Splunk Search

how to stats count case-insensitively?

William
Path Finder

i have a case to count db operations. in the log file, the format is like:

[time1] op=select data=....
[time2] op=SELECT data=....
...

i can count each operation by the search "index=db | stats count by op". but "select" and "SELECT" are counted as two different ops, so, how to treat them as the same one?

Tags (2)
1 Solution

William
Path Finder

just found the "eval" command to handle this.

index=db | eval op=upper(op) | stats count by op

View solution in original post

William
Path Finder

just found the "eval" command to handle this.

index=db | eval op=upper(op) | stats count by op
Get Updates on the Splunk Community!

[Puzzles] Solve, Learn, Repeat: Word Search

This challenge was first posted on Slack #puzzles channelThis puzzle is based on a letter grid containing ...

[Puzzles] Solve, Learn, Repeat: Advent of Code - Day 4

Advent of CodeIn order to participate in these challenges, you will need to register with the Advent of Code ...

GA: S3 Promote for Historical Data Ingestion in Splunk Cloud

Ingest Historical S3 Data On-Demand: Announcing the General Availability of S3 Promote We’re excited to share ...