All Apps and Add-ons

I have setup Okta Identity Cloud Add-on for Splunk and I'm not seeing sourcetype=OktaIM2:log events

criticalstartms
Explorer

In have configured the app to ingest all 4 sourcetypes:
OktaIM2:app
OktaIM2:group
OktaIM2:user
OktaIM2:log

But I don't have any OktaIM2:log logs.

I don't see any errors in these files:
splunkd.log
ta_okta_identity_cloud_for_splunk_okta_identity_cloud.log
ta_okta.log

appalisudhakar
Path Finder

Hi,

Could you please let me know on which Splunk Version you have installed Okta Identity Cloud Add-on? Install Add-on on the Splunk HF and also check the API Token that you are using is valid.

You can use curl command to see if the API token used is valid or not,
eg:

curl -H "apikey: XYZ123XXXXXXXXXXX" "https://XYZ.okta.com/api/v1/users"

Thanks,
Sai

0 Karma
Get Updates on the Splunk Community!

Splunk Cloud | Empowering Splunk Administrators with Admin Config Service (ACS)

Greetings, Splunk Cloud Admins and Splunk enthusiasts! The Admin Configuration Service (ACS) team is excited ...

Tech Talk | One Log to Rule Them All

One log to rule them all: how you can centralize your troubleshooting with Splunk logs We know how important ...

Splunk Security Content for Threat Detection & Response, Q1 Roundup

Join Principal Threat Researcher, Michael Haag, as he walks through:An introduction to the Splunk Threat ...