Dashboards & Visualizations

Query regarding Splunk capabilities to compare logs with previous timerange

px42
New Member

Looking out for the alternatives of logcompare in Splunk as provided by SumoLogic.

For better understanding, this is what logcompare (in sumologic) does internally:

  1. Create the signatures by clustering messages together based on string and pattern similarity within a time range(say last 15mins) as provided.
  2. Compare the signatures based on the timeshift(say for example compares the logs for last 15 mins with similar 15 min time range before 24 hours from now). And provides the following stats for every signature(or we can say for every cluster in Splunk terminology) created: -> Error Count (within timerange) -> What is the delta percentage (change in number of messages) for a particular signature -> If the kind of an error is new or not.

I wanted to know if it's possible to create Splunk queries to achieve the same.

0 Karma
Get Updates on the Splunk Community!

Splunk Custom Visualizations App End of Life

The Splunk Custom Visualizations apps End of Life for SimpleXML will reach end of support on Dec 21, 2024, ...

Introducing Splunk Enterprise 9.2

WATCH HERE! Watch this Tech Talk to learn about the latest features and enhancements shipped in the new Splunk ...

Adoption of RUM and APM at Splunk

    Unleash the power of Splunk Observability   Watch Now In this can't miss Tech Talk! The Splunk Growth ...