Indusface SIEM Python API Docs | dltHub
Build a Indusface SIEM-to-database pipeline in Python using dlt with AI Workbench support for Claude Code, Cursor, and Codex.
Last updated:
Indusface SIEM service allows integration with third-party SIEM platforms via API for log analysis. Registration and token-based authentication are required. Detailed instructions are available in the official documentation. The REST API base URL is https://tas.indusface.com/wafportal/rest/siem/v1 and All requests require an OAuth2 Bearer access token (24h) obtained via client credentials/authorization code..
dlt is an open-source Python library that handles authentication, pagination, and schema evolution automatically. dlthub provides AI context files that enable code assistants to generate production-ready pipelines. Install with uv pip install "dlt[workspace]" and start loading Indusface SIEM data in under 10 minutes.
What data can I load from Indusface SIEM?
Here are some of the endpoints you can load from Indusface SIEM:
| Resource | Endpoint | Method | Data selector | Description |
|---|---|---|---|---|
| siem_authorize | /authorize?client_id={client_id} | GET | (query string in redirect) | Initiate authorization code flow; returns code in redirect query string |
| auth_token | /getAuthToken | POST | access_token | Exchange client_id, client_secret and code or grant_type=client_credentials for access token (response contains access_token, token_type, expires_in) |
| attack_info | /getAttackInfo | POST | data | Retrieve attack details for given time range and optional websiteName; response JSON includes top-level data array under key "data" (contains websiteName and attacks array) |
| attack_count | /getAttackCount | POST | (unspecified) | Returns counts; docs indicate similar structure (may include data or successMessage) |
| get_websites | /getWebsites | GET/POST (docs vary) | data | Retrieve list of websites enrolled for SIEM (response includes "data" array) |
| get_logs | /getLogs (or event logs endpoints) | POST | data | Retrieve event/attack logs (response contains "data" array) |
How do I authenticate with the Indusface SIEM API?
Obtain access token by POST to /getAuthToken with client_id and client_secret (form-urlencoded). For authorization-code flow, first GET /authorize?client_id={api_id} to receive authorization code via redirect, then exchange code with client credentials at /getAuthToken.
1. Get your credentials
- In AppTrana portal go to Settings > SIEM Integration > API Integration (or Manage API Key under user profile). 2) Create connector / Manage API Key to generate API ID and Key (client_id and client_secret). 3) Note allowed IPs/redirect URL and copy API ID and Key.
2. Add them to .dlt/secrets.toml
[sources.indusface_siem_source] api_key = "your_api_key_here"
dlt reads this automatically at runtime — never hardcode tokens in your pipeline script. For production environments, see setting up credentials with dlt for environment variable and vault-based options.
How do I set up and run the pipeline?
Set up a virtual environment and install dlt:
uv venv && source .venv/bin/activate uv pip install "dlt[workspace]"
1. Install the dlt AI Workbench:
dlt ai init --agent <your-agent> # <agent>: claude | cursor | codex
This installs project rules, a secrets management skill, appropriate ignore files, and configures the dlt MCP server for your agent. Learn more →
2. Install the rest-api-pipeline toolkit:
dlt ai toolkit rest-api-pipeline install
This loads the skills and context about dlt the agent uses to build the pipeline iteratively, efficiently, and safely. The agent uses MCP tools to inspect credentials — it never needs to read your secrets.toml directly. Learn more →
3. Start LLM-assisted coding:
Use /find-source to load data from the Indusface SIEM API into DuckDB.
The rest-api-pipeline toolkit takes over from here — it reads relevant API documentation, presents you with options for which endpoints to load, and follows a structured workflow to scaffold, debug, and validate the pipeline step by step.
4. Run the pipeline:
python indusface_siem_pipeline.py
If everything is configured correctly, you'll see output like this:
Pipeline indusface_siem_pipeline load step completed in 0.26 seconds 1 load package(s) were loaded to destination duckdb and into dataset indusface_siem_data The duckdb destination used duckdb:/indusface_siem.duckdb location to store data Load package 1749667187.541553 is LOADED and contains no failed jobs
Inspect your pipeline and data:
dlt pipeline indusface_siem_pipeline show
This opens the Pipeline Dashboard where you can verify pipeline state, load metrics, schema (tables, columns, types), and query the loaded data directly.
Python pipeline example
This example loads attack_info and auth_token from the Indusface SIEM API into DuckDB. It mirrors the endpoint and data selector configuration from the table above:
import dlt from dlt.sources.rest_api import RESTAPIConfig, rest_api_resources @dlt.source def indusface_siem_source(api_key=dlt.secrets.value): config: RESTAPIConfig = { "client": { "base_url": "https://tas.indusface.com/wafportal/rest/siem/v1", "auth": { "type": "bearer", "access_token": api_key, }, }, "resources": [ {"name": "attack_info", "endpoint": {"path": "getAttackInfo", "data_selector": "data"}}, {"name": "auth_token", "endpoint": {"path": "getAuthToken", "data_selector": "access_token"}} ], } yield from rest_api_resources(config) def get_data() -> None: pipeline = dlt.pipeline( pipeline_name="indusface_siem_pipeline", destination="duckdb", dataset_name="indusface_siem_data", ) load_info = pipeline.run(indusface_siem_source()) print(load_info)
To add more endpoints, append entries from the resource table to the "resources" list using the same name, path, and data_selector pattern.
How do I query the loaded data?
Once the pipeline runs, dlt creates one table per resource. You can query with Python or SQL.
Python (pandas DataFrame):
import dlt data = dlt.pipeline("indusface_siem_pipeline").dataset() sessions_df = data.attack_info.df() print(sessions_df.head())
SQL (DuckDB example):
SELECT * FROM indusface_siem_data.attack_info LIMIT 10;
In a marimo or Jupyter notebook:
import dlt data = dlt.pipeline("indusface_siem_pipeline").dataset() data.attack_info.df().head()
See how to explore your data in marimo Notebooks and how to query your data in Python with dataset.
What destinations can I load Indusface SIEM data to?
dlt supports loading into any of these destinations — only the destination parameter changes:
| Destination | Example value |
|---|---|
| DuckDB (local, default) | "duckdb" |
| PostgreSQL | "postgres" |
| BigQuery | "bigquery" |
| Snowflake | "snowflake" |
| Redshift | "redshift" |
| Databricks | "databricks" |
| Filesystem (S3, GCS, Azure) | "filesystem" |
Change the destination in dlt.pipeline(destination="snowflake") and add credentials in .dlt/secrets.toml. See the full destinations list.
Next steps
Continue your data engineering journey with the other toolkits of the dltHub AI Workbench:
data-exploration— Build custom notebooks, charts, and dashboards for deeper analysis with marimo notebooks.dlthub-runtime— Deploy, schedule, and monitor your pipeline in production.
dlt ai toolkit data-exploration install dlt ai toolkit dlthub-runtime install
Was this page helpful?
Community Hub
Need more dlt context for Indusface SIEM?
Request dlt skills, commands, AGENT.md files, and AI-native context.