Splunk® Enterprise

Knowledge Manager Manual

Download manual as PDF

Splunk Enterprise version 5.0 reached its End of Life on December 1, 2017. Please see the migration information.
This documentation does not apply to the most recent version of Splunk. Click here for the latest version.
Download topic as PDF

Tag and alias field values in Splunk Web

In your data, you might have groups of events with related field values. To help you search more efficiently for these groups of fields, you can assign tags to their field values. You can assign one or more tags to any extracted field (including event type, host, source, or source type).

For more information, read "About tags and aliases" in the Knowledge Manager manual.

How to tag and alias field values

You can tag field/value pairs. You can also alias field names.

Tag field value pairs

You can use Splunk Web to tag any field value pair directly from the search results. In any resulting event that has the field value pair that you want to tag, click on the arrow next to that field value. A dropdown menu opens with an option to tag that value. For example, if you selected a syslog source type, you will see:

Tag wcookie.png

After you select the Tag action for your field value pair, you can add the tag or tags in the "Tag this field" popup window:

Tag this field 4.2.png

Note: Values for the Tags field must not be enclosed within double quotes.

Alias field names

You can add multiple aliases to a field name or use these field aliases to normalize different field names. This does not rename or remove the original field name. After you alias a field, you can search for it using any of its name aliases. To alias a field name, you need to have access to props.conf. For information on how to do this, see "Create aliases for fields" in the Knowledge Manager manual.

Search for tagged field values

There are two ways to search for tags. If you are searching for a tag associated with a value on any field, you can use the following syntax:


Or, if you are looking for a tag associated with a value on a specific field, you can use the following syntax:


Use wildcards to search for tags

You can use the asterisk (*) wildcard when searching keywords and field values, including for eventtypes and tags.

For example, if you have multiple event-type tags for various types of IP addresses, such as IP-src and IP-dst, you can search for all of them with:


If you wanted to find all hosts whose tags contain "local", you can search for the tag:


Also, if you wanted to search for the events with eventtypes that have no tags, you can search for the Boolean expression:

NOT tag::eventtype=*

Disabling and deleting tags

If you have a tag that you no longer want to use, or want to have associated with a particular field, you have the option of either disabling it or removing it. You can:

  • Remove a tag association for a specific field value through the Search app.
  • Disable or delete tags, even if they are associated with multiple field values, via Splunk Manager.

For more information about using Splunk Manager to manage tags, see "Define and manage tags" in the Knowledge Manager manual.

Remove a tag association for a specific field value in search results

If you no longer want to have a tag associated with a specific field value in your search results, click the arrow next to that field/value combination to open up the dropdown menu. Select Tag [fieldname]=[value] to bring up the Tag This Field popup window.

Erase the tag or tags that you want to disable from the Tags field and click Save. This removes this particular tag and field value association from the system. If this is the only field value with which a tag is associated, then the tag is removed from the system.

Rename source types

When you configure a source type in props.conf, you can rename the source type. Multiple source types can share the same name; this can be useful if you want to group a set of source types together for searching purposes. For example, you can normalize source type names that include "-too_small" to remove the classifier. For information on how to do this, see "Rename source types" in the Getting Data In Manual.

About tags and aliases
Define and manage tags

This documentation applies to the following versions of Splunk® Enterprise: 5.0, 5.0.1, 5.0.2, 5.0.3, 5.0.4, 5.0.5, 5.0.6, 5.0.7, 5.0.8, 5.0.9, 5.0.10, 5.0.11, 5.0.12, 5.0.13, 5.0.14, 5.0.15, 5.0.16, 5.0.17, 5.0.18

Was this documentation topic helpful?

Enter your email address, and someone from the documentation team will respond to you:

Please provide your comments here. Ask a question or make a suggestion.

You must be logged into splunk.com in order to post comments. Log in now.

Please try to keep this discussion focused on the content covered in this documentation topic. If you have a more general question about Splunk functionality or are experiencing a difficulty with Splunk, consider posting a question to Splunkbase Answers.

0 out of 1000 Characters