<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Re: help on complex dynamic pie chart in Splunk Search</title>
    <link>https://community.splunk.com/t5/Splunk-Search/help-on-complex-dynamic-pie-chart/m-p/465973#M131243</link>
    <description>&lt;P&gt;BASE SEARCH:&lt;/P&gt;

&lt;PRE&gt;&lt;CODE&gt;`CPU` 
| eval PROCESS=case(process_name like "mfev%" OR process_name like "mcdatrep" OR process_name=="mcshield" OR process_name=="amupdate" OR process_name=="McScript_InUse" OR process_name=="macompatsvc" OR process_name=="FrameworkService" OR process_name=="McScanCheck", "McAFEE", process_name like "Wmi%", "WMI", process_name=="conhost", "CMD Windows console", process_name=="csrss" OR process_name=="System" OR process_name=="TiWorker" OR process_name=="msfeedssync" OR process_name=="msiexec" OR process_name=="rundll32" OR process_name=="services" OR process_name like "svchost%" OR process_name=="OneDriveSetup" OR process_name=="poqexec" OR process_name=="unsecapp" OR process_name=="TabTip" OR process_name=="Memory_Compression" OR process_name=="SetupHost" OR process_name=="WerFault" OR process_name=="explorer" OR process_name=="mscorsvw" OR process_name=="sppsvc" OR process_name=="ngen" OR process_name=="spoolsv" OR process_name=="SrTasks" OR process_name=="policyHost" OR process_name=="dwm" OR process_name=="perf-test-9c" OR process_name like "SearchProtocolHost%" OR process_name like "RuntimeBroker%" OR process_name like "LogonUI%", "Windows native process", process_name=="taskhost", "Tasks scheduler") 
&lt;/CODE&gt;&lt;/PRE&gt;

&lt;P&gt;McAfee or Win:&lt;/P&gt;

&lt;PRE&gt;&lt;CODE&gt;| stats dc(eval(if(process_cpu_used_percent &amp;gt; 50,host,NULL))) as Total by PROCESS 
&lt;/CODE&gt;&lt;/PRE&gt;

&lt;P&gt;Process_selected:&lt;/P&gt;

&lt;PRE&gt;&lt;CODE&gt;| where PROCESS==$your_token|s$
| stats dc(eval(if(process_cpu_used_percent &amp;gt; 50,host,NULL))) as Total by process_name
| sort 0 - Total
&lt;/CODE&gt;&lt;/PRE&gt;

&lt;P&gt;I think it is easy to make three charts obediently.&lt;/P&gt;</description>
    <pubDate>Mon, 16 Dec 2019 08:54:12 GMT</pubDate>
    <dc:creator>to4kawa</dc:creator>
    <dc:date>2019-12-16T08:54:12Z</dc:date>
    <item>
      <title>help on complex dynamic pie chart</title>
      <link>https://community.splunk.com/t5/Splunk-Search/help-on-complex-dynamic-pie-chart/m-p/465972#M131242</link>
      <description>&lt;P&gt;Hello&lt;/P&gt;

&lt;P&gt;I use the search below in order to display datas in a pie chart&lt;BR /&gt;
As you can see in my eval command, I agregate different services in order to disply them in a single name like "McAFEE" or "Windows native process".&lt;BR /&gt;
My need is to be able to click on the on the "McAFEE" laber or the "Windows native process" label in order to display a new pie chart with the services in relation with this label &lt;BR /&gt;
For McAFEE, its for example  "mfev%", "mcdatrep", "mcshield", "amupdate", "McScript_InUse", "macompatsvc" , "FrameworkService" OR "McScanCheck" &lt;BR /&gt;
Could you help me please??&lt;/P&gt;

