lib/aws-sdk-guardduty/client.rb in aws-sdk-guardduty-1.66.0 vs lib/aws-sdk-guardduty/client.rb in aws-sdk-guardduty-1.67.0
- old
+ new
@@ -541,12 +541,18 @@
# tags: {
# "TagKey" => "TagValue",
# },
# features: [
# {
- # name: "S3_DATA_EVENTS", # accepts S3_DATA_EVENTS, EKS_AUDIT_LOGS, EBS_MALWARE_PROTECTION, RDS_LOGIN_EVENTS
+ # name: "S3_DATA_EVENTS", # accepts S3_DATA_EVENTS, EKS_AUDIT_LOGS, EBS_MALWARE_PROTECTION, RDS_LOGIN_EVENTS, EKS_RUNTIME_MONITORING
# status: "ENABLED", # accepts ENABLED, DISABLED
+ # additional_configuration: [
+ # {
+ # name: "EKS_ADDON_MANAGEMENT", # accepts EKS_ADDON_MANAGEMENT
+ # status: "ENABLED", # accepts ENABLED, DISABLED
+ # },
+ # ],
# },
# ],
# })
#
# @example Response structure
@@ -1439,12 +1445,15 @@
# resp.member_account_limit_reached #=> Boolean
# resp.data_sources.s3_logs.auto_enable #=> Boolean
# resp.data_sources.kubernetes.audit_logs.auto_enable #=> Boolean
# resp.data_sources.malware_protection.scan_ec2_instance_with_findings.ebs_volumes.auto_enable #=> Boolean
# resp.features #=> Array
- # resp.features[0].name #=> String, one of "S3_DATA_EVENTS", "EKS_AUDIT_LOGS", "EBS_MALWARE_PROTECTION", "RDS_LOGIN_EVENTS"
+ # resp.features[0].name #=> String, one of "S3_DATA_EVENTS", "EKS_AUDIT_LOGS", "EBS_MALWARE_PROTECTION", "RDS_LOGIN_EVENTS", "EKS_RUNTIME_MONITORING"
# resp.features[0].auto_enable #=> String, one of "NEW", "NONE"
+ # resp.features[0].additional_configuration #=> Array
+ # resp.features[0].additional_configuration[0].name #=> String, one of "EKS_ADDON_MANAGEMENT"
+ # resp.features[0].additional_configuration[0].auto_enable #=> String, one of "NEW", "NONE"
# resp.next_token #=> String
# resp.auto_enable_organization_members #=> String, one of "NEW", "ALL", "NONE"
#
# @see http://docs.aws.amazon.com/goto/WebAPI/guardduty-2017-11-28/DescribeOrganizationConfiguration AWS API Documentation
#
@@ -1668,10 +1677,64 @@
def get_administrator_account(params = {}, options = {})
req = build_request(:get_administrator_account, params)
req.send_request(options)
end
+ # Retrieves aggregated statistics for your account. If you are a
+ # GuardDuty administrator, you can retrieve the statistics for all the
+ # resources associated with the active member accounts in your
+ # organization who have enabled EKS Runtime Monitoring and have the
+ # GuardDuty agent running on their EKS nodes.
+ #
+ # @option params [required, String] :detector_id
+ # The unique ID of the GuardDuty detector associated to the coverage
+ # statistics.
+ #
+ # @option params [Types::CoverageFilterCriteria] :filter_criteria
+ # Represents the criteria used to filter the coverage statistics
+ #
+ # @option params [required, Array<String>] :statistics_type
+ # Represents the statistics type used to aggregate the coverage details.
