aws-sdk-guardduty 1.66.0 → 1.67.0

Sign up to get free protection for your applications and to get access to all the features.
checksums.yaml CHANGED
@@ -1,7 +1,7 @@
1
1
  ---
2
2
  SHA256:
3
- metadata.gz: c6356dfb2e391ad2d06a67b8a860b11e382be1184324673fe57bbe272df9b971
4
- data.tar.gz: 6ad3443644cb9f9d91f3f87b6bab03d3c3128886cbc55274d9a9e64a2b16be6b
3
+ metadata.gz: 7b41a9b2a921a007298a97ebab767ea77f33b1f8a64eba2e1a3ec7ef551b27a9
4
+ data.tar.gz: 30856538aa33c440691add29c523fe45528cedaeb7baba8443ce751ebeb738a3
5
5
  SHA512:
6
- metadata.gz: 538e231cfdadb79e2c7206569bb478b7083b946142fe82665f80c2db42e1abc0ec42d1a16580f4a72e02aee5171b334946ae8c62cb376995cacf8d5be5ddc9f3
7
- data.tar.gz: e0088873fa2a9511eb70ab6294d1c89ced063b4259312d586243398cab52b843f58a88938cec78b8e6bf3b4b46ffadc6e1a1e6f49281e47ebe1dcd3602ce04ff
6
+ metadata.gz: c2d8016a45d7521d7e155b38a70982daebec8faf94bc61de8fe4f201000e875ca6b8355b6ece7e6ea9bbb9e307e9ac47e650cc29ef119067943859f53acf7a27
7
+ data.tar.gz: 820ab0c3bafd31270bf6fab637465942aa9740f79b12ea37437b1e52ca6463e5f7a6656e16b8224b6e152055f19bf3c0e623707a69c6ecdbbe88c7a54d4fe230
data/CHANGELOG.md CHANGED
@@ -1,6 +1,11 @@
1
1
  Unreleased Changes
2
2
  ------------------
3
3
 
4
+ 1.67.0 (2023-03-30)
5
+ ------------------
6
+
7
+ * Feature - Added EKS Runtime Monitoring feature support to existing detector, finding APIs and introducing new Coverage APIs
8
+
4
9
  1.66.0 (2023-03-23)
5
10
  ------------------
6
11
 
data/VERSION CHANGED
@@ -1 +1 @@
1
- 1.66.0
1
+ 1.67.0
@@ -543,8 +543,14 @@ module Aws::GuardDuty
543
543
  # },
544
544
  # features: [
545
545
  # {
546
- # name: "S3_DATA_EVENTS", # accepts S3_DATA_EVENTS, EKS_AUDIT_LOGS, EBS_MALWARE_PROTECTION, RDS_LOGIN_EVENTS
546
+ # name: "S3_DATA_EVENTS", # accepts S3_DATA_EVENTS, EKS_AUDIT_LOGS, EBS_MALWARE_PROTECTION, RDS_LOGIN_EVENTS, EKS_RUNTIME_MONITORING
547
547
  # status: "ENABLED", # accepts ENABLED, DISABLED
548
+ # additional_configuration: [
549
+ # {
550
+ # name: "EKS_ADDON_MANAGEMENT", # accepts EKS_ADDON_MANAGEMENT
551
+ # status: "ENABLED", # accepts ENABLED, DISABLED
552
+ # },
553
+ # ],
548
554
  # },
549
555
  # ],
550
556
  # })
@@ -1441,8 +1447,11 @@ module Aws::GuardDuty
1441
1447
  # resp.data_sources.kubernetes.audit_logs.auto_enable #=> Boolean
1442
1448
  # resp.data_sources.malware_protection.scan_ec2_instance_with_findings.ebs_volumes.auto_enable #=> Boolean
1443
1449
  # resp.features #=> Array
1444
- # resp.features[0].name #=> String, one of "S3_DATA_EVENTS", "EKS_AUDIT_LOGS", "EBS_MALWARE_PROTECTION", "RDS_LOGIN_EVENTS"
1450
+ # resp.features[0].name #=> String, one of "S3_DATA_EVENTS", "EKS_AUDIT_LOGS", "EBS_MALWARE_PROTECTION", "RDS_LOGIN_EVENTS", "EKS_RUNTIME_MONITORING"
1445
1451
  # resp.features[0].auto_enable #=> String, one of "NEW", "NONE"
1452
+ # resp.features[0].additional_configuration #=> Array
1453
