You may want to use wpaexporter - https://learn.microsoft.com/en-us/windows-hardware/test/wpt/exporter or xperf action - https://learn.microsoft.com/en-us/windows-hardware/test/wpt/xperf-actions
WPA export ETL trace to csv or excel file.
I am wondering WPA can export ETL trace to CSV or excel file format or not.
I have several ETL test logs needs to check.
I can open them one by one the copy the content to a excel file.
I would like to see if it is possible to use some kind of command line which can allow me to export them to csv or excel file.
Then I can write a python script to check the csv or excel file automatically, instead of check them one by one.
I would like to get some kind of automation to assist me check ETL trace.
2 answers
Sort by: Most helpful
-
-
Alois Kraus 1 Reputation point
2022-12-10T20:43:35.79+00:00 You can use WPAExporter to export tables defined in WPA Profiles. This works but is not optimal.
I have written ETWAnalyzer which converts aggregates into Json files which can programmatically be queried, or you can export the data further to a .csv file.
See https://github.com/Siemens-Healthineers/ETWAnalyzerThe workflow is
ETWAnalyzer -extract all -fd xxx.etl -symserver ms
This will create a json file and put it (by default) in a subfolder Extract with the same file name as the input ETL file.
Once you have extracted the data you can dump the data to console or export it further:ETWAnalyzer -dump process -fd Extract\xxx.json -csv Process.csv
ETWAnalyzer -dump CPU -fd Extract\xxx.json -csv CPUOverView.csv
ETWAnalyzer -dump CPU -methods * -fd Extract\xxx.json -csv CPUDetails.csv
ETWAnalyzer -dump File -fd Extract\xxx.json -csv File.csv
ETWAnalyzer -dump Disk -fd Extract\xxx.json -csv Disk.csv
...You can limit the data to a specific process with -processname which supports multiple filters and exclusion rules. Filters are separated with ;
-processname *ch*;!*chrome* will filter for all processes which contan ch but excludes chrome processes.