All Apps and Add-ons

I have setup Okta Identity Cloud Add-on for Splunk and I'm not seeing sourcetype=OktaIM2:log events

criticalstartms
Explorer

In have configured the app to ingest all 4 sourcetypes:
OktaIM2:app
OktaIM2:group
OktaIM2:user
OktaIM2:log

But I don't have any OktaIM2:log logs.

I don't see any errors in these files:
splunkd.log
ta_okta_identity_cloud_for_splunk_okta_identity_cloud.log
ta_okta.log

appalisudhakar
Path Finder

Hi,

Could you please let me know on which Splunk Version you have installed Okta Identity Cloud Add-on? Install Add-on on the Splunk HF and also check the API Token that you are using is valid.

You can use curl command to see if the API token used is valid or not,
eg:

curl -H "apikey: XYZ123XXXXXXXXXXX" "https://XYZ.okta.com/api/v1/users"

Thanks,
Sai

0 Karma
Get Updates on the Splunk Community!

Enterprise Security Content Update (ESCU) | New Releases

In December, the Splunk Threat Research Team had 1 release of new security content via the Enterprise Security ...

Why am I not seeing the finding in Splunk Enterprise Security Analyst Queue?

(This is the first of a series of 2 blogs). Splunk Enterprise Security is a fantastic tool that offers robust ...

Index This | What are the 12 Days of Splunk-mas?

December 2024 Edition Hayyy Splunk Education Enthusiasts and the Eternally Curious!  We’re back with another ...