+ # resp.features[0].additional_configuration[0].name #=> String, one of "EKS_ADDON_MANAGEMENT"
1454
+ # resp.features[0].additional_configuration[0].auto_enable #=> String, one of "NEW", "NONE"
1446
1455
  # resp.next_token #=> String
1447
1456
  # resp.auto_enable_organization_members #=> String, one of "NEW", "ALL", "NONE"
1448
1457
  #
@@ -1670,6 +1679,60 @@ module Aws::GuardDuty
1670
1679
  req.send_request(options)
1671
1680
  end
1672
1681
 
1682
+ # Retrieves aggregated statistics for your account. If you are a
1683
+ # GuardDuty administrator, you can retrieve the statistics for all the
1684
+ # resources associated with the active member accounts in your
1685
+ # organization who have enabled EKS Runtime Monitoring and have the
1686
+ # GuardDuty agent running on their EKS nodes.
1687
+ #
1688
+ # @option params [required, String] :detector_id
1689
+ # The unique ID of the GuardDuty detector associated to the coverage
1690
+ # statistics.
1691
+ #
1692
+ # @option params [Types::CoverageFilterCriteria] :filter_criteria
1693
+ # Represents the criteria used to filter the coverage statistics
1694
+ #
1695
+ # @option params [required, Array<String>] :statistics_type
1696
+ # Represents the statistics type used to aggregate the coverage details.
1697
+ #
1698
+ # @return [Types::GetCoverageStatisticsResponse] Returns a {Seahorse::Client::Response response} object which responds to the following methods:
1699
+ #
1700
+ # * {Types::GetCoverageStatisticsResponse#coverage_statistics #coverage_statistics} => Types::CoverageStatistics
1701
+ #
1702
+ # @example Request syntax with placeholder values
1703
+ #
1704
+ # resp = client.get_coverage_statistics({
1705
+ # detector_id: "DetectorId", # required
1706
+ # filter_criteria: {
1707
+ # filter_criterion: [
1708
+ # {
1709
+ # criterion_key: "ACCOUNT_ID", # accepts ACCOUNT_ID, CLUSTER_NAME, RESOURCE_TYPE, COVERAGE_STATUS, ADDON_VERSION
1710
+ # filter_condition: {
1711
+ # equals: ["String"],
1712
+ # not_equals: ["String"],
1713
+ # },
1714
+ # },
1715
+ # ],
1716
+ # },
1717
+ # statistics_type: ["COUNT_BY_RESOURCE_TYPE"], # required, accepts COUNT_BY_RESOURCE_TYPE, COUNT_BY_COVERAGE_STATUS
1718
+ # })
1719
+ #
1720
+ # @example Response structure
1721
+ #
1722
+ # resp.coverage_statistics.count_by_resource_type #=> Hash
1723
+ # resp.coverage_statistics.count_by_resource_type["ResourceType"] #=> Integer
1724
+ # resp.coverage_statistics.count_by_coverage_status #=> Hash
1725
+ # resp.coverage_statistics.count_by_coverage_status["CoverageStatus"] #=> Integer
1726
+ #
1727
+ # @see http://docs.aws.amazon.com/goto/WebAPI/guardduty-2017-11-28/GetCoverageStatistics AWS API Documentation
1728
+ #
1729
+ # @overload get_coverage_statistics(params = {})
1730
+ # @param [Hash] params ({})
1731
+ def get_coverage_statistics(params = {}, options = {})
1732
+ req = build_request(:get_coverage_statistics, params)
1733
+ req.send_request(options)
