Splunk Search

How to add percentages to all the fields?

inkedia
Explorer

 

| lookup local=true ipasncidr_def CIDR as dest_ip output Organization
| lookup src_eonid_name.csv SRC_EONID OUTPUT "SRC_EONID NAME"
| top limit=3 "SRC_EONID NAME", dest_ip, dest_port, servicenow, Organization by SRC_EONID
| stats values(dest_ip) as "Destination" dc(dest_ip) as "Destination IP count" values(Organization) as "Organization" values(dest_port) as "Dest Ports" values(servicenow) as "Service now Tickets" by "SRC_EONID NAME" SRC_EONID

 



Hi everyone.
So I have this query that is being saved as dashboard(statistical table.). Is there a way I can include percentages for all the fields captured in the statistical table. 

 

 

Labels (3)
0 Karma

bowesmana
SplunkTrust
SplunkTrust

It looks like you only have 1 numerical field in your output - dc(dest_ip). What would the percentage show that you want and what do you want the percentage to show for the other fields, e.g. Service now Tickets?

 

0 Karma

inkedia
Explorer

This is what I'm trying to achieve 



SRC_EON NAME

SRC_EON

Dest IP

Organization

Service now ticket

Dest port

ABA

3311

*********    88.94%

*********      5.12%
*********        3.32%
others

Google
Microsoft

TASK132325   80%

 

 

449         100%

0 Karma
Get Updates on the Splunk Community!

Earn a $35 Gift Card for Answering our Splunk Admins & App Developer Survey

Survey for Splunk Admins and App Developers is open now! | Earn a $35 gift card!      Hello there,  Splunk ...

Continuing Innovation & New Integrations Unlock Full Stack Observability For Your ...

You’ve probably heard the latest about AppDynamics joining the Splunk Observability portfolio, deepening our ...

Monitoring Amazon Elastic Kubernetes Service (EKS)

As we’ve seen, integrating Kubernetes environments with Splunk Observability Cloud is a quick and easy way to ...