Skip to content

Conversation

@yusufozturk
Copy link
Member

@yusufozturk yusufozturk commented Oct 26, 2025

This pull request adds comprehensive documentation for the Alibaba Cloud OSS target and introduces scheduler-related configuration options to the Azure Blob Storage and Azure Data Explorer targets. It also improves consistency in debug option descriptions across the documentation. The most important changes are grouped below.

New Target Documentation

  • Added a full documentation page for the Alibaba Cloud OSS target (alibabas3), detailing configuration schema, authentication, region support, file formats, compression, file management, templates, multipart upload, multiple bucket support, schema requirements, and example configurations.

Scheduler Configuration Enhancements

  • Added support for scheduler options (interval and cron) to the Azure Blob Storage target configuration schema and documentation, allowing users to control execution frequency and scheduled runs. [1] [2]
  • Added support for scheduler options (interval and cron) to the Azure Data Explorer target configuration schema and documentation, providing similar scheduling capabilities. [1] [2]

Documentation Consistency

  • Standardized the debug option descriptions for Azure Blob Storage and Azure Data Explorer targets, clarifying that logs are not sent to the "target" rather than a specific service during testing. [1] [2]

Field Format Documentation

  • Added a new appendix page explaining the OCSF field format, including schema classes, usage, integration with AWS Security Lake, and example configurations. This helps users understand and configure OCSF normalization for security event data.

Summary by CodeRabbit

Documentation

  • New Features

    • Added time-based scheduling support (Cron and Interval) for data collection and routing across all targets
    • Introduced AWS Security Lake target with OCSF normalization capabilities
    • Added support for 10+ new cloud storage providers (Alibaba OSS, Backblaze B2, Cloudflare R2, DigitalOcean Spaces, IBM COS, MinIO, Oracle Cloud, Scaleway, Wasabi, etc.)
    • Added standardized debug options across all targets for testing and troubleshooting
    • Enhanced Elasticsearch and Splunk targets with automatic load balancing capabilities
  • Documentation

    • Comprehensive SIEM optimization framework documentation
    • OCSF field format reference guide
    • Expanded configuration guidance for all supported targets and scheduling methods

@coderabbitai
Copy link

coderabbitai bot commented Oct 26, 2025

Walkthrough

This pull request significantly expands documentation coverage, introducing 15+ new cloud storage target configurations, comprehensive scheduling guides (Cron and Interval), SIEM optimization documentation, OCSF field format support, and adding scheduler and debug options to existing target configurations across the system.

Changes

Cohort / File(s) Summary
Scheduling Documentation (new)
docs/configuration/scheduling/overview.mdx, docs/configuration/scheduling/cron.mdx, docs/configuration/scheduling/interval.mdx
Introduces time-based execution guides for telemetry pipelines with cron expressions and interval-based scheduling, including use cases, configuration patterns, best practices, and performance considerations.
SIEM & Field Format Documentation (new)
docs/about/siem-optimization.mdx, docs/appendix/field-formats/ocsf.mdx
Adds comprehensive SIEM optimization guide with Risk-Free Reduction framework and OCSF (Open Cybersecurity Schema Framework) field format documentation with AWS Security Lake integration.
Cloud Storage Targets — New S3-Compatible Targets (new)
docs/configuration/targets/alibaba-oss.mdx, docs/configuration/targets/backblaze-b2.mdx, docs/configuration/targets/cloudflare-r2.mdx, docs/configuration/targets/digitalocean-spaces.mdx, docs/configuration/targets/ibm-cos.mdx, docs/configuration/targets/minio.mdx, docs/configuration/targets/oracle-cloud-os.mdx, docs/configuration/targets/scaleway-os.mdx, docs/configuration/targets/wasabi-cloud-storage.mdx
Documents 9 new S3-compatible cloud storage targets with consistent schema, credentials, connection, file management, formats, compression, and multipart upload configuration patterns.
Cloud Storage Targets — AWS Specialized (new/updated)
docs/configuration/targets/aws-s3.mdx, docs/configuration/targets/aws-security-lake.mdx
Significantly refactors AWS S3 documentation with expanded schema and config details; introduces new AWS Security Lake target for OCSF-compliant Parquet output.
Existing Targets — Scheduler & Debug Additions
docs/configuration/targets/azure-blob-storage.mdx, docs/configuration/targets/azure-data-explorer.mdx, docs/configuration/targets/bigquery.mdx, docs/configuration/targets/clickhouse.mdx, docs/configuration/targets/console.mdx, docs/configuration/targets/event-hubs.mdx, docs/configuration/targets/file.mdx, docs/configuration/targets/microsoft-sentinel.mdx, docs/configuration/targets/microsoft-sentinel-data-lake.mdx, docs/configuration/targets/syslog.mdx
Adds interval, cron, and debug configuration fields (with status and dont_send_logs) to 10 target configurations and updates debug descriptions for consistency.
Existing Targets — Major Updates
docs/configuration/targets/elasticsearch.mdx, docs/configuration/targets/splunk-hec.mdx, docs/configuration/targets/overview.mdx
Expands Elasticsearch and Splunk HEC documentation with load balancing, failover, dynamic routing, scheduler, and debug options; adds comprehensive Debug Options section to targets overview.
Configuration & Navigation
sidebars.ts, topics.json
Updates documentation navigation: adds new scheduling section entries, new target entries, SIEM optimization, and OCSF field format; registers new route mappings in topics registry.

