@aws-sdk/client-guardduty 3.451.0 → 3.458.0

This diff represents the content of publicly available package versions that have been released to one of the supported registries. The information contained in this diff is provided for informational purposes only and reflects changes between package versions as they appear in their respective public registries.
Files changed (30) hide show
  1. package/README.md +71 -70
  2. package/dist-cjs/models/models_0.js +18 -0
  3. package/dist-cjs/protocols/Aws_restJson1.js +35 -0
  4. package/dist-es/models/models_0.js +18 -0
  5. package/dist-es/protocols/Aws_restJson1.js +35 -0
  6. package/dist-types/GuardDuty.d.ts +3 -2
  7. package/dist-types/GuardDutyClient.d.ts +3 -2
  8. package/dist-types/commands/CreateDetectorCommand.d.ts +2 -2
  9. package/dist-types/commands/DescribeOrganizationConfigurationCommand.d.ts +2 -2
  10. package/dist-types/commands/GetCoverageStatisticsCommand.d.ts +1 -1
  11. package/dist-types/commands/GetDetectorCommand.d.ts +2 -2
  12. package/dist-types/commands/GetMemberDetectorsCommand.d.ts +2 -2
  13. package/dist-types/commands/GetRemainingFreeTrialDaysCommand.d.ts +1 -1
  14. package/dist-types/commands/GetUsageStatisticsCommand.d.ts +2 -2
  15. package/dist-types/commands/ListCoverageCommand.d.ts +26 -4
  16. package/dist-types/commands/ListIPSetsCommand.d.ts +1 -1
  17. package/dist-types/commands/ListInvitationsCommand.d.ts +2 -1
  18. package/dist-types/commands/ListMembersCommand.d.ts +1 -2
  19. package/dist-types/commands/UpdateDetectorCommand.d.ts +2 -2
  20. package/dist-types/commands/UpdateMemberDetectorsCommand.d.ts +2 -2
  21. package/dist-types/commands/UpdateOrganizationConfigurationCommand.d.ts +2 -2
  22. package/dist-types/index.d.ts +3 -2
  23. package/dist-types/models/models_0.d.ts +172 -117
  24. package/dist-types/models/models_1.d.ts +117 -0
  25. package/dist-types/ts3.4/commands/ListIPSetsCommand.d.ts +1 -1
  26. package/dist-types/ts3.4/commands/ListInvitationsCommand.d.ts +2 -4
  27. package/dist-types/ts3.4/commands/ListMembersCommand.d.ts +1 -2
  28. package/dist-types/ts3.4/models/models_0.d.ts +43 -25
  29. package/dist-types/ts3.4/models/models_1.d.ts +25 -0
  30. package/package.json +3 -3
@@ -51,8 +51,10 @@ exports.FreeTrialFeatureResult = {
51
51
  CLOUD_TRAIL: "CLOUD_TRAIL",
52
52
  DNS_LOGS: "DNS_LOGS",
53
53
  EBS_MALWARE_PROTECTION: "EBS_MALWARE_PROTECTION",
54
+ EC2_RUNTIME_MONITORING: "EC2_RUNTIME_MONITORING",
54
55
  EKS_AUDIT_LOGS: "EKS_AUDIT_LOGS",
55
56
  EKS_RUNTIME_MONITORING: "EKS_RUNTIME_MONITORING",
57
+ FARGATE_RUNTIME_MONITORING: "FARGATE_RUNTIME_MONITORING",
56
58
  FLOW_LOGS: "FLOW_LOGS",
57
59
  LAMBDA_NETWORK_LOGS: "LAMBDA_NETWORK_LOGS",
58
60
  RDS_LOGIN_EVENTS: "RDS_LOGIN_EVENTS",
@@ -100,18 +102,25 @@ exports.CoverageStatus = {
100
102
  UNHEALTHY: "UNHEALTHY",
101
103
  };
102
104
  exports.ResourceType = {
105
+ EC2: "EC2",
106
+ ECS: "ECS",
103
107
  EKS: "EKS",
104
108
  };
105
109
  exports.ManagementType = {
106
110
  AUTO_MANAGED: "AUTO_MANAGED",
111
+ DISABLED: "DISABLED",
107
112
  MANUAL: "MANUAL",
108
113
  };
109
114
  exports.CoverageFilterCriterionKey = {
110
115
  ACCOUNT_ID: "ACCOUNT_ID",
111
116
  ADDON_VERSION: "ADDON_VERSION",
117
+ AGENT_VERSION: "AGENT_VERSION",
118
+ CLUSTER_ARN: "CLUSTER_ARN",
112
119
  CLUSTER_NAME: "CLUSTER_NAME",
113
120
  COVERAGE_STATUS: "COVERAGE_STATUS",
121
+ ECS_CLUSTER_NAME: "ECS_CLUSTER_NAME",
114
122
  EKS_CLUSTER_NAME: "EKS_CLUSTER_NAME",
123
+ INSTANCE_ID: "INSTANCE_ID",
115
124
  MANAGEMENT_TYPE: "MANAGEMENT_TYPE",
116
125
  RESOURCE_TYPE: "RESOURCE_TYPE",
117
126
  };
@@ -120,7 +129,9 @@ exports.CoverageSortKey = {
120
129
  ADDON_VERSION: "ADDON_VERSION",
121
130
  CLUSTER_NAME: "CLUSTER_NAME",
122
131
  COVERAGE_STATUS: "COVERAGE_STATUS",
132
+ ECS_CLUSTER_NAME: "ECS_CLUSTER_NAME",
123
133
  EKS_CLUSTER_NAME: "EKS_CLUSTER_NAME",
134
+ INSTANCE_ID: "INSTANCE_ID",
124
135
  ISSUE: "ISSUE",
125
136
  UPDATED_AT: "UPDATED_AT",
126
137
  };
@@ -133,6 +144,7 @@ exports.CoverageStatisticsType = {
133
144
  COUNT_BY_RESOURCE_TYPE: "COUNT_BY_RESOURCE_TYPE",
134
145
  };
135
146
  exports.FeatureAdditionalConfiguration = {
147
+ ECS_FARGATE_AGENT_MANAGEMENT: "ECS_FARGATE_AGENT_MANAGEMENT",
136
148
  EKS_ADDON_MANAGEMENT: "EKS_ADDON_MANAGEMENT",
137
149
  };
138
150
  exports.FeatureStatus = {
@@ -145,6 +157,7 @@ exports.DetectorFeature = {
145
157
  EKS_RUNTIME_MONITORING: "EKS_RUNTIME_MONITORING",
