I'm performing a REST Search that ends with a | table command
When I configure the script to csv format, I get 5 events. Raw format, 5 events. Splunk Web: 5 statistics/events. But when I switch the format to json, 10 events, 5 of which are duplicates.
Is there any valid reason why json should be any different than all the other types?
I've read solutions that suggest going to the config files, this is not available to me.
Hopefully, there is a way inline with my search to tell Splunk that I want, say, just the data that shows up in my table. This would be ideal.
Thanks so much.
When KV_MODE is set to auto or auto_escaped, automatic JSON field extraction can take place alongside other automatic key/value field extractions. To disable JSON field extraction without changing the KV_MODE value from auto, add AUTO_KV_JSON=false to the stanza. When not set, AUTO_KV_JSON defaults to true.