Splunk Search

Question on Selected fields in fields side bar

muralisushma7
Explorer

Hi,

In the selected fields to the left, I have a selected field by name source_address and it looks like below:

Top 10 values Count %
192.168.0.155 14103 15.78%
192.168.0.1 138324 15.47%

I would like to know what does Count and % indicate? Whether Count is count of IP address occurred for a given time/date range?

Please guide me.

Regards,
Sushma.

Tags (1)
0 Karma

p_gurav
Champion

Yes. The count is occurrence of field value and % shows field appears in over % of events.

0 Karma
Get Updates on the Splunk Community!

Splunk + ThousandEyes: Correlate frontend, app, and network data to troubleshoot ...

 Are you tired of troubleshooting delays caused by siloed frontend, application, and network data? We've got a ...

Splunk Observability for AI

Don’t miss out on an exciting Tech Talk on Splunk Observability for AI!Discover how Splunk’s agentic AI ...

🔐 Trust at Every Hop: How mTLS in Splunk Enterprise 10.0 Makes Security Simpler

From Idea to Implementation: Why Splunk Built mTLS into Splunk Enterprise 10.0  mTLS wasn’t just a checkbox ...