1734
+ end
1735
+
1673
1736
  # Retrieves an Amazon GuardDuty detector specified by the detectorId.
1674
1737
  #
1675
1738
  # There might be regional differences because some data sources might
@@ -1719,9 +1782,13 @@ module Aws::GuardDuty
1719
1782
  # resp.tags #=> Hash
1720
1783
  # resp.tags["TagKey"] #=> String
1721
1784
  # resp.features #=> Array
1722
- # resp.features[0].name #=> String, one of "FLOW_LOGS", "CLOUD_TRAIL", "DNS_LOGS", "S3_DATA_EVENTS", "EKS_AUDIT_LOGS", "EBS_MALWARE_PROTECTION", "RDS_LOGIN_EVENTS"
1785
+ # resp.features[0].name #=> String, one of "FLOW_LOGS", "CLOUD_TRAIL", "DNS_LOGS", "S3_DATA_EVENTS", "EKS_AUDIT_LOGS", "EBS_MALWARE_PROTECTION", "RDS_LOGIN_EVENTS", "EKS_RUNTIME_MONITORING"
1723
1786
  # resp.features[0].status #=> String, one of "ENABLED", "DISABLED"
1724
1787
  # resp.features[0].updated_at #=> Time
1788
+ # resp.features[0].additional_configuration #=> Array
1789
+ # resp.features[0].additional_configuration[0].name #=> String, one of "EKS_ADDON_MANAGEMENT"
1790
+ # resp.features[0].additional_configuration[0].status #=> String, one of "ENABLED", "DISABLED"
1791
+ # resp.features[0].additional_configuration[0].updated_at #=> Time
1725
1792
  #
1726
1793
  # @see http://docs.aws.amazon.com/goto/WebAPI/guardduty-2017-11-28/GetDetector AWS API Documentation
1727
1794
  #
@@ -2121,6 +2188,92 @@ module Aws::GuardDuty
2121
2188
  # resp.findings[0].service.ebs_volume_scan_details.scan_detections.threat_detected_by_name.threat_names[0].file_paths[0].volume_arn #=> String
2122
2189
  # resp.findings[0].service.ebs_volume_scan_details.scan_detections.threat_detected_by_name.threat_names[0].file_paths[0].hash #=> String
2123
2190
  # resp.findings[0].service.ebs_volume_scan_details.scan_detections.threat_detected_by_name.threat_names[0].file_paths[0].file_name #=> String
2191
+ # resp.findings[0].service.runtime_details.process.name #=> String
2192
+ # resp.findings[0].service.runtime_details.process.executable_path #=> String
2193
+ # resp.findings[0].service.runtime_details.process.executable_sha_256 #=> String
2194
+ # resp.findings[0].service.runtime_details.process.namespace_pid #=> Integer
2195
+ # resp.findings[0].service.runtime_details.process.pwd #=> String
2196
+ # resp.findings[0].service.runtime_details.process.pid #=> Integer
2197
+ # resp.findings[0].service.runtime_details.process.start_time #=> Time
2198
+ # resp.findings[0].service.runtime_details.process.uuid #=> String
2199
+ # resp.findings[0].service.runtime_details.process.parent_uuid #=> String
2200
+ # resp.findings[0].service.runtime_details.process.user #=> String
2201
+ # resp.findings[0].service.runtime_details.process.user_id #=> Integer
2202
+ # resp.findings[0].service.runtime_details.process.euid #=> Integer
2203
+ # resp.findings[0].service.runtime_details.process.lineage #=> Array
2204
+ # resp.findings[0].service.runtime_details.process.lineage[0].start_time #=> Time
2205
+ # resp.findings[0].service.runtime_details.process.lineage[0].namespace_pid #=> Integer
2206
+ # resp.findings[0].service.runtime_details.process.lineage[0].user_id #=> Integer
2207
+ # resp.findings[0].service.runtime_details.process.lineage[0].name #=> String
2208
+ # resp.findings[0].service.runtime_details.process.lineage[0].pid #=> Integer
2209
+ # resp.findings[0].service.runtime_details.process.lineage[0].uuid #=> String
2210
+ # resp.findings[0].service.runtime_details.process.lineage[0].executable_path #=> String
2211
+ # resp.findings[0].service.runtime_details.process.lineage[0].euid #=> Integer
2212
