Splunk Search

Why are Splunk Fields showing 200%?

HarperWCurran
Engager

Hi,

i am doing a search and noticing that i am getting 200% on the fields i troubleshooted and used this line at the beginning of my search 

KV_MODE = none
AUTO_KV_JSON = false

 however it instead returns with no events what so ever and i have the time on all time yet i still get nothing

please help 

Labels (2)
0 Karma

gcusello
SplunkTrust
SplunkTrust

Hi @HarperWCurran,

as @yuanliu said, these are options for props.conf, if you put them in the beginning of your search you're searching for these strings and obviously you don't find anything.

Could you share your search and a screenshot of the 200%?

Have you multivalues fields?

Ciao.

Giuseppe

0 Karma

yuanliu
SplunkTrust
SplunkTrust

Those expressions are meant for props.conf, not in search language.  You need to check that sourcetype in props.conf to make sure that you don't have duplicate extraction.

0 Karma
Got questions? Get answers!

Join the Splunk Community Slack to learn, troubleshoot, and make connections with fellow Splunk practitioners in real time!

Meet up IRL or virtually!

Join Splunk User Groups to connect and learn in-person by region or remotely by topic or industry.

Get Updates on the Splunk Community!

[Puzzles] Solve, Learn, Repeat: Character substitutions with Regular Expressions

This challenge was first posted on Slack #puzzles channelFor BORE at .conf23, we had a puzzle question which ...

Splunk Community Badges!

  Hey everyone! Ready to earn some serious bragging rights in the community? Along with our existing badges ...

[Puzzles] Solve, Learn, Repeat: Matching cron expressions

This puzzle (first published here) is based on matching timestamps to cron expressions.All the timestamps ...