Splunk Search

Standardizing field values

tanyongjin
Explorer

I have field values that are the same as each other but in different cases.

How can I standardize them to prevent inconsistencies in my results?

Thank you,

0 Karma

DalJeanis
Legend

I'm going to assume that you have some fields that contain both "No" and "no" as potential values.

1) Before running a stats (or similar aggregation command), you should take each such field and apply either the upper or lower command to the field, such as

| eval myfield = lower(myfield)
| stats count by myfield

2) When using a rex or regex or match command on the field, at the front of the regular expression, add the flag "(?i)" to do case-insensitive matching.

| regex AnotherField="(?i)yes"

which is equivalent to

| regex AnotherField="(yes|yeS|yEs|yES|Yes|YeS|YEs|YES)"
0 Karma
Got questions? Get answers!

Join the Splunk Community Slack to learn, troubleshoot, and make connections with fellow Splunk practitioners in real time!

Meet up IRL or virtually!

Join Splunk User Groups to connect and learn in-person by region or remotely by topic or industry.

Get Updates on the Splunk Community!

Why Splunk Customers Should Attend Cisco Live 2026 Las Vegas

Why Splunk Customers Should Attend Cisco Live 2026 Las Vegas     Cisco Live 2026 is almost here, and this ...

What Is the Name of the USB Key Inserted by Bob Smith? (BOTS Hint, Not the Answer)

Hello Splunkers,   So you searched, “what is the name of the usb key inserted by bob smith?”  Not gonna lie… ...

Automating Threat Operations and Threat Hunting with Recorded Future

    Automating Threat Operations and Threat Hunting with Recorded Future June 29, 2026 | Register   Is your ...