Splunk Search

How to add percentages to all the fields?

inkedia
Explorer

 

| lookup local=true ipasncidr_def CIDR as dest_ip output Organization
| lookup src_eonid_name.csv SRC_EONID OUTPUT "SRC_EONID NAME"
| top limit=3 "SRC_EONID NAME", dest_ip, dest_port, servicenow, Organization by SRC_EONID
| stats values(dest_ip) as "Destination" dc(dest_ip) as "Destination IP count" values(Organization) as "Organization" values(dest_port) as "Dest Ports" values(servicenow) as "Service now Tickets" by "SRC_EONID NAME" SRC_EONID

 



Hi everyone.
So I have this query that is being saved as dashboard(statistical table.). Is there a way I can include percentages for all the fields captured in the statistical table. 

 

 

Labels (3)
0 Karma

bowesmana
SplunkTrust
SplunkTrust

It looks like you only have 1 numerical field in your output - dc(dest_ip). What would the percentage show that you want and what do you want the percentage to show for the other fields, e.g. Service now Tickets?

 

0 Karma

inkedia
Explorer

This is what I'm trying to achieve 



SRC_EON NAME

SRC_EON

Dest IP

Organization

Service now ticket

Dest port

ABA

3311

*********    88.94%

*********      5.12%
*********        3.32%
others

Google
Microsoft

TASK132325   80%

 

 

449         100%

0 Karma
Get Updates on the Splunk Community!

Enterprise Security Content Update (ESCU) | New Releases

In December, the Splunk Threat Research Team had 1 release of new security content via the Enterprise Security ...

Why am I not seeing the finding in Splunk Enterprise Security Analyst Queue?

(This is the first of a series of 2 blogs). Splunk Enterprise Security is a fantastic tool that offers robust ...

Index This | What are the 12 Days of Splunk-mas?

December 2024 Edition Hayyy Splunk Education Enthusiasts and the Eternally Curious!  We’re back with another ...