<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Re: Finding the top 10 or 15 processes in taskmgr search query. in Splunk Enterprise</title>
    <link>https://community.splunk.com/t5/Splunk-Enterprise/Finding-the-top-10-or-15-processes-in-taskmgr-search-query/m-p/30641#M8532</link>
    <description>&lt;P&gt;Do you want to see statistics of process on Windows server? If so, you can install Windows app. This may be the easiest way to do. The site is following.&lt;/P&gt;

&lt;P&gt;&lt;A href="http://splunk-base.splunk.com/apps/22315/splunk-for-windows"&gt;http://splunk-base.splunk.com/apps/22315/splunk-for-windows&lt;/A&gt;&lt;/P&gt;

&lt;P&gt;Following command will show you max cpu load by process name. Hope this help.&lt;/P&gt;

&lt;P&gt;source=WMI:localprocesses Name!=Total  | rex field=Name "(?&lt;NAME&gt;[^#]+)#\d+$"  | eval CPULoad = PercentProcessorTime  | stats avg(CPULoad) by Name&lt;/NAME&gt;&lt;/P&gt;</description>
    <pubDate>Wed, 07 Dec 2011 23:23:47 GMT</pubDate>
    <dc:creator>Takajian</dc:creator>
    <dc:date>2011-12-07T23:23:47Z</dc:date>
    <item>
      <title>Finding the top 10 or 15 processes in taskmgr search query.</title>
      <link>https://community.splunk.com/t5/Splunk-Enterprise/Finding-the-top-10-or-15-processes-in-taskmgr-search-query/m-p/30640#M8531</link>
      <description>&lt;P&gt;Hey folks.  Im new to splunk ive been created a bunch of different useful dashboards but i could not figure out how to do the following:&lt;/P&gt;

&lt;P&gt;top 10 or 15 processes within task mgr.&lt;/P&gt;

&lt;P&gt;I already have my perfmon.conf configured to forward a bunch of counters already.  are there any counters in particular that I would need to help with this search query?&lt;/P&gt;

&lt;P&gt;thank you very much for you input.  &lt;/P&gt;

&lt;P&gt;Scott&lt;/P&gt;</description>
      <pubDate>Wed, 07 Dec 2011 20:46:18 GMT</pubDate>
      <guid>https://community.splunk.com/t5/Splunk-Enterprise/Finding-the-top-10-or-15-processes-in-taskmgr-search-query/m-p/30640#M8531</guid>
      <dc:creator>saccam447</dc:creator>
      <dc:date>2011-12-07T20:46:18Z</dc:date>
    </item>
    <item>
      <title>Re: Finding the top 10 or 15 processes in taskmgr search query.</title>
      <link>https://community.splunk.com/t5/Splunk-Enterprise/Finding-the-top-10-or-15-processes-in-taskmgr-search-query/m-p/30641#M8532</link>
      <description>&lt;P&gt;Do you want to see statistics of process on Windows server? If so, you can install Windows app. This may be the easiest way to do. The site is following.&lt;/P&gt;

&lt;P&gt;&lt;A href="http://splunk-base.splunk.com/apps/22315/splunk-for-windows"&gt;http://splunk-base.splunk.com/apps/22315/splunk-for-windows&lt;/A&gt;&lt;/P&gt;

&lt;P&gt;Following command will show you max cpu load by process name. Hope this help.&lt;/P&gt;

&lt;P&gt;source=WMI:localprocesses Name!=Total  | rex field=Name "(?&lt;NAME&gt;[^#]+)#\d+$"  | eval CPULoad = PercentProcessorTime  | stats avg(CPULoad) by Name&lt;/NAME&gt;&lt;/P&gt;</description>
      <pubDate>Wed, 07 Dec 2011 23:23:47 GMT</pubDate>
      <guid>https://community.splunk.com/t5/Splunk-Enterprise/Finding-the-top-10-or-15-processes-in-taskmgr-search-query/m-p/30641#M8532</guid>
      <dc:creator>Takajian</dc:creator>
      <dc:date>2011-12-07T23:23:47Z</dc:date>
    </item>
    <item>
      <title>Re: Finding the top 10 or 15 processes in taskmgr search query.</title>
      <link>https://community.splunk.com/t5/Splunk-Enterprise/Finding-the-top-10-or-15-processes-in-taskmgr-search-query/m-p/30642#M8533</link>
      <description>&lt;P&gt;I already have the Windows app installed.  The problem is that im using perfmon:* instead of WMI:* for all my counters.  Is there a way where that seatrch query can be modified for perfmon:* ... ? Or is WMI easier for this type of query?&lt;/P&gt;

&lt;P&gt;Hope I am making sense.&lt;/P&gt;

&lt;P&gt;Scott&lt;/P&gt;</description>
      <pubDate>Thu, 08 Dec 2011 18:57:49 GMT</pubDate>
      <guid>https://community.splunk.com/t5/Splunk-Enterprise/Finding-the-top-10-or-15-processes-in-taskmgr-search-query/m-p/30642#M8533</guid>
      <dc:creator>saccam447</dc:creator>
      <dc:date>2011-12-08T18:57:49Z</dc:date>
    </item>
    <item>
      <title>Re: Finding the top 10 or 15 processes in taskmgr search query.</title>
      <link>https://community.splunk.com/t5/Splunk-Enterprise/Finding-the-top-10-or-15-processes-in-taskmgr-search-query/m-p/30643#M8534</link>
      <description>&lt;P&gt;This is what I did below:  I also made sure that my perfmon.conf file had all of the necessary instances and counters for the perfmon counter i created below.  &lt;/P&gt;

&lt;P&gt;source="perfmon:process percent processor time" host="las-p-pd-sql*" instance= *  | chart max(Value) as MaxCPU, by instance,host&lt;/P&gt;

&lt;P&gt;This worked perfectly for what I needed.  The Chart and Table is very useful to look for a spike.&lt;/P&gt;

&lt;P&gt;But Thank you Takajian for your help.&lt;/P&gt;</description>
      <pubDate>Mon, 12 Dec 2011 20:21:55 GMT</pubDate>
      <guid>https://community.splunk.com/t5/Splunk-Enterprise/Finding-the-top-10-or-15-processes-in-taskmgr-search-query/m-p/30643#M8534</guid>
      <dc:creator>saccam447</dc:creator>
      <dc:date>2011-12-12T20:21:55Z</dc:date>
    </item>
  </channel>
</rss>

