A common mantra among cyber-security professionals is – ‘the more data the better’. Cybersecurity log collection and analysis is a critical function in the modern cyber-security toolset. Having a plethora of data sources allows for better correlation, increased levels of assurance and better investigation quality on security events. However, as the data scales, so does the engineering requirements to ingest and maintain these sources. This process of collecting and organizing security data is called data engineering. The main process behind data engineering is the development of extract-transform-load (ETL) pipelines. These ETL pipelines are typically a combination of configuration files, software scripts and infrastructure provisioning.”