lib/aws-sdk-guardduty/client.rb in aws-sdk-guardduty-1.83.0 vs lib/aws-sdk-guardduty/client.rb in aws-sdk-guardduty-1.84.0
- old
+ new
@@ -561,15 +561,15 @@
# tags: {
# "TagKey" => "TagValue",
# },
# features: [
# {
- # name: "S3_DATA_EVENTS", # accepts S3_DATA_EVENTS, EKS_AUDIT_LOGS, EBS_MALWARE_PROTECTION, RDS_LOGIN_EVENTS, EKS_RUNTIME_MONITORING, LAMBDA_NETWORK_LOGS
+ # name: "S3_DATA_EVENTS", # accepts S3_DATA_EVENTS, EKS_AUDIT_LOGS, EBS_MALWARE_PROTECTION, RDS_LOGIN_EVENTS, EKS_RUNTIME_MONITORING, LAMBDA_NETWORK_LOGS, RUNTIME_MONITORING
# status: "ENABLED", # accepts ENABLED, DISABLED
# additional_configuration: [
# {
- # name: "EKS_ADDON_MANAGEMENT", # accepts EKS_ADDON_MANAGEMENT
+ # name: "EKS_ADDON_MANAGEMENT", # accepts EKS_ADDON_MANAGEMENT, ECS_FARGATE_AGENT_MANAGEMENT
# status: "ENABLED", # accepts ENABLED, DISABLED
# },
# ],
# },
# ],
@@ -1563,14 +1563,14 @@
# resp.member_account_limit_reached #=> Boolean
# resp.data_sources.s3_logs.auto_enable #=> Boolean
# resp.data_sources.kubernetes.audit_logs.auto_enable #=> Boolean
# resp.data_sources.malware_protection.scan_ec2_instance_with_findings.ebs_volumes.auto_enable #=> Boolean
# resp.features #=> Array
- # resp.features[0].name #=> String, one of "S3_DATA_EVENTS", "EKS_AUDIT_LOGS", "EBS_MALWARE_PROTECTION", "RDS_LOGIN_EVENTS", "EKS_RUNTIME_MONITORING", "LAMBDA_NETWORK_LOGS"
+ # resp.features[0].name #=> String, one of "S3_DATA_EVENTS", "EKS_AUDIT_LOGS", "EBS_MALWARE_PROTECTION", "RDS_LOGIN_EVENTS", "EKS_RUNTIME_MONITORING", "LAMBDA_NETWORK_LOGS", "RUNTIME_MONITORING"
# resp.features[0].auto_enable #=> String, one of "NEW", "NONE", "ALL"
# resp.features[0].additional_configuration #=> Array
- # resp.features[0].additional_configuration[0].name #=> String, one of "EKS_ADDON_MANAGEMENT"
+ # resp.features[0].additional_configuration[0].name #=> String, one of "EKS_ADDON_MANAGEMENT", "ECS_FARGATE_AGENT_MANAGEMENT"
# resp.features[0].additional_configuration[0].auto_enable #=> String, one of "NEW", "NONE", "ALL"
# resp.next_token #=> String
# resp.auto_enable_organization_members #=> String, one of "NEW", "ALL", "NONE"
#
# @see http://docs.aws.amazon.com/goto/WebAPI/guardduty-2017-11-28/DescribeOrganizationConfiguration AWS API Documentation
@@ -1874,11 +1874,11 @@
# resp = client.get_coverage_statistics({
# detector_id: "DetectorId", # required
# filter_criteria: {
# filter_criterion: [
# {
- # criterion_key: "ACCOUNT_ID", # accepts ACCOUNT_ID, CLUSTER_NAME, RESOURCE_TYPE, COVERAGE_STATUS, ADDON_VERSION, MANAGEMENT_TYPE, EKS_CLUSTER_NAME
+ # criterion_key: "ACCOUNT_ID", # accepts ACCOUNT_ID, CLUSTER_NAME, RESOURCE_TYPE, COVERAGE_STATUS, ADDON_VERSION, MANAGEMENT_TYPE, EKS_CLUSTER_NAME, ECS_CLUSTER_NAME, AGENT_VERSION, INSTANCE_ID, CLUSTER_ARN
# filter_condition: {
# equals: ["String"],
# not_equals: ["String"],
# },
# },
@@ -1950,15 +1950,15 @@
