Splunk Search

Standardizing field values


I have field values that are the same as each other but in different cases.

How can I standardize them to prevent inconsistencies in my results?

Thank you,

0 Karma


I'm going to assume that you have some fields that contain both "No" and "no" as potential values.

1) Before running a stats (or similar aggregation command), you should take each such field and apply either the upper or lower command to the field, such as

| eval myfield = lower(myfield)
| stats count by myfield

2) When using a rex or regex or match command on the field, at the front of the regular expression, add the flag "(?i)" to do case-insensitive matching.

| regex AnotherField="(?i)yes"

which is equivalent to

| regex AnotherField="(yes|yeS|yEs|yES|Yes|YeS|YEs|YES)"
0 Karma
Get Updates on the Splunk Community!

Splunk Forwarders and Forced Time Based Load Balancing

Splunk customers use universal forwarders to collect and send data to Splunk. A universal forwarder can send ...

NEW! Log Views in Splunk Observability Dashboards Gives Context From a Single Page

Today, Splunk Observability releases log views, a new feature for users to add their logs data from Splunk Log ...

Last Chance to Submit Your Paper For BSides Splunk - Deadline is August 12th!

Hello everyone! Don't wait to submit - The deadline is August 12th! We have truly missed the community so ...