146
158
  LAMBDA_NETWORK_LOGS: "LAMBDA_NETWORK_LOGS",
147
159
  RDS_LOGIN_EVENTS: "RDS_LOGIN_EVENTS",
160
+ RUNTIME_MONITORING: "RUNTIME_MONITORING",
148
161
  S3_DATA_EVENTS: "S3_DATA_EVENTS",
149
162
  };
150
163
  exports.FindingPublishingFrequency = {
@@ -212,6 +225,7 @@ exports.OrgFeatureStatus = {
212
225
  NONE: "NONE",
213
226
  };
214
227
  exports.OrgFeatureAdditionalConfiguration = {
228
+ ECS_FARGATE_AGENT_MANAGEMENT: "ECS_FARGATE_AGENT_MANAGEMENT",
215
229
  EKS_ADDON_MANAGEMENT: "EKS_ADDON_MANAGEMENT",
216
230
  };
217
231
  exports.OrgFeature = {
@@ -220,6 +234,7 @@ exports.OrgFeature = {
220
234
  EKS_RUNTIME_MONITORING: "EKS_RUNTIME_MONITORING",
221
235
  LAMBDA_NETWORK_LOGS: "LAMBDA_NETWORK_LOGS",
222
236
  RDS_LOGIN_EVENTS: "RDS_LOGIN_EVENTS",
237
+ RUNTIME_MONITORING: "RUNTIME_MONITORING",
223
238
  S3_DATA_EVENTS: "S3_DATA_EVENTS",
224
239
  };
225
240
  exports.PublishingStatus = {
@@ -237,6 +252,7 @@ exports.DetectorFeatureResult = {
237
252
  FLOW_LOGS: "FLOW_LOGS",
238
253
  LAMBDA_NETWORK_LOGS: "LAMBDA_NETWORK_LOGS",
239
254
  RDS_LOGIN_EVENTS: "RDS_LOGIN_EVENTS",
255
+ RUNTIME_MONITORING: "RUNTIME_MONITORING",
240
256
  S3_DATA_EVENTS: "S3_DATA_EVENTS",
241
257
  };
242
258
  exports.DetectorStatus = {
@@ -279,8 +295,10 @@ exports.UsageFeature = {
279
295
  CLOUD_TRAIL: "CLOUD_TRAIL",
280
296
  DNS_LOGS: "DNS_LOGS",
281
297
  EBS_MALWARE_PROTECTION: "EBS_MALWARE_PROTECTION",
298
+ EC2_RUNTIME_MONITORING: "EC2_RUNTIME_MONITORING",
282
299
  EKS_AUDIT_LOGS: "EKS_AUDIT_LOGS",
283
300
  EKS_RUNTIME_MONITORING: "EKS_RUNTIME_MONITORING",
301
+ FARGATE_RUNTIME_MONITORING: "FARGATE_RUNTIME_MONITORING",
284
302
  FLOW_LOGS: "FLOW_LOGS",
285
303
  LAMBDA_NETWORK_LOGS: "LAMBDA_NETWORK_LOGS",
286
304
  RDS_LOGIN_EVENTS: "RDS_LOGIN_EVENTS",
@@ -4437,6 +4437,11 @@ const de_Administrator = (output, context) => {
4437
4437
  RelationshipStatus: [, smithy_client_1.expectString, `relationshipStatus`],
4438
4438
  });
4439
4439
  };
4440
+ const de_AgentDetails = (output, context) => {
4441
+ return (0, smithy_client_1.take)(output, {
4442
+ Version: [, smithy_client_1.expectString, `version`],
4443
+ });
4444
+ };
4440
4445
  const de_Anomaly = (output, context) => {
4441
4446
  return (0, smithy_client_1.take)(output, {
4442
4447
  Profiles: [, (_) => de_AnomalyProfiles(_, context), `profiles`],
@@ -4570,6 +4575,12 @@ const de_Container = (output, context) => {
4570
4575
  VolumeMounts: [, (_) => de_VolumeMounts(_, context), `volumeMounts`],
4571
4576
  });
4572
4577
  };
4578
+ const de_ContainerInstanceDetails = (output, context) => {
4579
+ return (0, smithy_client_1.take)(output, {
4580
+ CompatibleContainerInstances: [, smithy_client_1.expectLong, `compatibleContainerInstances`],
4581
+ CoveredContainerInstances: [, smithy_client_1.expectLong, `coveredContainerInstances`],
4582
+ });
4583
+ };
4573
4584
  const de_Containers = (output, context) => {
4574
4585
  const retVal = (output || [])
4575
4586
  .filter((e) => e != null)
@@ -4584,6 +4595,22 @@ const de_Country = (output, context) => {
4584
4595
  CountryName: [, smithy_client_1.expectString, `countryName`],
4585
4596
  });
4586
4597
  };
4598
+ const de_CoverageEc2InstanceDetails = (output, context) => {
4599
+ return (0, smithy_client_1.take)(output, {
4600
+ AgentDetails: [, (_) => de_AgentDetails(_, context), `agentDetails`],
4601
+ ClusterArn: [, smithy_client_1.expectString, `clusterArn`],
4602
+ InstanceId: [, smithy_client_1.expectString, `instanceId`],
4603
+ InstanceType: [, smithy_client_1.expectString, `instanceType`],
4604
+ ManagementType: [, smithy_client_1.expectString, `managementType`],
4605
+ });
4606
+ };
4607
+ const de_CoverageEcsClusterDetails = (output, context) => {
4608
+ return (0, smithy_client_1.take)(output, {
4609
+ ClusterName: [, smithy_client_1.expectString, `clusterName`],
4610
+ ContainerInstanceDetails: [, (_) => de_ContainerInstanceDetails(_, context), `containerInstanceDetails`],
4611
+ FargateDetails: [, (_) => de_FargateDetails(_, context), `fargateDetails`],
4612
+ });
4613
+ };
4587
4614
  const de_CoverageEksClusterDetails = (output, context) => {
4588
4615
  return (0, smithy_client_1.take)(output, {
4589
4616
  AddonDetails: [, (_) => de_AddonDetails(_, context), `addonDetails`],
@@ -4606,6 +4633,8 @@ const de_CoverageResource = (output, context) => {
4606
4633
  };
4607
4634
  const de_CoverageResourceDetails = (output, context) => {
4608
