Knowledge Manager Manual

 


Data normalization: Tags and aliases

Tag and alias field values in Splunk Web

Tag and alias field values in Splunk Web

In your data, you might have groups of events with related field values. To help you search more efficiently for these groups of fields, you can assign tags to their field values. You can assign one or more tags to any extracted field (including event type, host, source, or source type).

For more information, read "About tags and aliases" in the Knowledge Manager manual.

How to tag and alias field values

You can tag field/value pairs. You can also alias field names.

Tag field value pairs

You can use Splunk Web to tag any field value pair directly from the search results. In any resulting event that has the field value pair that you want to tag, click on the arrow next to that event, then under Actions click on the arrow next to that field value, then select Edit Tags. Create a tag and save it. For example, if you selected a syslog source type, you will see:

Tag wcookie.png

After you select the Edit Tags action for your field value pair, you can add the tag or tags in the "Create Tags" popup window:

Tag this field 4.2 b.png

Note: Values for the Tags field must not be enclosed within double quotes.

Alias field names

You can add multiple aliases to a field name or use these field aliases to normalize different field names. This does not rename or remove the original field name. After you alias a field, you can search for it using any of its name aliases. To alias a field name, you need to have access to props.conf. For information on how to do this, see "Create aliases for fields" in the Knowledge Manager manual.

Search for tagged field values

There are two ways to search for tags. If you are searching for a tag associated with a value on any field, you can use the following syntax:

tag=<tagname>

Or, if you are looking for a tag associated with a value on a specific field, you can use the following syntax:

tag::<field>=<tagname>

Use wildcards to search for tags

You can use the asterisk (*) wildcard when searching keywords and field values, including for eventtypes and tags.

For example, if you have multiple event-type tags for various types of IP addresses, such as IP-src and IP-dst, you can search for all of them with:

tag::eventtype=IP-*

If you wanted to find all hosts whose tags contain "local", you can search for the tag:

tag::host=*local*

Also, if you wanted to search for the events with eventtypes that have no tags, you can search for the Boolean expression:

NOT tag::eventtype=*

Disabling and deleting tags

If you have a tag that you no longer want to use, or want to have associated with a particular field, you have the option of either disabling it or removing it. You can:

  • Remove a tag association for a specific field value through the Search app.
  • Disable or delete tags, even if they are associated with multiple field values, via Splunk Web.

For more information about using Splunk Web to manage tags, see "Define and manage tags" in the Knowledge Manager manual.

Remove a tag association for a specific field value in search results

If you no longer want to have a tag associated with a specific field value in your search results, click the arrow next to that event, then under Actions click on the arrow next to that field value, then select Edit Tags to bring up the Create Tags popup window.

Erase the tag or tags that you want to disable from the Tags field and click Save. This removes this particular tag and field value association from the system. If this is the only field value with which a tag is associated, then the tag is removed from the system.

Rename source types

When you configure a source type in props.conf, you can rename the source type. Multiple source types can share the same name; this can be useful if you want to group a set of source types together for searching purposes. For example, you can normalize source type names that include "-too_small" to remove the classifier. For information on how to do this, see "Rename source types" in the Getting Data In Manual.

This documentation applies to the following versions of Splunk: 6.0 , 6.0.1 , 6.0.2 , 6.0.3 View the Article History for its revisions.


You must be logged into splunk.com in order to post comments. Log in now.

Was this documentation topic helpful?

If you'd like to hear back from us, please provide your email address:

We'd love to hear what you think about this topic or the documentation as a whole. Feedback you enter here will be delivered to the documentation team.

Feedback submitted, thanks!