Dashboards & Visualizations

Query regarding Splunk capabilities to compare logs with previous timerange

px42
New Member

Looking out for the alternatives of logcompare in Splunk as provided by SumoLogic.

For better understanding, this is what logcompare (in sumologic) does internally:

  1. Create the signatures by clustering messages together based on string and pattern similarity within a time range(say last 15mins) as provided.
  2. Compare the signatures based on the timeshift(say for example compares the logs for last 15 mins with similar 15 min time range before 24 hours from now). And provides the following stats for every signature(or we can say for every cluster in Splunk terminology) created: -> Error Count (within timerange) -> What is the delta percentage (change in number of messages) for a particular signature -> If the kind of an error is new or not.

I wanted to know if it's possible to create Splunk queries to achieve the same.

0 Karma
Get Updates on the Splunk Community!

Your Guide to Splunk Digital Experience Monitoring

A flawless digital experience isn't just an advantage, it's key to customer loyalty and business success. But ...

Data Management Digest – November 2025

  Welcome to the inaugural edition of Data Management Digest! As your trusted partner in data innovation, the ...

Upcoming Webinar: Unmasking Insider Threats with Slunk Enterprise Security’s UEBA

Join us on Wed, Dec 10. at 10AM PST / 1PM EST for a live webinar and demo with Splunk experts! Discover how ...