Splunk Search

Field extraction discrepancy between Prod and Dev

koyachi
Explorer

We are seeing a large discrepancy in field extraction counts between our Prod and Dev environments for sourcetype=xxx.

  • In Prod, a search returns ~600+ fields. In Dev, the same search returns ~100 fields.

  • We confirmed that KV_MODE=auto is set on both environments, but Dev still does not extract as many fields.

  • Raw events in Dev do contain certain keys (e.g., PreStore), but these fields do not consistently appear in the sidebar unless explicitly searched.

  • Prod has ~58 field extractions defined for this sourcetype, while Dev only has ~6. A large number of the extractions in Prod appear as Private in the UI. We are unclear whether these “Private” extractions are also being applied to other users, or only to the owners.

Questions

  1. How do “Private” field extractions behave — are they ever applied to users other than the owner, or should they only affect the owner’s searches?

  2. Could differences in data verbosity (more key=value pairs in Prod logs) be compounding the discrepancy, even with the same KV_MODE setting?

  3. What is the best way to identify all active field extractions (including private/app-scoped) that are being applied to a sourcetype, so we can reconcile between environments?

  4. How can we ensure consistent field discovery behavior between Dev and Prod?

 

Steps taken so far

 

  • Checked props.conf and transforms.conf on the search app in both environments — only a few extractions found in Dev vs many in Prod.

  • Verified KV_MODE settings using REST and btool. Confirmed Prod SH shows auto, Dev was updated to auto, but discrepancy remains.

  • Compared number of field extractions and in PROD it is 58 for sourcetype and in Dev it is 6.

 

Labels (2)
Tags (2)
0 Karma

PickleRick
SplunkTrust
SplunkTrust

btool is your friend

splunk btool props list sourcetype -user user -app app -debug

Same goes for transforms

It will show you what is the effective config read from files in your environment and applied in context of a given user and app according to precedence rules.

I'm not hundred percent sure if it uses user's private KOs. I suppose it does but you'd have to double check it.

1. Yes, user's private KOs are limited to this user only.

2. If you have different data, it might produce different (number of) fields. That should be pretty obvious

3. Depending on what you mean by "active", probably the btool

4. By keeping the configuration in sync and the same (format of) data? I know that due to compliance reasons dev/test/staging/whatever data might need to be anonymized or otherwise manipulated but it should generally represent the production data. Otherwise there's no point in keeping those environments.

0 Karma
Got questions? Get answers!

Join the Splunk Community Slack to learn, troubleshoot, and make connections with fellow Splunk practitioners in real time!

Meet up IRL or virtually!

Join Splunk User Groups to connect and learn in-person by region or remotely by topic or industry.

Get Updates on the Splunk Community!

Why Splunk Customers Should Attend Cisco Live 2026 Las Vegas

Why Splunk Customers Should Attend Cisco Live 2026 Las Vegas     Cisco Live 2026 is almost here, and this ...

What Is the Name of the USB Key Inserted by Bob Smith? (BOTS Hint, Not the Answer)

Hello Splunkers,   So you searched, “what is the name of the usb key inserted by bob smith?”  Not gonna lie… ...

Automating Threat Operations and Threat Hunting with Recorded Future

    Automating Threat Operations and Threat Hunting with Recorded Future June 29, 2026 | Register   Is your ...