Splunk Search

Event sampling and Count - accuracy?

Path Finder

I have a need for approximate statistics/metrics and am currently using Event Sampling, which drastically speeds up the queries. For queries that calculate averages this works great, but I also have a need to do counts. If you set the Event Sampling to for example 1:100, then Splunk seems to look at every 100 Events, which is also reflected in how many Events that are matched when doing 1:100 vs 1:1.

Example count with and without sampling:

1:100 = 26311
1:1 = 2623658
1:100 scaled up to 1:1 = 2631100
Diff = 7442, which is 0.3%

The Time Period was a previous hour (not the latest hour) as not to have incoming Events affect the Count.

0.3% difference is perfectly ok for my purpose.


Am I thinking of this correctly, or is there any risk of much bigger differences in Count (after upscaling the count)?

Labels (1)
Tags (1)
0 Karma


I think you're correct, at least with regard to event counts.

If this reply helps you, Karma would be appreciated.
Get Updates on the Splunk Community!

.conf24 | Day 0

Hello Splunk Community! My name is Chris, and I'm based in Canberra, Australia's capital, and I travelled for ...

Enhance Security Visibility with Splunk Enterprise Security 7.1 through Threat ...

(view in My Videos)Struggling with alert fatigue, lack of context, and prioritization around security ...

Troubleshooting the OpenTelemetry Collector

  In this tech talk, you’ll learn how to troubleshoot the OpenTelemetry collector - from checking the ...