Skip to content

Commit 1a5ea82

Browse files
authored
Merge pull request #43174 from acwwat/d-aws_guardduty_detector_feature-add_extended_threat_detection_for_eks
docs: Add extended threat detection for EKS info and example to aws_guardduty_detector_feature doc
2 parents d2b7d6e + faa5284 commit 1a5ea82

File tree

1 file changed

+22
-0
lines changed

1 file changed

+22
-0
lines changed

website/docs/r/guardduty_detector_feature.html.markdown

Lines changed: 22 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -19,6 +19,28 @@ resource "aws_guardduty_detector" "example" {
1919
enable = true
2020
}
2121
22+
resource "aws_guardduty_detector_feature" "s3_protection" {
23+
detector_id = aws_guardduty_detector.example.id
24+
name = "S3_DATA_EVENTS"
25+
status = "ENABLED"
26+
}
27+
```
28+
29+
## Extended Threat Detection for EKS
30+
31+
To enable GuardDuty [Extended Threat Detection](https://docs.aws.amazon.com/guardduty/latest/ug/guardduty-extended-threat-detection.html) for EKS, you need at least one of these features enabled: [EKS Protection](https://docs.aws.amazon.com/guardduty/latest/ug/kubernetes-protection.html) or [Runtime Monitoring}(https://docs.aws.amazon.com/guardduty/latest/ug/runtime-monitoring-configuration.html). For maximum detection coverage, enabling both is recommended to enhance detection capabilities.
32+
33+
```terraform
34+
resource "aws_guardduty_detector" "example" {
35+
enable = true
36+
}
37+
38+
resource "aws_guardduty_detector_feature" "eks_protection" {
39+
detector_id = aws_guardduty_detector.example.id
40+
name = "EKS_AUDIT_LOGS"
41+
status = "ENABLED"
42+
}
43+
2244
resource "aws_guardduty_detector_feature" "eks_runtime_monitoring" {
2345
detector_id = aws_guardduty_detector.example.id
2446
name = "EKS_RUNTIME_MONITORING"

0 commit comments

Comments
 (0)