# resp.data_sources.malware_protection.scan_ec2_instance_with_findings.ebs_volumes.reason #=> String
# resp.data_sources.malware_protection.service_role #=> String
# resp.tags #=> Hash
# resp.tags["TagKey"] #=> String
# resp.features #=> Array
- # resp.features[0].name #=> String, one of "FLOW_LOGS", "CLOUD_TRAIL", "DNS_LOGS", "S3_DATA_EVENTS", "EKS_AUDIT_LOGS", "EBS_MALWARE_PROTECTION", "RDS_LOGIN_EVENTS", "EKS_RUNTIME_MONITORING", "LAMBDA_NETWORK_LOGS"
+ # resp.features[0].name #=> String, one of "FLOW_LOGS", "CLOUD_TRAIL", "DNS_LOGS", "S3_DATA_EVENTS", "EKS_AUDIT_LOGS", "EBS_MALWARE_PROTECTION", "RDS_LOGIN_EVENTS", "EKS_RUNTIME_MONITORING", "LAMBDA_NETWORK_LOGS", "RUNTIME_MONITORING"
# resp.features[0].status #=> String, one of "ENABLED", "DISABLED"
# resp.features[0].updated_at #=> Time
# resp.features[0].additional_configuration #=> Array
- # resp.features[0].additional_configuration[0].name #=> String, one of "EKS_ADDON_MANAGEMENT"
+ # resp.features[0].additional_configuration[0].name #=> String, one of "EKS_ADDON_MANAGEMENT", "ECS_FARGATE_AGENT_MANAGEMENT"
# resp.features[0].additional_configuration[0].status #=> String, one of "ENABLED", "DISABLED"
# resp.features[0].additional_configuration[0].updated_at #=> Time
#
# @see http://docs.aws.amazon.com/goto/WebAPI/guardduty-2017-11-28/GetDetector AWS API Documentation
#
@@ -2754,15 +2754,15 @@
# resp.member_data_source_configurations[0].data_sources.kubernetes.audit_logs.status #=> String, one of "ENABLED", "DISABLED"
# resp.member_data_source_configurations[0].data_sources.malware_protection.scan_ec2_instance_with_findings.ebs_volumes.status #=> String, one of "ENABLED", "DISABLED"
# resp.member_data_source_configurations[0].data_sources.malware_protection.scan_ec2_instance_with_findings.ebs_volumes.reason #=> String
# resp.member_data_source_configurations[0].data_sources.malware_protection.service_role #=> String
# resp.member_data_source_configurations[0].features #=> Array
- # resp.member_data_source_configurations[0].features[0].name #=> String, one of "S3_DATA_EVENTS", "EKS_AUDIT_LOGS", "EBS_MALWARE_PROTECTION", "RDS_LOGIN_EVENTS", "EKS_RUNTIME_MONITORING", "LAMBDA_NETWORK_LOGS"
+ # resp.member_data_source_configurations[0].features[0].name #=> String, one of "S3_DATA_EVENTS", "EKS_AUDIT_LOGS", "EBS_MALWARE_PROTECTION", "RDS_LOGIN_EVENTS", "EKS_RUNTIME_MONITORING", "LAMBDA_NETWORK_LOGS", "RUNTIME_MONITORING"
# resp.member_data_source_configurations[0].features[0].status #=> String, one of "ENABLED", "DISABLED"
# resp.member_data_source_configurations[0].features[0].updated_at #=> Time
# resp.member_data_source_configurations[0].features[0].additional_configuration #=> Array
- # resp.member_data_source_configurations[0].features[0].additional_configuration[0].name #=> String, one of "EKS_ADDON_MANAGEMENT"
+ # resp.member_data_source_configurations[0].features[0].additional_configuration[0].name #=> String, one of "EKS_ADDON_MANAGEMENT", "ECS_FARGATE_AGENT_MANAGEMENT"