+ #
+ # @return [Types::GetCoverageStatisticsResponse] Returns a {Seahorse::Client::Response response} object which responds to the following methods:
+ #
+ # * {Types::GetCoverageStatisticsResponse#coverage_statistics #coverage_statistics} => Types::CoverageStatistics
+ #
+ # @example Request syntax with placeholder values
+ #
+ # resp = client.get_coverage_statistics({
+ # detector_id: "DetectorId", # required
+ # filter_criteria: {
+ # filter_criterion: [
+ # {
+ # criterion_key: "ACCOUNT_ID", # accepts ACCOUNT_ID, CLUSTER_NAME, RESOURCE_TYPE, COVERAGE_STATUS, ADDON_VERSION
+ # filter_condition: {
+ # equals: ["String"],
+ # not_equals: ["String"],
+ # },
+ # },
+ # ],
+ # },
+ # statistics_type: ["COUNT_BY_RESOURCE_TYPE"], # required, accepts COUNT_BY_RESOURCE_TYPE, COUNT_BY_COVERAGE_STATUS
+ # })
+ #
+ # @example Response structure
+ #
+ # resp.coverage_statistics.count_by_resource_type #=> Hash
+ # resp.coverage_statistics.count_by_resource_type["ResourceType"] #=> Integer
+ # resp.coverage_statistics.count_by_coverage_status #=> Hash
+ # resp.coverage_statistics.count_by_coverage_status["CoverageStatus"] #=> Integer
+ #
+ # @see http://docs.aws.amazon.com/goto/WebAPI/guardduty-2017-11-28/GetCoverageStatistics AWS API Documentation
+ #
+ # @overload get_coverage_statistics(params = {})
+ # @param [Hash] params ({})
+ def get_coverage_statistics(params = {}, options = {})
+ req = build_request(:get_coverage_statistics, params)
+ req.send_request(options)
+ end
+
# Retrieves an Amazon GuardDuty detector specified by the detectorId.
#
# There might be regional differences because some data sources might
# not be available in all the Amazon Web Services Regions where
# GuardDuty is presently supported. For more information, see [Regions
@@ -1717,13 +1780,17 @@
# resp.data_sources.malware_protection.scan_ec2_instance_with_findings.ebs_volumes.reason #=> String
# resp.data_sources.malware_protection.service_role #=> String
# resp.tags #=> Hash
# resp.tags["TagKey"] #=> String
# resp.features #=> Array
- # resp.features[0].name #=> String, one of "FLOW_LOGS", "CLOUD_TRAIL", "DNS_LOGS", "S3_DATA_EVENTS", "EKS_AUDIT_LOGS", "EBS_MALWARE_PROTECTION", "RDS_LOGIN_EVENTS"
+ # resp.features[0].name #=> String, one of "FLOW_LOGS", "CLOUD_TRAIL", "DNS_LOGS", "S3_DATA_EVENTS", "EKS_AUDIT_LOGS", "EBS_MALWARE_PROTECTION", "RDS_LOGIN_EVENTS", "EKS_RUNTIME_MONITORING"
# resp.features[0].status #=> String, one of "ENABLED", "DISABLED"
# resp.features[0].updated_at #=> Time
+ # resp.features[0].additional_configuration #=> Array
+ # resp.features[0].additional_configuration[0].name #=> String, one of "EKS_ADDON_MANAGEMENT"
+ # resp.features[0].additional_configuration[0].status #=> String, one of "ENABLED", "DISABLED"
+ # resp.features[0].additional_configuration[0].updated_at #=> Time
#
# @see http://docs.aws.amazon.com/goto/WebAPI/guardduty-2017-11-28/GetDetector AWS API Documentation
#
# @overload get_detector(params = {})
# @param [Hash] params ({})
@@ -2119,10 +2186,96 @@
# resp.findings[0].service.ebs_volume_scan_details.scan_detections.threat_detected_by_name.threat_names[0].file_paths #=> Array
# resp.findings[0].service.ebs_volume_scan_details.scan_detections.threat_detected_by_name.threat_names[0].file_paths[0].file_path #=> String
# resp.findings[0].service.ebs_volume_scan_details.scan_detections.threat_detected_by_name.threat_names[0].file_paths[0].volume_arn #=> String
# resp.findings[0].service.ebs_volume_scan_details.scan_detections.threat_detected_by_name.threat_names[0].file_paths[0].hash #=> String
# resp.findings[0].service.ebs_volume_scan_details.scan_detections.threat_detected_by_name.threat_names[0].file_paths[0].file_name #=> String
+ # resp.findings[0].service.runtime_details.process.name #=> String
+ # resp.findings[0].service.runtime_details.process.executable_path #=> String
