Cribl puts your IT and Security data at the center of your data management strategy and provides a one-stop shop for analyzing, collecting, processing, and routing it all at any scale. Try the Cribl suite of products and start building your data engine today!
Learn more ›Evolving demands placed on IT and Security teams are driving a new architecture for how observability data is captured, curated, and queried. This new architecture provides flexibility and control while managing the costs of increasing data volumes.
Read white paper ›Cribl Stream is a vendor-agnostic observability pipeline that gives you the flexibility to collect, reduce, enrich, normalize, and route data from any source to any destination within your existing data infrastructure.
Learn more ›Cribl Edge provides an intelligent, highly scalable edge-based data collection system for logs, metrics, and application data.
Learn more ›Cribl Search turns the traditional search process on its head, allowing users to search data in place without having to collect/store first.
Learn more ›Cribl Lake is a turnkey data lake solution that takes just minutes to get up and running — no data expertise needed. Leverage open formats, unified security with rich access controls, and central access to all IT and security data.
Learn more ›The Cribl.Cloud platform gets you up and running fast without the hassle of running infrastructure.
Learn more ›Cribl.Cloud Solution Brief
The fastest and easiest way to realize the value of an observability ecosystem.
Read Solution Brief ›Cribl Copilot gets your deployments up and running in minutes, not weeks or months.
Learn more ›AppScope gives operators the visibility they need into application behavior, metrics and events with no configuration and no agent required.
Learn more ›Explore Cribl’s Solutions by Use Cases:
Explore Cribl’s Solutions by Integrations:
Explore Cribl’s Solutions by Industry:
Try Your Own Cribl Sandbox
Experience a full version of Cribl Stream and Cribl Edge in the cloud.
Launch Now ›Get inspired by how our customers are innovating IT, security and observability. They inspire us daily!
Read Customer Stories ›Sally Beauty Holdings
Sally Beauty Swaps LogStash and Syslog-ng with Cribl.Cloud for a Resilient Security and Observability Pipeline
Read Case Study ›Experience a full version of Cribl Stream and Cribl Edge in the cloud.
Launch Now ›Transform data management with Cribl, the Data Engine for IT and Security
Learn More ›Cribl Corporate Overview
Cribl makes open observability a reality, giving you the freedom and flexibility to make choices instead of compromises.
Get the Guide ›Stay up to date on all things Cribl and observability.
Visit the Newsroom ›Cribl’s leadership team has built and launched category-defining products for some of the most innovative companies in the technology sector, and is supported by the world’s most elite investors.
Meet our Leaders ›Join the Cribl herd! The smartest, funniest, most passionate goats you’ll ever meet.
Learn More ›Whether you’re just getting started or scaling up, the Cribl for Startups program gives you the tools and resources your company needs to be successful at every stage.
Learn More ›Want to learn more about Cribl from our sales experts? Send us your contact information and we’ll be in touch.
Talk to an Expert ›In the blog titled “Streamline Endpoint Data with Cribl Pack for SentinelOne Cloud Funnel” we dove into the Cloud Funnel data, its relevance in the modern SOC, and how Cribl Stream transforms the data while addressing visibility gaps. We left the AWS-specific details to this blog for those not yet familiar with configuring AWS S3 buckets, SQS Queues, and Identity and Access Management (IAM).
We are going to use a combination of ACLs, Policies, and Roles within AWS to allow SentinelOne to write the Cloud Funnel data to your S3 bucket and to allow Cribl Stream to pull this data. We will also allow the S3 bucket to send notifications to the SQS queue to let Cribl Stream know when new data is available.
After creating the S3 bucket, there are several configurations that need to occur related to event notifications and trusts. Make sure you have ACLs enabled when you create the S3 bucket because we will add an ACL in the next section to allow SentinelOne write access. I’m assuming you have created your S3 bucket and have Its associated ARN documented for reference in the below policy.
Let’s begin by using the Amazon Console to create an SQS queue. We will soon configure our S3 bucket via event notifications to send events into the SQS queue which Cribl Stream will monitor. While creating the new SQS queue in the same region as your bucket, accept all default settings except for the Access Policy section. We need to allow our S3 bucket to send notifications into this queue. Under ‘Access Policy’, set the method to ‘Advanced’ and place the below JSON blob in the text box making sure to replace the green text with values specific to your configuration. This policy states that your S3 bucket is allowed access to this queue. Save Changes.