&lt;PRE&gt;&lt;CODE&gt;`CPU` 
| fields process_cpu_used_percent host process_name 
| where process_cpu_used_percent&amp;gt;50 
| dedup host process_name 
| eval process_name=case(process_name like "mfev%" OR process_name like "mcdatrep" OR process_name=="mcshield" OR process_name=="amupdate" OR process_name=="McScript_InUse" OR process_name=="macompatsvc" OR process_name=="FrameworkService" OR process_name=="McScanCheck", "McAFEE", process_name like "Wmi%", "WMI", process_name=="conhost", "CMD Windows console", process_name=="csrss" OR process_name=="System" OR process_name=="TiWorker" OR process_name=="msfeedssync" OR process_name=="msiexec" OR process_name=="rundll32" OR process_name=="services" OR process_name like "svchost%" OR process_name=="OneDriveSetup" OR process_name=="poqexec" OR process_name=="unsecapp" OR process_name=="TabTip" OR process_name=="Memory_Compression" OR process_name=="SetupHost" OR process_name=="WerFault" OR process_name=="explorer" OR process_name=="mscorsvw" OR process_name=="sppsvc" OR process_name=="ngen" OR process_name=="spoolsv" OR process_name=="SrTasks" OR process_name=="policyHost" OR process_name=="dwm" OR process_name=="perf-test-9c" OR process_name like "SearchProtocolHost%" OR process_name like "RuntimeBroker%" OR process_name like "LogonUI%", "Windows native process", process_name=="taskhost", "Tasks scheduler")
| stats count(host) as Total by process_name 
| sort -Total
&lt;/CODE&gt;&lt;/PRE&gt;</description>
      <pubDate>Sun, 15 Dec 2019 14:25:10 GMT</pubDate>
      <guid>https://community.splunk.com/t5/Splunk-Search/help-on-complex-dynamic-pie-chart/m-p/465972#M131242</guid>
      <dc:creator>jip31</dc:creator>
      <dc:date>2019-12-15T14:25:10Z</dc:date>
    </item>
    <item>
      <title>Re: help on complex dynamic pie chart</title>
      <link>https://community.splunk.com/t5/Splunk-Search/help-on-complex-dynamic-pie-chart/m-p/465973#M131243</link>
      <description>&lt;P&gt;BASE SEARCH:&lt;/P&gt;

&lt;PRE&gt;&lt;CODE&gt;`CPU` 
| eval PROCESS=case(process_name like "mfev%" OR process_name like "mcdatrep" OR process_name=="mcshield" OR process_name=="amupdate" OR process_name=="McScript_InUse" OR process_name=="macompatsvc" OR process_name=="FrameworkService" OR process_name=="McScanCheck", "McAFEE", process_name like "Wmi%", "WMI", process_name=="conhost", "CMD Windows console", process_name=="csrss" OR process_name=="System" OR process_name=="TiWorker" OR process_name=="msfeedssync" OR process_name=="msiexec" OR process_name=="rundll32" OR process_name=="services" OR process_name like "svchost%" OR process_name=="OneDriveSetup" OR process_name=="poqexec" OR process_name=="unsecapp" OR process_name=="TabTip" OR process_name=="Memory_Compression" OR process_name=="SetupHost" OR process_name=="WerFault" OR process_name=="explorer" OR process_name=="mscorsvw" OR process_name=="sppsvc" OR process_name=="ngen" OR process_name=="spoolsv" OR process_name=="SrTasks" OR process_name=="policyHost" OR process_name=="dwm" OR process_name=="perf-test-9c" OR process_name like "SearchProtocolHost%" OR process_name like "RuntimeBroker%" OR process_name like "LogonUI%", "Windows native process", process_name=="taskhost", "Tasks scheduler") 
&lt;/CODE&gt;&lt;/PRE&gt;

&lt;P&gt;McAfee or Win:&lt;/P&gt;

&lt;PRE&gt;&lt;CODE&gt;| stats dc(eval(if(process_cpu_used_percent &amp;gt; 50,host,NULL))) as Total by PROCESS 
&lt;/CODE&gt;&lt;/PRE&gt;

&lt;P&gt;Process_selected:&lt;/P&gt;

&lt;PRE&gt;&lt;CODE&gt;| where PROCESS==$your_token|s$
| stats dc(eval(if(process_cpu_used_percent &amp;gt; 50,host,NULL))) as Total by process_name
| sort 0 - Total
&lt;/CODE&gt;&lt;/PRE&gt;