+ # resp.findings[0].service.runtime_details.process.executable_sha_256 #=> String
+ # resp.findings[0].service.runtime_details.process.namespace_pid #=> Integer
+ # resp.findings[0].service.runtime_details.process.pwd #=> String
+ # resp.findings[0].service.runtime_details.process.pid #=> Integer
+ # resp.findings[0].service.runtime_details.process.start_time #=> Time
+ # resp.findings[0].service.runtime_details.process.uuid #=> String
+ # resp.findings[0].service.runtime_details.process.parent_uuid #=> String
+ # resp.findings[0].service.runtime_details.process.user #=> String
+ # resp.findings[0].service.runtime_details.process.user_id #=> Integer
+ # resp.findings[0].service.runtime_details.process.euid #=> Integer
+ # resp.findings[0].service.runtime_details.process.lineage #=> Array
+ # resp.findings[0].service.runtime_details.process.lineage[0].start_time #=> Time
+ # resp.findings[0].service.runtime_details.process.lineage[0].namespace_pid #=> Integer
+ # resp.findings[0].service.runtime_details.process.lineage[0].user_id #=> Integer
+ # resp.findings[0].service.runtime_details.process.lineage[0].name #=> String
+ # resp.findings[0].service.runtime_details.process.lineage[0].pid #=> Integer
+ # resp.findings[0].service.runtime_details.process.lineage[0].uuid #=> String
+ # resp.findings[0].service.runtime_details.process.lineage[0].executable_path #=> String
+ # resp.findings[0].service.runtime_details.process.lineage[0].euid #=> Integer
+ # resp.findings[0].service.runtime_details.process.lineage[0].parent_uuid #=> String
+ # resp.findings[0].service.runtime_details.context.modifying_process.name #=> String
+ # resp.findings[0].service.runtime_details.context.modifying_process.executable_path #=> String
+ # resp.findings[0].service.runtime_details.context.modifying_process.executable_sha_256 #=> String
+ # resp.findings[0].service.runtime_details.context.modifying_process.namespace_pid #=> Integer
+ # resp.findings[0].service.runtime_details.context.modifying_process.pwd #=> String
+ # resp.findings[0].service.runtime_details.context.modifying_process.pid #=> Integer
+ # resp.findings[0].service.runtime_details.context.modifying_process.start_time #=> Time
+ # resp.findings[0].service.runtime_details.context.modifying_process.uuid #=> String
+ # resp.findings[0].service.runtime_details.context.modifying_process.parent_uuid #=> String
+ # resp.findings[0].service.runtime_details.context.modifying_process.user #=> String
+ # resp.findings[0].service.runtime_details.context.modifying_process.user_id #=> Integer
+ # resp.findings[0].service.runtime_details.context.modifying_process.euid #=> Integer
+ # resp.findings[0].service.runtime_details.context.modifying_process.lineage #=> Array
+ # resp.findings[0].service.runtime_details.context.modifying_process.lineage[0].start_time #=> Time
+ # resp.findings[0].service.runtime_details.context.modifying_process.lineage[0].namespace_pid #=> Integer
+ # resp.findings[0].service.runtime_details.context.modifying_process.lineage[0].user_id #=> Integer
+ # resp.findings[0].service.runtime_details.context.modifying_process.lineage[0].name #=> String
+ # resp.findings[0].service.runtime_details.context.modifying_process.lineage[0].pid #=> Integer
+ # resp.findings[0].service.runtime_details.context.modifying_process.lineage[0].uuid #=> String
+ # resp.findings[0].service.runtime_details.context.modifying_process.lineage[0].executable_path #=> String
+ # resp.findings[0].service.runtime_details.context.modifying_process.lineage[0].euid #=> Integer
+ # resp.findings[0].service.runtime_details.context.modifying_process.lineage[0].parent_uuid #=> String
+ # resp.findings[0].service.runtime_details.context.modified_at #=> Time
+ # resp.findings[0].service.runtime_details.context.script_path #=> String