4635
  return (0, smithy_client_1.take)(output, {
4636
+ Ec2InstanceDetails: [, (_) => de_CoverageEc2InstanceDetails(_, context), `ec2InstanceDetails`],
4637
+ EcsClusterDetails: [, (_) => de_CoverageEcsClusterDetails(_, context), `ecsClusterDetails`],
4609
4638
  EksClusterDetails: [, (_) => de_CoverageEksClusterDetails(_, context), `eksClusterDetails`],
4610
4639
  ResourceType: [, smithy_client_1.expectString, `resourceType`],
4611
4640
  });
@@ -4807,6 +4836,12 @@ const de_Evidence = (output, context) => {
4807
4836
  ThreatIntelligenceDetails: [, (_) => de_ThreatIntelligenceDetails(_, context), `threatIntelligenceDetails`],
4808
4837
  });
4809
4838
  };
4839
+ const de_FargateDetails = (output, context) => {
4840
+ return (0, smithy_client_1.take)(output, {
4841
+ Issues: [, smithy_client_1._json, `issues`],
4842
+ ManagementType: [, smithy_client_1.expectString, `managementType`],
4843
+ });
4844
+ };
4810
4845
  const de_FilePaths = (output, context) => {
4811
4846
  const retVal = (output || [])
4812
4847
  .filter((e) => e != null)
@@ -45,8 +45,10 @@ export const FreeTrialFeatureResult = {
45
45
  CLOUD_TRAIL: "CLOUD_TRAIL",
46
46
  DNS_LOGS: "DNS_LOGS",
47
47
  EBS_MALWARE_PROTECTION: "EBS_MALWARE_PROTECTION",
48
+ EC2_RUNTIME_MONITORING: "EC2_RUNTIME_MONITORING",
48
49
  EKS_AUDIT_LOGS: "EKS_AUDIT_LOGS",
49
50
  EKS_RUNTIME_MONITORING: "EKS_RUNTIME_MONITORING",
51
+ FARGATE_RUNTIME_MONITORING: "FARGATE_RUNTIME_MONITORING",
50
52
  FLOW_LOGS: "FLOW_LOGS",
51
53
  LAMBDA_NETWORK_LOGS: "LAMBDA_NETWORK_LOGS",
52
54
  RDS_LOGIN_EVENTS: "RDS_LOGIN_EVENTS",
@@ -93,18 +95,25 @@ export const CoverageStatus = {
93
95
  UNHEALTHY: "UNHEALTHY",
94
96
  };
95
97
  export const ResourceType = {
98
+ EC2: "EC2",
99
+ ECS: "ECS",
96
100
  EKS: "EKS",
97
101
  };
98
102
  export const ManagementType = {
99
103
  AUTO_MANAGED: "AUTO_MANAGED",
104
+ DISABLED: "DISABLED",
100
105
  MANUAL: "MANUAL",
101
106
  };
102
107
  export const CoverageFilterCriterionKey = {
103
108
  ACCOUNT_ID: "ACCOUNT_ID",
104
109
  ADDON_VERSION: "ADDON_VERSION",
110
+ AGENT_VERSION: "AGENT_VERSION",
111
+ CLUSTER_ARN: "CLUSTER_ARN",
105
112
  CLUSTER_NAME: "CLUSTER_NAME",
106
113
  COVERAGE_STATUS: "COVERAGE_STATUS",
114
+ ECS_CLUSTER_NAME: "ECS_CLUSTER_NAME",
107
115
  EKS_CLUSTER_NAME: "EKS_CLUSTER_NAME",
116
+ INSTANCE_ID: "INSTANCE_ID",
108
117
  MANAGEMENT_TYPE: "MANAGEMENT_TYPE",
109
118
  RESOURCE_TYPE: "RESOURCE_TYPE",
110
119
  };
@@ -113,7 +122,9 @@ export const CoverageSortKey = {
113
122
  ADDON_VERSION: "ADDON_VERSION",
114
123
  CLUSTER_NAME: "CLUSTER_NAME",
115
124
  COVERAGE_STATUS: "COVERAGE_STATUS",
125
+ ECS_CLUSTER_NAME: "ECS_CLUSTER_NAME",
116
126
  EKS_CLUSTER_NAME: "EKS_CLUSTER_NAME",
127
+ INSTANCE_ID: "INSTANCE_ID",
117
128
  ISSUE: "ISSUE",
118
129
  UPDATED_AT: "UPDATED_AT",
119
130
  };
@@ -126,6 +137,7 @@ export const CoverageStatisticsType = {
126
137
  COUNT_BY_RESOURCE_TYPE: "COUNT_BY_RESOURCE_TYPE",
127
138
  };
128
139
  export const FeatureAdditionalConfiguration = {
140
+ ECS_FARGATE_AGENT_MANAGEMENT: "ECS_FARGATE_AGENT_MANAGEMENT",
129
141
  EKS_ADDON_MANAGEMENT: "EKS_ADDON_MANAGEMENT",
130
142
  };
131
143
  export const FeatureStatus = {
@@ -138,6 +150,7 @@ export const DetectorFeature = {
138
150
  EKS_RUNTIME_MONITORING: "EKS_RUNTIME_MONITORING",
139
151
  LAMBDA_NETWORK_LOGS: "LAMBDA_NETWORK_LOGS",
140
152
  RDS_LOGIN_EVENTS: "RDS_LOGIN_EVENTS",
153
+ RUNTIME_MONITORING: "RUNTIME_MONITORING",
141
154
  S3_DATA_EVENTS: "S3_DATA_EVENTS",
142
155
  };
143
156
  export const FindingPublishingFrequency = {
@@ -205,6 +218,7 @@ export const OrgFeatureStatus = {
205
218
  NONE: "NONE",
206
219
  };
207
220
  export const OrgFeatureAdditionalConfiguration = {
221
+ ECS_FARGATE_AGENT_MANAGEMENT: "ECS_FARGATE_AGENT_MANAGEMENT",
208
222
  EKS_ADDON_MANAGEMENT: "EKS_ADDON_MANAGEMENT",
209
223
  };
210
224
  export const OrgFeature = {
@@ -213,6 +227,7 @@ export const OrgFeature = {
213
227
  EKS_RUNTIME_MONITORING: "EKS_RUNTIME_MONITORING",
214
228
  LAMBDA_NETWORK_LOGS: "LAMBDA_NETWORK_LOGS",
215
229
  RDS_LOGIN_EVENTS: "RDS_LOGIN_EVENTS",
230
+ RUNTIME_MONITORING: "RUNTIME_MONITORING",
216
231
  S3_DATA_EVENTS: "S3_DATA_EVENTS",
217
232
  };
218
233
  export const PublishingStatus = {
@@ -230,6 +245,7 @@ export const DetectorFeatureResult = {
230
245
  FLOW_LOGS: "FLOW_LOGS",
231
246
  LAMBDA_NETWORK_LOGS: "LAMBDA_NETWORK_LOGS",
232
247
  RDS_LOGIN_EVENTS: "RDS_LOGIN_EVENTS",
