Splunk Search

Case sensitivity of name, in name=value pairs

NK_1
Path Finder

I would like to do a "stats distinct_count(accountID)"

However, some code modules log "accountID=xxxx", while others log "AccountID=xxxx"

Is there a way to get a distinct count of Account IDs without having to change the code that does the logging?

1 Solution

southeringtonp
Motivator

As long as only one or the other is present, use coalesce:

| eval accountID=coalesce(accountID, AccountID)
| stats dc(accountID)

Another possibility would be to use rex. If, for example IDs are numeric:

| rex field=_raw "(?i)AccountID=(?<accountID>\d+)"

The rex approach is better if you need to deal with the possibility of multiple matches in one event.

View solution in original post

southeringtonp
Motivator

As long as only one or the other is present, use coalesce:

| eval accountID=coalesce(accountID, AccountID)
| stats dc(accountID)

Another possibility would be to use rex. If, for example IDs are numeric:

| rex field=_raw "(?i)AccountID=(?<accountID>\d+)"

The rex approach is better if you need to deal with the possibility of multiple matches in one event.

Get Updates on the Splunk Community!

Building Reliable Asset and Identity Frameworks in Splunk ES

 Accurate asset and identity resolution is the backbone of security operations. Without it, alerts are ...

Cloud Monitoring Console - Unlocking Greater Visibility in SVC Usage Reporting

For Splunk Cloud customers, understanding and optimizing Splunk Virtual Compute (SVC) usage and resource ...

Automatic Discovery Part 3: Practical Use Cases

If you’ve enabled Automatic Discovery in your install of the Splunk Distribution of the OpenTelemetry ...