+ # resp.findings[0].service.runtime_details.context.library_path #=> String
+ # resp.findings[0].service.runtime_details.context.ld_preload_value #=> String
+ # resp.findings[0].service.runtime_details.context.socket_path #=> String
+ # resp.findings[0].service.runtime_details.context.runc_binary_path #=> String
+ # resp.findings[0].service.runtime_details.context.release_agent_path #=> String
+ # resp.findings[0].service.runtime_details.context.mount_source #=> String
+ # resp.findings[0].service.runtime_details.context.mount_target #=> String
+ # resp.findings[0].service.runtime_details.context.file_system_type #=> String
+ # resp.findings[0].service.runtime_details.context.flags #=> Array
+ # resp.findings[0].service.runtime_details.context.flags[0] #=> String
+ # resp.findings[0].service.runtime_details.context.module_name #=> String
+ # resp.findings[0].service.runtime_details.context.module_file_path #=> String
+ # resp.findings[0].service.runtime_details.context.module_sha_256 #=> String
+ # resp.findings[0].service.runtime_details.context.shell_history_file_path #=> String
+ # resp.findings[0].service.runtime_details.context.target_process.name #=> String
+ # resp.findings[0].service.runtime_details.context.target_process.executable_path #=> String
+ # resp.findings[0].service.runtime_details.context.target_process.executable_sha_256 #=> String
+ # resp.findings[0].service.runtime_details.context.target_process.namespace_pid #=> Integer
+ # resp.findings[0].service.runtime_details.context.target_process.pwd #=> String
+ # resp.findings[0].service.runtime_details.context.target_process.pid #=> Integer
+ # resp.findings[0].service.runtime_details.context.target_process.start_time #=> Time
+ # resp.findings[0].service.runtime_details.context.target_process.uuid #=> String
+ # resp.findings[0].service.runtime_details.context.target_process.parent_uuid #=> String
+ # resp.findings[0].service.runtime_details.context.target_process.user #=> String
+ # resp.findings[0].service.runtime_details.context.target_process.user_id #=> Integer
+ # resp.findings[0].service.runtime_details.context.target_process.euid #=> Integer
+ # resp.findings[0].service.runtime_details.context.target_process.lineage #=> Array
+ # resp.findings[0].service.runtime_details.context.target_process.lineage[0].start_time #=> Time
+ # resp.findings[0].service.runtime_details.context.target_process.lineage[0].namespace_pid #=> Integer
+ # resp.findings[0].service.runtime_details.context.target_process.lineage[0].user_id #=> Integer
+ # resp.findings[0].service.runtime_details.context.target_process.lineage[0].name #=> String
+ # resp.findings[0].service.runtime_details.context.target_process.lineage[0].pid #=> Integer
+ # resp.findings[0].service.runtime_details.context.target_process.lineage[0].uuid #=> String
+ # resp.findings[0].service.runtime_details.context.target_process.lineage[0].executable_path #=> String
+ # resp.findings[0].service.runtime_details.context.target_process.lineage[0].euid #=> Integer
+ # resp.findings[0].service.runtime_details.context.target_process.lineage[0].parent_uuid #=> String
+ # resp.findings[0].service.runtime_details.context.address_family #=> String
+ # resp.findings[0].service.runtime_details.context.iana_protocol_number #=> Integer
+ # resp.findings[0].service.runtime_details.context.memory_regions #=> Array
+ # resp.findings[0].service.runtime_details.context.memory_regions[0] #=> String
# resp.findings[0].severity #=> Float
# resp.findings[0].title #=> String
# resp.findings[0].type #=> String
# resp.findings[0].updated_at #=> String
#
@@ -2373,13 +2526,17 @@
