All Apps and Add-ons

I have setup Okta Identity Cloud Add-on for Splunk and I'm not seeing sourcetype=OktaIM2:log events

criticalstartms
Explorer

In have configured the app to ingest all 4 sourcetypes:
OktaIM2:app
OktaIM2:group
OktaIM2:user
OktaIM2:log

But I don't have any OktaIM2:log logs.

I don't see any errors in these files:
splunkd.log
ta_okta_identity_cloud_for_splunk_okta_identity_cloud.log
ta_okta.log

appalisudhakar
Path Finder

Hi,

Could you please let me know on which Splunk Version you have installed Okta Identity Cloud Add-on? Install Add-on on the Splunk HF and also check the API Token that you are using is valid.

You can use curl command to see if the API token used is valid or not,
eg:

curl -H "apikey: XYZ123XXXXXXXXXXX" "https://XYZ.okta.com/api/v1/users"

Thanks,
Sai

0 Karma
Get Updates on the Splunk Community!

Detecting Brute Force Account Takeover Fraud with Splunk

This article is the second in a three-part series exploring advanced fraud detection techniques using Splunk. ...

Buttercup Games: Further Dashboarding Techniques (Part 9)

This series of blogs assumes you have already completed the Splunk Enterprise Search Tutorial as it uses the ...

Buttercup Games: Further Dashboarding Techniques (Part 8)

This series of blogs assumes you have already completed the Splunk Enterprise Search Tutorial as it uses the ...