Skip to content

Commit

Permalink
Specify log detection based rule support
Browse files Browse the repository at this point in the history
  • Loading branch information
eho1307 authored Dec 11, 2023
1 parent 67ac216 commit d05095d
Showing 1 changed file with 1 addition and 1 deletion.
Original file line number Diff line number Diff line change
Expand Up @@ -21,7 +21,7 @@ To create a Datadog integration, see [Create a New Integration][3].
## Create a detection rule
### Build a detection rule JSON schema

1. Navigate to **[Security > Cloud SIEM > Detection Rules > New Rule][4]** and create a new rule. Note: Only threshold based rules are currently supported.
1. Navigate to **[Security > Cloud SIEM > Detection Rules > New Rule][4]** and create a new rule. Note: Only log detection based rules are currently supported.

Check warning on line 24 in content/en/developers/integrations/create-a-cloud-siem-detection-rule.md

View workflow job for this annotation

GitHub Actions / vale

[vale] content/en/developers/integrations/create-a-cloud-siem-detection-rule.md#L24

[Datadog.tense] Avoid temporal words like 'currently'.
Raw output
{"message": "[Datadog.tense] Avoid temporal words like 'currently'.", "location": {"path": "content/en/developers/integrations/create-a-cloud-siem-detection-rule.md", "range": {"start": {"line": 24, "column": 140}}}, "severity": "WARNING"}

2. Follow the [best practices](#configuration-best-practices) in this guide to configure your detection rule.

Expand Down

0 comments on commit d05095d

Please sign in to comment.