Dashboards & Visualizations

Query regarding Splunk capabilities to compare logs with previous timerange

px42
New Member

Looking out for the alternatives of logcompare in Splunk as provided by SumoLogic.

For better understanding, this is what logcompare (in sumologic) does internally:

  1. Create the signatures by clustering messages together based on string and pattern similarity within a time range(say last 15mins) as provided.
  2. Compare the signatures based on the timeshift(say for example compares the logs for last 15 mins with similar 15 min time range before 24 hours from now). And provides the following stats for every signature(or we can say for every cluster in Splunk terminology) created: -> Error Count (within timerange) -> What is the delta percentage (change in number of messages) for a particular signature -> If the kind of an error is new or not.

I wanted to know if it's possible to create Splunk queries to achieve the same.

0 Karma
Got questions? Get answers!

Join the Splunk Community Slack to learn, troubleshoot, and make connections with fellow Splunk practitioners in real time!

Meet up IRL or virtually!

Join Splunk User Groups to connect and learn in-person by region or remotely by topic or industry.

Get Updates on the Splunk Community!

[Puzzles] Solve, Learn, Repeat: Character substitutions with Regular Expressions

This challenge was first posted on Slack #puzzles channelFor BORE at .conf23, we had a puzzle question which ...

Splunk Community Badges!

  Hey everyone! Ready to earn some serious bragging rights in the community? Along with our existing badges ...

[Puzzles] Solve, Learn, Repeat: Matching cron expressions

This puzzle (first published here) is based on matching timestamps to cron expressions.All the timestamps ...