Skip to content

Alert Ingestion

Alert ingestion is the entry point for everything in Seliq. Every alert that arrives — regardless of source format — is normalised into a common schema, deduplicated, and queued for AI triage. Your analysts see a single, consistent interface no matter where the alert originated.

Seliq supports two ingestion modes depending on what your source provides:

Pull (polling): Seliq queries your source on a configurable interval (default: 60 seconds). Suitable for SIEMs and ticketing systems that expose a query or search API. Slightly higher latency than push.

Push (webhooks): Your source sends alerts to a Seliq-provided webhook endpoint in real time. Zero polling lag. Supported by EDR platforms (CrowdStrike, SentinelOne) and most modern SIEM services.

When an alert arrives, Seliq runs it through a normalisation pipeline before it reaches the analyst queue:

  1. Schema mapping — vendor-specific field names are mapped to the Seliq common event schema (based on OCSF)
  2. Severity translation — vendor severity scales (e.g. Splunk’s 0–10 or CrowdStrike’s informational/low/medium/high/critical) are mapped to Seliq’s five-level scale
  3. Entity extraction — IP addresses, hostnames, usernames, file hashes, and CVE identifiers are extracted and indexed for cross-alert correlation
  4. Deduplication — near-duplicate alerts from the same source within a rolling 10-minute window are collapsed into a single event with a count

Every normalised alert in Seliq carries:

FieldTypeDescription
idstringSeliq-generated UUID
sourcestringIntegration name (e.g. crowdstrike, sentinel)
external_idstringOriginal alert ID from the source system
severityenumcritical | high | medium | low | info
titlestringNormalised alert title
entitiesobject[]Extracted IP, hostname, user, hash, and CVE references
rawobjectThe original, unmodified payload from the source
ingested_attimestampUTC timestamp of ingestion

You can configure source-level filters to suppress low-value alerts before they reach the analyst queue:

  • Severity floor — ignore all alerts below a configurable severity (e.g. drop info and low)
  • Title exclusion list — suppress specific alert titles that are known false-positive generators in your environment
  • Time-of-day windows — suppress certain alert types outside business hours