Splunk Search

Splunk show duplicate event but there is only one

darismendy
Explorer

Hello

I'm monitoring a directory with splunk when i search for those events it shows me by example the field id with count =2alt text

but if i search for that id it shows me only one event , why is this happening?

Tags (1)
0 Karma

somesoni2
Revered Legend

Also make sure that, the time range of both searches are exactly same.

0 Karma

mdsnmss
SplunkTrust
SplunkTrust

If your data is coming in JSON or some other structured format and you are having fields extracted at index time then you do not need them done at search time. That is likely what is occuring here. On the search head where this is occuring set KV_MODE = none for the sourcetype that this data is in. Then it should only be extracted at index time and not at search time as well.

0 Karma

darismendy
Explorer

Hello thank you for our answer, I'm not making extractions at index time, i'm just only not truncating the incoming data

0 Karma

FrankVl
Ultra Champion

Can you share both the searches (ideally screenshots that show the search query, as well as the (relevant part of) the results?

0 Karma
Get Updates on the Splunk Community!

Data Management Digest – December 2025

Welcome to the December edition of Data Management Digest! As we continue our journey of data innovation, the ...

Index This | What is broken 80% of the time by February?

December 2025 Edition   Hayyy Splunk Education Enthusiasts and the Eternally Curious!    We’re back with this ...

Unlock Faster Time-to-Value on Edge and Ingest Processor with New SPL2 Pipeline ...

Hello Splunk Community,   We're thrilled to share an exciting update that will help you manage your data more ...