Splunk Enterprise

Sentinel One Integration with Splunk

azer271
Path Finder

Hi. I am new to Splunk and SentinelOne. Here is what I've done so far:

I need to forward logs from SentinelOne to a single Splunk instance. Since it is a single instance, I installed the Splunk CIM Add-on and the SentinelOne App. (which is mentioned in the Installation of the app. https://splunkbase.splunk.com/app/5433 )

In the SentinelOne App of the Splunk instance, I changed the search index to sentinelone in Application Configuration. I already created the index for testing purpose. In the API configuration, I added the url which is xxx-xxx-xxx.sentinelone.net and the api token. It is generated by adding a new service user in SentinelOne and clicking generate API token. The scope is global. I am not sure if its the correct API token.

Moreover, I am not sure which channel I need to pick in SentinelOne inputs in Application Configuration(SentineOne App), such as Agents/Activities/Applications etc. How do I know which channel do i need to forward or i just add all channels?

azer271_0-1739031342871.png

Clicking the application health overview, there is no data ingest of items. Using this SPL index=_internal sourcetype="sentinelone*" sourcetype="sentinelone:modularinput" does not show any action=saving_checkpoint, which means no data.

azer271_1-1739031391390.png

Any help/documentation for the setup would be helpful. I would like to know the reason for no data and how to fix it. Thank you.

Tags (1)
0 Karma
1 Solution

aplura_llc_supp
Path Finder

According to your screenshot, the inputs are "DISABLED". The checkmark follows typical Splunk inputs as "disabled == checked". Uncheck those inputs, and you should see data flow.

Thanks!

View solution in original post

aplura_llc_supp
Path Finder

According to your screenshot, the inputs are "DISABLED". The checkmark follows typical Splunk inputs as "disabled == checked". Uncheck those inputs, and you should see data flow.

Thanks!

azer271
Path Finder

The inputs are unchecked now. disabled = 0 in local/inputs.conf as well. 443/tcp is allowed in firewall.

azer271_2-1739285589369.png

 

azer271_0-1739285388274.png

There is still no data. Is there anything I am missing? Thank you everyone for your help!

API Token Post Request:

azer271_3-1739285753628.png

internal log:

azer271_1-1739285466722.png

 

0 Karma

molla
Explorer

Hi @azer271
have you solved the issue?

I'm also having the same.

0 Karma

azer271
Path Finder

I solved the issue by unchecking the inputs in the app, since they are disabled by default and making sure the API permissions in Sentinel One. In my case, i just create a new service user in Sentinel One and use the api generated from the service user. The user has the scope of access to the site.

0 Karma

kiran_panchavat
Champion

@azer271 Check the internal logs:

index=_internal *sentinelone*
Did this help? If yes, please consider giving kudos, marking it as the solution, or commenting for clarification — your feedback keeps the community going!

kiran_panchavat
Champion

@azer271 

To verify, you can test the API connection by using Postman or curl

curl -X GET "https://xxx-xxx-xxx.sentinelone.net/web/api/v2.1/info" -H "Authorization: APIToken"

If you get a successful response, the API token is valid.

If logs are missing, check API permissions,  and any firewall restrictions.

Did this help? If yes, please consider giving kudos, marking it as the solution, or commenting for clarification — your feedback keeps the community going!
Career Survey
First 500 qualified respondents will receive a $20 gift card! Tell us about your professional Splunk journey.

Can’t make it to .conf25? Join us online!

Get Updates on the Splunk Community!

Can’t Make It to Boston? Stream .conf25 and Learn with Haya Husain

Boston may be buzzing this September with Splunk University and .conf25, but you don’t have to pack a bag to ...

Splunk Lantern’s Guide to The Most Popular .conf25 Sessions

Splunk Lantern is a Splunk customer success center that provides advice from Splunk experts on valuable data ...

Unlock What’s Next: The Splunk Cloud Platform at .conf25

In just a few days, Boston will be buzzing as the Splunk team and thousands of community members come together ...