Splunk Search

Question on Selected fields in fields side bar

muralisushma7
Explorer

Hi,

In the selected fields to the left, I have a selected field by name source_address and it looks like below:

Top 10 values Count %
192.168.0.155 14103 15.78%
192.168.0.1 138324 15.47%

I would like to know what does Count and % indicate? Whether Count is count of IP address occurred for a given time/date range?

Please guide me.

Regards,
Sushma.

Tags (1)
0 Karma

p_gurav
Champion

Yes. The count is occurrence of field value and % shows field appears in over % of events.

0 Karma
Got questions? Get answers!

Join the Splunk Community Slack to learn, troubleshoot, and make connections with fellow Splunk practitioners in real time!

Meet up IRL or virtually!

Join Splunk User Groups to connect and learn in-person by region or remotely by topic or industry.

Get Updates on the Splunk Community!

Event Series May & June: From Network Visibility to Service Intelligence

Unifying the Network: Moving from Alert Noise to Service Intelligence with Splunk ITSI In today’s hybrid ...

Global Splunk User Group Events: May + June 2026

Your Splunk Community Awaits: Discover Upcoming User Group Events Worldwide    Staying ahead in the fast-paced ...

Why Splunk Customers Should Attend Cisco Live 2026 Las Vegas

Why Splunk Customers Should Attend Cisco Live 2026 Las Vegas     Cisco Live 2026 is almost here, and this ...