Splunk Search

Standardizing field values


I have field values that are the same as each other but in different cases.

How can I standardize them to prevent inconsistencies in my results?

Thank you,

0 Karma


I'm going to assume that you have some fields that contain both "No" and "no" as potential values.

1) Before running a stats (or similar aggregation command), you should take each such field and apply either the upper or lower command to the field, such as

| eval myfield = lower(myfield)
| stats count by myfield

2) When using a rex or regex or match command on the field, at the front of the regular expression, add the flag "(?i)" to do case-insensitive matching.

| regex AnotherField="(?i)yes"

which is equivalent to

| regex AnotherField="(yes|yeS|yEs|yES|Yes|YeS|YEs|YES)"
0 Karma
Get Updates on the Splunk Community!

Accelerate Service Onboarding, Decomposition, Troubleshooting - and more with ITSI’s ...

Accelerate Service Onboarding, Decomposition, Troubleshooting - and more! Faster Time to ValueManaging and ...

New Release | Splunk Enterprise 9.3

Admins and Analyst can benefit from:  Seamlessly route data to your local file system to save on storage ...

2024 Splunk Career Impact Survey | Earn a $20 gift card for participating!

Hear ye, hear ye! The time has come again for Splunk's annual Career Impact Survey!  We need your help by ...