+ # resp.findings[0].service.runtime_details.process.lineage[0].parent_uuid #=> String
2213
+ # resp.findings[0].service.runtime_details.context.modifying_process.name #=> String
2214
+ # resp.findings[0].service.runtime_details.context.modifying_process.executable_path #=> String
2215
+ # resp.findings[0].service.runtime_details.context.modifying_process.executable_sha_256 #=> String
2216
+ # resp.findings[0].service.runtime_details.context.modifying_process.namespace_pid #=> Integer
2217
+ # resp.findings[0].service.runtime_details.context.modifying_process.pwd #=> String
2218
+ # resp.findings[0].service.runtime_details.context.modifying_process.pid #=> Integer
2219
+ # resp.findings[0].service.runtime_details.context.modifying_process.start_time #=> Time
2220
+ # resp.findings[0].service.runtime_details.context.modifying_process.uuid #=> String
2221
+ # resp.findings[0].service.runtime_details.context.modifying_process.parent_uuid #=> String
2222
+ # resp.findings[0].service.runtime_details.context.modifying_process.user #=> String
2223
+ # resp.findings[0].service.runtime_details.context.modifying_process.user_id #=> Integer
2224
+ # resp.findings[0].service.runtime_details.context.modifying_process.euid #=> Integer
2225
+ # resp.findings[0].service.runtime_details.context.modifying_process.lineage #=> Array
2226
+ # resp.findings[0].service.runtime_details.context.modifying_process.lineage[0].start_time #=> Time
2227
+ # resp.findings[0].service.runtime_details.context.modifying_process.lineage[0].namespace_pid #=> Integer
2228
+ # resp.findings[0].service.runtime_details.context.modifying_process.lineage[0].user_id #=> Integer
2229
+ # resp.findings[0].service.runtime_details.context.modifying_process.lineage[0].name #=> String
2230
+ # resp.findings[0].service.runtime_details.context.modifying_process.lineage[0].pid #=> Integer
2231
+ # resp.findings[0].service.runtime_details.context.modifying_process.lineage[0].uuid #=> String
2232
+ # resp.findings[0].service.runtime_details.context.modifying_process.lineage[0].executable_path #=> String
2233
+ # resp.findings[0].service.runtime_details.context.modifying_process.lineage[0].euid #=> Integer
2234
+ # resp.findings[0].service.runtime_details.context.modifying_process.lineage[0].parent_uuid #=> String
2235
+ # resp.findings[0].service.runtime_details.context.modified_at #=> Time
2236
+ # resp.findings[0].service.runtime_details.context.script_path #=> String
2237
+ # resp.findings[0].service.runtime_details.context.library_path #=> String
2238
+ # resp.findings[0].service.runtime_details.context.ld_preload_value #=> String
2239
+ # resp.findings[0].service.runtime_details.context.socket_path #=> String
2240
+ # resp.findings[0].service.runtime_details.context.runc_binary_path #=> String
2241
+ # resp.findings[0].service.runtime_details.context.release_agent_path #=> String
2242
+ # resp.findings[0].service.runtime_details.context.mount_source #=> String
2243
+ # resp.findings[0].service.runtime_details.context.mount_target #=> String
2244
+ # resp.findings[0].service.runtime_details.context.file_system_type #=> String
2245
+ # resp.findings[0].service.runtime_details.context.flags #=> Array
2246
+ # resp.findings[0].service.runtime_details.context.flags[0] #=> String
2247
+ # resp.findings[0].service.runtime_details.context.module_name #=> String
2248
+ # resp.findings[0].service.runtime_details.context.module_file_path #=> String
2249
+ # resp.findings[0].service.runtime_details.context.module_sha_256 #=> String
2250
