<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Re: Windows monitoring- high CPU % process - Splunk Alert in Splunk Search</title>
    <link>https://community.splunk.com/t5/Splunk-Search/Windows-monitoring-high-CPU-process-Splunk-Alert/m-p/515916#M144888</link>
    <description>&lt;P&gt;&lt;a href="https://community.splunk.com/t5/user/viewprofilepage/user-id/184221"&gt;@to4kawa&lt;/a&gt;&amp;nbsp; Thank you for the help.&lt;/P&gt;&lt;P&gt;Also there is a requirement to find the high cpu consumption process not the total cpu % , how the query should be and what should be the wql query/&amp;nbsp; configuration file changes.&lt;/P&gt;&lt;P&gt;Thanks in advance&lt;/P&gt;</description>
    <pubDate>Tue, 25 Aug 2020 05:13:17 GMT</pubDate>
    <dc:creator>dkgs</dc:creator>
    <dc:date>2020-08-25T05:13:17Z</dc:date>
    <item>
      <title>Windows monitoring- high CPU % process - Splunk Alert</title>
      <link>https://community.splunk.com/t5/Splunk-Search/Windows-monitoring-high-CPU-process-Splunk-Alert/m-p/515760#M144815</link>
      <description>&lt;P&gt;Hello,&lt;/P&gt;&lt;P&gt;I wanted to setup alert in Splunk cloud&amp;nbsp; for windows machines when CPU% is greater than 90.&amp;nbsp;&lt;/P&gt;&lt;P&gt;Please do&amp;nbsp; help how to set up the same.&lt;/P&gt;&lt;P&gt;My query is not working properly as expected.&lt;/P&gt;&lt;P&gt;index="index1" host=windows1 source="WMI:ProcessesCPU" | WHERE NOT Name="_Total" | WHERE NOT Name="System" | WHERE NOT Name="Idle" | streamstats dc(_time) as distinct_times | head (distinct_times == 1) | stats latest(PercentProcessorTime) as CPU% by Name | sort -ProcessorTime |eval AlertStatus=if('CPU%'&amp;gt; 90, "Alert", "Ignore") |search AlertStatus="Alert"&lt;/P&gt;&lt;P&gt;Inputs.conf file configurations&lt;/P&gt;&lt;P&gt;[WMI:ProcessesCPU]&lt;BR /&gt;interval = 60&lt;BR /&gt;wql = SELECT Name, PercentProcessorTime, PercentPrivilegedTime, PercentUserTime, ThreadCount FROM Win32_PerfFormattedData_PerfProc_Process WHERE PercentProcessorTime&amp;gt;0&lt;BR /&gt;disabled = 0&lt;/P&gt;</description>
      <pubDate>Mon, 24 Aug 2020 11:59:32 GMT</pubDate>
      <guid>https://community.splunk.com/t5/Splunk-Search/Windows-monitoring-high-CPU-process-Splunk-Alert/m-p/515760#M144815</guid>
      <dc:creator>dkgs</dc:creator>
      <dc:date>2020-08-24T11:59:32Z</dc:date>
    </item>
    <item>
      <title>Re: Windows monitoring- high CPU % process - Splunk Alert</title>
      <link>https://community.splunk.com/t5/Splunk-Search/Windows-monitoring-high-CPU-process-Splunk-Alert/m-p/515763#M144816</link>
      <description>&lt;P&gt;&lt;SPAN&gt;index="index1" host=windows1 source="WMI:ProcessesCPU"&amp;nbsp;PercentProcessorTime &amp;gt; 90&lt;BR /&gt;&lt;BR /&gt;How about this?&lt;/SPAN&gt;&lt;/P&gt;</description>
      <pubDate>Mon, 24 Aug 2020 12:05:28 GMT</pubDate>
      <guid>https://community.splunk.com/t5/Splunk-Search/Windows-monitoring-high-CPU-process-Splunk-Alert/m-p/515763#M144816</guid>
      <dc:creator>to4kawa</dc:creator>
      <dc:date>2020-08-24T12:05:28Z</dc:date>
    </item>
    <item>
      <title>Re: Windows monitoring- high CPU % process - Splunk Alert</title>
      <link>https://community.splunk.com/t5/Splunk-Search/Windows-monitoring-high-CPU-process-Splunk-Alert/m-p/515778#M144822</link>
      <description>&lt;P&gt;&lt;a href="https://community.splunk.com/t5/user/viewprofilepage/user-id/184221"&gt;@to4kawa&lt;/a&gt;&amp;nbsp; thank you for the response.But this won't help.&amp;nbsp; Different processes will be coming in&amp;nbsp;&lt;SPAN&gt;PercentProcessorTime. We need to check the total cpu % greater than 90.&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN&gt;Any other way ? Please do suggest&lt;/SPAN&gt;&lt;/P&gt;</description>
      <pubDate>Mon, 24 Aug 2020 13:07:24 GMT</pubDate>