248
+ RUNTIME_MONITORING: "RUNTIME_MONITORING",
233
249
  S3_DATA_EVENTS: "S3_DATA_EVENTS",
234
250
  };
235
251
  export const DetectorStatus = {
@@ -272,8 +288,10 @@ export const UsageFeature = {
272
288
  CLOUD_TRAIL: "CLOUD_TRAIL",
273
289
  DNS_LOGS: "DNS_LOGS",
274
290
  EBS_MALWARE_PROTECTION: "EBS_MALWARE_PROTECTION",
291
+ EC2_RUNTIME_MONITORING: "EC2_RUNTIME_MONITORING",
275
292
  EKS_AUDIT_LOGS: "EKS_AUDIT_LOGS",
276
293
  EKS_RUNTIME_MONITORING: "EKS_RUNTIME_MONITORING",
294
+ FARGATE_RUNTIME_MONITORING: "FARGATE_RUNTIME_MONITORING",
277
295
  FLOW_LOGS: "FLOW_LOGS",
278
296
  LAMBDA_NETWORK_LOGS: "LAMBDA_NETWORK_LOGS",
279
297
  RDS_LOGIN_EVENTS: "RDS_LOGIN_EVENTS",
@@ -4296,6 +4296,11 @@ const de_Administrator = (output, context) => {
4296
4296
  RelationshipStatus: [, __expectString, `relationshipStatus`],
4297
4297
  });
4298
4298
  };
4299
+ const de_AgentDetails = (output, context) => {
4300
+ return take(output, {
4301
+ Version: [, __expectString, `version`],
4302
+ });
4303
+ };
4299
4304
  const de_Anomaly = (output, context) => {
4300
4305
  return take(output, {
4301
4306
  Profiles: [, (_) => de_AnomalyProfiles(_, context), `profiles`],
@@ -4429,6 +4434,12 @@ const de_Container = (output, context) => {
4429
4434
  VolumeMounts: [, (_) => de_VolumeMounts(_, context), `volumeMounts`],
4430
4435
  });
4431
4436
  };
4437
+ const de_ContainerInstanceDetails = (output, context) => {
4438
+ return take(output, {
4439
+ CompatibleContainerInstances: [, __expectLong, `compatibleContainerInstances`],
4440
+ CoveredContainerInstances: [, __expectLong, `coveredContainerInstances`],
4441
+ });
4442
+ };
4432
4443
  const de_Containers = (output, context) => {
4433
4444
  const retVal = (output || [])
4434
4445
  .filter((e) => e != null)
@@ -4443,6 +4454,22 @@ const de_Country = (output, context) => {
4443
4454
  CountryName: [, __expectString, `countryName`],
4444
4455
  });
4445
4456
  };
4457
+ const de_CoverageEc2InstanceDetails = (output, context) => {
4458
+ return take(output, {
4459
+ AgentDetails: [, (_) => de_AgentDetails(_, context), `agentDetails`],
4460
+ ClusterArn: [, __expectString, `clusterArn`],
4461
+ InstanceId: [, __expectString, `instanceId`],
4462
+ InstanceType: [, __expectString, `instanceType`],
4463
+ ManagementType: [, __expectString, `managementType`],
4464
+ });
4465
+ };
4466
+ const de_CoverageEcsClusterDetails = (output, context) => {
4467
+ return take(output, {
4468
+ ClusterName: [, __expectString, `clusterName`],
4469
+ ContainerInstanceDetails: [, (_) => de_ContainerInstanceDetails(_, context), `containerInstanceDetails`],
4470
+ FargateDetails: [, (_) => de_FargateDetails(_, context), `fargateDetails`],
4471
+ });
4472
+ };
4446
4473
  const de_CoverageEksClusterDetails = (output, context) => {
4447
4474
  return take(output, {
4448
4475
  AddonDetails: [, (_) => de_AddonDetails(_, context), `addonDetails`],
@@ -4465,6 +4492,8 @@ const de_CoverageResource = (output, context) => {
4465
4492
  };
4466
4493
  const de_CoverageResourceDetails = (output, context) => {
4467
4494
  return take(output, {
4495
+ Ec2InstanceDetails: [, (_) => de_CoverageEc2InstanceDetails(_, context), `ec2InstanceDetails`],
4496
+ EcsClusterDetails: [, (_) => de_CoverageEcsClusterDetails(_, context), `ecsClusterDetails`],
4468
4497
  EksClusterDetails: [, (_) => de_CoverageEksClusterDetails(_, context), `eksClusterDetails`],
4469
4498
  ResourceType: [, __expectString, `resourceType`],
4470
4499
  });
@@ -4666,6 +4695,12 @@ const de_Evidence = (output, context) => {
4666
4695
  ThreatIntelligenceDetails: [, (_) => de_ThreatIntelligenceDetails(_, context), `threatIntelligenceDetails`],
4667
4696
  });
4668
4697
  };
4698
+ const de_FargateDetails = (output, context) => {
4699
+ return take(output, {
4700
+ Issues: [, _json, `issues`],
4701
+ ManagementType: [, __expectString, `managementType`],
4702
+ });
4703
+ };
4669
4704
  const de_FilePaths = (output, context) => {
4670
4705
  const retVal = (output || [])
4671
4706
  .filter((e) => e != null)
@@ -481,8 +481,9 @@ export interface GuardDuty {
481
481
  /**
482
482
  * @public
483
483
  * <p>Amazon GuardDuty is a continuous security monitoring service that analyzes and processes
484
- * the following data sources: VPC flow logs, Amazon Web Services CloudTrail management event logs, CloudTrail S3 data event
485
- * logs, EKS audit logs, DNS logs, and Amazon EBS volume data.
