This recently worked before - From the Sentinel One side - I have access to one of their admin to re-generate keys. They reported that they are unable to provide legacy api tokens for the Splunk App dating back to 2024. We have changed the API key with success as recently as this year.
Upgraded IA-sentinelone_app_for_splunk to 6.0.0
Curl fails from the HF which also worked before. Not likely an app issue, but wondering if a new configuration is required.
Has anyone else encountered something similar?
Auth errors were internal -- we able to use the new JWS token created on sentinel1 under service accounts.
This did not work yesterday, but within 24 hours of bringing it to their attention, so I am not sure what changed.
If I am able to reverse-engineer what was changed, I will post here.
@si_CE Sounds good. Thank you.
@si_CE Did you check the internal logs for any related errors? That would help us understand the issue. As per your query, I presume this is an authentication issue, which can be confirmed from the internal logs for the app/add-on input.
Please confirm your splunk enterprise version and ensure its compatibility with App version on HF.
The below should be the new add on (TA) which should be installed on the HF.
Input Add On for SentinelOne App For Splunk | Splunkbase
>>
If this post addressed your question, you can:
Acknowledging helpful answers keeps the community strong and motivates contributors to continue sharing their expertise.
>>