On this page

Monitor Okta

Okta offers monitoring and alerting capabilities through Okta's APIs, SDKs, and Admin Console. All supported events within your Okta organization (org) are captured and available through system logs. This allows you to do the following:

  • Determine connectivity status from global internet locations to your Okta org
  • Identify trends related to users, apps, policies, and other Okta entities
  • Detect tasks that require action, such as unlocking a user or restarting an agent
  • Detect suspicious activities
  • Review user-reported suspicious activities
  • Detect and augment certain events
  • Avoid exceeding API use limits
  • View and block IP addresses identified by the greater Okta community as threatening
  • Determine the risk of an anomalous sign-in event
  • Confirm that validation is functional

The Admin Console contains predefined reports, system log filters, and notification tools to achieve most of these tasks. If you have external commercial or custom monitoring tools, you can integrate them with your Okta org. Okta sends the integrated tools a continuous flow of event logs or alerts for configured events.

NOTE: Your Okta org maintains a 90-day sliding window of system logs. If you need to retain earlier logs, you can download system logs for external processing or archiving before they pass the 90-day window.

Use the Admin Console to monitor events

The Admin Console provides a rich set of visuals and tools for you to monitor your Okta org.

Integrate with external monitoring tools

You can integrate commercial log monitoring tools, such as Splunk, Sumo Logic, or Datadog, with your Okta org. You can then monitor and analyze all your apps and web traffic. The commercial monitoring tools are typically integrated with Okta using the Okta System Log API (opens new window). At a high level, the API integration process includes:

  1. Obtaining an API token from your Okta org
  2. Creating an Okta API service account for external integration (not required for all tools)
  3. In the external monitoring tool, configuring your integration properties to Okta, along with the following information:
    • Okta org domain
    • Okta API token
    • Okta API service account username and credentials (not required for all integrated tools)

These configuration properties allow the external tool to request system logs from the Okta System Log API (opens new window). See Exporting Okta Log Data (opens new window) for details.

For external integration examples, refer to:

NOTE: During the integration setup, use the Admin Console for verification or troubleshooting purposes. Compare the system logs from the Admin Console with the system logs received in your external monitoring tool.

Send alerts to an external service

Your org may have an external web service that performs extra processing for specific Okta events, such as creating or deactivating a user lifecycle event. Okta provides a webhook feature called event hooks. They let you set up triggers at specific events in Okta to send event payloads to an external web service. Event hooks are asynchronous and don't affect existing Okta workflows.

For an example of an end-to-end event hook setup, see the Event hooks guide. For a list of events that support event hooks, see the Event Types catalog and search with the parameter event-hook-eligible.

Monitor Okta with your custom tool

You can build custom apps to monitor and analyze events in Okta using Okta SDKs and APIs.

Refer to the supported Event Types catalog for the list of events you can use to filter for the system logs you're interested in.

See Useful System Log Queries (opens new window) for common system log query use cases.

NOTE: When you test your custom monitoring tool, use the Admin Console for verification or troubleshooting purposes. Compare the system logs from the Admin Console with the system logs received in your custom tool.

Download system logs for analysis

You can use the Admin Console to manually download CSV files that contain query results of system logs. Use them for analysis or send them to a data warehouse or lake. See System Logs (opens new window).

Enable and configure Okta ThreatInsight

The Okta ThreatInsight (opens new window) feature aggregates data across Okta customers to detect malicious IP addresses that attempt credential-based attacks. You can enable ThreatInsight through the Okta ThreatInsight Settings (opens new window) in the Admin Console, or through the ThreatInsight API (opens new window).

After ThreatInsight is enabled, Okta captures access attempts from malicious IPs in the system logs. You can also configure it to block access from the malicious IPs to your Okta org.

Monitor rate limit warnings and violations

To mitigate denial-of-service attacks and abusive actions, Okta enforces rate limits on API requests as well as other user inbound and outbound operations. See the Rate limit overview.

Monitor and review the system log events for rate limits to detect rate limit warnings or violations. Use the information in these event logs to investigate access spikes, abusive actions, or traffic trends. You can set up notification emails or notifications that appear in the Admin Console banner for admins. See Set up rate limit notifications (opens new window).

Review Okta system status

Okta provides real-time performance updates and service availability of all Okta service features at status.okta.com (opens new window). Sign in as an administrator at this site to review system status reports specific to your Okta org. Subscribe to the Okta Status RSS (opens new window) feed to receive the latest updates on service degradation and disruptions.