Splunk Enterprise Security

Top alerts fires

saotaigiri
Path Finder

Please I am looking for a query to search for the top alerts that fired within 2 weeks (or within a time frame).

I am also looking for a query to show anomalies within a time frame

Labels (1)
0 Karma

richgalloway
SplunkTrust
SplunkTrust

Start with this query.

| rest/servicesNS/-/-/alerts/fired_alerts| search NOT title="-"

Your second question is far too broad to attempt to answer.  Please post a new question with more specifics.  What kind of data?  What is considered an anomaly?  What time frame? 

---
If this reply helps you, Karma would be appreciated.
0 Karma
Get Updates on the Splunk Community!

Unleash Unified Security and Observability with Splunk Cloud Platform

     Now Available on Microsoft AzureThursday, March 27, 2025  |  11AM PST / 2PM EST | Register NowStep boldly ...

Splunk AppDynamics with Cisco Secure Application

Web applications unfortunately present a target rich environment for security vulnerabilities and attacks. ...

New Splunk Innovations Enhance Performance and Accelerate Troubleshooting

Splunk is excited to announce new releases that empower ITOps and engineering teams to stay ahead in ever ...