Splunk Search

Case insensitive field value results in a count

sdettling
New Member

How can I make the results of a count on the user field case insensitive?

index=winevents sourcetype="WinEventLog:Security" Keywords="Audit Failure" | fields user, count

I get results like:

User:
JDoe
jdoe
MSmith
msmith

I'd rather that user field consolidate those values/

I think this is done with the eval argument, but I don't know the syntax.

Tags (1)
0 Karma

martin_mueller
SplunkTrust
SplunkTrust

I think you meant | stats count by user rather than | fields?

That being said, yeah - stats is case sensitive. In fact, virtually everything in Splunk searches is case sensitive except the search command with regards to values... so you can | search log_level="error" and find ERROR, but can't | search loG_level="error" because field names are always case sensitive and can't | where log_level="error" because it's not search.

You can normalize field values to either lower or upper case before sending them into stats like this:

... | eval user = lower(user) | stats count by user
Get Updates on the Splunk Community!

Splunk Observability Cloud's AI Assistant in Action Series: Auditing Compliance and ...

This is the third post in the Splunk Observability Cloud’s AI Assistant in Action series that digs into how to ...

Splunk Community Badges!

  Hey everyone! Ready to earn some serious bragging rights in the community? Along with our existing badges ...

What You Read The Most: Splunk Lantern’s Most Popular Articles!

Splunk Lantern is a Splunk customer success center that provides advice from Splunk experts on valuable data ...