Connecting Your First Integration
Seliq connects to your existing security tools rather than replacing them. This page covers connecting your first source. For a full list of supported integrations, see the Integrations Overview.
How ingestion works
Section titled “How ingestion works”When you connect a source, Seliq:
- Authenticates using the credentials you provide (API key, OAuth token, or service principal)
- Performs an initial backfill of recent alerts (configurable, default: last 72 hours)
- Sets up continuous polling or webhook delivery depending on the source type
- Begins AI triage as soon as the first batch arrives
Credentials are encrypted at rest and never exposed in the UI after the initial setup.
Connecting your first source
Section titled “Connecting your first source”Required: Azure AD service principal with Security Reader role on the target workspace.
- In the Azure portal, create a service principal under Azure Active Directory → App registrations
- Assign the
Security Readerrole scoped to your Sentinel workspace - Note the Tenant ID, Client ID, and Client Secret
- In Seliq, go to Settings → Integrations → Add Source → Microsoft Sentinel
- Enter your Tenant ID, Client ID, Client Secret, and the Sentinel workspace resource ID
- Click Test connection — a green indicator confirms access
Required: A Splunk user account or service account with search capability and can_delete turned off (read-only recommended).
- In Splunk, create an API token: Settings → Tokens → New Token
- Scope the token to the index(es) you want Seliq to ingest from
- In Seliq, go to Settings → Integrations → Add Source → Splunk
- Enter your Splunk host (e.g.
https://your-instance.splunkcloud.com), port (8089for API), and the token - Optionally set a SPL filter to limit which events Seliq ingests
- Click Test connection
Required: A CrowdStrike OAuth2 API client with Detections: Read and Incidents: Read scopes.
- In the Falcon console, go to Support → API Clients and Keys → Add new API client
- Enable
Detections: ReadandIncidents: Read— no write scopes required - Note the Client ID and Client Secret
- In Seliq, go to Settings → Integrations → Add Source → CrowdStrike Falcon
- Select your Falcon cloud region and enter the Client ID and Client Secret
- Click Test connection
Testing your connection
Section titled “Testing your connection”After saving an integration, Seliq runs a connectivity check and attempts to pull a sample of alerts. The integration card shows one of three states:
| Status | Meaning |
|---|---|
| ✅ Connected | Credentials are valid and alerts are flowing |
| ⚠️ Degraded | Connected but fewer alerts than expected — check your filter settings |
| ❌ Failed | Authentication or network error — check credentials and firewall rules |