484
+ * the following foundational data sources - VPC flow logs, Amazon Web Services CloudTrail management event logs, CloudTrail S3 data event
485
+ * logs, EKS audit logs, DNS logs, Amazon EBS volume data, runtime activity belonging to container workloads, such
486
+ * as Amazon EKS, Amazon ECS (including Amazon Web Services Fargate), and Amazon EC2 instances.
486
487
  * It uses threat intelligence
487
488
  * feeds, such as lists of malicious IPs and domains, and machine learning to identify
488
489
  * unexpected, potentially unauthorized, and malicious activity within your Amazon Web Services environment.
@@ -221,8 +221,9 @@ export interface GuardDutyClientResolvedConfig extends GuardDutyClientResolvedCo
221
221
  /**
222
222
  * @public
223
223
  * <p>Amazon GuardDuty is a continuous security monitoring service that analyzes and processes
224
- * the following data sources: VPC flow logs, Amazon Web Services CloudTrail management event logs, CloudTrail S3 data event
225
- * logs, EKS audit logs, DNS logs, and Amazon EBS volume data.
224
+ * the following foundational data sources - VPC flow logs, Amazon Web Services CloudTrail management event logs, CloudTrail S3 data event
225
+ * logs, EKS audit logs, DNS logs, Amazon EBS volume data, runtime activity belonging to container workloads, such
226
+ * as Amazon EKS, Amazon ECS (including Amazon Web Services Fargate), and Amazon EC2 instances.
226
227
  * It uses threat intelligence
227
228
  * feeds, such as lists of malicious IPs and domains, and machine learning to identify
228
229
  * unexpected, potentially unauthorized, and malicious activity within your Amazon Web Services environment.
@@ -60,11 +60,11 @@ export interface CreateDetectorCommandOutput extends CreateDetectorResponse, __M
60
60
  * },
61
61
  * Features: [ // DetectorFeatureConfigurations
62
62
  * { // DetectorFeatureConfiguration
63
- * Name: "S3_DATA_EVENTS" || "EKS_AUDIT_LOGS" || "EBS_MALWARE_PROTECTION" || "RDS_LOGIN_EVENTS" || "EKS_RUNTIME_MONITORING" || "LAMBDA_NETWORK_LOGS",
63
+ * Name: "S3_DATA_EVENTS" || "EKS_AUDIT_LOGS" || "EBS_MALWARE_PROTECTION" || "RDS_LOGIN_EVENTS" || "EKS_RUNTIME_MONITORING" || "LAMBDA_NETWORK_LOGS" || "RUNTIME_MONITORING",
64
64
  * Status: "ENABLED" || "DISABLED",
65
65
  * AdditionalConfiguration: [ // DetectorAdditionalConfigurations
66
66
  * { // DetectorAdditionalConfiguration
67
- * Name: "EKS_ADDON_MANAGEMENT",
67
+ * Name: "EKS_ADDON_MANAGEMENT" || "ECS_FARGATE_AGENT_MANAGEMENT",
68
68
  * Status: "ENABLED" || "DISABLED",
69
69
  * },
70
70
  * ],
@@ -63,11 +63,11 @@ export interface DescribeOrganizationConfigurationCommandOutput extends Describe
63
63
  * // },
64
64
  * // Features: [ // OrganizationFeaturesConfigurationsResults
65
65
  * // { // OrganizationFeatureConfigurationResult
66
- * // Name: "S3_DATA_EVENTS" || "EKS_AUDIT_LOGS" || "EBS_MALWARE_PROTECTION" || "RDS_LOGIN_EVENTS" || "EKS_RUNTIME_MONITORING" || "LAMBDA_NETWORK_LOGS",
66
+ * // Name: "S3_DATA_EVENTS" || "EKS_AUDIT_LOGS" || "EBS_MALWARE_PROTECTION" || "RDS_LOGIN_EVENTS" || "EKS_RUNTIME_MONITORING" || "LAMBDA_NETWORK_LOGS" || "RUNTIME_MONITORING",
67
67
  * // AutoEnable: "NEW" || "NONE" || "ALL",
68
68
  * // AdditionalConfiguration: [ // OrganizationAdditionalConfigurationResults
69
69
  * // { // OrganizationAdditionalConfigurationResult
70
- * // Name: "EKS_ADDON_MANAGEMENT",
70
+ * // Name: "EKS_ADDON_MANAGEMENT" || "ECS_FARGATE_AGENT_MANAGEMENT",
71
71
  * // AutoEnable: "NEW" || "NONE" || "ALL",
72
72
  * // },
73
73
  * // ],
@@ -38,7 +38,7 @@ export interface GetCoverageStatisticsCommandOutput extends GetCoverageStatistic
38
38
  * FilterCriteria: { // CoverageFilterCriteria
39
39
  * FilterCriterion: [ // CoverageFilterCriterionList
40
40
  * { // CoverageFilterCriterion
41
- * CriterionKey: "ACCOUNT_ID" || "CLUSTER_NAME" || "RESOURCE_TYPE" || "COVERAGE_STATUS" || "ADDON_VERSION" || "MANAGEMENT_TYPE" || "EKS_CLUSTER_NAME",
41
+ * CriterionKey: "ACCOUNT_ID" || "CLUSTER_NAME" || "RESOURCE_TYPE" || "COVERAGE_STATUS" || "ADDON_VERSION" || "MANAGEMENT_TYPE" || "EKS_CLUSTER_NAME" || "ECS_CLUSTER_NAME" || "AGENT_VERSION" || "INSTANCE_ID" || "CLUSTER_ARN",
42
42
  * FilterCondition: { // CoverageFilterCondition