Estimated code review effort

🎯 3 (Moderate) | ⏱️ ~25 minutes

  • Breadth: 30+ documentation files added or updated requires systematic review across all new targets to verify consistency in schema, examples, and descriptions.
  • Pattern repetition: 9 new S3-compatible targets follow similar structure (credentials, connection, formats, rotation), reducing per-file complexity but requiring attention to region/endpoint specifics.
  • Major rewrites: AWS S3 and Elasticsearch/Splunk HEC documentation significantly restructured; verify that changes preserve accuracy of load balancing, multipart upload behavior, and debug semantics.
  • Consistency checks:
    • Scheduler/debug field additions across 10+ targets use uniform field names and descriptions.
    • OCSF and AWS Security Lake documentation alignment with new target.
    • Navigation entries (sidebars.ts, topics.json) correctly reference new files.

Pre-merge checks and finishing touches

❌ Failed checks (1 warning, 1 inconclusive)
Check name Status Explanation Resolution
Docstring Coverage ⚠️ Warning Docstring coverage is 0.00% which is insufficient. The required threshold is 80.00%. You can run @coderabbitai generate docstrings to improve docstring coverage.
Title Check ❓ Inconclusive The pull request title "v1.5.0 updates for pipelines, targets etc." refers to real aspects of the changeset, particularly the v1.5.0 release and extensive target documentation updates. However, the title is vague in its use of "etc." and does not clearly convey the scope of changes, which encompasses significantly more than just pipelines and targets—including new scheduling documentation (cron and interval), SIEM optimization, OCSF field format support, and comprehensive target enhancements. The instruction to avoid vague terms applies here, and a reader scanning history would not have a clear understanding of the primary changes from the title alone. Consider revising the title to be more specific and descriptive. Examples might include: "Add v1.5.0 documentation for scheduling, targets, and SIEM optimization" or "Document v1.5.0 target enhancements, scheduling, and OCSF support." This would provide clarity about the key components being added without relying on vague catch-all terms.
✅ Passed checks (1 passed)
Check name Status Explanation
Description Check ✅ Passed Check skipped - CodeRabbit’s high-level summary is enabled.
✨ Finishing touches
  • 📝 Generate docstrings
🧪 Generate unit tests (beta)
  • Create PR with unit tests
  • Post copyable unit tests in a comment
  • Commit unit tests in branch dev

Comment @coderabbitai help to get the list of available commands and usage tips.

@yusufozturk yusufozturk merged commit 8b22434 into main Oct 26, 2025
2 of 3 checks passed
Copy link

@coderabbitai coderabbitai bot left a comment

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

Actionable comments posted: 6

Caution

Some comments are outside the diff and can’t be posted inline due to platform limitations.

⚠️ Outside diff range comments (1)
docs/configuration/targets/console.mdx (1)

78-78: Fix typo in documentation.

Line 78 contains "defails" which should be "details".

Apply this diff:

-For defails of ECS, see <Topic id="appendix-ecs">Appendix</Topic>.
+For details of ECS, see <Topic id="appendix-ecs">Appendix</Topic>.
🧹 Nitpick comments (11)
docs/configuration/targets/minio.mdx (1)

3-3: Consider hyphenating compound adjective in badge text. Per standard English usage, the badge should read "Long-Term Storage" rather than "Long Term Storage" to properly form the compound adjective modifying "Storage".

If other target documentation uses this badge text, consider standardizing it across all target docs for consistency.

docs/configuration/targets/ibm-cos.mdx (1)

3-3: Consider hyphenating compound adjective in badge text. Use "Long-Term Storage" instead of "Long Term Storage" to properly format the compound adjective, and ensure consistency across all badge text in target documentation.

docs/configuration/targets/wasabi-cloud-storage.mdx (2)

3-3: Use hyphen for compound adjective "Long-Term Storage".

Per English grammar guidelines, compound adjectives modifying a noun should be hyphenated.

