On this page
Monitor Okta
Okta offers monitoring and alerting capabilities through Okta's APIs, SDKs, and Admin Console. All supported events within your Okta organization (org) are captured and available through system logs. This allows you to do the following:
- Determine connectivity status from global internet locations to your Okta org
- Identify trends related to users, apps, policies, and other Okta entities
- Detect tasks that require action, such as unlocking a user or restarting an agent
- Detect suspicious activities
- Review user-reported suspicious activities
- Detect and augment certain events
- Avoid exceeding API use limits
- View and block IP addresses identified by the greater Okta community as threatening
- Determine the risk of an anomalous sign-in event
- Confirm that validation is functional
The Admin Console contains predefined reports, system log filters, and notification tools to achieve most of these tasks. If you have external commercial or custom monitoring tools, you can integrate them with your Okta org. Okta sends the integrated tools a continuous flow of event logs or alerts for configured events.
NOTE: Your Okta org maintains a 90-day sliding window of system logs. If you need to retain earlier logs, you can download system logs for external processing or archiving before they pass the 90-day window.
Use the Admin Console to monitor events
The Admin Console provides a rich set of visuals and tools for you to monitor your Okta org.
- Use the Dashboard (opens new window) to view your org at a glance (opens new window), including the number of active users, active groups, and active SSO apps. You can also view your org agents' status (opens new window), your tasks (opens new window) list, recent org changes, and security tips.
- Use the Reports (opens new window) page to view predefined system log reports or visuals
- Use the System Logs (opens new window) page to filter for specific events and to view trends over time
- Use HealthInsight (opens new window) to view recommendations from a recent Okta org security audit
- Use ThreatInsight (opens new window) to view IP addresses identified by the greater Okta community as threatening
Integrate with external monitoring tools
You can integrate commercial log monitoring tools, such as Splunk, Sumo Logic, or Datadog, with your Okta org. You can then monitor and analyze all your apps and web traffic. The commercial monitoring tools are typically integrated with Okta using the Okta System Log API (opens new window). At a high level, the API integration process includes:
- Obtaining an API token from your Okta org
- Creating an Okta API service account for external integration (not required for all tools)
- In the external monitoring tool, configuring your integration properties to Okta, along with the following information:
- Okta org domain
- Okta API token
- Okta API service account username and credentials (not required for all integrated tools)
These configuration properties allow the external tool to request system logs from the Okta System Log API (opens new window). See Exporting Okta Log Data (opens new window) for details.
For external integration examples, refer to:
- Splunk Add-on for Okta (opens new window)
- Datadog Log Management integration (opens new window)
- Sumo Logic integration with Okta (opens new window)
NOTE: During the integration setup, use the Admin Console for verification or troubleshooting purposes. Compare the system logs from the Admin Console with the system logs received in your external monitoring tool.
Send alerts to an external service
Your org may have an external web service that performs extra processing for specific Okta events, such as creating or deactivating a user lifecycle event. Okta provides a webhook feature called event hooks. They let you set up triggers at specific events in Okta to send event payloads to an external web service. Event hooks are asynchronous and don't affect existing Okta workflows.
For an example of an end-to-end event hook setup, see the Event hooks guide. For a list of events that support event hooks, see the Event Types catalog and search with the parameter event-hook-eligible
.
Monitor Okta with your custom tool
You can build custom apps to monitor and analyze events in Okta using Okta SDKs and APIs.
- For a REST API implementation, use the System Log API (opens new window) to retrieve system logs in your Okta org from the last 90 days.
- For a Node.js (opens new window) implementation, use the getLog() (opens new window) method to retrieve system logs in your Okta org from the last 90 days.
- For an okta-sdk-java (opens new window) implementation, use the getLogs() (opens new window) method to retrieve system logs in your Okta org from the last 90 days.
Refer to the supported Event Types catalog for the list of events you can use to filter for the system logs you're interested in.
See Useful System Log Queries (opens new window) for common system log query use cases.
NOTE: When you test your custom monitoring tool, use the Admin Console for verification or troubleshooting purposes. Compare the system logs from the Admin Console with the system logs received in your custom tool.
Download system logs for analysis
You can use the Admin Console to manually download CSV files that contain query results of system logs. Use them for analysis or send them to a data warehouse or lake. See System Logs (opens new window).
Enable and configure Okta ThreatInsight
The Okta ThreatInsight (opens new window) feature aggregates data across Okta customers to detect malicious IP addresses that attempt credential-based attacks. You can enable ThreatInsight through the Okta ThreatInsight Settings (opens new window) in the Admin Console, or through the ThreatInsight API (opens new window).
After ThreatInsight is enabled, Okta captures access attempts from malicious IPs in the system logs. You can also configure it to block access from the malicious IPs to your Okta org.
Monitor rate limit warnings and violations
To mitigate denial-of-service attacks and abusive actions, Okta enforces rate limits on API requests as well as other user inbound and outbound operations. See the Rate limit overview.
Monitor and review the system log events for rate limits to detect rate limit warnings or violations. Use the information in these event logs to investigate access spikes, abusive actions, or traffic trends. You can set up notification emails or notifications that appear in the Admin Console banner for admins. See Set up rate limit notifications (opens new window).
Review Okta system status
Okta provides real-time performance updates and service availability of all Okta service features at status.okta.com (opens new window). Sign in as an administrator at this site to review system status reports specific to your Okta org. Subscribe to the Okta Status RSS (opens new window) feed to receive the latest updates on service degradation and disruptions.