# resp.member_data_source_configurations[0].data_sources.kubernetes.audit_logs.status #=> String, one of "ENABLED", "DISABLED"
# resp.member_data_source_configurations[0].data_sources.malware_protection.scan_ec2_instance_with_findings.ebs_volumes.status #=> String, one of "ENABLED", "DISABLED"
# resp.member_data_source_configurations[0].data_sources.malware_protection.scan_ec2_instance_with_findings.ebs_volumes.reason #=> String
# resp.member_data_source_configurations[0].data_sources.malware_protection.service_role #=> String
# resp.member_data_source_configurations[0].features #=> Array
- # resp.member_data_source_configurations[0].features[0].name #=> String, one of "S3_DATA_EVENTS", "EKS_AUDIT_LOGS", "EBS_MALWARE_PROTECTION", "RDS_LOGIN_EVENTS"
+ # resp.member_data_source_configurations[0].features[0].name #=> String, one of "S3_DATA_EVENTS", "EKS_AUDIT_LOGS", "EBS_MALWARE_PROTECTION", "RDS_LOGIN_EVENTS", "EKS_RUNTIME_MONITORING"
# resp.member_data_source_configurations[0].features[0].status #=> String, one of "ENABLED", "DISABLED"
# resp.member_data_source_configurations[0].features[0].updated_at #=> Time
+ # resp.member_data_source_configurations[0].features[0].additional_configuration #=> Array
+ # resp.member_data_source_configurations[0].features[0].additional_configuration[0].name #=> String, one of "EKS_ADDON_MANAGEMENT"
+ # resp.member_data_source_configurations[0].features[0].additional_configuration[0].status #=> String, one of "ENABLED", "DISABLED"
+ # resp.member_data_source_configurations[0].features[0].additional_configuration[0].updated_at #=> Time
# resp.unprocessed_accounts #=> Array
# resp.unprocessed_accounts[0].account_id #=> String
# resp.unprocessed_accounts[0].result #=> String
#
# @see http://docs.aws.amazon.com/goto/WebAPI/guardduty-2017-11-28/GetMemberDetectors AWS API Documentation
@@ -2468,11 +2625,11 @@
# resp.accounts[0].data_sources.flow_logs.free_trial_days_remaining #=> Integer
# resp.accounts[0].data_sources.s3_logs.free_trial_days_remaining #=> Integer
# resp.accounts[0].data_sources.kubernetes.audit_logs.free_trial_days_remaining #=> Integer
# resp.accounts[0].data_sources.malware_protection.scan_ec2_instance_with_findings.free_trial_days_remaining #=> Integer
# resp.accounts[0].features #=> Array
- # resp.accounts[0].features[0].name #=> String, one of "FLOW_LOGS", "CLOUD_TRAIL", "DNS_LOGS", "S3_DATA_EVENTS", "EKS_AUDIT_LOGS", "EBS_MALWARE_PROTECTION", "RDS_LOGIN_EVENTS"
+ # resp.accounts[0].features[0].name #=> String, one of "FLOW_LOGS", "CLOUD_TRAIL", "DNS_LOGS", "S3_DATA_EVENTS", "EKS_AUDIT_LOGS", "EBS_MALWARE_PROTECTION", "RDS_LOGIN_EVENTS", "EKS_RUNTIME_MONITORING"
# resp.accounts[0].features[0].free_trial_days_remaining #=> Integer
# resp.unprocessed_accounts #=> Array
# resp.unprocessed_accounts[0].account_id #=> String
# resp.unprocessed_accounts[0].result #=> String
#
@@ -2668,10 +2825,93 @@
def invite_members(params = {}, options = {})
req = build_request(:invite_members, params)
req.send_request(options)
end
+ # Lists coverage details for your GuardDuty account. If you're a
+ # GuardDuty administrator, you can retrieve all resources associated
+ # with the active member accounts in your organization.
+ #
+ # Make sure the accounts have EKS Runtime Monitoring enabled and
+ # GuardDuty agent running on their EKS nodes.
+ #
+ # @option params [required, String] :detector_id
+ # The unique ID of the detector whose coverage details you want to
+ # retrieve.
+ #
+ # @option params [String] :next_token
+ # A token to use for paginating results that are returned in the
+ # response. Set the value of this parameter to null for the first
+ # request to a list action. For subsequent calls, use the NextToken
+ # value returned from the previous request to continue listing results
+ # after the first page.
+ #
+ # @option params [Integer] :max_results
+ # The maximum number of results to return in the response.
+ #
+ # @option params [Types::CoverageFilterCriteria] :filter_criteria
+ # Represents the criteria used to filter the coverage details.
