All Apps and Add-ons

I have setup Okta Identity Cloud Add-on for Splunk and I'm not seeing sourcetype=OktaIM2:log events

criticalstartms
Explorer

In have configured the app to ingest all 4 sourcetypes:
OktaIM2:app
OktaIM2:group
OktaIM2:user
OktaIM2:log

But I don't have any OktaIM2:log logs.

I don't see any errors in these files:
splunkd.log
ta_okta_identity_cloud_for_splunk_okta_identity_cloud.log
ta_okta.log

appalisudhakar
Path Finder

Hi,

Could you please let me know on which Splunk Version you have installed Okta Identity Cloud Add-on? Install Add-on on the Splunk HF and also check the API Token that you are using is valid.

You can use curl command to see if the API token used is valid or not,
eg:

curl -H "apikey: XYZ123XXXXXXXXXXX" "https://XYZ.okta.com/api/v1/users"

Thanks,
Sai

0 Karma
Get Updates on the Splunk Community!

Preparing your Splunk Environment for OpenSSL3

The Splunk platform will transition to OpenSSL version 3 in a future release. Actions are required to prepare ...

Unleash Unified Security and Observability with Splunk Cloud Platform

     Now Available on Microsoft AzureThursday, March 27, 2025  |  11AM PST / 2PM EST | Register NowStep boldly ...

Splunk AppDynamics with Cisco Secure Application

Web applications unfortunately present a target rich environment for security vulnerabilities and attacks. ...