Getting Data In

Duplicate values but one key

mrstrozy
Path Finder

Hi,

I am running into an issue where I have keys and values which will show up once; upon expansion however it shows that there are two values for each key. The only fields that have the two values are under the 'Event' type.

Here is an example of what I see:

alt text

and then expanded:

alt text

And here is an example souretype configuration that is on one of my forwarders:

[blahblah]
DATETIME_CONFIG =
INDEXED_EXTRACTIONS = json
KV_MODE = none
AUTO_KV_JSON = false
NO_BINARY_CHECK = true
TZ = UTC
category = structured

Does anyone have any idea of what is going on?

0 Karma

pruthvikrishnap
Contributor
INDEXED_EXTRACTIONS = json
 KV_MODE = none
 AUTO_KV_JSON = false
 TIME_PREFIX = "timestamp"
 MAX_TIMESTAMP_LOOKAHEAD = 50
 NO_BINARY_CHECK = true
 SHOULD_LINEMERGE = false
 TIMESTAMP_FIELDS = timestamp
 category = Structured

Try this. i see that the fields are being extracted twice.
Let me know if this works.

0 Karma
Get Updates on the Splunk Community!

What the End of Support for Splunk Add-on Builder Means for You

Hello Splunk Community! We want to share an important update regarding the future of the Splunk Add-on Builder ...

Solve, Learn, Repeat: New Puzzle Channel Now Live

Welcome to the Splunk Puzzle PlaygroundIf you are anything like me, you love to solve problems, and what ...

Building Reliable Asset and Identity Frameworks in Splunk ES

 Accurate asset and identity resolution is the backbone of security operations. Without it, alerts are ...