Skip to content

Commit 5e93e6e

Browse files
authored
Merge pull request #43188 from acwwat/d-aws_guardduty_member_detector_feature-add_extended_threat_detection_for_eks
docs: Add extended threat detection for EKS info and example to aws_guardduty_member_detector_feature doc
2 parents 377bbab + 5454a71 commit 5e93e6e

File tree

2 files changed

+26
-7
lines changed

2 files changed

+26
-7
lines changed

website/docs/r/guardduty_detector_feature.html.markdown

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -28,7 +28,7 @@ resource "aws_guardduty_detector_feature" "s3_protection" {
2828

2929
## Extended Threat Detection for EKS
3030

31-
To enable GuardDuty [Extended Threat Detection](https://docs.aws.amazon.com/guardduty/latest/ug/guardduty-extended-threat-detection.html) for EKS, you need at least one of these features enabled: [EKS Protection](https://docs.aws.amazon.com/guardduty/latest/ug/kubernetes-protection.html) or [Runtime Monitoring}(https://docs.aws.amazon.com/guardduty/latest/ug/runtime-monitoring-configuration.html). For maximum detection coverage, enabling both is recommended to enhance detection capabilities.
31+
To enable GuardDuty [Extended Threat Detection](https://docs.aws.amazon.com/guardduty/latest/ug/guardduty-extended-threat-detection.html) for EKS, you need at least one of these features enabled: [EKS Protection](https://docs.aws.amazon.com/guardduty/latest/ug/kubernetes-protection.html) or [Runtime Monitoring](https://docs.aws.amazon.com/guardduty/latest/ug/runtime-monitoring-configuration.html). For maximum detection coverage, enabling both is recommended to enhance detection capabilities.
3232

3333
```terraform
3434
resource "aws_guardduty_detector" "example" {

website/docs/r/guardduty_member_detector_feature.html.markdown

Lines changed: 25 additions & 6 deletions
Original file line numberDiff line numberDiff line change
@@ -22,16 +22,35 @@ resource "aws_guardduty_detector" "example" {
2222
resource "aws_guardduty_member_detector_feature" "runtime_monitoring" {
2323
detector_id = aws_guardduty_detector.example.id
2424
account_id = "123456789012"
25-
name = "RUNTIME_MONITORING"
25+
name = "S3_DATA_EVENTS"
2626
status = "ENABLED"
27+
}
28+
```
2729

28-
additional_configuration {
29-
name = "EKS_ADDON_MANAGEMENT"
30-
status = "ENABLED"
31-
}
30+
## Extended Threat Detection for EKS
31+
32+
To enable GuardDuty [Extended Threat Detection](https://docs.aws.amazon.com/guardduty/latest/ug/guardduty-extended-threat-detection.html) for EKS, you need at least one of these features enabled: [EKS Protection](https://docs.aws.amazon.com/guardduty/latest/ug/kubernetes-protection.html) or [Runtime Monitoring](https://docs.aws.amazon.com/guardduty/latest/ug/runtime-monitoring-configuration.html). For maximum detection coverage, enabling both is recommended to enhance detection capabilities.
33+
34+
```terraform
35+
resource "aws_guardduty_detector" "example" {
36+
enable = true
37+
}
38+
39+
resource "aws_guardduty_detector_feature" "eks_protection" {
40+
detector_id = aws_guardduty_detector.example.id
41+
account_id = "123456789012"
42+
name = "EKS_AUDIT_LOGS"
43+
status = "ENABLED"
44+
}
45+
46+
resource "aws_guardduty_detector_feature" "eks_runtime_monitoring" {
47+
detector_id = aws_guardduty_detector.example.id
48+
account_id = "123456789012"
49+
name = "EKS_RUNTIME_MONITORING"
50+
status = "ENABLED"
3251
3352
additional_configuration {
34-
name = "ECS_FARGATE_AGENT_MANAGEMENT"
53+
name = "EKS_ADDON_MANAGEMENT"
3554
status = "ENABLED"
3655
}
3756
}

0 commit comments

Comments
 (0)