The issue has been identified and resolved.
We are continuing to investigate this issue. Please refer to the Workaround posted in our update from 15:50 UTC.
We are continuing to investigate this issue.
We are continuing to investigate this issue.
Our engineering teams continue investigating this service disruption in search of a permanent solution for the SSO Authentication issues. The workaround mentioned in our previous update remains as the best course of action to mitigate immediate impact.
We have identified a workaround that can help restore access while we continue investigating the root cause.
Workaround
Organizations with SSO enabled have a local administrator account that can sign in without SSO. Administrators can use this account to:
1. Sign in to Splunk Observability using email and password (local login)
2. Invite affected users to the organization
3. Enable invited users to sign in using email and password (local login) as a temporary alternative
We have validated this process internally and confirmed it is working as expected.
Next step
* If you need assistance applying this workaround, please contact Splunk Customer Support.
We will continue to monitor the situation and provide updates as additional information becomes available.
We are continuing to investigate this issue.
We are continuing to investigate this issue.
Starting at 03:12 AM Pacific Time, customers using Azure Entra ID for Single Sign-On (SSO) may be unable to log in to Splunk Observability. We are actively investigating now.
With IsDown, you can monitor all your critical services' official status pages from one centralized dashboard and receive instant alerts the moment an outage is detected. Say goodbye to constantly checking multiple sites for updates and stay ahead of outages with IsDown.
Start free trialNo credit card required · Cancel anytime · 5450 services available
Integrations with