Getting Data In

Why is JSON Event Data Showing Duplicate Values?

cchange
Path Finder

Hi,

I'm trying to ingest json data but it showing data twice for each event field. I used below in props.conf and not sure what is causing the issue.

[sourcetype]

INDEXED_EXTRACTIONS = json

KV_MODE=none  #( tried both KV_MODE=json and None)

SHOULD_LINEMERGE=true

pulldown_type=true

TIMESTAMP_FIELDS=<timestamp field>

AUTO_KV_JSON=false

NO_BINARY_CHECK = true

 

Data in SH:

Title:  [RESOLVED] Increased Error Rates 

            [RESOLVED] Increased Error Rates

 

Labels (1)
0 Karma

marycordova
SplunkTrust
SplunkTrust

it's the "INDEXED_EXTRACTIONS"

Splunk is doing search time extractions natively on the JSON data anyway and the indexed extractions are adding the duplicate, as well as using up more disk space, you can remove that config and everything should be fine

pretty sure you could just drop the entire KV_MODE and AUTO_KV_JSON lines as well and search time parsing would still extract all your fields for you

here's an exact config I just setup the other day:

[batch:///opt/logs/*.json.gz]
disabled = false
index = <index>
sourcetype = <sourcetype>
move_policy = sinkhole


[sourcetype]
disabled=false
NO_BINARY_CHECK = true
LINE_BREAKER = <regex>
SHOULD_LINEMERGE = false
TRUNCATE = 0
DATETIME_CONFIG = <time>

 

-upvotes appreciated 🤓

@marycordova

jesspetty
Engager

this worked for me

0 Karma

cchange
Path Finder

Thanks for the response but it is not working.

0 Karma

diogofgm
SplunkTrust
SplunkTrust

Hi,
The "Data in SH:" doesn't show much. It's linking to you Splunk local instance. Can you correct that and share an example of what you're seeing?

------------
Hope I was able to help you. If so, some karma would be appreciated.
0 Karma
Get Updates on the Splunk Community!

See just what you’ve been missing | Observability tracks at Splunk University

Looking to sharpen your observability skills so you can better understand how to collect and analyze data from ...

Weezer at .conf25? Say it ain’t so!

Hello Splunkers, The countdown to .conf25 is on-and we've just turned up the volume! We're thrilled to ...

How SC4S Makes Suricata Logs Ingestion Simple

Network security monitoring has become increasingly critical for organizations of all sizes. Splunk has ...