lib/aws-sdk-guardduty/client.rb in aws-sdk-guardduty-1.83.0 vs lib/aws-sdk-guardduty/client.rb in aws-sdk-guardduty-1.84.0

- old
+ new

@@ -561,15 +561,15 @@ # tags: { # "TagKey" => "TagValue", # }, # features: [ # { - # name: "S3_DATA_EVENTS", # accepts S3_DATA_EVENTS, EKS_AUDIT_LOGS, EBS_MALWARE_PROTECTION, RDS_LOGIN_EVENTS, EKS_RUNTIME_MONITORING, LAMBDA_NETWORK_LOGS + # name: "S3_DATA_EVENTS", # accepts S3_DATA_EVENTS, EKS_AUDIT_LOGS, EBS_MALWARE_PROTECTION, RDS_LOGIN_EVENTS, EKS_RUNTIME_MONITORING, LAMBDA_NETWORK_LOGS, RUNTIME_MONITORING # status: "ENABLED", # accepts ENABLED, DISABLED # additional_configuration: [ # { - # name: "EKS_ADDON_MANAGEMENT", # accepts EKS_ADDON_MANAGEMENT + # name: "EKS_ADDON_MANAGEMENT", # accepts EKS_ADDON_MANAGEMENT, ECS_FARGATE_AGENT_MANAGEMENT # status: "ENABLED", # accepts ENABLED, DISABLED # }, # ], # }, # ], @@ -1563,14 +1563,14 @@ # resp.member_account_limit_reached #=> Boolean # resp.data_sources.s3_logs.auto_enable #=> Boolean # resp.data_sources.kubernetes.audit_logs.auto_enable #=> Boolean # resp.data_sources.malware_protection.scan_ec2_instance_with_findings.ebs_volumes.auto_enable #=> Boolean # resp.features #=> Array - # resp.features[0].name #=> String, one of "S3_DATA_EVENTS", "EKS_AUDIT_LOGS", "EBS_MALWARE_PROTECTION", "RDS_LOGIN_EVENTS", "EKS_RUNTIME_MONITORING", "LAMBDA_NETWORK_LOGS" + # resp.features[0].name #=> String, one of "S3_DATA_EVENTS", "EKS_AUDIT_LOGS", "EBS_MALWARE_PROTECTION", "RDS_LOGIN_EVENTS", "EKS_RUNTIME_MONITORING", "LAMBDA_NETWORK_LOGS", "RUNTIME_MONITORING" # resp.features[0].auto_enable #=> String, one of "NEW", "NONE", "ALL" # resp.features[0].additional_configuration #=> Array - # resp.features[0].additional_configuration[0].name #=> String, one of "EKS_ADDON_MANAGEMENT" + # resp.features[0].additional_configuration[0].name #=> String, one of "EKS_ADDON_MANAGEMENT", "ECS_FARGATE_AGENT_MANAGEMENT" # resp.features[0].additional_configuration[0].auto_enable #=> String, one of "NEW", "NONE", "ALL" # resp.next_token #=> String # resp.auto_enable_organization_members #=> String, one of "NEW", "ALL", "NONE" # # @see http://docs.aws.amazon.com/goto/WebAPI/guardduty-2017-11-28/DescribeOrganizationConfiguration AWS API Documentation @@ -1874,11 +1874,11 @@ # resp = client.get_coverage_statistics({ # detector_id: "DetectorId", # required # filter_criteria: { # filter_criterion: [ # { - # criterion_key: "ACCOUNT_ID", # accepts ACCOUNT_ID, CLUSTER_NAME, RESOURCE_TYPE, COVERAGE_STATUS, ADDON_VERSION, MANAGEMENT_TYPE, EKS_CLUSTER_NAME + # criterion_key: "ACCOUNT_ID", # accepts ACCOUNT_ID, CLUSTER_NAME, RESOURCE_TYPE, COVERAGE_STATUS, ADDON_VERSION, MANAGEMENT_TYPE, EKS_CLUSTER_NAME, ECS_CLUSTER_NAME, AGENT_VERSION, INSTANCE_ID, CLUSTER_ARN # filter_condition: { # equals: ["String"], # not_equals: ["String"], # }, # }, @@ -1950,15 +1950,15 @@ # resp.data_sources.malware_protection.scan_ec2_instance_with_findings.ebs_volumes.reason #=> String # resp.data_sources.malware_protection.service_role #=> String # resp.tags #=> Hash # resp.tags["TagKey"] #=> String # resp.features #=> Array - # resp.features[0].name #=> String, one of "FLOW_LOGS", "CLOUD_TRAIL", "DNS_LOGS", "S3_DATA_EVENTS", "EKS_AUDIT_LOGS", "EBS_MALWARE_PROTECTION", "RDS_LOGIN_EVENTS", "EKS_RUNTIME_MONITORING", "LAMBDA_NETWORK_LOGS" + # resp.features[0].name #=> String, one of "FLOW_LOGS", "CLOUD_TRAIL", "DNS_LOGS", "S3_DATA_EVENTS", "EKS_AUDIT_LOGS", "EBS_MALWARE_PROTECTION", "RDS_LOGIN_EVENTS", "EKS_RUNTIME_MONITORING", "LAMBDA_NETWORK_LOGS", "RUNTIME_MONITORING" # resp.features[0].status #=> String, one of "ENABLED", "DISABLED" # resp.features[0].updated_at #=> Time # resp.features[0].additional_configuration #=> Array - # resp.features[0].additional_configuration[0].name #=> String, one of "EKS_ADDON_MANAGEMENT" + # resp.features[0].additional_configuration[0].name #=> String, one of "EKS_ADDON_MANAGEMENT", "ECS_FARGATE_AGENT_MANAGEMENT" # resp.features[0].additional_configuration[0].status #=> String, one of "ENABLED", "DISABLED" # resp.features[0].additional_configuration[0].updated_at #=> Time # # @see http://docs.aws.amazon.com/goto/WebAPI/guardduty-2017-11-28/GetDetector AWS API Documentation # @@ -2754,15 +2754,15 @@ # resp.member_data_source_configurations[0].data_sources.kubernetes.audit_logs.status #=> String, one of "ENABLED", "DISABLED" # resp.member_data_source_configurations[0].data_sources.malware_protection.scan_ec2_instance_with_findings.ebs_volumes.status #=> String, one of "ENABLED", "DISABLED" # resp.member_data_source_configurations[0].data_sources.malware_protection.scan_ec2_instance_with_findings.ebs_volumes.reason #=> String # resp.member_data_source_configurations[0].data_sources.malware_protection.service_role #=> String # resp.member_data_source_configurations[0].features #=> Array - # resp.member_data_source_configurations[0].features[0].name #=> String, one of "S3_DATA_EVENTS", "EKS_AUDIT_LOGS", "EBS_MALWARE_PROTECTION", "RDS_LOGIN_EVENTS", "EKS_RUNTIME_MONITORING", "LAMBDA_NETWORK_LOGS" + # resp.member_data_source_configurations[0].features[0].name #=> String, one of "S3_DATA_EVENTS", "EKS_AUDIT_LOGS", "EBS_MALWARE_PROTECTION", "RDS_LOGIN_EVENTS", "EKS_RUNTIME_MONITORING", "LAMBDA_NETWORK_LOGS", "RUNTIME_MONITORING" # resp.member_data_source_configurations[0].features[0].status #=> String, one of "ENABLED", "DISABLED" # resp.member_data_source_configurations[0].features[0].updated_at #=> Time # resp.member_data_source_configurations[0].features[0].additional_configuration #=> Array - # resp.member_data_source_configurations[0].features[0].additional_configuration[0].name #=> String, one of "EKS_ADDON_MANAGEMENT" + # resp.member_data_source_configurations[0].features[0].additional_configuration[0].name #=> String, one of "EKS_ADDON_MANAGEMENT", "ECS_FARGATE_AGENT_MANAGEMENT" # resp.member_data_source_configurations[0].features[0].additional_configuration[0].status #=> String, one of "ENABLED", "DISABLED" # resp.member_data_source_configurations[0].features[0].additional_configuration[0].updated_at #=> Time # resp.unprocessed_accounts #=> Array # resp.unprocessed_accounts[0].account_id #=> String # resp.unprocessed_accounts[0].result #=> String @@ -2853,11 +2853,11 @@ # resp.accounts[0].data_sources.flow_logs.free_trial_days_remaining #=> Integer # resp.accounts[0].data_sources.s3_logs.free_trial_days_remaining #=> Integer # resp.accounts[0].data_sources.kubernetes.audit_logs.free_trial_days_remaining #=> Integer # resp.accounts[0].data_sources.malware_protection.scan_ec2_instance_with_findings.free_trial_days_remaining #=> Integer # resp.accounts[0].features #=> Array - # resp.accounts[0].features[0].name #=> String, one of "FLOW_LOGS", "CLOUD_TRAIL", "DNS_LOGS", "S3_DATA_EVENTS", "EKS_AUDIT_LOGS", "EBS_MALWARE_PROTECTION", "RDS_LOGIN_EVENTS", "EKS_RUNTIME_MONITORING", "LAMBDA_NETWORK_LOGS" + # resp.accounts[0].features[0].name #=> String, one of "FLOW_LOGS", "CLOUD_TRAIL", "DNS_LOGS", "S3_DATA_EVENTS", "EKS_AUDIT_LOGS", "EBS_MALWARE_PROTECTION", "RDS_LOGIN_EVENTS", "EKS_RUNTIME_MONITORING", "LAMBDA_NETWORK_LOGS", "FARGATE_RUNTIME_MONITORING", "EC2_RUNTIME_MONITORING" # resp.accounts[0].features[0].free_trial_days_remaining #=> Integer # resp.unprocessed_accounts #=> Array # resp.unprocessed_accounts[0].account_id #=> String # resp.unprocessed_accounts[0].result #=> String # @@ -2962,11 +2962,11 @@ # usage_statistic_type: "SUM_BY_ACCOUNT", # required, accepts SUM_BY_ACCOUNT, SUM_BY_DATA_SOURCE, SUM_BY_RESOURCE, TOP_RESOURCES, SUM_BY_FEATURES # usage_criteria: { # required # account_ids: ["AccountId"], # data_sources: ["FLOW_LOGS"], # accepts FLOW_LOGS, CLOUD_TRAIL, DNS_LOGS, S3_LOGS, KUBERNETES_AUDIT_LOGS, EC2_MALWARE_SCAN # resources: ["String"], - # features: ["FLOW_LOGS"], # accepts FLOW_LOGS, CLOUD_TRAIL, DNS_LOGS, S3_DATA_EVENTS, EKS_AUDIT_LOGS, EBS_MALWARE_PROTECTION, RDS_LOGIN_EVENTS, LAMBDA_NETWORK_LOGS, EKS_RUNTIME_MONITORING + # features: ["FLOW_LOGS"], # accepts FLOW_LOGS, CLOUD_TRAIL, DNS_LOGS, S3_DATA_EVENTS, EKS_AUDIT_LOGS, EBS_MALWARE_PROTECTION, RDS_LOGIN_EVENTS, LAMBDA_NETWORK_LOGS, EKS_RUNTIME_MONITORING, FARGATE_RUNTIME_MONITORING, EC2_RUNTIME_MONITORING # }, # unit: "String", # max_results: 1, # next_token: "String", # }) @@ -2988,11 +2988,11 @@ # resp.usage_statistics.top_resources #=> Array # resp.usage_statistics.top_resources[0].resource #=> String # resp.usage_statistics.top_resources[0].total.amount #=> String # resp.usage_statistics.top_resources[0].total.unit #=> String # resp.usage_statistics.sum_by_feature #=> Array - # resp.usage_statistics.sum_by_feature[0].feature #=> String, one of "FLOW_LOGS", "CLOUD_TRAIL", "DNS_LOGS", "S3_DATA_EVENTS", "EKS_AUDIT_LOGS", "EBS_MALWARE_PROTECTION", "RDS_LOGIN_EVENTS", "LAMBDA_NETWORK_LOGS", "EKS_RUNTIME_MONITORING" + # resp.usage_statistics.sum_by_feature[0].feature #=> String, one of "FLOW_LOGS", "CLOUD_TRAIL", "DNS_LOGS", "S3_DATA_EVENTS", "EKS_AUDIT_LOGS", "EBS_MALWARE_PROTECTION", "RDS_LOGIN_EVENTS", "LAMBDA_NETWORK_LOGS", "EKS_RUNTIME_MONITORING", "FARGATE_RUNTIME_MONITORING", "EC2_RUNTIME_MONITORING" # resp.usage_statistics.sum_by_feature[0].total.amount #=> String # resp.usage_statistics.sum_by_feature[0].total.unit #=> String # resp.next_token #=> String # # @see http://docs.aws.amazon.com/goto/WebAPI/guardduty-2017-11-28/GetUsageStatistics AWS API Documentation @@ -3122,20 +3122,20 @@ # next_token: "String", # max_results: 1, # filter_criteria: { # filter_criterion: [ # { - # criterion_key: "ACCOUNT_ID", # accepts ACCOUNT_ID, CLUSTER_NAME, RESOURCE_TYPE, COVERAGE_STATUS, ADDON_VERSION, MANAGEMENT_TYPE, EKS_CLUSTER_NAME + # criterion_key: "ACCOUNT_ID", # accepts ACCOUNT_ID, CLUSTER_NAME, RESOURCE_TYPE, COVERAGE_STATUS, ADDON_VERSION, MANAGEMENT_TYPE, EKS_CLUSTER_NAME, ECS_CLUSTER_NAME, AGENT_VERSION, INSTANCE_ID, CLUSTER_ARN # filter_condition: { # equals: ["String"], # not_equals: ["String"], # }, # }, # ], # }, # sort_criteria: { - # attribute_name: "ACCOUNT_ID", # accepts ACCOUNT_ID, CLUSTER_NAME, COVERAGE_STATUS, ISSUE, ADDON_VERSION, UPDATED_AT, EKS_CLUSTER_NAME + # attribute_name: "ACCOUNT_ID", # accepts ACCOUNT_ID, CLUSTER_NAME, COVERAGE_STATUS, ISSUE, ADDON_VERSION, UPDATED_AT, EKS_CLUSTER_NAME, ECS_CLUSTER_NAME, INSTANCE_ID # order_by: "ASC", # accepts ASC, DESC # }, # }) # # @example Response structure @@ -3147,12 +3147,23 @@ # resp.resources[0].resource_details.eks_cluster_details.cluster_name #=> String # resp.resources[0].resource_details.eks_cluster_details.covered_nodes #=> Integer # resp.resources[0].resource_details.eks_cluster_details.compatible_nodes #=> Integer # resp.resources[0].resource_details.eks_cluster_details.addon_details.addon_version #=> String # resp.resources[0].resource_details.eks_cluster_details.addon_details.addon_status #=> String - # resp.resources[0].resource_details.eks_cluster_details.management_type #=> String, one of "AUTO_MANAGED", "MANUAL" - # resp.resources[0].resource_details.resource_type #=> String, one of "EKS" + # resp.resources[0].resource_details.eks_cluster_details.management_type #=> String, one of "AUTO_MANAGED", "MANUAL", "DISABLED" + # resp.resources[0].resource_details.resource_type #=> String, one of "EKS", "ECS", "EC2" + # resp.resources[0].resource_details.ecs_cluster_details.cluster_name #=> String + # resp.resources[0].resource_details.ecs_cluster_details.fargate_details.issues #=> Array + # resp.resources[0].resource_details.ecs_cluster_details.fargate_details.issues[0] #=> String + # resp.resources[0].resource_details.ecs_cluster_details.fargate_details.management_type #=> String, one of "AUTO_MANAGED", "MANUAL", "DISABLED" + # resp.resources[0].resource_details.ecs_cluster_details.container_instance_details.covered_container_instances #=> Integer + # resp.resources[0].resource_details.ecs_cluster_details.container_instance_details.compatible_container_instances #=> Integer + # resp.resources[0].resource_details.ec2_instance_details.instance_id #=> String + # resp.resources[0].resource_details.ec2_instance_details.instance_type #=> String + # resp.resources[0].resource_details.ec2_instance_details.cluster_arn #=> String + # resp.resources[0].resource_details.ec2_instance_details.agent_details.version #=> String + # resp.resources[0].resource_details.ec2_instance_details.management_type #=> String, one of "AUTO_MANAGED", "MANUAL", "DISABLED" # resp.resources[0].coverage_status #=> String, one of "HEALTHY", "UNHEALTHY" # resp.resources[0].issue #=> String # resp.resources[0].updated_at #=> Time # resp.next_token #=> String # @@ -4033,15 +4044,15 @@ # }, # }, # }, # features: [ # { - # name: "S3_DATA_EVENTS", # accepts S3_DATA_EVENTS, EKS_AUDIT_LOGS, EBS_MALWARE_PROTECTION, RDS_LOGIN_EVENTS, EKS_RUNTIME_MONITORING, LAMBDA_NETWORK_LOGS + # name: "S3_DATA_EVENTS", # accepts S3_DATA_EVENTS, EKS_AUDIT_LOGS, EBS_MALWARE_PROTECTION, RDS_LOGIN_EVENTS, EKS_RUNTIME_MONITORING, LAMBDA_NETWORK_LOGS, RUNTIME_MONITORING # status: "ENABLED", # accepts ENABLED, DISABLED # additional_configuration: [ # { - # name: "EKS_ADDON_MANAGEMENT", # accepts EKS_ADDON_MANAGEMENT + # name: "EKS_ADDON_MANAGEMENT", # accepts EKS_ADDON_MANAGEMENT, ECS_FARGATE_AGENT_MANAGEMENT # status: "ENABLED", # accepts ENABLED, DISABLED # }, # ], # }, # ], @@ -4315,15 +4326,15 @@ # }, # }, # }, # features: [ # { - # name: "S3_DATA_EVENTS", # accepts S3_DATA_EVENTS, EKS_AUDIT_LOGS, EBS_MALWARE_PROTECTION, RDS_LOGIN_EVENTS, EKS_RUNTIME_MONITORING, LAMBDA_NETWORK_LOGS + # name: "S3_DATA_EVENTS", # accepts S3_DATA_EVENTS, EKS_AUDIT_LOGS, EBS_MALWARE_PROTECTION, RDS_LOGIN_EVENTS, EKS_RUNTIME_MONITORING, LAMBDA_NETWORK_LOGS, RUNTIME_MONITORING # status: "ENABLED", # accepts ENABLED, DISABLED # additional_configuration: [ # { - # name: "EKS_ADDON_MANAGEMENT", # accepts EKS_ADDON_MANAGEMENT + # name: "EKS_ADDON_MANAGEMENT", # accepts EKS_ADDON_MANAGEMENT, ECS_FARGATE_AGENT_MANAGEMENT # status: "ENABLED", # accepts ENABLED, DISABLED # }, # ], # }, # ], @@ -4422,15 +4433,15 @@ # }, # }, # }, # features: [ # { - # name: "S3_DATA_EVENTS", # accepts S3_DATA_EVENTS, EKS_AUDIT_LOGS, EBS_MALWARE_PROTECTION, RDS_LOGIN_EVENTS, EKS_RUNTIME_MONITORING, LAMBDA_NETWORK_LOGS + # name: "S3_DATA_EVENTS", # accepts S3_DATA_EVENTS, EKS_AUDIT_LOGS, EBS_MALWARE_PROTECTION, RDS_LOGIN_EVENTS, EKS_RUNTIME_MONITORING, LAMBDA_NETWORK_LOGS, RUNTIME_MONITORING # auto_enable: "NEW", # accepts NEW, NONE, ALL # additional_configuration: [ # { - # name: "EKS_ADDON_MANAGEMENT", # accepts EKS_ADDON_MANAGEMENT + # name: "EKS_ADDON_MANAGEMENT", # accepts EKS_ADDON_MANAGEMENT, ECS_FARGATE_AGENT_MANAGEMENT # auto_enable: "NEW", # accepts NEW, NONE, ALL # }, # ], # }, # ], @@ -4535,10 +4546,10 @@ operation: config.api.operation(operation_name), client: self, params: params, config: config) context[:gem_name] = 'aws-sdk-guardduty' - context[:gem_version] = '1.83.0' + context[:gem_version] = '1.84.0' Seahorse::Client::Request.new(handlers, context) end # @api private # @deprecated