{
“Version”: “2012-10-17”,
“Id”: “example-ID”,
“Statement”: [
{
“Effect”: “Allow”,
“Principal”: {“Service”: “s3.amazonaws.com”},
“Action”: “SQS:SendMessage”,
“Resource”: “arn:aws:sqs:us-east-1:999999999999:CFQueue-sentinelone-cloudfunnel-v2”,
“Condition”: {“StringEquals”: {“aws:SourceAccount”: “999999999999”},
“ArnLike”: {“aws:SourceArn”: “arn:aws:s3:::your-cloudfunnel-xdr-inbound-bucket”}
}
}
]
}
We need to configure your S3 bucket to send event notifications into your new SQS queue. Select your bucket, select the ‘Properties’ tab, and scroll down to ‘Event Notifications’. Create a new Event Notification, select ‘All Object Create Events’ under ‘Object Creation’, set the Destination to ‘SQS Queue’, and enter your SQS queue ARN. Save changes.
We need to allow Cloud Funnel to write to your new S3 bucket. From within the AWS S3 console select your bucket then select the ‘Permissions’ tab. SentinelOne provides clear instructions which included a canonical ID which is used to create an ACL to provide access. Under ‘Access Control List’, select ‘Edit’ then populate the ‘Access for other AWS accounts’ section with the Grantee Canonical ID and select Objects ‘List’ and ‘Write’. Save Changes.
Before we create and configure a new Cribl Stream Source we need to make sure we have AWS IAM policies and a role allowing Cribl Stream to read from our new S3 bucket via the SQS Queue. Cribl Stream will assume this new role. From your AWS IAM console, select ‘Policies’ on the left then ‘Create Policy’ to create a policy providing access to the S3 bucket. Select the ‘JSON’ tab and place the below JSON blob in the text box making sure to replace the green text with values specific to your configuration. Save Changes.
{
“Version”: “2012-10-17”,
“Statement”: [
{
“Effect”: “Allow”,
“Action”: [“s3:GetObject”,”s3:ListBucket”,”s3:GetBucketLocation”],
“Resource”: [“arn:aws:s3::: arn:aws:s3:::your-cloudfunnel-xdr-inbound-bucket “,
“arn:aws:s3::: arn:aws:s3:::your-cloudfunnel-xdr-inbound-bucket /*”]
}
]
}
We need to repeat the above for a second policy that provides access to the SQS Queue.
{
“Version”: “2012-10-17”,
“Statement”: [
{
“Effect”: “Allow”,
“Action”: [
“sqs:DeleteMessage”,
“sqs:GetQueueUrl”,
“sqs:ChangeMessageVisibility”,
“sqs:ReceiveMessage”,
“sqs:GetQueueAttributes”],
“Resource”: “arn:aws:sqs:us-east-1:999999999999:your-cloudfunnel-xdr-SQS”
}
]
}
We need an AWS IAM role containing these two policies which Cribl Stream will assume. Before configuring our new AWS IAM role, we need to grab our Cribl Stream Worker ARNs. We do this by returning to our Cribl.Cloud home screen, select ‘Network Settings’ from the top, select ‘Trust’, then copy our Worker ARN as seen below.
From your AWS IAM console, select ‘Roles’ on the left then ‘Create Role’. Set the Trusted Entity Type to ‘Custom Trust Policy’ and place the below JSON blob in the text box making sure to replace the green text with values specific to your Worker ARNs. The External ID is optional but check this out for a bit of an explanation as well as a deeper dive into AWS Trusts and Cribl Stream.
{
“Version”: “2012-10-17”,
“Statement”: [
{
“Sid”: “Statement1”,
“Effect”: “Allow”,
“Principal”: {“AWS”: “arn:aws:iam::<your-worker-account>:role/main-default”},
“Action”: “sts:AssumeRole”,
“Condition”: {“StringEquals”: {“sts:ExternalId”: “Pu1pF1ct10n”}}
}
]
}
Click the ‘Next’ button to add permissions. Select the two policies you created above from the list and click ‘Next’. Provide a Role name and description then click the ‘Create Role’ button. You will refer to this Role ARN from within the Cribl Stream tile when configuring the ‘Assume Role’ field.
You should now be able to configure the Cloud Funnel Integration within the SentinelOne Singularity console and verify that data is being written to the S3 bucket. You should also be able to configure Cribl Stream to pull the Cloud Funnel data from the S3 bucket and use the Cribl Pack for SentinelOne Cloud Funnel to transform, enrich, and route to one or more destinations.
The fastest way to get started with Cribl Stream, Edge, and Search is to try the Free Cloud Sandboxes.
Experience a full version of Cribl Stream and Cribl Edge in the cloud with pre-made sources and destinations.
Classic choice. Sadly, our website is designed for all modern supported browsers like Edge, Chrome, Firefox, and Safari
Got one of those handy?