- <span className="theme-doc-version-badge badge badge--secondary">Long Term Storage</span>
+ <span className="theme-doc-version-badge badge badge--secondary">Long-Term Storage</span>

220-232: Add disclaimer to example credentials.

Code examples use placeholder credentials that could trigger false-positive credential scanning. Add a clear comment indicating these are examples, not real secrets.

  ### Basic Configuration
  
  The minimum configuration for a JSON Wasabi target:
  
  ```yaml
+ # NOTE: Replace with actual credentials. These are placeholder values.
  targets:
    - name: basic_wasabi
      type: wasabis3
      properties:
        key: "ABCDEFGHIJKLMNOPQRST"
        secret: "abcdefghijklmnopqrstuvwxyz0123456789ABCD"
        region: "us-east-1"
        endpoint: "https://s3.us-east-1.wasabisys.com"
        bucket: "datastream-logs"

</blockquote></details>
<details>
<summary>docs/about/siem-optimization.mdx (2)</summary><blockquote>

`54-54`: **Consider tightening wording: "without warning" can be more concise.**

Current phrasing is acceptable but can be strengthened for impact.

```diff
- AI models can produce unexpected results, potentially dropping critical security events without warning.
+ AI models can produce unexpected results, potentially dropping critical security events silently.

244-244: Use stronger adjective than "deep" for vendor knowledge.

Consider a more specific descriptor that conveys expertise and analysis rigor.

- Event filters are developed based on deep vendor knowledge and real-world security operations experience.
+ Event filters are developed based on comprehensive vendor analysis and real-world security operations experience.
docs/configuration/targets/oracle-cloud-os.mdx (3)

3-3: Use hyphen for compound adjective "Long-Term Storage" (matches Wasabi target).

Per English grammar guidelines for compound adjectives.

- <span className="theme-doc-version-badge badge badge--secondary">Long Term Storage</span>
+ <span className="theme-doc-version-badge badge badge--secondary">Long-Term Storage</span>

154-154: Use proper diacritics for location name: "São Paulo".

Geographic names should use proper diacritical marks for accuracy and consistency.

  |`sa-saopaulo-1`|Brazil East (Sao Paulo)|
+ |`sa-saopaulo-1`|Brazil East (São Paulo)|

222-234: Add disclaimer to example credentials.

Similar to Wasabi documentation, add a comment to clarify these are placeholder values.

  The minimum configuration for a JSON OCI Object Storage target:
  
  ```yaml
+ # NOTE: Replace with actual credentials. These are placeholder values.
  targets:
    - name: basic_oci
      type: oracles3
      properties:
        key: "0a1b2c3d4e5f6g7h8i9j0k1l2m3n4o5p"
        secret: "AbCdEfGhIjKlMnOpQrStUvWxYz0123456789+/=="
        region: "us-ashburn-1"
        endpoint: "https://mytenancy.compat.objectstorage.us-ashburn-1.oraclecloud.com"
        bucket: "datastream-logs"

</blockquote></details>
<details>
<summary>docs/configuration/scheduling/interval.mdx (1)</summary><blockquote>

`332-332`: **Use hyphen for compound adjective "Cost-Optimized Route".**

Per English grammar guidelines for compound adjectives modifying nouns.

```diff
- ### Cost Optimized Route
+ ### Cost-Optimized Route
docs/configuration/targets/backblaze-b2.mdx (1)

118-118: Minor: Consider conciseness for "at a fraction of" phrase.

The phrase "at a fraction of the cost" is slightly wordy. Consider "significantly lower cost" for brevity, though this is optional.

📜 Review details

Configuration used: CodeRabbit UI

Review profile: CHILL

Plan: Pro

Disabled knowledge base sources:

  • Jira integration is disabled by default for public repositories

You can enable these sources in your CodeRabbit configuration.

📥 Commits

Reviewing files that changed from the base of the PR and between a2db7d2 and 4132692.

