Splunk Search

how to stats count case-insensitively?

William
Path Finder

i have a case to count db operations. in the log file, the format is like:

[time1] op=select data=....
[time2] op=SELECT data=....
...

i can count each operation by the search "index=db | stats count by op". but "select" and "SELECT" are counted as two different ops, so, how to treat them as the same one?

Tags (2)
1 Solution

William
Path Finder

just found the "eval" command to handle this.

index=db | eval op=upper(op) | stats count by op

View solution in original post

William
Path Finder

just found the "eval" command to handle this.

index=db | eval op=upper(op) | stats count by op
Get Updates on the Splunk Community!

Splunk Decoded: Service Maps vs Service Analyzer Tree View vs Flow Maps

It’s Monday morning, and your phone is buzzing with alert escalations – your customer-facing portal is running ...

What’s New in Splunk Observability – September 2025

What's NewWe are excited to announce the latest enhancements to Splunk Observability, designed to help ITOps ...

Fun with Regular Expression - multiples of nine

Fun with Regular Expression - multiples of nineThis challenge was first posted on Slack #regex channel ...