# resp.member_data_source_configurations[0].features[0].additional_configuration[0].status #=> String, one of "ENABLED", "DISABLED"
# resp.member_data_source_configurations[0].features[0].additional_configuration[0].updated_at #=> Time
# resp.unprocessed_accounts #=> Array
# resp.unprocessed_accounts[0].account_id #=> String
# resp.unprocessed_accounts[0].result #=> String
@@ -2853,11 +2853,11 @@
# resp.accounts[0].data_sources.flow_logs.free_trial_days_remaining #=> Integer
# resp.accounts[0].data_sources.s3_logs.free_trial_days_remaining #=> Integer
# resp.accounts[0].data_sources.kubernetes.audit_logs.free_trial_days_remaining #=> Integer
# resp.accounts[0].data_sources.malware_protection.scan_ec2_instance_with_findings.free_trial_days_remaining #=> Integer
# resp.accounts[0].features #=> Array
- # resp.accounts[0].features[0].name #=> String, one of "FLOW_LOGS", "CLOUD_TRAIL", "DNS_LOGS", "S3_DATA_EVENTS", "EKS_AUDIT_LOGS", "EBS_MALWARE_PROTECTION", "RDS_LOGIN_EVENTS", "EKS_RUNTIME_MONITORING", "LAMBDA_NETWORK_LOGS"
+ # resp.accounts[0].features[0].name #=> String, one of "FLOW_LOGS", "CLOUD_TRAIL", "DNS_LOGS", "S3_DATA_EVENTS", "EKS_AUDIT_LOGS", "EBS_MALWARE_PROTECTION", "RDS_LOGIN_EVENTS", "EKS_RUNTIME_MONITORING", "LAMBDA_NETWORK_LOGS", "FARGATE_RUNTIME_MONITORING", "EC2_RUNTIME_MONITORING"
# resp.accounts[0].features[0].free_trial_days_remaining #=> Integer
# resp.unprocessed_accounts #=> Array
# resp.unprocessed_accounts[0].account_id #=> String
# resp.unprocessed_accounts[0].result #=> String
#
@@ -2962,11 +2962,11 @@
# usage_statistic_type: "SUM_BY_ACCOUNT", # required, accepts SUM_BY_ACCOUNT, SUM_BY_DATA_SOURCE, SUM_BY_RESOURCE, TOP_RESOURCES, SUM_BY_FEATURES
# usage_criteria: { # required
# account_ids: ["AccountId"],
# data_sources: ["FLOW_LOGS"], # accepts FLOW_LOGS, CLOUD_TRAIL, DNS_LOGS, S3_LOGS, KUBERNETES_AUDIT_LOGS, EC2_MALWARE_SCAN
# resources: ["String"],
- # features: ["FLOW_LOGS"], # accepts FLOW_LOGS, CLOUD_TRAIL, DNS_LOGS, S3_DATA_EVENTS, EKS_AUDIT_LOGS, EBS_MALWARE_PROTECTION, RDS_LOGIN_EVENTS, LAMBDA_NETWORK_LOGS, EKS_RUNTIME_MONITORING
+ # features: ["FLOW_LOGS"], # accepts FLOW_LOGS, CLOUD_TRAIL, DNS_LOGS, S3_DATA_EVENTS, EKS_AUDIT_LOGS, EBS_MALWARE_PROTECTION, RDS_LOGIN_EVENTS, LAMBDA_NETWORK_LOGS, EKS_RUNTIME_MONITORING, FARGATE_RUNTIME_MONITORING, EC2_RUNTIME_MONITORING
# },
# unit: "String",
# max_results: 1,
# next_token: "String",
# })
@@ -2988,11 +2988,11 @@
# resp.usage_statistics.top_resources #=> Array
# resp.usage_statistics.top_resources[0].resource #=> String
# resp.usage_statistics.top_resources[0].total.amount #=> String
# resp.usage_statistics.top_resources[0].total.unit #=> String
# resp.usage_statistics.sum_by_feature #=> Array
- # resp.usage_statistics.sum_by_feature[0].feature #=> String, one of "FLOW_LOGS", "CLOUD_TRAIL", "DNS_LOGS", "S3_DATA_EVENTS", "EKS_AUDIT_LOGS", "EBS_MALWARE_PROTECTION", "RDS_LOGIN_EVENTS", "LAMBDA_NETWORK_LOGS", "EKS_RUNTIME_MONITORING"
+ # resp.usage_statistics.sum_by_feature[0].feature #=> String, one of "FLOW_LOGS", "CLOUD_TRAIL", "DNS_LOGS", "S3_DATA_EVENTS", "EKS_AUDIT_LOGS", "EBS_MALWARE_PROTECTION", "RDS_LOGIN_EVENTS", "LAMBDA_NETWORK_LOGS", "EKS_RUNTIME_MONITORING", "FARGATE_RUNTIME_MONITORING", "EC2_RUNTIME_MONITORING"