📒 Files selected for processing (31)
  • docs/about/siem-optimization.mdx (1 hunks)
  • docs/appendix/field-formats/ocsf.mdx (1 hunks)
  • docs/configuration/scheduling/cron.mdx (1 hunks)
  • docs/configuration/scheduling/interval.mdx (1 hunks)
  • docs/configuration/scheduling/overview.mdx (1 hunks)
  • docs/configuration/targets/alibaba-oss.mdx (1 hunks)
  • docs/configuration/targets/aws-s3.mdx (1 hunks)
  • docs/configuration/targets/aws-security-lake.mdx (1 hunks)
  • docs/configuration/targets/azure-blob-storage.mdx (2 hunks)
  • docs/configuration/targets/azure-data-explorer.mdx (2 hunks)
  • docs/configuration/targets/backblaze-b2.mdx (1 hunks)
  • docs/configuration/targets/bigquery.mdx (2 hunks)
  • docs/configuration/targets/clickhouse.mdx (2 hunks)
  • docs/configuration/targets/cloudflare-r2.mdx (1 hunks)
  • docs/configuration/targets/console.mdx (2 hunks)
  • docs/configuration/targets/digitalocean-spaces.mdx (1 hunks)
  • docs/configuration/targets/elasticsearch.mdx (7 hunks)
  • docs/configuration/targets/event-hubs.mdx (2 hunks)
  • docs/configuration/targets/file.mdx (2 hunks)
  • docs/configuration/targets/ibm-cos.mdx (1 hunks)
  • docs/configuration/targets/microsoft-sentinel-data-lake.mdx (3 hunks)
  • docs/configuration/targets/microsoft-sentinel.mdx (2 hunks)
  • docs/configuration/targets/minio.mdx (1 hunks)
  • docs/configuration/targets/oracle-cloud-os.mdx (1 hunks)
  • docs/configuration/targets/overview.mdx (2 hunks)
  • docs/configuration/targets/scaleway-os.mdx (1 hunks)
  • docs/configuration/targets/splunk-hec.mdx (11 hunks)
  • docs/configuration/targets/syslog.mdx (2 hunks)
  • docs/configuration/targets/wasabi-cloud-storage.mdx (1 hunks)
  • sidebars.ts (5 hunks)
  • topics.json (2 hunks)
🧰 Additional context used
🪛 Gitleaks (8.28.0)
docs/configuration/targets/scaleway-os.mdx

[high] 213-213: Detected a Generic API Key, potentially exposing access to various services and sensitive operations.

(generic-api-key)


[high] 214-214: Detected a Generic API Key, potentially exposing access to various services and sensitive operations.

(generic-api-key)


[high] 229-229: Detected a Generic API Key, potentially exposing access to various services and sensitive operations.

(generic-api-key)


[high] 230-230: Detected a Generic API Key, potentially exposing access to various services and sensitive operations.

(generic-api-key)


[high] 254-254: Detected a Generic API Key, potentially exposing access to various services and sensitive operations.

(generic-api-key)


[high] 255-255: Detected a Generic API Key, potentially exposing access to various services and sensitive operations.

(generic-api-key)


[high] 277-277: Detected a Generic API Key, potentially exposing access to various services and sensitive operations.

(generic-api-key)


[high] 278-278: Detected a Generic API Key, potentially exposing access to various services and sensitive operations.

(generic-api-key)


[high] 297-297: Detected a Generic API Key, potentially exposing access to various services and sensitive operations.

(generic-api-key)


[high] 298-298: Detected a Generic API Key, potentially exposing access to various services and sensitive operations.

(generic-api-key)


[high] 316-316: Detected a Generic API Key, potentially exposing access to various services and sensitive operations.

(generic-api-key)


[high] 317-317: Detected a Generic API Key, potentially exposing access to various services and sensitive operations.

(generic-api-key)


[high] 337-337: Detected a Generic API Key, potentially exposing access to various services and sensitive operations.

(generic-api-key)


[high] 338-338: Detected a Generic API Key, potentially exposing access to various services and sensitive operations.

(generic-api-key)

docs/configuration/targets/oracle-cloud-os.mdx

[high] 229-229: Detected a Generic API Key, potentially exposing access to various services and sensitive operations.

(generic-api-key)


[high] 245-245: Detected a Generic API Key, potentially exposing access to various services and sensitive operations.

(generic-api-key)


[high] 270-270: Detected a Generic API Key, potentially exposing access to various services and sensitive operations.

(generic-api-key)


[high] 293-293: Detected a Generic API Key, potentially exposing access to various services and sensitive operations.

(generic-api-key)


[high] 313-313: Detected a Generic API Key, potentially exposing access to various services and sensitive operations.

(generic-api-key)


[high] 332-332: Detected a Generic API Key, potentially exposing access to various services and sensitive operations.

(generic-api-key)

docs/configuration/targets/cloudflare-r2.mdx

[high] 211-211: Detected a Generic API Key, potentially exposing access to various services and sensitive operations.

(generic-api-key)


[high] 227-227: Detected a Generic API Key, potentially exposing access to various services and sensitive operations.

(generic-api-key)


[high] 252-252: Detected a Generic API Key, potentially exposing access to various services and sensitive operations.

(generic-api-key)


[high] 275-275: Detected a Generic API Key, potentially exposing access to various services and sensitive operations.

(generic-api-key)


[high] 295-295: Detected a Generic API Key, potentially exposing access to various services and sensitive operations.

