lib/aws-sdk-guardduty/client.rb in aws-sdk-guardduty-1.67.0 vs lib/aws-sdk-guardduty/client.rb in aws-sdk-guardduty-1.68.0

- old
+ new

@@ -541,11 +541,11 @@ # tags: { # "TagKey" => "TagValue", # }, # features: [ # { - # name: "S3_DATA_EVENTS", # accepts S3_DATA_EVENTS, EKS_AUDIT_LOGS, EBS_MALWARE_PROTECTION, RDS_LOGIN_EVENTS, EKS_RUNTIME_MONITORING + # name: "S3_DATA_EVENTS", # accepts S3_DATA_EVENTS, EKS_AUDIT_LOGS, EBS_MALWARE_PROTECTION, RDS_LOGIN_EVENTS, EKS_RUNTIME_MONITORING, LAMBDA_NETWORK_LOGS # status: "ENABLED", # accepts ENABLED, DISABLED # additional_configuration: [ # { # name: "EKS_ADDON_MANAGEMENT", # accepts EKS_ADDON_MANAGEMENT # status: "ENABLED", # accepts ENABLED, DISABLED @@ -1445,11 +1445,11 @@ # resp.member_account_limit_reached #=> Boolean # resp.data_sources.s3_logs.auto_enable #=> Boolean # resp.data_sources.kubernetes.audit_logs.auto_enable #=> Boolean # resp.data_sources.malware_protection.scan_ec2_instance_with_findings.ebs_volumes.auto_enable #=> Boolean # resp.features #=> Array - # resp.features[0].name #=> String, one of "S3_DATA_EVENTS", "EKS_AUDIT_LOGS", "EBS_MALWARE_PROTECTION", "RDS_LOGIN_EVENTS", "EKS_RUNTIME_MONITORING" + # resp.features[0].name #=> String, one of "S3_DATA_EVENTS", "EKS_AUDIT_LOGS", "EBS_MALWARE_PROTECTION", "RDS_LOGIN_EVENTS", "EKS_RUNTIME_MONITORING", "LAMBDA_NETWORK_LOGS" # resp.features[0].auto_enable #=> String, one of "NEW", "NONE" # resp.features[0].additional_configuration #=> Array # resp.features[0].additional_configuration[0].name #=> String, one of "EKS_ADDON_MANAGEMENT" # resp.features[0].additional_configuration[0].auto_enable #=> String, one of "NEW", "NONE" # resp.next_token #=> String @@ -1780,11 +1780,11 @@ # resp.data_sources.malware_protection.scan_ec2_instance_with_findings.ebs_volumes.reason #=> String # resp.data_sources.malware_protection.service_role #=> String # resp.tags #=> Hash # resp.tags["TagKey"] #=> String # resp.features #=> Array - # resp.features[0].name #=> String, one of "FLOW_LOGS", "CLOUD_TRAIL", "DNS_LOGS", "S3_DATA_EVENTS", "EKS_AUDIT_LOGS", "EBS_MALWARE_PROTECTION", "RDS_LOGIN_EVENTS", "EKS_RUNTIME_MONITORING" + # resp.features[0].name #=> String, one of "FLOW_LOGS", "CLOUD_TRAIL", "DNS_LOGS", "S3_DATA_EVENTS", "EKS_AUDIT_LOGS", "EBS_MALWARE_PROTECTION", "RDS_LOGIN_EVENTS", "EKS_RUNTIME_MONITORING", "LAMBDA_NETWORK_LOGS" # resp.features[0].status #=> String, one of "ENABLED", "DISABLED" # resp.features[0].updated_at #=> Time # resp.features[0].additional_configuration #=> Array # resp.features[0].additional_configuration[0].name #=> String, one of "EKS_ADDON_MANAGEMENT" # resp.features[0].additional_configuration[0].status #=> String, one of "ENABLED", "DISABLED" @@ -2056,10 +2056,26 @@ # resp.findings[0].resource.rds_db_user_details.user #=> String # resp.findings[0].resource.rds_db_user_details.application #=> String # resp.findings[0].resource.rds_db_user_details.database #=> String # resp.findings[0].resource.rds_db_user_details.ssl #=> String # resp.findings[0].resource.rds_db_user_details.auth_method #=> String + # resp.findings[0].resource.lambda_details.function_arn #=> String + # resp.findings[0].resource.lambda_details.function_name #=> String + # resp.findings[0].resource.lambda_details.description #=> String + # resp.findings[0].resource.lambda_details.last_modified_at #=> Time + # resp.findings[0].resource.lambda_details.revision_id #=> String + # resp.findings[0].resource.lambda_details.function_version #=> String + # resp.findings[0].resource.lambda_details.role #=> String + # resp.findings[0].resource.lambda_details.vpc_config.subnet_ids #=> Array + # resp.findings[0].resource.lambda_details.vpc_config.subnet_ids[0] #=> String + # resp.findings[0].resource.lambda_details.vpc_config.vpc_id #=> String + # resp.findings[0].resource.lambda_details.vpc_config.security_groups #=> Array + # resp.findings[0].resource.lambda_details.vpc_config.security_groups[0].group_id #=> String + # resp.findings[0].resource.lambda_details.vpc_config.security_groups[0].group_name #=> String + # resp.findings[0].resource.lambda_details.tags #=> Array + # resp.findings[0].resource.lambda_details.tags[0].key #=> String + # resp.findings[0].resource.lambda_details.tags[0].value #=> String # resp.findings[0].schema_version #=> String # resp.findings[0].service.action.action_type #=> String # resp.findings[0].service.action.aws_api_call_action.api #=> String # resp.findings[0].service.action.aws_api_call_action.caller_type #=> String # resp.findings[0].service.action.aws_api_call_action.domain_details.domain #=> String @@ -2526,11 +2542,11 @@ # resp.member_data_source_configurations[0].data_sources.kubernetes.audit_logs.status #=> String, one of "ENABLED", "DISABLED" # resp.member_data_source_configurations[0].data_sources.malware_protection.scan_ec2_instance_with_findings.ebs_volumes.status #=> String, one of "ENABLED", "DISABLED" # resp.member_data_source_configurations[0].data_sources.malware_protection.scan_ec2_instance_with_findings.ebs_volumes.reason #=> String # resp.member_data_source_configurations[0].data_sources.malware_protection.service_role #=> String # resp.member_data_source_configurations[0].features #=> Array - # resp.member_data_source_configurations[0].features[0].name #=> String, one of "S3_DATA_EVENTS", "EKS_AUDIT_LOGS", "EBS_MALWARE_PROTECTION", "RDS_LOGIN_EVENTS", "EKS_RUNTIME_MONITORING" + # resp.member_data_source_configurations[0].features[0].name #=> String, one of "S3_DATA_EVENTS", "EKS_AUDIT_LOGS", "EBS_MALWARE_PROTECTION", "RDS_LOGIN_EVENTS", "EKS_RUNTIME_MONITORING", "LAMBDA_NETWORK_LOGS" # resp.member_data_source_configurations[0].features[0].status #=> String, one of "ENABLED", "DISABLED" # resp.member_data_source_configurations[0].features[0].updated_at #=> Time # resp.member_data_source_configurations[0].features[0].additional_configuration #=> Array # resp.member_data_source_configurations[0].features[0].additional_configuration[0].name #=> String, one of "EKS_ADDON_MANAGEMENT" # resp.member_data_source_configurations[0].features[0].additional_configuration[0].status #=> String, one of "ENABLED", "DISABLED" @@ -2625,11 +2641,11 @@ # resp.accounts[0].data_sources.flow_logs.free_trial_days_remaining #=> Integer # resp.accounts[0].data_sources.s3_logs.free_trial_days_remaining #=> Integer # resp.accounts[0].data_sources.kubernetes.audit_logs.free_trial_days_remaining #=> Integer # resp.accounts[0].data_sources.malware_protection.scan_ec2_instance_with_findings.free_trial_days_remaining #=> Integer # resp.accounts[0].features #=> Array - # resp.accounts[0].features[0].name #=> String, one of "FLOW_LOGS", "CLOUD_TRAIL", "DNS_LOGS", "S3_DATA_EVENTS", "EKS_AUDIT_LOGS", "EBS_MALWARE_PROTECTION", "RDS_LOGIN_EVENTS", "EKS_RUNTIME_MONITORING" + # resp.accounts[0].features[0].name #=> String, one of "FLOW_LOGS", "CLOUD_TRAIL", "DNS_LOGS", "S3_DATA_EVENTS", "EKS_AUDIT_LOGS", "EBS_MALWARE_PROTECTION", "RDS_LOGIN_EVENTS", "EKS_RUNTIME_MONITORING", "LAMBDA_NETWORK_LOGS" # resp.accounts[0].features[0].free_trial_days_remaining #=> Integer # resp.unprocessed_accounts #=> Array # resp.unprocessed_accounts[0].account_id #=> String # resp.unprocessed_accounts[0].result #=> String # @@ -3740,11 +3756,11 @@ # }, # }, # }, # features: [ # { - # name: "S3_DATA_EVENTS", # accepts S3_DATA_EVENTS, EKS_AUDIT_LOGS, EBS_MALWARE_PROTECTION, RDS_LOGIN_EVENTS, EKS_RUNTIME_MONITORING + # name: "S3_DATA_EVENTS", # accepts S3_DATA_EVENTS, EKS_AUDIT_LOGS, EBS_MALWARE_PROTECTION, RDS_LOGIN_EVENTS, EKS_RUNTIME_MONITORING, LAMBDA_NETWORK_LOGS # status: "ENABLED", # accepts ENABLED, DISABLED # additional_configuration: [ # { # name: "EKS_ADDON_MANAGEMENT", # accepts EKS_ADDON_MANAGEMENT # status: "ENABLED", # accepts ENABLED, DISABLED @@ -4022,11 +4038,11 @@ # }, # }, # }, # features: [ # { - # name: "S3_DATA_EVENTS", # accepts S3_DATA_EVENTS, EKS_AUDIT_LOGS, EBS_MALWARE_PROTECTION, RDS_LOGIN_EVENTS, EKS_RUNTIME_MONITORING + # name: "S3_DATA_EVENTS", # accepts S3_DATA_EVENTS, EKS_AUDIT_LOGS, EBS_MALWARE_PROTECTION, RDS_LOGIN_EVENTS, EKS_RUNTIME_MONITORING, LAMBDA_NETWORK_LOGS # status: "ENABLED", # accepts ENABLED, DISABLED # additional_configuration: [ # { # name: "EKS_ADDON_MANAGEMENT", # accepts EKS_ADDON_MANAGEMENT # status: "ENABLED", # accepts ENABLED, DISABLED @@ -4120,11 +4136,11 @@ # }, # }, # }, # features: [ # { - # name: "S3_DATA_EVENTS", # accepts S3_DATA_EVENTS, EKS_AUDIT_LOGS, EBS_MALWARE_PROTECTION, RDS_LOGIN_EVENTS, EKS_RUNTIME_MONITORING + # name: "S3_DATA_EVENTS", # accepts S3_DATA_EVENTS, EKS_AUDIT_LOGS, EBS_MALWARE_PROTECTION, RDS_LOGIN_EVENTS, EKS_RUNTIME_MONITORING, LAMBDA_NETWORK_LOGS # auto_enable: "NEW", # accepts NEW, NONE # additional_configuration: [ # { # name: "EKS_ADDON_MANAGEMENT", # accepts EKS_ADDON_MANAGEMENT # auto_enable: "NEW", # accepts NEW, NONE @@ -4233,10 +4249,10 @@ operation: config.api.operation(operation_name), client: self, params: params, config: config) context[:gem_name] = 'aws-sdk-guardduty' - context[:gem_version] = '1.67.0' + context[:gem_version] = '1.68.0' Seahorse::Client::Request.new(handlers, context) end # @api private # @deprecated