Tag and alias field values
In your data, you might have groups of events with related field values. To help you search more efficiently for these groups of fields, you can assign tags to their field values. You can assign one or more tags to any extracted field (including event type, host, source, or source type).
For more information, read "About tags and aliases" in the Knowledge Manager manual.
How to tag and alias field values
You can tag field/value pairs. You can also alias field names.
Tag field value pairs
You can use Splunk Web to tag any field value pair directly from the search results. In any resulting event that has the field value pair that you want to tag, click on the arrow next to that field value. A dropdown menu opens with an option to tag that value. For example, if you selected a syslog source type, you will see:
After you select the Tag action for your field value pair, you can add the tag or tags in the "Tag this field" popup window:
Note: Values for the Tags field must not be enclosed within double quotes.
Alias field names
You can add multiple aliases to a field name or use these field aliases to normalize different field names. This does not rename or remove the original field name. After you alias a field, you can search for it using any of its name aliases. To alias a field name, you need to have access to props.conf. For information on how to do this, see "Create aliases for fields" in the Knowledge Manager manual.
Search for tagged field values
There are two ways to search for tags. If you are searching for a tag associated with a value on any field, you can use the following syntax:
Or, if you are looking for a tag associated with a value on a specific field, you can use the following syntax:
You can use the asterisk (
*) wildcard when searching keywords and field values, including for eventtypes and tags.
For example, if you have multiple event-type tags for various types of IP addresses, such as
IP-dst, you can search for all of them with:
If you wanted to find all hosts whose tags contain "local", you can search for the tag:
Also, if you wanted to search for the events with eventtypes that have no tags, you can search for the Boolean expression:
If you have a tag that you no longer want to use, or want to have associated with a particular field, you have the option of either disabling it or removing it. You can:
- Remove a tag association for a specific field value through the Search app.
- Disable or delete tags, even if they are associated with multiple field values, via Splunk Manager.
For more information about using Splunk Manager to manage tags, see "Define and manage tags" in the Knowledge Manager manual.
Remove a tag association for a specific field value in search results
If you no longer want to have a tag associated with a specific field value in your search results, click the arrow next to that field/value combination to open up the dropdown menu. Select Tag [fieldname]=[value] to bring up the Tag This Field popup window.
Erase the tag or tags that you want to disable from the Tags field and click Save. This removes this particular tag and field value association from the system. If this is the only field value with which a tag is associated, then the tag is removed from the system.
Rename source types
When you configure a source type in props.conf, you can rename the source type. Multiple source types can share the same name; this can be useful if you want to group a set of source types together for searching purposes. For example, you can normalize source type names that include "-too_small" to remove the classifier. For information on how to do this, see "Rename source types" in the Getting Data In Manual.
Classify and group similar events
Extract and add new fields
This documentation applies to the following versions of Splunk® Enterprise: 4.3, 4.3.1, 4.3.2, 4.3.3, 4.3.4, 4.3.5, 4.3.6, 4.3.7