+ # resp.findings[0].service.runtime_details.context.shell_history_file_path #=> String
2251
+ # resp.findings[0].service.runtime_details.context.target_process.name #=> String
2252
+ # resp.findings[0].service.runtime_details.context.target_process.executable_path #=> String
2253
+ # resp.findings[0].service.runtime_details.context.target_process.executable_sha_256 #=> String
2254
+ # resp.findings[0].service.runtime_details.context.target_process.namespace_pid #=> Integer
2255
+ # resp.findings[0].service.runtime_details.context.target_process.pwd #=> String
2256
+ # resp.findings[0].service.runtime_details.context.target_process.pid #=> Integer
2257
+ # resp.findings[0].service.runtime_details.context.target_process.start_time #=> Time
2258
+ # resp.findings[0].service.runtime_details.context.target_process.uuid #=> String
2259
+ # resp.findings[0].service.runtime_details.context.target_process.parent_uuid #=> String
2260
+ # resp.findings[0].service.runtime_details.context.target_process.user #=> String
2261
+ # resp.findings[0].service.runtime_details.context.target_process.user_id #=> Integer
2262
+ # resp.findings[0].service.runtime_details.context.target_process.euid #=> Integer
2263
+ # resp.findings[0].service.runtime_details.context.target_process.lineage #=> Array
2264
+ # resp.findings[0].service.runtime_details.context.target_process.lineage[0].start_time #=> Time
2265
+ # resp.findings[0].service.runtime_details.context.target_process.lineage[0].namespace_pid #=> Integer
2266
+ # resp.findings[0].service.runtime_details.context.target_process.lineage[0].user_id #=> Integer
2267
+ # resp.findings[0].service.runtime_details.context.target_process.lineage[0].name #=> String
2268
+ # resp.findings[0].service.runtime_details.context.target_process.lineage[0].pid #=> Integer
2269
+ # resp.findings[0].service.runtime_details.context.target_process.lineage[0].uuid #=> String
2270
+ # resp.findings[0].service.runtime_details.context.target_process.lineage[0].executable_path #=> String
2271
+ # resp.findings[0].service.runtime_details.context.target_process.lineage[0].euid #=> Integer
2272
+ # resp.findings[0].service.runtime_details.context.target_process.lineage[0].parent_uuid #=> String
2273
+ # resp.findings[0].service.runtime_details.context.address_family #=> String
2274
+ # resp.findings[0].service.runtime_details.context.iana_protocol_number #=> Integer
2275
+ # resp.findings[0].service.runtime_details.context.memory_regions #=> Array
2276
+ # resp.findings[0].service.runtime_details.context.memory_regions[0] #=> String
2124
2277
  # resp.findings[0].severity #=> Float
2125
2278
  # resp.findings[0].title #=> String
2126
2279
  # resp.findings[0].type #=> String
@@ -2375,9 +2528,13 @@ module Aws::GuardDuty
2375
2528
  # resp.member_data_source_configurations[0].data_sources.malware_protection.scan_ec2_instance_with_findings.ebs_volumes.reason #=> String
2376
2529
  # resp.member_data_source_configurations[0].data_sources.malware_protection.service_role #=> String
2377
2530
  # resp.member_data_source_configurations[0].features #=> Array
2378
- # resp.member_data_source_configurations[0].features[0].name #=> String, one of "S3_DATA_EVENTS", "EKS_AUDIT_LOGS", "EBS_MALWARE_PROTECTION", "RDS_LOGIN_EVENTS"
2531
+ # resp.member_data_source_configurations[0].features[0].name #=> String, one of "S3_DATA_EVENTS", "EKS_AUDIT_LOGS", "EBS_MALWARE_PROTECTION", "RDS_LOGIN_EVENTS", "EKS_RUNTIME_MONITORING"
2379
2532
  # resp.member_data_source_configurations[0].features[0].status #=> String, one of "ENABLED", "DISABLED"
2380
2533
