Getting Data In

Why am I seeing a mismatch between Key-Value and Count after ingesting JSON data?

satishsdange
Builder

I have ingested JSON data & Splunk has extracted important fields automatically, but I see some mismatch between Key-Value & Count. There are many such fields with mismatch in count.

As per my screenshot for a single event, "Count" should be 1 instead of 2. Could someone advise me how to fix this problem.
(i don't see any problem with host, source, sourcetype)
props.conf

[json]
KV_MODE = json
INDEXED_EXTRACTIONS = JSON
TRUNCATE = 0
TIME_PREFIX = startTime":
MAX_TIMESTAMP_LOOKAHEAD = 16
SHOULD_LINEMERGE = False
NO_BINARY_CHECK = 0

alt text

0 Karma
1 Solution

martin_mueller
SplunkTrust
SplunkTrust

Set KV_MODE = none and your issue should go away.

View solution in original post

martin_mueller
SplunkTrust
SplunkTrust

Set KV_MODE = none and your issue should go away.

satishsdange
Builder

Here is an event. Important fields have been extracted by Splunk. e.g corCallHeader.firstCellId=1.
Then I have used Alias to change it to Cell_ID.

{"corCallHeader":{"traceId":123456789123456,"startTime":1395736409790,"stopTime":1395736414180,"callDuration":4390,"rnti":0,"imsi":48,"tmsi":962442424,"

P.S - deleting original log

0 Karma

martin_mueller
SplunkTrust
SplunkTrust

I'd say your event contains two Call_Drop values.

If not, you could post anonymized events.

0 Karma

somesoni2
Revered Legend

Can you post some sample entries?

0 Karma

satishsdange
Builder

Unfortunately, I can't share that data. Would you like to see any config?

0 Karma

somesoni2
Revered Legend

If you can mask all the sensitive data, that should do. I'm interested in seeing the format of jSON with the mentioned field. On cursory look, the configuration looks correct. One question though, is this a custom sourcetype? and if yes, could you try renaming it to something else?

0 Karma
Got questions? Get answers!

Join the Splunk Community Slack to learn, troubleshoot, and make connections with fellow Splunk practitioners in real time!

Meet up IRL or virtually!

Join Splunk User Groups to connect and learn in-person by region or remotely by topic or industry.

Get Updates on the Splunk Community!

Splunk Community Badges!

  Hey everyone! Ready to earn some serious bragging rights in the community? Along with our existing badges ...

How to find the worst searches in your Splunk environment and how to fix them

Everyone knows Splunk is a powerful platform for running searches and doing data analytics. Your ...

Share Your Feedback: On Admin Config Service (ACS)!

Help Us Build a Better Admin Config Service Experience (ACS)   We Want Your Feedback on Admin Config Service ...