SIEM Integrations
Seliq ingests alerts and incidents from your SIEM and adds AI triage on top. Your SIEM keeps its existing detection rules, dashboards, and workflows. Seliq adds the analyst-facing prioritisation and investigation layer.
Microsoft Sentinel
Section titled “Microsoft Sentinel”Ingestion method: Pull (Azure REST API) and optional Push (Logic App webhook)
Permissions required: Security Reader role on the Sentinel workspace
Configuration
Section titled “Configuration”- In the Azure portal, go to Azure Active Directory → App registrations → New registration
- Name the app (e.g.
seliq-reader), leave redirect URI blank - Under Certificates & secrets, create a new client secret and note the value
- Note the Application (client) ID and Directory (tenant) ID from the Overview page
- Navigate to your Sentinel workspace → Access control (IAM) → Add role assignment
- Assign
Security Readerscoped to the workspace, using the app you just created - In Seliq: Settings → Integrations → Add → Microsoft Sentinel
- Enter: Tenant ID, Client ID, Client Secret, and the workspace Resource ID
Workspace Resource ID format:
/subscriptions/{subscriptionId}/resourceGroups/{resourceGroup}/providers/Microsoft.OperationalInsights/workspaces/{workspaceName}
What Seliq ingests
Section titled “What Seliq ingests”SecurityAlerttable — all SIEM alertsSecurityIncidenttable — Sentinel-managed incidents (imported as grouped alerts)- Alert entities (IPs, accounts, hosts) for enrichment
Splunk
Section titled “Splunk”Ingestion method: Pull (Splunk REST API, port 8089)
Permissions required: search capability on the target indexes
Configuration
Section titled “Configuration”- In Splunk: Settings → Tokens → New Token
- Set an expiry appropriate for a service integration (or use a long-lived token with rotation policy)
- Note the token value (shown once)
- In Seliq: Settings → Integrations → Add → Splunk
- Enter: Splunk host URL, API port (
8089), and the token - Optionally set a SPL filter to limit which events Seliq ingests (e.g.
index=notable) - Set the polling interval (default: 60 seconds)
Recommended SPL filter for Splunk ES
Section titled “Recommended SPL filter for Splunk ES”index=notable | where severity >= "high"
Adjust the severity threshold and index name to match your Splunk ES configuration.
Elastic SIEM
Section titled “Elastic SIEM”Ingestion method: Pull (Elasticsearch API)
Permissions required: Read access to the .alerts-security.alerts-* index pattern
Configuration
Section titled “Configuration”- In Kibana: Stack Management → Security → API Keys → Create API key
- Grant
readaccess to.alerts-security.alerts-*index - Note the encoded API key
- In Seliq: Settings → Integrations → Add → Elastic SIEM
- Enter: Elasticsearch host URL, API key, and optionally a KQL filter