  # resp.member_data_source_configurations[0].features[0].updated_at #=> Time
2534
+ # resp.member_data_source_configurations[0].features[0].additional_configuration #=> Array
2535
+ # resp.member_data_source_configurations[0].features[0].additional_configuration[0].name #=> String, one of "EKS_ADDON_MANAGEMENT"
2536
+ # resp.member_data_source_configurations[0].features[0].additional_configuration[0].status #=> String, one of "ENABLED", "DISABLED"
2537
+ # resp.member_data_source_configurations[0].features[0].additional_configuration[0].updated_at #=> Time
2381
2538
  # resp.unprocessed_accounts #=> Array
2382
2539
  # resp.unprocessed_accounts[0].account_id #=> String
2383
2540
  # resp.unprocessed_accounts[0].result #=> String
@@ -2470,7 +2627,7 @@ module Aws::GuardDuty
2470
2627
  # resp.accounts[0].data_sources.kubernetes.audit_logs.free_trial_days_remaining #=> Integer
2471
2628
  # resp.accounts[0].data_sources.malware_protection.scan_ec2_instance_with_findings.free_trial_days_remaining #=> Integer
2472
2629
  # resp.accounts[0].features #=> Array
2473
- # resp.accounts[0].features[0].name #=> String, one of "FLOW_LOGS", "CLOUD_TRAIL", "DNS_LOGS", "S3_DATA_EVENTS", "EKS_AUDIT_LOGS", "EBS_MALWARE_PROTECTION", "RDS_LOGIN_EVENTS"
2630
+ # resp.accounts[0].features[0].name #=> String, one of "FLOW_LOGS", "CLOUD_TRAIL", "DNS_LOGS", "S3_DATA_EVENTS", "EKS_AUDIT_LOGS", "EBS_MALWARE_PROTECTION", "RDS_LOGIN_EVENTS", "EKS_RUNTIME_MONITORING"
2474
2631
  # resp.accounts[0].features[0].free_trial_days_remaining #=> Integer
2475
2632
  # resp.unprocessed_accounts #=> Array
2476
2633
  # resp.unprocessed_accounts[0].account_id #=> String
@@ -2670,6 +2827,89 @@ module Aws::GuardDuty
2670
2827
  req.send_request(options)
2671
2828
  end
2672
2829
 
2830
+ # Lists coverage details for your GuardDuty account. If you're a
2831
+ # GuardDuty administrator, you can retrieve all resources associated
2832
+ # with the active member accounts in your organization.
2833
+ #
2834
+ # Make sure the accounts have EKS Runtime Monitoring enabled and
2835
+ # GuardDuty agent running on their EKS nodes.
2836
+ #
2837
+ # @option params [required, String] :detector_id
2838
+ # The unique ID of the detector whose coverage details you want to
2839
+ # retrieve.
2840
+ #
2841
+ # @option params [String] :next_token
2842
+ # A token to use for paginating results that are returned in the
2843
+ # response. Set the value of this parameter to null for the first
2844
+ # request to a list action. For subsequent calls, use the NextToken
2845
+ # value returned from the previous request to continue listing results
2846
+ # after the first page.
2847
+ #
2848
+ # @option params [Integer] :max_results
2849
+ # The maximum number of results to return in the response.
2850
+ #
2851
+ # @option params [Types::CoverageFilterCriteria] :filter_criteria
2852
+ # Represents the criteria used to filter the coverage details.
2853
+ #
2854
+ # @option params [Types::CoverageSortCriteria] :sort_criteria
2855
+ # Represents the criteria used to sort the coverage details.
2856
+ #
2857
+ # @return [Types::ListCoverageResponse] Returns a {Seahorse::Client::Response response} object which responds to the following methods:
2858
+ #
2859
+ # * {Types::ListCoverageResponse#resources #resources} => Array&lt;Types::CoverageResource&gt;
2860
+ # * {Types::ListCoverageResponse#next_token #next_token} => String
2861
+ #
2862
+ # The returned {Seahorse::Client::Response response} is a pageable response and is Enumerable. For details on usage see {Aws::PageableResponse PageableResponse}.