43
43
  * Equals: [ // Equals
44
44
  * "STRING_VALUE",
@@ -77,12 +77,12 @@ export interface GetDetectorCommandOutput extends GetDetectorResponse, __Metadat
77
77
  * // },
78
78
  * // Features: [ // DetectorFeatureConfigurationsResults
79
79
  * // { // DetectorFeatureConfigurationResult
80
- * // Name: "FLOW_LOGS" || "CLOUD_TRAIL" || "DNS_LOGS" || "S3_DATA_EVENTS" || "EKS_AUDIT_LOGS" || "EBS_MALWARE_PROTECTION" || "RDS_LOGIN_EVENTS" || "EKS_RUNTIME_MONITORING" || "LAMBDA_NETWORK_LOGS",
80
+ * // Name: "FLOW_LOGS" || "CLOUD_TRAIL" || "DNS_LOGS" || "S3_DATA_EVENTS" || "EKS_AUDIT_LOGS" || "EBS_MALWARE_PROTECTION" || "RDS_LOGIN_EVENTS" || "EKS_RUNTIME_MONITORING" || "LAMBDA_NETWORK_LOGS" || "RUNTIME_MONITORING",
81
81
  * // Status: "ENABLED" || "DISABLED",
82
82
  * // UpdatedAt: new Date("TIMESTAMP"),
83
83
  * // AdditionalConfiguration: [ // DetectorAdditionalConfigurationResults
84
84
  * // { // DetectorAdditionalConfigurationResult
85
- * // Name: "EKS_ADDON_MANAGEMENT",
85
+ * // Name: "EKS_ADDON_MANAGEMENT" || "ECS_FARGATE_AGENT_MANAGEMENT",
86
86
  * // Status: "ENABLED" || "DISABLED",
87
87
  * // UpdatedAt: new Date("TIMESTAMP"),
88
88
  * // },
@@ -75,12 +75,12 @@ export interface GetMemberDetectorsCommandOutput extends GetMemberDetectorsRespo
75
75
  * // },
76
76
  * // Features: [ // MemberFeaturesConfigurationsResults
77
77
  * // { // MemberFeaturesConfigurationResult
78
- * // Name: "S3_DATA_EVENTS" || "EKS_AUDIT_LOGS" || "EBS_MALWARE_PROTECTION" || "RDS_LOGIN_EVENTS" || "EKS_RUNTIME_MONITORING" || "LAMBDA_NETWORK_LOGS",
78
+ * // Name: "S3_DATA_EVENTS" || "EKS_AUDIT_LOGS" || "EBS_MALWARE_PROTECTION" || "RDS_LOGIN_EVENTS" || "EKS_RUNTIME_MONITORING" || "LAMBDA_NETWORK_LOGS" || "RUNTIME_MONITORING",
79
79
  * // Status: "ENABLED" || "DISABLED",
80
80
  * // UpdatedAt: new Date("TIMESTAMP"),
81
81
  * // AdditionalConfiguration: [ // MemberAdditionalConfigurationResults
82
82
  * // { // MemberAdditionalConfigurationResult
83
- * // Name: "EKS_ADDON_MANAGEMENT",
83
+ * // Name: "EKS_ADDON_MANAGEMENT" || "ECS_FARGATE_AGENT_MANAGEMENT",
84
84
  * // Status: "ENABLED" || "DISABLED",
85
85
  * // UpdatedAt: new Date("TIMESTAMP"),
86
86
  * // },
@@ -67,7 +67,7 @@ export interface GetRemainingFreeTrialDaysCommandOutput extends GetRemainingFree
67
67
  * // },
68
68
  * // Features: [ // FreeTrialFeatureConfigurationsResults
69
69
  * // { // FreeTrialFeatureConfigurationResult
70
- * // Name: "FLOW_LOGS" || "CLOUD_TRAIL" || "DNS_LOGS" || "S3_DATA_EVENTS" || "EKS_AUDIT_LOGS" || "EBS_MALWARE_PROTECTION" || "RDS_LOGIN_EVENTS" || "EKS_RUNTIME_MONITORING" || "LAMBDA_NETWORK_LOGS",
70
+ * // Name: "FLOW_LOGS" || "CLOUD_TRAIL" || "DNS_LOGS" || "S3_DATA_EVENTS" || "EKS_AUDIT_LOGS" || "EBS_MALWARE_PROTECTION" || "RDS_LOGIN_EVENTS" || "EKS_RUNTIME_MONITORING" || "LAMBDA_NETWORK_LOGS" || "FARGATE_RUNTIME_MONITORING" || "EC2_RUNTIME_MONITORING",
71
71
  * // FreeTrialDaysRemaining: Number("int"),
72
72
  * // },
73
73
  * // ],
@@ -47,7 +47,7 @@ export interface GetUsageStatisticsCommandOutput extends GetUsageStatisticsRespo
47
47
  * "STRING_VALUE",
48
48
  * ],
49
49
  * Features: [ // UsageFeatureList
50
- * "FLOW_LOGS" || "CLOUD_TRAIL" || "DNS_LOGS" || "S3_DATA_EVENTS" || "EKS_AUDIT_LOGS" || "EBS_MALWARE_PROTECTION" || "RDS_LOGIN_EVENTS" || "LAMBDA_NETWORK_LOGS" || "EKS_RUNTIME_MONITORING",
50
+ * "FLOW_LOGS" || "CLOUD_TRAIL" || "DNS_LOGS" || "S3_DATA_EVENTS" || "EKS_AUDIT_LOGS" || "EBS_MALWARE_PROTECTION" || "RDS_LOGIN_EVENTS" || "LAMBDA_NETWORK_LOGS" || "EKS_RUNTIME_MONITORING" || "FARGATE_RUNTIME_MONITORING" || "EC2_RUNTIME_MONITORING",
51
51
  * ],
52
52
  * },
53
53
  * Unit: "STRING_VALUE",
@@ -96,7 +96,7 @@ export interface GetUsageStatisticsCommandOutput extends GetUsageStatisticsRespo
96
96
  * // ],
97
97
  * // SumByFeature: [ // UsageFeatureResultList
98
98
  * // { // UsageFeatureResult
99
- * // Feature: "FLOW_LOGS" || "CLOUD_TRAIL" || "DNS_LOGS" || "S3_DATA_EVENTS" || "EKS_AUDIT_LOGS" || "EBS_MALWARE_PROTECTION" || "RDS_LOGIN_EVENTS" || "LAMBDA_NETWORK_LOGS" || "EKS_RUNTIME_MONITORING",
99
+ * // Feature: "FLOW_LOGS" || "CLOUD_TRAIL" || "DNS_LOGS" || "S3_DATA_EVENTS" || "EKS_AUDIT_LOGS" || "EBS_MALWARE_PROTECTION" || "RDS_LOGIN_EVENTS" || "LAMBDA_NETWORK_LOGS" || "EKS_RUNTIME_MONITORING" || "FARGATE_RUNTIME_MONITORING" || "EC2_RUNTIME_MONITORING",
