/Admin/Propsconf" target="_blank"&gt;https://docs.splunk.com/Documentation/Splunk/7.2.4/Admin/Propsconf&lt;/A&gt;) but other times it doesn't and I'm not sure what that means then.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Any help would be GREAT!!!&lt;/P&gt;</description>
      <pubDate>Tue, 06 Oct 2020 20:46:43 GMT</pubDate>
      <guid>https://community.splunk.com/t5/Getting-Data-In/Why-would-INDEXED-EXTRACTIONS-JSON-in-props-conf-be-resulting-in/m-p/523291#M88384</guid>
      <dc:creator>joesrepsolc</dc:creator>
      <dc:date>2020-10-06T20:46:43Z</dc:date>
    </item>
    <item>
      <title>Re: Why would INDEXED_EXTRACTIONS=JSON in props.conf be resulting in duplicate values?</title>
      <link>https://community.splunk.com/t5/Getting-Data-In/Why-would-INDEXED-EXTRACTIONS-JSON-in-props-conf-be-resulting-in/m-p/708883#M117102</link>
      <description>&lt;P&gt;Hi &lt;a href="https://community.splunk.com/t5/user/viewprofilepage/user-id/7188"&gt;@pumphreyaw&lt;/a&gt;&amp;nbsp;, &lt;a href="https://community.splunk.com/t5/user/viewprofilepage/user-id/160866"&gt;@mattymo&lt;/a&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Now I am stuck in same problem. We don't have HF actually. We have deployment server which push apps to our manager and deployer. From there manager will push apps to peers nodes. We have 3 search heads and a deployer.&amp;nbsp;&lt;/P&gt;&lt;P&gt;Where I need to give these configurations to extract json data? Can you please help me step by step?&lt;/P&gt;</description>
      <pubDate>Wed, 15 Jan 2025 12:54:36 GMT</pubDate>
      <guid>https://community.splunk.com/t5/Getting-Data-In/Why-would-INDEXED-EXTRACTIONS-JSON-in-props-conf-be-resulting-in/m-p/708883#M117102</guid>
      <dc:creator>Karthikeya</dc:creator>
      <dc:date>2025-01-15T12:54:36Z</dc:date>
    </item>
    <item>
      <title>Re: Why would INDEXED_EXTRACTIONS=JSON in props.conf be resulting in duplicate values?</title>
      <link>https://community.splunk.com/t5/Getting-Data-In/Why-would-INDEXED-EXTRACTIONS-JSON-in-props-conf-be-resulting-in/m-p/708898#M117109</link>
      <description>&lt;P&gt;Hey&amp;nbsp;&lt;a href="https://community.splunk.com/t5/user/viewprofilepage/user-id/273888"&gt;@Karthikeya&lt;/a&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;as always "it depends" what you mean by "extract json data" and what problem you are trying to solve? Are you seeing duplicate extractions?&lt;/P&gt;&lt;P&gt;This thread talks about indexed extractions settings (in your case it would be needed on the UF) and search time "kv mode" settings (which would be on the Search Head) colliding. "Indexed Extractions" I would not suggest be the first step when working with JSON data. Splunk can extract well formed json at "search time", saving storage and search performance if it is not necessary to store the entire json blob in indexed fields.&amp;nbsp;&lt;/P&gt;&lt;P&gt;So can you clarify what exactly you are doing, or even better post a new question and we can move there?&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;thanks!&lt;/P&gt;</description>
      <pubDate>Wed, 15 Jan 2025 14:53:18 GMT</pubDate>
      <guid>https://community.splunk.com/t5/Getting-Data-In/Why-would-INDEXED-EXTRACTIONS-JSON-in-props-conf-be-resulting-in/m-p/708898#M117109</guid>
      <dc:creator>mattymo</dc:creator>
      <dc:date>2025-01-15T14:53:18Z</dc:date>
    </item>
    <item>
      <title>Re: Why would INDEXED_EXTRACTIONS=JSON in props.conf be resulting in duplicate values?</title>
      <link>https://community.splunk.com/t5/Getting-Data-In/Why-would-INDEXED-EXTRACTIONS-JSON-in-props-conf-be-resulting-in/m-p/708902#M117111</link>
      <description>&lt;P&gt;Hi &lt;a href="https://community.splunk.com/t5/user/viewprofilepage/user-id/160866"&gt;@mattymo&lt;/a&gt;&amp;nbsp;,&lt;/P&gt;&lt;P&gt;Here is the question link - &lt;A href="https://community.splunk.com/t5/Getting-Data-In/Query-to-be-auto-applied/m-p/708893" target="_blank"&gt;https://community.splunk.com/t5/Getting-Data-In/Query-to-be-auto-applied/m-p/708893&lt;/A&gt;..&lt;/P&gt;&lt;P&gt;Please help me out there.&lt;/P&gt;</description>
      <pubDate>Wed, 15 Jan 2025 15:15:58 GMT</pubDate>
      <guid>https://community.splunk.com/t5/Getting-Data-In/Why-would-INDEXED-EXTRACTIONS-JSON-in-props-conf-be-resulting-in/m-p/708902#M117111</guid>
      <dc:creator>Karthikeya</dc:creator>
      <dc:date>2025-01-15T15:15:58Z</dc:date>
    </item>
  </channel>
</rss>