(generic-api-key)

🪛 LanguageTool
docs/configuration/targets/ibm-cos.mdx

[uncategorized] ~3-~3: If this is a compound adjective that modifies the following noun, use a hyphen.
Context: ...c-version-badge badge badge--secondary">Long Term Storage ## Synopsis Creates a ...

(EN_COMPOUND_ADJECTIVE_INTERNAL)

docs/configuration/targets/backblaze-b2.mdx

[uncategorized] ~3-~3: If this is a compound adjective that modifies the following noun, use a hyphen.
Context: ...c-version-badge badge badge--secondary">Long Term Storage ## Synopsis Creates a ...

(EN_COMPOUND_ADJECTIVE_INTERNAL)


[style] ~118-~118: ‘at a fraction of’ might be wordy. Consider a shorter alternative.
Context: ...rent, simple pricing model with storage at a fraction of the cost of major cloud providers and f...

(EN_WORDINESS_PREMIUM_AT_A_FRACTION_OF)

docs/configuration/scheduling/interval.mdx

[grammar] ~332-~332: Use a hyphen to join words.
Context: ...`` ### Cost Optimized Route <Commen...

(QB_NEW_EN_HYPHEN)

docs/configuration/targets/scaleway-os.mdx

[uncategorized] ~3-~3: If this is a compound adjective that modifies the following noun, use a hyphen.
Context: ...c-version-badge badge badge--secondary">Long Term Storage ## Synopsis Creates a ...

(EN_COMPOUND_ADJECTIVE_INTERNAL)

docs/configuration/targets/oracle-cloud-os.mdx

[uncategorized] ~3-~3: If this is a compound adjective that modifies the following noun, use a hyphen.
Context: ...c-version-badge badge badge--secondary">Long Term Storage ## Synopsis Creates a ...

(EN_COMPOUND_ADJECTIVE_INTERNAL)


[uncategorized] ~154-~154: Did you mean “São Paulo” (= city in Brazil)?
Context: ...lbourne)| |sa-saopaulo-1|Brazil East (Sao Paulo)| |me-jeddah-1|Saudi Arabia West (Jed...

(SAO_PAOLO)

docs/configuration/targets/wasabi-cloud-storage.mdx

[uncategorized] ~3-~3: If this is a compound adjective that modifies the following noun, use a hyphen.
Context: ...c-version-badge badge badge--secondary">Long Term Storage ## Synopsis Creates a ...

(EN_COMPOUND_ADJECTIVE_INTERNAL)

docs/configuration/targets/minio.mdx

[uncategorized] ~3-~3: If this is a compound adjective that modifies the following noun, use a hyphen.
Context: ...c-version-badge badge badge--secondary">Long Term Storage ## Synopsis Creates a ...

(EN_COMPOUND_ADJECTIVE_INTERNAL)

docs/configuration/targets/digitalocean-spaces.mdx

[uncategorized] ~3-~3: If this is a compound adjective that modifies the following noun, use a hyphen.
Context: ...c-version-badge badge badge--secondary">Long Term Storage ## Synopsis Creates a ...

(EN_COMPOUND_ADJECTIVE_INTERNAL)

docs/configuration/targets/cloudflare-r2.mdx

[uncategorized] ~3-~3: If this is a compound adjective that modifies the following noun, use a hyphen.
Context: ...c-version-badge badge badge--secondary">Long Term Storage ## Synopsis Creates a ...

(EN_COMPOUND_ADJECTIVE_INTERNAL)

docs/about/siem-optimization.mdx

[style] ~54-~54: ‘without warning’ might be wordy. Consider a shorter alternative.
Context: ...ially dropping critical security events without warning. This unpredictability is unacceptable ...

(EN_WORDINESS_PREMIUM_WITHOUT_WARNING)


[style] ~244-~244: Consider a different adjective to strengthen your wording.
Context: .... Event filters are developed based on deep vendor knowledge and real-world securit...

(DEEP_PROFOUND)


[grammar] ~407-~407: Use a hyphen to join words.
Context: ... Event logs represent one of the highest volume data sources in enterprise enviro...

(QB_NEW_EN_HYPHEN)

docs/configuration/targets/aws-s3.mdx

[uncategorized] ~3-~3: If this is a compound adjective that modifies the following noun, use a hyphen.
Context: ...c-version-badge badge badge--secondary">Long Term Storage ## Synopsis Creates a ...

(EN_COMPOUND_ADJECTIVE_INTERNAL)

docs/configuration/targets/aws-security-lake.mdx

[grammar] ~7-~7: Use a hyphen to join words.
Context: ...SF (Open Cybersecurity Schema Framework) compliant Parquet format, enabling centr...