2863
+ #
2864
+ # @example Request syntax with placeholder values
2865
+ #
2866
+ # resp = client.list_coverage({
2867
+ # detector_id: "DetectorId", # required
2868
+ # next_token: "String",
2869
+ # max_results: 1,
2870
+ # filter_criteria: {
2871
+ # filter_criterion: [
2872
+ # {
2873
+ # criterion_key: "ACCOUNT_ID", # accepts ACCOUNT_ID, CLUSTER_NAME, RESOURCE_TYPE, COVERAGE_STATUS, ADDON_VERSION
2874
+ # filter_condition: {
2875
+ # equals: ["String"],
2876
+ # not_equals: ["String"],
2877
+ # },
2878
+ # },
2879
+ # ],
2880
+ # },
2881
+ # sort_criteria: {
2882
+ # attribute_name: "ACCOUNT_ID", # accepts ACCOUNT_ID, CLUSTER_NAME, COVERAGE_STATUS, ISSUE, ADDON_VERSION, UPDATED_AT
2883
+ # order_by: "ASC", # accepts ASC, DESC
2884
+ # },
2885
+ # })
2886
+ #
2887
+ # @example Response structure
2888
+ #
2889
+ # resp.resources #=> Array
2890
+ # resp.resources[0].resource_id #=> String
2891
+ # resp.resources[0].detector_id #=> String
2892
+ # resp.resources[0].account_id #=> String
2893
+ # resp.resources[0].resource_details.eks_cluster_details.cluster_name #=> String
2894
+ # resp.resources[0].resource_details.eks_cluster_details.covered_nodes #=> Integer
2895
+ # resp.resources[0].resource_details.eks_cluster_details.compatible_nodes #=> Integer
2896
+ # resp.resources[0].resource_details.eks_cluster_details.addon_details.addon_version #=> String
2897
+ # resp.resources[0].resource_details.eks_cluster_details.addon_details.addon_status #=> String
2898
+ # resp.resources[0].resource_details.resource_type #=> String, one of "EKS"
2899
+ # resp.resources[0].coverage_status #=> String, one of "HEALTHY", "UNHEALTHY"
2900
+ # resp.resources[0].issue #=> String
2901
+ # resp.resources[0].updated_at #=> Time
2902
+ # resp.next_token #=> String
2903
+ #
2904
+ # @see http://docs.aws.amazon.com/goto/WebAPI/guardduty-2017-11-28/ListCoverage AWS API Documentation
2905
+ #
2906
+ # @overload list_coverage(params = {})
2907
+ # @param [Hash] params ({})
2908
+ def list_coverage(params = {}, options = {})
2909
+ req = build_request(:list_coverage, params)
2910
+ req.send_request(options)
2911
+ end
2912
+
2673
2913
  # Lists detectorIds of all the existing Amazon GuardDuty detector
2674
2914
  # resources.
2675
2915
  #
@@ -3502,8 +3742,14 @@ module Aws::GuardDuty
3502
3742
  # },
3503
3743
  # features: [
3504
3744
  # {
3505
- # name: "S3_DATA_EVENTS", # accepts S3_DATA_EVENTS, EKS_AUDIT_LOGS, EBS_MALWARE_PROTECTION, RDS_LOGIN_EVENTS
3745
+ # name: "S3_DATA_EVENTS", # accepts S3_DATA_EVENTS, EKS_AUDIT_LOGS, EBS_MALWARE_PROTECTION, RDS_LOGIN_EVENTS, EKS_RUNTIME_MONITORING
3506
3746
  # status: "ENABLED", # accepts ENABLED, DISABLED
3747
+ # additional_configuration: [
3748
+ # {
3749
+ # name: "EKS_ADDON_MANAGEMENT", # accepts EKS_ADDON_MANAGEMENT
3750
+ # status: "ENABLED", # accepts ENABLED, DISABLED
3751
+ # },
3752
+ # ],
3507
3753
  # },
3508
3754
  # ],
3509
3755
  # })
@@ -3778,8 +4024,14 @@ module Aws::GuardDuty
3778
4024
  # },
3779
4025
  # features: [
3780
4026
  # {
3781
- # name: "S3_DATA_EVENTS", # accepts S3_DATA_EVENTS, EKS_AUDIT_LOGS, EBS_MALWARE_PROTECTION, RDS_LOGIN_EVENTS
4027
+ # name: "S3_DATA_EVENTS", # accepts S3_DATA_EVENTS, EKS_AUDIT_LOGS, EBS_MALWARE_PROTECTION, RDS_LOGIN_EVENTS, EKS_RUNTIME_MONITORING
