Splunk Search

Case sensitivity of name, in name=value pairs

NK_1
Path Finder

I would like to do a "stats distinct_count(accountID)"

However, some code modules log "accountID=xxxx", while others log "AccountID=xxxx"

Is there a way to get a distinct count of Account IDs without having to change the code that does the logging?

1 Solution

southeringtonp
Motivator

As long as only one or the other is present, use coalesce:

| eval accountID=coalesce(accountID, AccountID)
| stats dc(accountID)

Another possibility would be to use rex. If, for example IDs are numeric:

| rex field=_raw "(?i)AccountID=(?<accountID>\d+)"

The rex approach is better if you need to deal with the possibility of multiple matches in one event.

View solution in original post

southeringtonp
Motivator

As long as only one or the other is present, use coalesce:

| eval accountID=coalesce(accountID, AccountID)
| stats dc(accountID)

Another possibility would be to use rex. If, for example IDs are numeric:

| rex field=_raw "(?i)AccountID=(?<accountID>\d+)"

The rex approach is better if you need to deal with the possibility of multiple matches in one event.

Get Updates on the Splunk Community!

Splunk Observability for AI

Don’t miss out on an exciting Tech Talk on Splunk Observability for AI!Discover how Splunk’s agentic AI ...

Splunk Enterprise Security 8.x: The Essential Upgrade for Threat Detection, ...

Watch On Demand the Tech Talk on November 6 at 11AM PT, and empower your SOC to reach new heights! Duration: ...

Splunk Observability as Code: From Zero to Dashboard

For the details on what Self-Service Observability and Observability as Code is, we have some awesome content ...