(QB_NEW_EN_HYPHEN)

docs/configuration/targets/alibaba-oss.mdx

[uncategorized] ~3-~3: If this is a compound adjective that modifies the following noun, use a hyphen.
Context: ...c-version-badge badge badge--secondary">Long Term Storage ## Synopsis Creates a ...

(EN_COMPOUND_ADJECTIVE_INTERNAL)

🔇 Additional comments (51)
docs/configuration/targets/azure-data-explorer.mdx (3)

35-36: Schema correctly updated with new scheduler fields.

The interval and cron fields are properly added to the schema at the top-level properties, consistent with their use as target-wide execution controls.


96-102: Scheduler section well-documented; verify "realtime" default value.

The new Scheduler section clearly documents both fields with references to external documentation topics. However, the default value for interval is listed as "realtime"—please verify this is a recognized option in your system's interval specification. If "realtime" means "no scheduling, process immediately," consider whether the description could be more explicit about this behavior.

Additionally, consider adding a scheduler example to the Examples section (e.g., combining interval or cron with one of the existing configurations) to demonstrate real-world usage patterns.


108-108: Debug description standardized for consistency.

The description update to "Process logs but don't send to target (testing)" makes the option generic and consistent across targets, improving clarity for users testing configurations across multiple target types.

docs/configuration/targets/azure-blob-storage.mdx (1)

35-36: Scheduler and debug options addition is well-structured. The changes consistently integrate with the configuration documentation and follow the established pattern for standardizing scheduling and debug capabilities across targets. The updated dont_send_logs description is appropriately generalized.

Also applies to: 94-100, 106-106

docs/configuration/targets/event-hubs.mdx (1)

35-40: Scheduler and debug options are properly integrated. The new sections follow the documentation pattern established across other targets, with clear descriptions and appropriate references to scheduling documentation.

Also applies to: 108-121

docs/configuration/targets/clickhouse.mdx (1)

26-30: Scheduler and debug options implementation is consistent. The additions follow the established pattern and integrate cleanly with existing configuration documentation.

Also applies to: 63-76

docs/configuration/targets/microsoft-sentinel-data-lake.mdx (1)

3-3: Badge update and scheduling/debug additions are well-coordinated. The terminology change from "SIEM" to "Security Lake" appropriately reflects the target's focus, and the scheduler/debug additions follow the standard pattern with generalized descriptions.

Also applies to: 40-41, 88-100

docs/configuration/targets/minio.mdx (1)

1-115: Comprehensive MinIO target documentation with strong structure. The schema, configuration tables, and examples provide clear guidance for users. The integration of scheduler and debug options follows established patterns.

docs/appendix/field-formats/ocsf.mdx (1)

1-130: OCSF documentation is comprehensive and well-organized. The schema class categorization, practical usage examples, and integration guidance with AWS Security Lake provide clear reference material for implementing OCSF normalization. The example configurations effectively demonstrate OCSF identifier usage.

docs/configuration/targets/ibm-cos.mdx (1)

1-115: IBM COS target documentation is complete and well-structured. The configuration sections, region table, and diverse examples provide clear guidance. The integration of scheduler and debug options aligns with established patterns across targets.

docs/configuration/targets/aws-security-lake.mdx (2)

1-130: AWS Security Lake documentation is exceptionally comprehensive. The extensive OCSF schema identifier table, detailed bucket configuration guidance, and diverse examples covering multiple security event types provide excellent reference material. The VirtualMetric AWS Security Lake Pack integration is well-explained, making the normalization capabilities clear to users.


49-49: Verify that aws_lake pipeline is required rather than optional. Line 49 marks pipelines as required with the comment "Must include aws_lake pipeline for OCSF normalization." This is appropriate guidance; confirm this is an actual enforced requirement in the target implementation.

docs/configuration/targets/wasabi-cloud-storage.mdx (1)

74-74: Verify normalization-mapping Topic reference.

The <Topic id="normalization-mapping"> reference is used across multiple target docs. Ensure this topic exists in the navigation/topics.json file and is properly documented.

docs/about/siem-optimization.mdx (1)

1-579: SIEM Optimization documentation is comprehensive and well-structured.

The documentation effectively explains the Risk-Free Reduction framework, contrasts it with AI-based approaches, and provides detailed coverage of optimization techniques. The Mermaid diagrams enhance understanding, and the security/compliance considerations are well-addressed. Configuration examples are clear and practical.

docs/configuration/scheduling/interval.mdx (1)

411-431: Comparison table with Schedule (Cron) is helpful.

