All Apps and Add-ons

I have setup Okta Identity Cloud Add-on for Splunk and I'm not seeing sourcetype=OktaIM2:log events

criticalstartms
Explorer

In have configured the app to ingest all 4 sourcetypes:
OktaIM2:app
OktaIM2:group
OktaIM2:user
OktaIM2:log

But I don't have any OktaIM2:log logs.

I don't see any errors in these files:
splunkd.log
ta_okta_identity_cloud_for_splunk_okta_identity_cloud.log
ta_okta.log

appalisudhakar
Path Finder

Hi,

Could you please let me know on which Splunk Version you have installed Okta Identity Cloud Add-on? Install Add-on on the Splunk HF and also check the API Token that you are using is valid.

You can use curl command to see if the API token used is valid or not,
eg:

curl -H "apikey: XYZ123XXXXXXXXXXX" "https://XYZ.okta.com/api/v1/users"

Thanks,
Sai

0 Karma
Get Updates on the Splunk Community!

Upcoming Webinar: Unmasking Insider Threats with Slunk Enterprise Security’s UEBA

Join us on Wed, Dec 10. at 10AM PST / 1PM EST for a live webinar and demo with Splunk experts! Discover how ...

.conf25 technical session recap of Observability for Gen AI: Monitoring LLM ...

If you’re unfamiliar, .conf is Splunk’s premier event where the Splunk community, customers, partners, and ...

A Season of Skills: New Splunk Courses to Light Up Your Learning Journey

There’s something special about this time of year—maybe it’s the glow of the holidays, maybe it’s the ...