100
100
  * // Total: {
101
101
  * // Amount: "STRING_VALUE",
102
102
  * // Unit: "STRING_VALUE",
@@ -40,7 +40,7 @@ export interface ListCoverageCommandOutput extends ListCoverageResponse, __Metad
40
40
  * FilterCriteria: { // CoverageFilterCriteria
41
41
  * FilterCriterion: [ // CoverageFilterCriterionList
42
42
  * { // CoverageFilterCriterion
43
- * CriterionKey: "ACCOUNT_ID" || "CLUSTER_NAME" || "RESOURCE_TYPE" || "COVERAGE_STATUS" || "ADDON_VERSION" || "MANAGEMENT_TYPE" || "EKS_CLUSTER_NAME",
43
+ * CriterionKey: "ACCOUNT_ID" || "CLUSTER_NAME" || "RESOURCE_TYPE" || "COVERAGE_STATUS" || "ADDON_VERSION" || "MANAGEMENT_TYPE" || "EKS_CLUSTER_NAME" || "ECS_CLUSTER_NAME" || "AGENT_VERSION" || "INSTANCE_ID" || "CLUSTER_ARN",
44
44
  * FilterCondition: { // CoverageFilterCondition
45
45
  * Equals: [ // Equals
46
46
  * "STRING_VALUE",
@@ -53,7 +53,7 @@ export interface ListCoverageCommandOutput extends ListCoverageResponse, __Metad
53
53
  * ],
54
54
  * },
55
55
  * SortCriteria: { // CoverageSortCriteria
56
- * AttributeName: "ACCOUNT_ID" || "CLUSTER_NAME" || "COVERAGE_STATUS" || "ISSUE" || "ADDON_VERSION" || "UPDATED_AT" || "EKS_CLUSTER_NAME",
56
+ * AttributeName: "ACCOUNT_ID" || "CLUSTER_NAME" || "COVERAGE_STATUS" || "ISSUE" || "ADDON_VERSION" || "UPDATED_AT" || "EKS_CLUSTER_NAME" || "ECS_CLUSTER_NAME" || "INSTANCE_ID",
57
57
  * OrderBy: "ASC" || "DESC",
58
58
  * },
59
59
  * };
@@ -74,9 +74,31 @@ export interface ListCoverageCommandOutput extends ListCoverageResponse, __Metad
74
74
  * // AddonVersion: "STRING_VALUE",
75
75
  * // AddonStatus: "STRING_VALUE",
76
76
  * // },
77
- * // ManagementType: "AUTO_MANAGED" || "MANUAL",
77
+ * // ManagementType: "AUTO_MANAGED" || "MANUAL" || "DISABLED",
78
+ * // },
79
+ * // ResourceType: "EKS" || "ECS" || "EC2",
80
+ * // EcsClusterDetails: { // CoverageEcsClusterDetails
81
+ * // ClusterName: "STRING_VALUE",
82
+ * // FargateDetails: { // FargateDetails
83
+ * // Issues: [ // Issues
84
+ * // "STRING_VALUE",
85
+ * // ],
86
+ * // ManagementType: "AUTO_MANAGED" || "MANUAL" || "DISABLED",
87
+ * // },
88
+ * // ContainerInstanceDetails: { // ContainerInstanceDetails
89
+ * // CoveredContainerInstances: Number("long"),
90
+ * // CompatibleContainerInstances: Number("long"),
91
+ * // },
92
+ * // },
93
+ * // Ec2InstanceDetails: { // CoverageEc2InstanceDetails
94
+ * // InstanceId: "STRING_VALUE",
95
+ * // InstanceType: "STRING_VALUE",
96
+ * // ClusterArn: "STRING_VALUE",
97
+ * // AgentDetails: { // AgentDetails
98
+ * // Version: "STRING_VALUE",
99
+ * // },
100
+ * // ManagementType: "AUTO_MANAGED" || "MANUAL" || "DISABLED",
78
101
  * // },
79
- * // ResourceType: "EKS",
80
102
  * // },
81
103
  * // CoverageStatus: "HEALTHY" || "UNHEALTHY",
82
104
  * // Issue: "STRING_VALUE",
@@ -2,7 +2,7 @@ import { EndpointParameterInstructions } from "@smithy/middleware-endpoint";
2
2
  import { Command as $Command } from "@smithy/smithy-client";
3
3
  import { Handler, HttpHandlerOptions as __HttpHandlerOptions, MetadataBearer as __MetadataBearer, MiddlewareStack } from "@smithy/types";
4
4
  import { GuardDutyClientResolvedConfig, ServiceInputTypes, ServiceOutputTypes } from "../GuardDutyClient";
5
- import { ListIPSetsRequest, ListIPSetsResponse } from "../models/models_0";
5
+ import { ListIPSetsRequest, ListIPSetsResponse } from "../models/models_1";
6
6
  /**
7
7
  * @public
8
8
  */
@@ -2,7 +2,8 @@ import { EndpointParameterInstructions } from "@smithy/middleware-endpoint";
2
2
  import { Command as $Command } from "@smithy/smithy-client";
3
3
  import { Handler, HttpHandlerOptions as __HttpHandlerOptions, MetadataBearer as __MetadataBearer, MiddlewareStack } from "@smithy/types";
4
4
  import { GuardDutyClientResolvedConfig, ServiceInputTypes, ServiceOutputTypes } from "../GuardDutyClient";
5
- import { ListInvitationsRequest, ListInvitationsResponse } from "../models/models_0";
5
+ import { ListInvitationsRequest } from "../models/models_0";
6
+ import { ListInvitationsResponse } from "../models/models_1";
6
7
  /**
7
8
  * @public
8
9
  */
