Splunk Enterprise Security

Top alerts fires

saotaigiri
Path Finder

Please I am looking for a query to search for the top alerts that fired within 2 weeks (or within a time frame).

I am also looking for a query to show anomalies within a time frame

Labels (1)
0 Karma

richgalloway
SplunkTrust
SplunkTrust

Start with this query.

| rest/servicesNS/-/-/alerts/fired_alerts| search NOT title="-"

Your second question is far too broad to attempt to answer.  Please post a new question with more specifics.  What kind of data?  What is considered an anomaly?  What time frame? 

---
If this reply helps you, Karma would be appreciated.
0 Karma
First 500 qualified respondents will receive a $20 gift card! Tell us about your professional Splunk journey.
Get Updates on the Splunk Community!

Splunk Decoded: Service Maps vs Service Analyzer Tree View vs Flow Maps

It’s Monday morning, and your phone is buzzing with alert escalations – your customer-facing portal is running ...

What’s New in Splunk Observability – September 2025

What's NewWe are excited to announce the latest enhancements to Splunk Observability, designed to help ITOps ...

Fun with Regular Expression - multiples of nine

Fun with Regular Expression - multiples of nineThis challenge was first posted on Slack #regex channel ...