All Apps and Add-ons

Okta Identity Cloud Add-On issue with default searches

jgeorges
Engager

I have installed the Okta Identity Cloud Add-On into Splunk Cloud.   I have setup individual indexes for each of the log types and accounts that I am ingesting. 

I can see that the Okta logs are being ingested correctly but none of the default searches work.

By default they do a search on "sourcetype" however this returns no results:

sourcetype="oktaim2:log" event_type="okta_event_authentication" (host="*")

If I manually add the index to the search, then it works:

index="okta-*" sourcetype="oktaim2:log" event_type="okta_event_authentication" (host="*")

I can't find anywhere to set the default index.  If I do a plain search for sourcetype="oktaim2:log" it also returns no results.

Is this an error when Splunk have installed the add-on, or a configuration I have missed, or do I just have to manually adjust all of the views ?

Any thoughts appreciated.

 

Labels (2)

asridhara
Explorer

As an Admin user, go to Settings > roles > select a role you want to enable default indexes for > Indexes > select default for okta index. Save .. Waaalah 

0 Karma
Career Survey
First 500 qualified respondents will receive a $20 gift card! Tell us about your professional Splunk journey.

Can’t make it to .conf25? Join us online!

Get Updates on the Splunk Community!

Community Content Calendar, September edition

Welcome to another insightful post from our Community Content Calendar! We're thrilled to continue bringing ...

Splunkbase Unveils New App Listing Management Public Preview

Splunkbase Unveils New App Listing Management Public PreviewWe're thrilled to announce the public preview of ...

Leveraging Automated Threat Analysis Across the Splunk Ecosystem

Are you leveraging automation to its fullest potential in your threat detection strategy?Our upcoming Security ...