In that case, I do have another hypothesis. Is it possible that your source type uses both index-time extraction of JSON structure (INDEXED_EXTRACTIONS=JSON) and search time automatic extraction (KV_MODE=JSON)? A field can not only be multivalued and have several different values per event, but also be multivalued with identical values. If every event has properties.path populated, this faux multivalue condition can most easily identified by looking at the fields column in smart mode or verbose mode. You will see that properties.path is populated in 200% of events. (As opposed to 100%.) If the fields is sparsely populated, you will need something like base search properties.path=* Hope this helps. I remember reading warnings about KV_MODE and INDEX_EXTRACTIONS in Splunk docs, but cannot find examples in a quick search.
... View more