+ #
+ # @option params [Types::CoverageSortCriteria] :sort_criteria
+ # Represents the criteria used to sort the coverage details.
+ #
+ # @return [Types::ListCoverageResponse] Returns a {Seahorse::Client::Response response} object which responds to the following methods:
+ #
+ # * {Types::ListCoverageResponse#resources #resources} => Array<Types::CoverageResource>
+ # * {Types::ListCoverageResponse#next_token #next_token} => String
+ #
+ # The returned {Seahorse::Client::Response response} is a pageable response and is Enumerable. For details on usage see {Aws::PageableResponse PageableResponse}.
+ #
+ # @example Request syntax with placeholder values
+ #
+ # resp = client.list_coverage({
+ # detector_id: "DetectorId", # required
+ # next_token: "String",
+ # max_results: 1,
+ # filter_criteria: {
+ # filter_criterion: [
+ # {
+ # criterion_key: "ACCOUNT_ID", # accepts ACCOUNT_ID, CLUSTER_NAME, RESOURCE_TYPE, COVERAGE_STATUS, ADDON_VERSION
+ # filter_condition: {
+ # equals: ["String"],
+ # not_equals: ["String"],
+ # },
+ # },
+ # ],
+ # },
+ # sort_criteria: {
+ # attribute_name: "ACCOUNT_ID", # accepts ACCOUNT_ID, CLUSTER_NAME, COVERAGE_STATUS, ISSUE, ADDON_VERSION, UPDATED_AT
+ # order_by: "ASC", # accepts ASC, DESC
+ # },
+ # })
+ #
+ # @example Response structure
+ #
+ # resp.resources #=> Array
+ # resp.resources[0].resource_id #=> String
+ # resp.resources[0].detector_id #=> String
+ # resp.resources[0].account_id #=> String
+ # resp.resources[0].resource_details.eks_cluster_details.cluster_name #=> String
+ # resp.resources[0].resource_details.eks_cluster_details.covered_nodes #=> Integer
+ # resp.resources[0].resource_details.eks_cluster_details.compatible_nodes #=> Integer
+ # resp.resources[0].resource_details.eks_cluster_details.addon_details.addon_version #=> String
+ # resp.resources[0].resource_details.eks_cluster_details.addon_details.addon_status #=> String
+ # resp.resources[0].resource_details.resource_type #=> String, one of "EKS"
+ # resp.resources[0].coverage_status #=> String, one of "HEALTHY", "UNHEALTHY"
+ # resp.resources[0].issue #=> String
+ # resp.resources[0].updated_at #=> Time
+ # resp.next_token #=> String
+ #
+ # @see http://docs.aws.amazon.com/goto/WebAPI/guardduty-2017-11-28/ListCoverage AWS API Documentation
+ #
+ # @overload list_coverage(params = {})
+ # @param [Hash] params ({})
+ def list_coverage(params = {}, options = {})
+ req = build_request(:list_coverage, params)
+ req.send_request(options)
