Application and Process Startup Metrics
uberAgent collects metrics for each application or process that is being launched like startup duration, IOPS during startup as well as if the process was started with admin privileges.
Note: as with all other metrics process startup duration is recorded automatically without requiring any configuration.
uberAgent optionally only shows new processes never seen before.
Note: processes are auto-grouped into applications, i.e. the application name is determined automatically without requiring any configuration. Information on how this works are available here.
If the configuration setting EnableExtendedInfo is enabled, uberAgent also collects metrics like the full path to the process executable in the file system as well the full commandline the process was launched with.
- Source type: uberAgent:Process:ProcessStartup
- Used in dashboards: Application Startup, Process Startup, Single Application Detail, Analyze data over time
- Enabled through configuration setting: ProcessStartup
- Related configuration settings: [ProcessStartupSettings], ProcessStartupDurationWaitIntervalOverride
|StartupTimeMs||Startup time duration||Number||ms||300|
|StartupIOPS||Startup I/O operations per second||Number||150|
|AppId||Associated application ID. Used by uberAgent to lookup application names and populate field AppName.||String||GglChrm|
|ProcParentID||Parent process ID||Number||789|
|SessionID||Unique identifier that is generated by the machine when the session is created.
Will be reassigned to other sessions after logoff.
|ProcGUID||Unique identifier that is generated by uberAgent when the process is started||String||00000000-ebe5-469c-63ae-f5a1de28d401|
|SessionGUID||Unique identifier that is generated by uberAgent when the session is created.
Valid for this session only.
|ProcParentName||Parent process name||String||powershell.exe|
|ProcPath||Full path to the process executable in the file system||String||C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe|
|ProcCmdline||Full commandline the process was launched with||String||C:\Program Files (x86)\Google\Chrome\Application\chrome.exe –url http://vastlimits.com|
|IsElevated||Indicates if the process was started elevated (admin rights)||String||C:\Program Files (x86)\Google\Chrome\Application\chrome.exe|
|AppVersion||Associated application version||String||67.0.3396.99|
The following fields are empty unless EnableExtendedInfo is set to true: ProcID, ProcParentID, SessionID, ProcGUID, SessionGUID, ProcParentName, ProcPath, ProcCmdline
|Field||Description||Data type||Unit||Example||Where available|
|User||Content of field ProcUser||String||Domain\JohnDoe||Splunk data model|
|StartupTimeS||Startup time duration||Number||s||0.3||Splunk data model|
|StartupIOCount||StartupIOPS * StartupTimeMs / 1000||Number||45||Splunk data model|
|AppName||Associated application name||String||Google Chrome||Splunk data model, Splunk SPL|