Skip to content

Source and event types for the Splunk Add-on for Okta Identity Cloud

The Splunk Add-on for Okta Identity Cloud has the following sourcetypes. The lookup files are located in $SPLUNK_HOME/etc/apps/Splunk_TA_okta_identity_cloud/lookups.

The Splunk Add-on for Okta Identity Cloud provides the following source types. The add-on assigns different source types based on the Metric selected from the input.

Source type
Description
Event Type
CIM data models
OktaIM2:log System log events coming from Okta Rest API endpoints Refer to “CIM compatibility of Okta System Logs” for detailed information of Okta System Logs okta_identity_cloud_alerts
okta_identity_cloud_authentication
okta_identity_cloud_change_all_changes
okta_identity_cloud_change_account_management
okta_identity_cloud_network_traffic
Alerts
Authentication
Change:All_Changes
Change:Account_Management
Network Traffic
OktaIM2:app Okta App events, Not recommended until really needed okta_app Inventory:User
OktaIM2:user Okta user events okta_user Inventory:User
OktaIM2:group Okta group events N/A N/A
OktaIM2:groupUser Users associated to any group N/A N/A
OktaIM2:appUser Users associated to any app okta_app_user Change:Account_Management