+ end
+
# Lists detectorIds of all the existing Amazon GuardDuty detector
# resources.
#
# @option params [Integer] :max_results
# You can use this parameter to indicate the maximum number of items
@@ -3500,12 +3740,18 @@
# },
# },
# },
# features: [
# {
- # name: "S3_DATA_EVENTS", # accepts S3_DATA_EVENTS, EKS_AUDIT_LOGS, EBS_MALWARE_PROTECTION, RDS_LOGIN_EVENTS
+ # name: "S3_DATA_EVENTS", # accepts S3_DATA_EVENTS, EKS_AUDIT_LOGS, EBS_MALWARE_PROTECTION, RDS_LOGIN_EVENTS, EKS_RUNTIME_MONITORING
# status: "ENABLED", # accepts ENABLED, DISABLED
+ # additional_configuration: [
+ # {
+ # name: "EKS_ADDON_MANAGEMENT", # accepts EKS_ADDON_MANAGEMENT
+ # status: "ENABLED", # accepts ENABLED, DISABLED
+ # },
+ # ],
# },
# ],
# })
#
# @see http://docs.aws.amazon.com/goto/WebAPI/guardduty-2017-11-28/UpdateDetector AWS API Documentation
@@ -3776,12 +4022,18 @@
# },
# },
# },
# features: [
# {
- # name: "S3_DATA_EVENTS", # accepts S3_DATA_EVENTS, EKS_AUDIT_LOGS, EBS_MALWARE_PROTECTION, RDS_LOGIN_EVENTS
+ # name: "S3_DATA_EVENTS", # accepts S3_DATA_EVENTS, EKS_AUDIT_LOGS, EBS_MALWARE_PROTECTION, RDS_LOGIN_EVENTS, EKS_RUNTIME_MONITORING
# status: "ENABLED", # accepts ENABLED, DISABLED
+ # additional_configuration: [
+ # {
+ # name: "EKS_ADDON_MANAGEMENT", # accepts EKS_ADDON_MANAGEMENT
+ # status: "ENABLED", # accepts ENABLED, DISABLED
+ # },
+ # ],
# },
# ],
# })
#
# @example Response structure
@@ -3817,28 +4069,34 @@
#
# @option params [Boolean] :auto_enable
# Indicates whether to automatically enable member accounts in the
# organization.
#
+ # Even though this is still supported, we recommend using
+ # `AutoEnableOrganizationMembers` to achieve the similar results.
+ #
# @option params [Types::OrganizationDataSourceConfigurations] :data_sources
# Describes which data sources will be updated.
#
# @option params [Array<Types::OrganizationFeatureConfiguration>] :features
# A list of features that will be configured for the organization.
#
# @option params [String] :auto_enable_organization_members
# Indicates the auto-enablement configuration of GuardDuty for the
# member accounts in the organization.
#
- # * `NEW`: Indicates that new accounts joining the organization are
- # configured to have GuardDuty enabled automatically.
+ # * `NEW`: Indicates that when a new account joins the organization,
+ # they will have GuardDuty enabled automatically.
#
- # * `ALL`: Indicates that all accounts (new and existing members) in the
- # organization are configured to have GuardDuty enabled automatically.
+ # * `ALL`: Indicates that all accounts in the Amazon Web Services
+ # Organization have GuardDuty enabled automatically. This includes
+ # `NEW` accounts that join the organization and accounts that may have
+ # been suspended or removed from the organization in GuardDuty.
#
- # * `NONE`: Indicates that no account in the organization will be
- # configured to have GuardDuty enabled automatically.
+ # * `NONE`: Indicates that GuardDuty will not be automatically enabled
+ # for any accounts in the organization. GuardDuty must be managed for
+ # each account individually by the administrator.
#
# @return [Struct] Returns an empty {Seahorse::Client::Response response}.
#
# @example Request syntax with placeholder values
#
@@ -3862,12 +4120,18 @@
# },
# },
# },
# features: [
# {
- # name: "S3_DATA_EVENTS", # accepts S3_DATA_EVENTS, EKS_AUDIT_LOGS, EBS_MALWARE_PROTECTION, RDS_LOGIN_EVENTS
+ # name: "S3_DATA_EVENTS", # accepts S3_DATA_EVENTS, EKS_AUDIT_LOGS, EBS_MALWARE_PROTECTION, RDS_LOGIN_EVENTS, EKS_RUNTIME_MONITORING
# auto_enable: "NEW", # accepts NEW, NONE
+ # additional_configuration: [
+ # {
+ # name: "EKS_ADDON_MANAGEMENT", # accepts EKS_ADDON_MANAGEMENT
+ # auto_enable: "NEW", # accepts NEW, NONE
+ # },
+ # ],
# },
# ],
# auto_enable_organization_members: "NEW", # accepts NEW, ALL, NONE
# })
#
@@ -3969,10 +4233,10 @@
operation: config.api.operation(operation_name),
client: self,
params: params,
config: config)
context[:gem_name] = 'aws-sdk-guardduty'
- context[:gem_version] = '1.66.0'
+ context[:gem_version] = '1.67.0'
Seahorse::Client::Request.new(handlers, context)
end
# @api private
# @deprecated