      <guid>https://community.splunk.com/t5/Splunk-Search/Windows-monitoring-high-CPU-process-Splunk-Alert/m-p/515778#M144822</guid>
      <dc:creator>dkgs</dc:creator>
      <dc:date>2020-08-24T13:07:24Z</dc:date>
    </item>
    <item>
      <title>Re: Windows monitoring- high CPU % process - Splunk Alert</title>
      <link>https://community.splunk.com/t5/Splunk-Search/Windows-monitoring-high-CPU-process-Splunk-Alert/m-p/515781#M144823</link>
      <description>&lt;P&gt;what's &lt;STRONG&gt;total?&lt;BR /&gt;sum? average? other?&lt;/STRONG&gt;&lt;/P&gt;</description>
      <pubDate>Mon, 24 Aug 2020 13:11:39 GMT</pubDate>
      <guid>https://community.splunk.com/t5/Splunk-Search/Windows-monitoring-high-CPU-process-Splunk-Alert/m-p/515781#M144823</guid>
      <dc:creator>to4kawa</dc:creator>
      <dc:date>2020-08-24T13:11:39Z</dc:date>
    </item>
    <item>
      <title>Re: Windows monitoring- high CPU % process - Splunk Alert</title>
      <link>https://community.splunk.com/t5/Splunk-Search/Windows-monitoring-high-CPU-process-Splunk-Alert/m-p/515785#M144824</link>
      <description>&lt;P&gt;&lt;a href="https://community.splunk.com/t5/user/viewprofilepage/user-id/184221"&gt;@to4kawa&lt;/a&gt;&amp;nbsp; Total of all CPU processes in the windows machine.&amp;nbsp; I am also confused whether to take sum or average in this case. Normally how we see as total cpu % in task manager in a windows machine . Also we need to check for real time&lt;/P&gt;&lt;P&gt;Below is the wql query written in wmi file&lt;/P&gt;&lt;P&gt;wql = SELECT Name, PercentProcessorTime, PercentPrivilegedTime, PercentUserTime, ThreadCount FROM Win32_PerfFormattedData_PerfProc_Process WHERE PercentProcessorTime&amp;gt;0&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Mon, 24 Aug 2020 13:19:16 GMT</pubDate>
      <guid>https://community.splunk.com/t5/Splunk-Search/Windows-monitoring-high-CPU-process-Splunk-Alert/m-p/515785#M144824</guid>
      <dc:creator>dkgs</dc:creator>
      <dc:date>2020-08-24T13:19:16Z</dc:date>
    </item>
    <item>
      <title>Re: Windows monitoring- high CPU % process - Splunk Alert</title>
      <link>https://community.splunk.com/t5/Splunk-Search/Windows-monitoring-high-CPU-process-Splunk-Alert/m-p/515887#M144878</link>
      <description>&lt;P&gt;well, why do you use `&lt;SPAN&gt;| WHERE NOT Name="_Total"` ?&lt;BR /&gt;&lt;BR /&gt;_Total is total cpu usage. so, I asked you.&lt;BR /&gt;&lt;BR /&gt;in wql. where ... AND Name="_Total" is simple solution.&lt;/SPAN&gt;&lt;/P&gt;</description>
      <pubDate>Mon, 24 Aug 2020 21:01:00 GMT</pubDate>
      <guid>https://community.splunk.com/t5/Splunk-Search/Windows-monitoring-high-CPU-process-Splunk-Alert/m-p/515887#M144878</guid>
      <dc:creator>to4kawa</dc:creator>
      <dc:date>2020-08-24T21:01:00Z</dc:date>
    </item>
    <item>
      <title>Re: Windows monitoring- high CPU % process - Splunk Alert</title>
      <link>https://community.splunk.com/t5/Splunk-Search/Windows-monitoring-high-CPU-process-Splunk-Alert/m-p/515916#M144888</link>
      <description>&lt;P&gt;&lt;a href="https://community.splunk.com/t5/user/viewprofilepage/user-id/184221"&gt;@to4kawa&lt;/a&gt;&amp;nbsp; Thank you for the help.&lt;/P&gt;&lt;P&gt;Also there is a requirement to find the high cpu consumption process not the total cpu % , how the query should be and what should be the wql query/&amp;nbsp; configuration file changes.&lt;/P&gt;&lt;P&gt;Thanks in advance&lt;/P&gt;</description>
      <pubDate>Tue, 25 Aug 2020 05:13:17 GMT</pubDate>
      <guid>https://community.splunk.com/t5/Splunk-Search/Windows-monitoring-high-CPU-process-Splunk-Alert/m-p/515916#M144888</guid>
      <dc:creator>dkgs</dc:creator>
      <dc:date>2020-08-25T05:13:17Z</dc:date>
    </item>
  </channel>
</rss>