@@ -2,8 +2,7 @@ import { EndpointParameterInstructions } from "@smithy/middleware-endpoint";
2
2
  import { Command as $Command } from "@smithy/smithy-client";
3
3
  import { Handler, HttpHandlerOptions as __HttpHandlerOptions, MetadataBearer as __MetadataBearer, MiddlewareStack } from "@smithy/types";
4
4
  import { GuardDutyClientResolvedConfig, ServiceInputTypes, ServiceOutputTypes } from "../GuardDutyClient";
5
- import { ListMembersRequest } from "../models/models_0";
6
- import { ListMembersResponse } from "../models/models_1";
5
+ import { ListMembersRequest, ListMembersResponse } from "../models/models_1";
7
6
  /**
8
7
  * @public
9
8
  */
@@ -54,11 +54,11 @@ export interface UpdateDetectorCommandOutput extends UpdateDetectorResponse, __M
54
54
  * },
55
55
  * Features: [ // DetectorFeatureConfigurations
56
56
  * { // DetectorFeatureConfiguration
57
- * Name: "S3_DATA_EVENTS" || "EKS_AUDIT_LOGS" || "EBS_MALWARE_PROTECTION" || "RDS_LOGIN_EVENTS" || "EKS_RUNTIME_MONITORING" || "LAMBDA_NETWORK_LOGS",
57
+ * Name: "S3_DATA_EVENTS" || "EKS_AUDIT_LOGS" || "EBS_MALWARE_PROTECTION" || "RDS_LOGIN_EVENTS" || "EKS_RUNTIME_MONITORING" || "LAMBDA_NETWORK_LOGS" || "RUNTIME_MONITORING",
58
58
  * Status: "ENABLED" || "DISABLED",
59
59
  * AdditionalConfiguration: [ // DetectorAdditionalConfigurations
60
60
  * { // DetectorAdditionalConfiguration
61
- * Name: "EKS_ADDON_MANAGEMENT",
61
+ * Name: "EKS_ADDON_MANAGEMENT" || "ECS_FARGATE_AGENT_MANAGEMENT",
62
62
  * Status: "ENABLED" || "DISABLED",
63
63
  * },
64
64
  * ],
@@ -55,11 +55,11 @@ export interface UpdateMemberDetectorsCommandOutput extends UpdateMemberDetector
55
55
  * },
56
56
  * Features: [ // MemberFeaturesConfigurations
57
57
  * { // MemberFeaturesConfiguration
58
- * Name: "S3_DATA_EVENTS" || "EKS_AUDIT_LOGS" || "EBS_MALWARE_PROTECTION" || "RDS_LOGIN_EVENTS" || "EKS_RUNTIME_MONITORING" || "LAMBDA_NETWORK_LOGS",
58
+ * Name: "S3_DATA_EVENTS" || "EKS_AUDIT_LOGS" || "EBS_MALWARE_PROTECTION" || "RDS_LOGIN_EVENTS" || "EKS_RUNTIME_MONITORING" || "LAMBDA_NETWORK_LOGS" || "RUNTIME_MONITORING",
59
59
  * Status: "ENABLED" || "DISABLED",
60
60
  * AdditionalConfiguration: [ // MemberAdditionalConfigurations
61
61
  * { // MemberAdditionalConfiguration
62
- * Name: "EKS_ADDON_MANAGEMENT",
62
+ * Name: "EKS_ADDON_MANAGEMENT" || "ECS_FARGATE_AGENT_MANAGEMENT",
63
63
  * Status: "ENABLED" || "DISABLED",
64
64
  * },
65
65
  * ],
@@ -56,11 +56,11 @@ export interface UpdateOrganizationConfigurationCommandOutput extends UpdateOrga
56
56
  * },
57
57
  * Features: [ // OrganizationFeaturesConfigurations
58
58
  * { // OrganizationFeatureConfiguration
59
- * Name: "S3_DATA_EVENTS" || "EKS_AUDIT_LOGS" || "EBS_MALWARE_PROTECTION" || "RDS_LOGIN_EVENTS" || "EKS_RUNTIME_MONITORING" || "LAMBDA_NETWORK_LOGS",
59
+ * Name: "S3_DATA_EVENTS" || "EKS_AUDIT_LOGS" || "EBS_MALWARE_PROTECTION" || "RDS_LOGIN_EVENTS" || "EKS_RUNTIME_MONITORING" || "LAMBDA_NETWORK_LOGS" || "RUNTIME_MONITORING",
60
60
  * AutoEnable: "NEW" || "NONE" || "ALL",
61
61
  * AdditionalConfiguration: [ // OrganizationAdditionalConfigurations
62
62
  * { // OrganizationAdditionalConfiguration
63
- * Name: "EKS_ADDON_MANAGEMENT",
63
+ * Name: "EKS_ADDON_MANAGEMENT" || "ECS_FARGATE_AGENT_MANAGEMENT",
64
64
  * AutoEnable: "NEW" || "NONE" || "ALL",
65
65
  * },
66
66
  * ],
@@ -1,7 +1,8 @@
1
1
  /**
2
2
  * <p>Amazon GuardDuty is a continuous security monitoring service that analyzes and processes
3
- * the following data sources: VPC flow logs, Amazon Web Services CloudTrail management event logs, CloudTrail S3 data event
4
- * logs, EKS audit logs, DNS logs, and Amazon EBS volume data.
3
+ * the following foundational data sources - VPC flow logs, Amazon Web Services CloudTrail management event logs, CloudTrail S3 data event
4
+ * logs, EKS audit logs, DNS logs, Amazon EBS volume data, runtime activity belonging to container workloads, such
5
+ * as Amazon EKS, Amazon ECS (including Amazon Web Services Fargate), and Amazon EC2 instances.
5
6
  * It uses threat intelligence
6
7
  * feeds, such as lists of malicious IPs and domains, and machine learning to identify
7
8
  * unexpected, potentially unauthorized, and malicious activity within your Amazon Web Services environment.