Splunk Search

Case Insensitive Join

slee8812
Engager

Hi,
Is it possible to perform a case insensitive join? The log files I'm working with have a field that contains values which begin with a prefix. The case of the prefix does not appear to be consistent but the rest of the string value is. Any help will be appreciated. Thank you.

Sam

Tags (1)
1 Solution

Ayn
Legend

You could change the case for the relevant fields before performing the join, using eval's lower() function. Something like:

... | eval myfield=lower(myfield) | join myfield [... | eval myfield=lower(myfield)]

View solution in original post

Ayn
Legend

You could change the case for the relevant fields before performing the join, using eval's lower() function. Something like:

... | eval myfield=lower(myfield) | join myfield [... | eval myfield=lower(myfield)]

slee8812
Engager

Thank you. Worked like a charm.

0 Karma
Get Updates on the Splunk Community!

New Year. New Skills. New Course Releases from Splunk Education

A new year often inspires reflection—and reinvention. Whether your goals include strengthening your security ...

Splunk and TLS: It doesn't have to be too hard

Overview Creating a TLS cert for Splunk usage is pretty much standard openssl.  To make life better, use an ...

Faster Insights with AI, Streamlined Cloud-Native Operations, and More New Lantern ...

Splunk Lantern is a Splunk customer success center that provides practical guidance from Splunk experts on key ...