SentinelOne
Overview
SentinelOne logs provide critical insights into the security of your organization, including endpoint activities, detected threats, user and admin actions. Read these logs to identify patterns, investigate threats and abnormal actions, and understand the context of potential security breaches.
For more information about this integration, click here.
How to use with Terraform
To deploy this integration using Terraform, you can use the coralogix_integration
resource provided by the Coralogix Terraform provider. Below is an example configuration:
resource "coralogix_integration" "sentinel-one-collector" {
integration_key = "sentinel-one-collector"
version = "0.0.1"
parameters = {
IntegrationName = "<IntegrationName>"
ApplicationName = "<ApplicationName>"
SubsystemName = "SentinelOne"
Endpoint = "<Endpoint>"
ApiKey = "<ApiKey>"
}
}
Replace the placeholder values with your actual configuration parameters. Refer to the parameter table below for required fields and their descriptions.
Revisions
0.0.1
Name | Type | Required | Description |
---|---|---|---|
ApiKey | String | Yes | API token to authenticate and read logs from your SentinelOne tenant |
ApplicationName | String | Yes | The application name that the integration will be used with |
Endpoint | String | Yes | URL of your SentinelOne tenant to connect and read logs from |
IntegrationName | String | Yes | |
SubsystemName | String | Yes | The subsystem name that the integration will be used with |
Theme
Light