Splunk Search

Case Insensitive Join

slee8812
Engager

Hi,
Is it possible to perform a case insensitive join? The log files I'm working with have a field that contains values which begin with a prefix. The case of the prefix does not appear to be consistent but the rest of the string value is. Any help will be appreciated. Thank you.

Sam

Tags (1)
1 Solution

Ayn
Legend

You could change the case for the relevant fields before performing the join, using eval's lower() function. Something like:

... | eval myfield=lower(myfield) | join myfield [... | eval myfield=lower(myfield)]

View solution in original post

Ayn
Legend

You could change the case for the relevant fields before performing the join, using eval's lower() function. Something like:

... | eval myfield=lower(myfield) | join myfield [... | eval myfield=lower(myfield)]

slee8812
Engager

Thank you. Worked like a charm.

0 Karma
Got questions? Get answers!

Join the Splunk Community Slack to learn, troubleshoot, and make connections with fellow Splunk practitioners in real time!

Meet up IRL or virtually!

Join Splunk User Groups to connect and learn in-person by region or remotely by topic or industry.

Get Updates on the Splunk Community!

Splunk Community Badges!

  Hey everyone! Ready to earn some serious bragging rights in the community? Along with our existing badges ...

How to find the worst searches in your Splunk environment and how to fix them

Everyone knows Splunk is a powerful platform for running searches and doing data analytics. Your ...

Share Your Feedback: On Admin Config Service (ACS)!

Help Us Build a Better Admin Config Service Experience (ACS)   We Want Your Feedback on Admin Config Service ...