3782
4028
  # status: "ENABLED", # accepts ENABLED, DISABLED
4029
+ # additional_configuration: [
4030
+ # {
4031
+ # name: "EKS_ADDON_MANAGEMENT", # accepts EKS_ADDON_MANAGEMENT
4032
+ # status: "ENABLED", # accepts ENABLED, DISABLED
4033
+ # },
4034
+ # ],
3783
4035
  # },
3784
4036
  # ],
3785
4037
  # })
@@ -3819,6 +4071,9 @@ module Aws::GuardDuty
3819
4071
  # Indicates whether to automatically enable member accounts in the
3820
4072
  # organization.
3821
4073
  #
4074
+ # Even though this is still supported, we recommend using
4075
+ # `AutoEnableOrganizationMembers` to achieve the similar results.
4076
+ #
3822
4077
  # @option params [Types::OrganizationDataSourceConfigurations] :data_sources
3823
4078
  # Describes which data sources will be updated.
3824
4079
  #
@@ -3829,14 +4084,17 @@ module Aws::GuardDuty
3829
4084
  # Indicates the auto-enablement configuration of GuardDuty for the
3830
4085
  # member accounts in the organization.
3831
4086
  #
3832
- # * `NEW`: Indicates that new accounts joining the organization are
3833
- # configured to have GuardDuty enabled automatically.
4087
+ # * `NEW`: Indicates that when a new account joins the organization,
4088
+ # they will have GuardDuty enabled automatically.
3834
4089
  #
3835
- # * `ALL`: Indicates that all accounts (new and existing members) in the
3836
- # organization are configured to have GuardDuty enabled automatically.
4090
+ # * `ALL`: Indicates that all accounts in the Amazon Web Services
4091
+ # Organization have GuardDuty enabled automatically. This includes
4092
+ # `NEW` accounts that join the organization and accounts that may have
4093
+ # been suspended or removed from the organization in GuardDuty.
3837
4094
  #
3838
- # * `NONE`: Indicates that no account in the organization will be
3839
- # configured to have GuardDuty enabled automatically.
4095
+ # * `NONE`: Indicates that GuardDuty will not be automatically enabled
4096
+ # for any accounts in the organization. GuardDuty must be managed for
4097
+ # each account individually by the administrator.
3840
4098
  #
3841
4099
  # @return [Struct] Returns an empty {Seahorse::Client::Response response}.
3842
4100
  #
@@ -3864,8 +4122,14 @@ module Aws::GuardDuty
3864
4122
  # },
3865
4123
  # features: [
3866
4124
  # {
3867
- # name: "S3_DATA_EVENTS", # accepts S3_DATA_EVENTS, EKS_AUDIT_LOGS, EBS_MALWARE_PROTECTION, RDS_LOGIN_EVENTS
4125
+ # name: "S3_DATA_EVENTS", # accepts S3_DATA_EVENTS, EKS_AUDIT_LOGS, EBS_MALWARE_PROTECTION, RDS_LOGIN_EVENTS, EKS_RUNTIME_MONITORING
3868
4126
  # auto_enable: "NEW", # accepts NEW, NONE
4127
+ # additional_configuration: [
4128
+ # {
4129
+ # name: "EKS_ADDON_MANAGEMENT", # accepts EKS_ADDON_MANAGEMENT
4130
+ # auto_enable: "NEW", # accepts NEW, NONE
4131
+ # },
4132
+ # ],
3869
4133
  # },
3870
4134
  # ],
3871
4135
  # auto_enable_organization_members: "NEW", # accepts NEW, ALL, NONE
@@ -3971,7 +4235,7 @@ module Aws::GuardDuty
3971
4235
  params: params,
3972
4236
  config: config)
3973
4237
  context[:gem_name] = 'aws-sdk-guardduty'
3974
- context[:gem_version] = '1.66.0'
4238
+ context[:gem_version] = '1.67.0'
3975
4239
  Seahorse::Client::Request.new(handlers, context)
3976
4240
  end
3977
4241