Rewrite threat-defense page descriptions (next trees)#2722
Merged
Conversation
✅ Deploy Preview for calico-docs-preview-next ready!
To edit notification comments on pull requests, go to your Netlify project configuration. |
✅ Deploy Preview succeeded!
To edit notification comments on pull requests, go to your Netlify project configuration. |
Contributor
There was a problem hiding this comment.
Pull request overview
Updates the description frontmatter (meta descriptions) for the Threat defense documentation in the unversioned (“next”) Calico Enterprise and Calico Cloud trees to improve clarity, include canonical product naming, and reduce cross-product duplication.
Changes:
- Rewrites
description:frontmatter across 19 Threat defense pages incalico-enterprise/threat/andcalico-cloud/threat/. - Adjusts descriptions to be more specific to each product’s deployment context (self-hosted Enterprise vs connected clusters/Cloud).
Reviewed changes
Copilot reviewed 19 out of 19 changed files in this pull request and generated 5 comments.
Show a summary per file
| File | Description |
|---|---|
| calico-enterprise/threat/index.mdx | Updated Threat defense landing-page meta description. |
| calico-enterprise/threat/security-event-management.mdx | Updated meta description for security event management page. |
| calico-enterprise/threat/suspicious-domains.mdx | Updated meta description for suspicious domains page. |
| calico-enterprise/threat/suspicious-ips.mdx | Updated meta description for suspicious IPs page. |
| calico-enterprise/threat/web-application-firewall.mdx | Updated meta description for workload-based WAF page. |
| calico-enterprise/threat/deploying-waf-ingress-gateway.mdx | Updated meta description for ingress-gateway WAF tutorial. |
| calico-enterprise/threat/deeppacketinspection.mdx | Updated meta description for deep packet inspection page. |
| calico-enterprise/threat/configuring-webhooks.mdx | Updated meta description for security-event webhooks page. |
| calico-enterprise/threat/tor-vpn-feed-and-dashboard.mdx | Updated meta description for Tor/VPN feed + dashboard page. |
| calico-cloud/threat/index.mdx | Updated Threat defense landing-page meta description. |
| calico-cloud/threat/security-event-management.mdx | Updated meta description for security event management page. |
| calico-cloud/threat/container-threat-detection.mdx | Updated meta description for container threat detection page. |
| calico-cloud/threat/suspicious-domains.mdx | Updated meta description for suspicious domains page. |
| calico-cloud/threat/suspicious-ips.mdx | Updated meta description for suspicious IPs page. |
| calico-cloud/threat/web-application-firewall.mdx | Updated meta description for workload-based WAF page. |
| calico-cloud/threat/deploying-waf-ingress-gateway.mdx | Updated meta description for ingress-gateway WAF tutorial. |
| calico-cloud/threat/deeppacketinspection.mdx | Updated meta description for deep packet inspection page. |
| calico-cloud/threat/configuring-webhooks.mdx | Updated meta description for security-event webhooks page. |
| calico-cloud/threat/tor-vpn-feed-and-dashboard.mdx | Updated meta description for Tor/VPN feed + dashboard page. |
| @@ -1,5 +1,5 @@ | |||
| --- | |||
| description: Detect and analyze malicious anonymization activity using Tor-VPN feeds. | |||
| description: Detect anonymization activity in Calico Cloud connected clusters with managed Tor bulk exit and X4B VPN feeds, and investigate findings in the Tor-VPN dashboard. | |||
| @@ -1,5 +1,5 @@ | |||
| --- | |||
| description: Add threat intelligence feeds to trace network flows of suspicious IP addresses, and optionally block traffic to them. | |||
| description: Use managed threat-intelligence feeds in Calico Cloud to alert on flows to suspicious IP addresses and optionally block them with a dynamic deny-list policy. | |||
| @@ -1,5 +1,5 @@ | |||
| --- | |||
| description: Add threat intelligence feeds to trace DNS queries that involve suspicious domains. | |||
| description: Use managed threat-intelligence feeds in Calico Cloud to detect DNS queries to suspicious domains and surface impacted pods in the anomaly dashboard. | |||
| @@ -1,5 +1,5 @@ | |||
| --- | |||
| description: Trace, analyze, and block malicious threats using intelligent feeds and alerts. | |||
| description: Detect, analyze, and block threats in your Calico Enterprise cluster with intrusion detection, threat-intel feeds, deep packet inspection, and a workload-based WAF. | |||
| @@ -1,5 +1,5 @@ | |||
| --- | |||
| description: Trace, analyze, and block malicious threats using intelligent feeds and alerts. | |||
| description: Detect and respond to threats in Calico Cloud connected clusters with container threat detection, managed threat-intel feed updates, deep packet inspection, and WAF. | |||
5 review comments addressed:
- tor-vpn-feed-and-dashboard.mdx (CC): replaced "managed Tor bulk
exit and X4B VPN feeds" with the actual install path the page
documents ("Tor bulk exit and X4B VPN feeds, ... in the Tor-VPN
dashboard in the web console").