# resp.usage_statistics.sum_by_feature[0].total.amount #=> String
# resp.usage_statistics.sum_by_feature[0].total.unit #=> String
# resp.next_token #=> String
#
# @see http://docs.aws.amazon.com/goto/WebAPI/guardduty-2017-11-28/GetUsageStatistics AWS API Documentation
@@ -3122,20 +3122,20 @@
# next_token: "String",
# max_results: 1,
# filter_criteria: {
# filter_criterion: [
# {
- # criterion_key: "ACCOUNT_ID", # accepts ACCOUNT_ID, CLUSTER_NAME, RESOURCE_TYPE, COVERAGE_STATUS, ADDON_VERSION, MANAGEMENT_TYPE, EKS_CLUSTER_NAME
+ # criterion_key: "ACCOUNT_ID", # accepts ACCOUNT_ID, CLUSTER_NAME, RESOURCE_TYPE, COVERAGE_STATUS, ADDON_VERSION, MANAGEMENT_TYPE, EKS_CLUSTER_NAME, ECS_CLUSTER_NAME, AGENT_VERSION, INSTANCE_ID, CLUSTER_ARN
# filter_condition: {
# equals: ["String"],
# not_equals: ["String"],
# },
# },
# ],
# },
# sort_criteria: {
- # attribute_name: "ACCOUNT_ID", # accepts ACCOUNT_ID, CLUSTER_NAME, COVERAGE_STATUS, ISSUE, ADDON_VERSION, UPDATED_AT, EKS_CLUSTER_NAME
+ # attribute_name: "ACCOUNT_ID", # accepts ACCOUNT_ID, CLUSTER_NAME, COVERAGE_STATUS, ISSUE, ADDON_VERSION, UPDATED_AT, EKS_CLUSTER_NAME, ECS_CLUSTER_NAME, INSTANCE_ID
# order_by: "ASC", # accepts ASC, DESC
# },
# })
#
# @example Response structure
@@ -3147,12 +3147,23 @@
# resp.resources[0].resource_details.eks_cluster_details.cluster_name #=> String
# resp.resources[0].resource_details.eks_cluster_details.covered_nodes #=> Integer
# resp.resources[0].resource_details.eks_cluster_details.compatible_nodes #=> Integer
# resp.resources[0].resource_details.eks_cluster_details.addon_details.addon_version #=> String
# resp.resources[0].resource_details.eks_cluster_details.addon_details.addon_status #=> String
- # resp.resources[0].resource_details.eks_cluster_details.management_type #=> String, one of "AUTO_MANAGED", "MANUAL"
- # resp.resources[0].resource_details.resource_type #=> String, one of "EKS"
+ # resp.resources[0].resource_details.eks_cluster_details.management_type #=> String, one of "AUTO_MANAGED", "MANUAL", "DISABLED"
+ # resp.resources[0].resource_details.resource_type #=> String, one of "EKS", "ECS", "EC2"
+ # resp.resources[0].resource_details.ecs_cluster_details.cluster_name #=> String
+ # resp.resources[0].resource_details.ecs_cluster_details.fargate_details.issues #=> Array
+ # resp.resources[0].resource_details.ecs_cluster_details.fargate_details.issues[0] #=> String
+ # resp.resources[0].resource_details.ecs_cluster_details.fargate_details.management_type #=> String, one of "AUTO_MANAGED", "MANUAL", "DISABLED"
+ # resp.resources[0].resource_details.ecs_cluster_details.container_instance_details.covered_container_instances #=> Integer
+ # resp.resources[0].resource_details.ecs_cluster_details.container_instance_details.compatible_container_instances #=> Integer
+ # resp.resources[0].resource_details.ec2_instance_details.instance_id #=> String
