Splunk Search

Remove irrelevant 0's from a field value

paulw10
Explorer

Hey,
I have a field called externalID with values like the following

1766000000009834
1766000000009835
1766000000009836

and i am looking for a way to remove all the 0's in the middle when i output to a table and then rename the field to something like shortID , so the table output would show the following values

17669834
17669835
17669836

I have tried playing around with functions like eval, ltrim, replace...etc and not getting anywhere.

can anyone help me out.

UPDATE:

Hi,
I need help with this problem again.
So as previously stated i only want to remove the zero's in the middle , but the options given above seem to remove all 0's.

so lets say my external ID is 867182000000921046
i want my table to show 867182921046

but the above options are removing all 0's and giving me 86718292146

any ideas how i can do this.

0 Karma

paulw10
Explorer

Hi,
I need help with this problem again.
So as previously stated i only want to remove the zero's in the middle , but the options given above seem to remove all 0's.

so lets say my external ID is 867182000000921046
i want my table to show 867182921046

but the above options are removing all 0's and giving me 86718292146

any ideas how i can do this.

0 Karma

richgalloway
SplunkTrust
SplunkTrust

Please see my updated answer.

---
If this reply helps you, Karma would be appreciated.
0 Karma

paulw10
Explorer

Hi,
I need help with this problem again.
So as previously stated i only want to remove the zero's in the middle , but the options given above seem to remove all 0's.

so lets say my external ID is 867182000000921046
i want my table to show 867182921046

but the above options are removing all 0's and giving me 86718292146

any ideas how i can do this.

0 Karma

paulw10
Explorer

Excellent. thank you both

0 Karma

vnravikumar
Champion

Hi

Try this also

| makeresults 
| eval test=17660000009834 
| rex field=test max_match=0 "(?P<temp>[1-9]+)" 
| eval result = mvjoin(temp,"") 
| table test,result
0 Karma

richgalloway
SplunkTrust
SplunkTrust

There are at least two ways to do that.

... | eval externalID = replace(externalID, "0{2,}", "")

... | rex field = externalID mode=sed "s/0{2,}//g"
---
If this reply helps you, Karma would be appreciated.
0 Karma
Get Updates on the Splunk Community!

Introducing Splunk Enterprise 9.2

WATCH HERE! Watch this Tech Talk to learn about the latest features and enhancements shipped in the new Splunk ...

Adoption of RUM and APM at Splunk

    Unleash the power of Splunk Observability   Watch Now In this can't miss Tech Talk! The Splunk Growth ...

Routing logs with Splunk OTel Collector for Kubernetes

The Splunk Distribution of the OpenTelemetry (OTel) Collector is a product that provides a way to ingest ...