- suspicious-ips.mdx and suspicious-domains.mdx (CC): removed the
"managed threat-intelligence feeds" framing since the pages
describe adding feeds via kubectl apply, not managed feeds.
- threat/index.mdx (CE and CC): spelled out "threat-intel" as
"threat intelligence" for consistency with sibling pages.
Then mirrored the full next-tree threat descriptions to the four
versioned snapshots:
- calico-enterprise_versioned_docs/version-3.23-1/threat/ (9)
- calico-enterprise_versioned_docs/version-3.22-2/threat/ (9)
- calico-cloud_versioned_docs/version-22-2/threat/ (10)
28 mirror writes plus 5 next-tree fixes = 33 file changes. No drift.
Vale clean on description lines across all 5 dirs.
Co-Authored-By: Claude Opus 4.7 (1M context) <noreply@anthropic.com>
80139c3 to
db07a93
Compare
This file contains hidden or bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
Sign up for free
to join this conversation on GitHub.
Already have an account?
Sign in to comment
Add this suggestion to a batch that can be applied as a single commit.This suggestion is invalid because no changes were made to the code.Suggestions cannot be applied while the pull request is closed.Suggestions cannot be applied while viewing a subset of changes.Only one suggestion per line can be applied in a batch.Add this suggestion to a batch that can be applied as a single commit.Applying suggestions on deleted lines is not supported.You must change the existing code in this line in order to create a valid suggestion.Outdated suggestions cannot be applied.This suggestion has been applied or marked resolved.Suggestions cannot be applied from pending reviews.Suggestions cannot be applied on multi-line comments.Suggestions cannot be applied while the pull request is queued to merge.Suggestion cannot be applied right now. Please check back later.

Summary
Rewrites the
descriptionfrontmatter on every page in the threat-defense book across the two unversioned (next-release) source trees that have one — 19 files, 1-line replacement each. Same rule set as #2696, #2697, #2708, #2709, #2710, #2711, #2718, #2719, #2720.calico-enterprise/threat/calico-cloud/threat/Next-only on purpose. Landing on unversioned source first so descriptions can get review without pre-mirroring to versioned snapshots that would all need amending if anything changes. Mirror to published latest-version snapshots in a follow-up.
What every new description follows
Calico EnterpriseorCalico Cloud). Calico Open Source has no threat-defense book.docs-frontmatter-descriptionskill's content-type rules.enable,disable, orteaching.What was wrong before
Pre-fix snapshot of the same 19 files:
enable/disable/teaching).Deploy WAF with ingress gateways,Threat detection for containerized workloads,Configure Calico to use with Layer 7 Web Application Firewall,Monitor live traffic for malicious activitiesare short, non-canonical, or omit the product name entirely. Rewrites use complete sentences with the canonical product name and Threat covers anomaly detection, container threat detection, IDS, threat-intel feeds, alerts, and malware detection.Verification
Run from repo root on this branch:
Length, canonical-name presence, and cross-product-uniqueness checks are equivalent one-liners over the same two directories. All four return empty post-fix.
Test plan
*/threat/suspicious-ips.mdx,*/threat/web-application-firewall.mdx,*/threat/tor-vpn-feed-and-dashboard.mdx,*/threat/deeppacketinspection.mdx) for distinguishability.