The comparison clearly delineates when to use interval vs cron scheduling, helping users make appropriate choices for their use cases.

docs/configuration/targets/bigquery.mdx (1)

31-32: Scheduler integration and debug standardization are consistent with other targets.

Scheduler fields (interval, cron) properly added to schema with corresponding documentation section and Topic references. Debug option description standardized to generic "target (testing)" language for consistency across all targets.

Also applies to: 106-111, 118-118

docs/configuration/targets/microsoft-sentinel.mdx (1)

40-41: Scheduler integration and debug standardization are properly implemented.

Scheduler fields (interval, cron) and debug options follow the established pattern seen in other target updates. Documentation is consistent and references are correct.

Also applies to: 88-93, 100-100

docs/configuration/targets/overview.mdx (2)

65-241: New Debug Options section provides comprehensive guidance.

The section effectively covers configuration, use cases (Development, Troubleshooting, Pipeline Validation, Staged Deployment), best practices, and security considerations. Examples are practical and warning callouts properly communicate important limitations (e.g., dont_send_logs requires debug.status).


118-120: Warning about dont_send_logs behavior is clear and important.

The callout correctly documents that dont_send_logs only works when debug.status is also enabled, preventing user confusion about configuration precedence.

docs/configuration/targets/file.mdx (1)

29-33: Scheduler and debug options properly integrated into file target documentation.

New interval, cron, and debug configuration options are correctly added to the schema and documented with corresponding sections. Documentation follows the established pattern used across other target updates.

Also applies to: 85-97

docs/configuration/targets/syslog.mdx (2)

42-46: LGTM! Scheduler and debug configuration fields added correctly.

The schema correctly adds the new scheduler fields (interval, cron) and debug options (debug.status, debug.dont_send_logs), consistent with the PR's broader addition of these capabilities across targets.


110-123: LGTM! Documentation sections are clear and well-structured.

The Scheduler and Debug Options sections properly document the new fields with appropriate cross-references to the dedicated scheduling documentation.

docs/configuration/scheduling/cron.mdx (1)

1-447: LGTM! Comprehensive and well-structured cron documentation.

The cron scheduling documentation is thorough and well-organized, covering:

  • Clear schema definitions for both targets and routes
  • Standard cron expression format with visual diagram
  • Multiple practical examples across different use cases
  • Common patterns reference table
  • Troubleshooting guidance

The documentation effectively supports the new scheduling capabilities being added across targets in this PR.

sidebars.ts (5)

14-14: LGTM! SIEM optimization documentation added.

The new "about/siem-optimization" entry is appropriately placed in the About section.


48-49: LGTM! Organization structure reorganized.

Moving "tenants" and "usage-and-limits" to the top-level Organization items improves the navigation hierarchy.


119-142: LGTM! Multiple new cloud storage targets added.

The additions include Alibaba OSS, AWS Security Lake, Backblaze B2, Cloudflare R2, DigitalOcean Spaces, IBM COS, MinIO, Oracle Cloud OS, Scaleway OS, and Wasabi Cloud Storage. The targets are appropriately alphabetized within the Targets category.


316-324: LGTM! Scheduling category properly structured.

The new Scheduling category with overview, cron, and interval documentation is well-organized and supports the PR's scheduler feature additions across targets.


388-388: LGTM! OCSF field format added to appendix.

The new "appendix/field-formats/ocsf" entry is appropriately placed in the Field Formats subsection of the Appendix.

topics.json (2)

30-31: LGTM! Scheduling topic mappings added correctly.

The new topic mappings for "cron" and "interval" correctly reference the new scheduling documentation paths and align with the Topic references used throughout the target documentation.


55-55: LGTM! OCSF field format topic mapping added.

The "appendix-ocsf" mapping correctly points to the new OCSF field format documentation.

docs/configuration/targets/digitalocean-spaces.mdx (2)

1-45: LGTM! DigitalOcean Spaces target documentation is comprehensive.

The new target documentation follows established patterns and includes proper schema definition with scheduler and debug options consistent with other targets in this PR.


102-115: LGTM! Scheduler and Debug Options sections are consistent.

These sections match the pattern established across other targets in this PR, with proper cross-references to the dedicated scheduling documentation.

docs/configuration/targets/console.mdx (2)

19-23: LGTM! Scheduler and debug fields added correctly.

The schema updates are consistent with the broader PR pattern of adding scheduler and debug capabilities to targets.


39-51: LGTM! Scheduler and Debug Options sections properly documented.

These sections follow the established pattern and correctly reference the scheduling documentation.

docs/configuration/scheduling/overview.mdx (1)

1-524: LGTM! Excellent comprehensive scheduling overview.