+ # resp.resources[0].resource_details.ec2_instance_details.instance_type #=> String
+ # resp.resources[0].resource_details.ec2_instance_details.cluster_arn #=> String
+ # resp.resources[0].resource_details.ec2_instance_details.agent_details.version #=> String
+ # resp.resources[0].resource_details.ec2_instance_details.management_type #=> String, one of "AUTO_MANAGED", "MANUAL", "DISABLED"
# resp.resources[0].coverage_status #=> String, one of "HEALTHY", "UNHEALTHY"
# resp.resources[0].issue #=> String
# resp.resources[0].updated_at #=> Time
# resp.next_token #=> String
#
@@ -4033,15 +4044,15 @@
# },
# },
# },
# features: [
# {
- # name: "S3_DATA_EVENTS", # accepts S3_DATA_EVENTS, EKS_AUDIT_LOGS, EBS_MALWARE_PROTECTION, RDS_LOGIN_EVENTS, EKS_RUNTIME_MONITORING, LAMBDA_NETWORK_LOGS
+ # name: "S3_DATA_EVENTS", # accepts S3_DATA_EVENTS, EKS_AUDIT_LOGS, EBS_MALWARE_PROTECTION, RDS_LOGIN_EVENTS, EKS_RUNTIME_MONITORING, LAMBDA_NETWORK_LOGS, RUNTIME_MONITORING
# status: "ENABLED", # accepts ENABLED, DISABLED
# additional_configuration: [
# {
- # name: "EKS_ADDON_MANAGEMENT", # accepts EKS_ADDON_MANAGEMENT
+ # name: "EKS_ADDON_MANAGEMENT", # accepts EKS_ADDON_MANAGEMENT, ECS_FARGATE_AGENT_MANAGEMENT
# status: "ENABLED", # accepts ENABLED, DISABLED
# },
# ],
# },
# ],
@@ -4315,15 +4326,15 @@
# },
# },
# },
# features: [
# {
- # name: "S3_DATA_EVENTS", # accepts S3_DATA_EVENTS, EKS_AUDIT_LOGS, EBS_MALWARE_PROTECTION, RDS_LOGIN_EVENTS, EKS_RUNTIME_MONITORING, LAMBDA_NETWORK_LOGS
+ # name: "S3_DATA_EVENTS", # accepts S3_DATA_EVENTS, EKS_AUDIT_LOGS, EBS_MALWARE_PROTECTION, RDS_LOGIN_EVENTS, EKS_RUNTIME_MONITORING, LAMBDA_NETWORK_LOGS, RUNTIME_MONITORING
# status: "ENABLED", # accepts ENABLED, DISABLED
# additional_configuration: [
# {
- # name: "EKS_ADDON_MANAGEMENT", # accepts EKS_ADDON_MANAGEMENT
+ # name: "EKS_ADDON_MANAGEMENT", # accepts EKS_ADDON_MANAGEMENT, ECS_FARGATE_AGENT_MANAGEMENT
# status: "ENABLED", # accepts ENABLED, DISABLED
# },
# ],
# },
# ],
@@ -4422,15 +4433,15 @@
# },
# },
# },
# features: [
# {
- # name: "S3_DATA_EVENTS", # accepts S3_DATA_EVENTS, EKS_AUDIT_LOGS, EBS_MALWARE_PROTECTION, RDS_LOGIN_EVENTS, EKS_RUNTIME_MONITORING, LAMBDA_NETWORK_LOGS
+ # name: "S3_DATA_EVENTS", # accepts S3_DATA_EVENTS, EKS_AUDIT_LOGS, EBS_MALWARE_PROTECTION, RDS_LOGIN_EVENTS, EKS_RUNTIME_MONITORING, LAMBDA_NETWORK_LOGS, RUNTIME_MONITORING
# auto_enable: "NEW", # accepts NEW, NONE, ALL
# additional_configuration: [
# {
- # name: "EKS_ADDON_MANAGEMENT", # accepts EKS_ADDON_MANAGEMENT
+ # name: "EKS_ADDON_MANAGEMENT", # accepts EKS_ADDON_MANAGEMENT, ECS_FARGATE_AGENT_MANAGEMENT
# auto_enable: "NEW", # accepts NEW, NONE, ALL
# },
# ],
# },
# ],
@@ -4535,10 +4546,10 @@
operation: config.api.operation(operation_name),
client: self,
params: params,
config: config)
context[:gem_name] = 'aws-sdk-guardduty'
- context[:gem_version] = '1.83.0'
+ context[:gem_version] = '1.84.0'
Seahorse::Client::Request.new(handlers, context)
end
# @api private
# @deprecated