&lt;P&gt;I think it is easy to make three charts obediently.&lt;/P&gt;</description>
      <pubDate>Mon, 16 Dec 2019 08:54:12 GMT</pubDate>
      <guid>https://community.splunk.com/t5/Splunk-Search/help-on-complex-dynamic-pie-chart/m-p/465973#M131243</guid>
      <dc:creator>to4kawa</dc:creator>
      <dc:date>2019-12-16T08:54:12Z</dc:date>
    </item>
    <item>
      <title>Re: help on complex dynamic pie chart</title>
      <link>https://community.splunk.com/t5/Splunk-Search/help-on-complex-dynamic-pie-chart/m-p/465974#M131244</link>
      <description>&lt;P&gt;Thanks for your answer&lt;BR /&gt;
If I well understand I have to replace my original search by your search?&lt;BR /&gt;
More I dont understand &lt;CODE&gt;| where PROCESS==$your_token|s$&lt;/CODE&gt;&lt;BR /&gt;
Do I have to enter the name of the process here? Like McAFEE or Windows native process?&lt;/P&gt;</description>
      <pubDate>Mon, 16 Dec 2019 12:34:41 GMT</pubDate>
      <guid>https://community.splunk.com/t5/Splunk-Search/help-on-complex-dynamic-pie-chart/m-p/465974#M131244</guid>
      <dc:creator>jip31</dc:creator>
      <dc:date>2019-12-16T12:34:41Z</dc:date>
    </item>
    <item>
      <title>Re: help on complex dynamic pie chart</title>
      <link>https://community.splunk.com/t5/Splunk-Search/help-on-complex-dynamic-pie-chart/m-p/465975#M131245</link>
      <description>&lt;P&gt;I thought you would make a dashboard, so I attached it to receive a drill-down token.&lt;BR /&gt;
yes, you will put the PROCESS("McAFEE","Windows native process","Tasks scheduler")&lt;/P&gt;</description>
      <pubDate>Mon, 16 Dec 2019 16:46:10 GMT</pubDate>
      <guid>https://community.splunk.com/t5/Splunk-Search/help-on-complex-dynamic-pie-chart/m-p/465975#M131245</guid>
      <dc:creator>to4kawa</dc:creator>
      <dc:date>2019-12-16T16:46:10Z</dc:date>
    </item>
    <item>
      <title>Re: help on complex dynamic pie chart</title>
      <link>https://community.splunk.com/t5/Splunk-Search/help-on-complex-dynamic-pie-chart/m-p/465976#M131246</link>
      <description>&lt;P&gt;Sorry but I had a doubt &lt;span class="lia-unicode-emoji" title=":winking_face:"&gt;😉&lt;/span&gt;&lt;BR /&gt;
so for summarize&lt;BR /&gt;
1) I keep my search in the main dash&lt;BR /&gt;
2) I create a drilldown with your search linked to my search? Do I have to add something in advanced parameters?&lt;BR /&gt;
And are you sure that if I click on the McAFEE pie label from my search it will only open a pie chart with the McAFEE sub processes?&lt;BR /&gt;
thanks&lt;/P&gt;</description>
      <pubDate>Tue, 17 Dec 2019 07:07:03 GMT</pubDate>
      <guid>https://community.splunk.com/t5/Splunk-Search/help-on-complex-dynamic-pie-chart/m-p/465976#M131246</guid>
      <dc:creator>jip31</dc:creator>
      <dc:date>2019-12-17T07:07:03Z</dc:date>
    </item>
    <item>
      <title>Re: help on complex dynamic pie chart</title>
      <link>https://community.splunk.com/t5/Splunk-Search/help-on-complex-dynamic-pie-chart/m-p/465977#M131247</link>
      <description>&lt;P&gt;1 yes.&lt;BR /&gt;
2 as you like.&lt;BR /&gt;
   Advanced parameters are not necessary.&lt;BR /&gt;
   When I created a dashboard on a trial basis, it was possible to drill down.&lt;/P&gt;</description>
      <pubDate>Tue, 17 Dec 2019 12:04:30 GMT</pubDate>
      <guid>https://community.splunk.com/t5/Splunk-Search/help-on-complex-dynamic-pie-chart/m-p/465977#M131247</guid>
      <dc:creator>to4kawa</dc:creator>
      <dc:date>2019-12-17T12:04:30Z</dc:date>
    </item>
  </channel>
</rss>