This overview documentation provides outstanding coverage of the scheduling capabilities, including:

  • Clear explanations of both timing methods (Cron and Interval)
  • Multiple practical use cases and scenarios
  • Configuration patterns and best practices
  • Performance considerations and migration strategies

The documentation will be highly valuable for users implementing scheduled data processing workflows.

docs/configuration/targets/scaleway-os.mdx (3)

1-45: LGTM! Scaleway Object Storage target documentation is well-structured.

The new target documentation follows established patterns and includes proper schema definition with scheduler and debug options consistent with other targets in this PR. The emphasis on European infrastructure and GDPR compliance is appropriate for this service.


102-115: LGTM! Scheduler and Debug Options sections are consistent.

These sections match the pattern established across other targets in this PR, with proper cross-references to the dedicated scheduling documentation.


190-201: LGTM! GDPR compliance and regional considerations well-documented.

The documentation appropriately highlights Scaleway's European focus, GDPR compliance, and data sovereignty features, which are key differentiators for this target.

docs/configuration/targets/backblaze-b2.mdx (1)

102-115: Scheduler and Debug Options properly integrated.

The Scheduler and Debug Options sections follow the established pattern across targets with clear documentation of interval, cron, and debug field behaviors.

docs/configuration/targets/alibaba-oss.mdx (2)

9-45: Schema and configuration consistently structured.

The schema definition and configuration tables follow the established pattern for cloud storage targets with proper Scheduler and Debug Options integration.


203-209: Good addition: Alibaba-specific sections enhance documentation.

The Storage Classes and Regional Performance sections provide valuable Alibaba Cloud context and are well-suited to the target audience. The Internal Endpoint example (lines 337-354) is particularly useful for cost optimization.

docs/configuration/targets/cloudflare-r2.mdx (1)

59-67: Cloudflare R2-specific configuration guidance is accurate.

The documentation correctly specifies that region: "auto" is typical for R2 and explains the endpoint pattern with account-id placeholders.

docs/configuration/targets/splunk-hec.mdx (3)

24-25: Clarify field name change: source_typesourcetype.

The schema shows sourcetype (line 24) and source (line 25) fields. If source_type is being renamed to sourcetype, this is a breaking change that should be explicitly documented in migration notes or deprecation guidance. Users with existing configurations using source_type will be affected.

Can you confirm whether source_type is being deprecated or if both names should be supported for backward compatibility?


107-157: Load Balancing, Dynamic Routing, and Field Normalization sections are well-documented.

The new sections clearly explain randomized endpoint selection, pipeline-based routing capabilities, and the order of operations for normalization. The practical example at lines 130-145 effectively demonstrates dynamic routing via pipelines.


183-284: Examples comprehensively demonstrate Splunk HEC target capabilities.

The updated examples progress logically from basic to advanced configurations, effectively demonstrating load balancing, field normalization, secure authentication, and performance tuning. All examples properly use the updated field names (sourcetype, source).

docs/configuration/targets/elasticsearch.mdx (3)

74-87: Scheduler and Debug Options properly integrated into Elasticsearch target.

The new sections follow the established pattern and documentation standards with clear field descriptions and references to scheduler topic pages.


106-187: Comprehensive new sections effectively explain Elasticsearch target capabilities.

The Load Balancing, JSON Message Handling, Dynamic Index Routing, Bulk API Error Handling, and Write Actions sections provide thorough explanations with practical examples. The ECS normalization context is particularly valuable for Elastic Stack users. The inline notes about tradeoffs (filter_path optimization) demonstrate good documentation practice.


307-346: New Elasticsearch examples effectively demonstrate optimization techniques.

The "Index Action" (lines 307-325) and "Minimal Response" (lines 327-345) examples are particularly valuable, demonstrating the write_action field usage and filter_path optimization. These examples complement the existing ones well and address common use cases.

docs/configuration/targets/aws-s3.mdx (3)

60-70: AWS S3 credential documentation properly explains authentication options.

The credential section clearly documents the IAM role authentication alternative via the footnote, providing valuable context for AWS deployments. The session token field for temporary credentials is properly included.


120-179: AWS S3 Details section comprehensively covers file management and formats.

The reorganized Details section provides clear documentation of file formats, compression options, template variables, multipart upload, and multiple buckets support. The template variables table is particularly thorough.


180-298: AWS S3 examples comprehensively demonstrate all major features.

The examples progress logically from basic configuration through multiple buckets, various formats, high-reliability settings, field normalization, and debug configuration. All examples properly use placeholder credentials in standard format, making the documentation clear and safe.

@github-actions
Copy link

Docs Feature Deployment https://534cef25.virtualmetric-docs.pages.dev

Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment

Labels

None yet

Projects

None yet

Development

Successfully merging this pull request may close these issues.

3 participants