Splunk Search

Why are Splunk Fields showing 200%?

HarperWCurran
Engager

Hi,

i am doing a search and noticing that i am getting 200% on the fields i troubleshooted and used this line at the beginning of my search 

KV_MODE = none
AUTO_KV_JSON = false

 however it instead returns with no events what so ever and i have the time on all time yet i still get nothing

please help 

Labels (2)
0 Karma

gcusello
SplunkTrust
SplunkTrust

Hi @HarperWCurran,

as @yuanliu said, these are options for props.conf, if you put them in the beginning of your search you're searching for these strings and obviously you don't find anything.

Could you share your search and a screenshot of the 200%?

Have you multivalues fields?

Ciao.

Giuseppe

0 Karma

yuanliu
SplunkTrust
SplunkTrust

Those expressions are meant for props.conf, not in search language.  You need to check that sourcetype in props.conf to make sure that you don't have duplicate extraction.

0 Karma
Career Survey
First 500 qualified respondents will receive a $20 gift card! Tell us about your professional Splunk journey.

Can’t make it to .conf25? Join us online!

Get Updates on the Splunk Community!

Community Content Calendar, September edition

Welcome to another insightful post from our Community Content Calendar! We're thrilled to continue bringing ...

Splunkbase Unveils New App Listing Management Public Preview

Splunkbase Unveils New App Listing Management Public PreviewWe're thrilled to announce the public preview of ...

Leveraging Automated Threat Analysis Across the Splunk Ecosystem

Are you leveraging automation to its fullest potential in your threat detection strategy?Our upcoming Security ...