Try AWS Native preview for resources not in the classic version.
aws.guardduty.Detector
Explore with Pulumi AI
Try AWS Native preview for resources not in the classic version.
Provides a resource to manage a GuardDuty detector.
NOTE: Deleting this resource is equivalent to “disabling” GuardDuty for an AWS region, which removes all existing findings. You can set the
enable
attribute tofalse
to instead “suspend” monitoring and feedback reporting while keeping existing data. See the Suspending or Disabling Amazon GuardDuty documentation for more information.
Example Usage
using System.Collections.Generic;
using System.Linq;
using Pulumi;
using Aws = Pulumi.Aws;
return await Deployment.RunAsync(() =>
{
var myDetector = new Aws.GuardDuty.Detector("myDetector", new()
{
Datasources = new Aws.GuardDuty.Inputs.DetectorDatasourcesArgs
{
Kubernetes = new Aws.GuardDuty.Inputs.DetectorDatasourcesKubernetesArgs
{
AuditLogs = new Aws.GuardDuty.Inputs.DetectorDatasourcesKubernetesAuditLogsArgs
{
Enable = false,
},
},
MalwareProtection = new Aws.GuardDuty.Inputs.DetectorDatasourcesMalwareProtectionArgs
{
ScanEc2InstanceWithFindings = new Aws.GuardDuty.Inputs.DetectorDatasourcesMalwareProtectionScanEc2InstanceWithFindingsArgs
{
EbsVolumes = new Aws.GuardDuty.Inputs.DetectorDatasourcesMalwareProtectionScanEc2InstanceWithFindingsEbsVolumesArgs
{
Enable = true,
},
},
},
S3Logs = new Aws.GuardDuty.Inputs.DetectorDatasourcesS3LogsArgs
{
Enable = true,
},
},
Enable = true,
});
});
package main
import (
"github.com/pulumi/pulumi-aws/sdk/v6/go/aws/guardduty"
"github.com/pulumi/pulumi/sdk/v3/go/pulumi"
)
func main() {
pulumi.Run(func(ctx *pulumi.Context) error {
_, err := guardduty.NewDetector(ctx, "myDetector", &guardduty.DetectorArgs{
Datasources: &guardduty.DetectorDatasourcesArgs{
Kubernetes: &guardduty.DetectorDatasourcesKubernetesArgs{
AuditLogs: &guardduty.DetectorDatasourcesKubernetesAuditLogsArgs{
Enable: pulumi.Bool(false),
},
},
MalwareProtection: &guardduty.DetectorDatasourcesMalwareProtectionArgs{
ScanEc2InstanceWithFindings: &guardduty.DetectorDatasourcesMalwareProtectionScanEc2InstanceWithFindingsArgs{
EbsVolumes: &guardduty.DetectorDatasourcesMalwareProtectionScanEc2InstanceWithFindingsEbsVolumesArgs{
Enable: pulumi.Bool(true),
},
},
},
S3Logs: &guardduty.DetectorDatasourcesS3LogsArgs{
Enable: pulumi.Bool(true),
},
},
Enable: pulumi.Bool(true),
})
if err != nil {
return err
}
return nil
})
}
package generated_program;
import com.pulumi.Context;
import com.pulumi.Pulumi;
import com.pulumi.core.Output;
import com.pulumi.aws.guardduty.Detector;
import com.pulumi.aws.guardduty.DetectorArgs;
import com.pulumi.aws.guardduty.inputs.DetectorDatasourcesArgs;
import com.pulumi.aws.guardduty.inputs.DetectorDatasourcesKubernetesArgs;
import com.pulumi.aws.guardduty.inputs.DetectorDatasourcesKubernetesAuditLogsArgs;
import com.pulumi.aws.guardduty.inputs.DetectorDatasourcesMalwareProtectionArgs;
import com.pulumi.aws.guardduty.inputs.DetectorDatasourcesMalwareProtectionScanEc2InstanceWithFindingsArgs;
import com.pulumi.aws.guardduty.inputs.DetectorDatasourcesMalwareProtectionScanEc2InstanceWithFindingsEbsVolumesArgs;
import com.pulumi.aws.guardduty.inputs.DetectorDatasourcesS3LogsArgs;
import java.util.List;
import java.util.ArrayList;
import java.util.Map;
import java.io.File;
import java.nio.file.Files;
import java.nio.file.Paths;
public class App {
public static void main(String[] args) {
Pulumi.run(App::stack);
}
public static void stack(Context ctx) {
var myDetector = new Detector("myDetector", DetectorArgs.builder()
.datasources(DetectorDatasourcesArgs.builder()
.kubernetes(DetectorDatasourcesKubernetesArgs.builder()
.auditLogs(DetectorDatasourcesKubernetesAuditLogsArgs.builder()
.enable(false)
.build())
.build())
.malwareProtection(DetectorDatasourcesMalwareProtectionArgs.builder()
.scanEc2InstanceWithFindings(DetectorDatasourcesMalwareProtectionScanEc2InstanceWithFindingsArgs.builder()
.ebsVolumes(DetectorDatasourcesMalwareProtectionScanEc2InstanceWithFindingsEbsVolumesArgs.builder()
.enable(true)
.build())
.build())
.build())
.s3Logs(DetectorDatasourcesS3LogsArgs.builder()
.enable(true)
.build())
.build())
.enable(true)
.build());
}
}
import pulumi
import pulumi_aws as aws
my_detector = aws.guardduty.Detector("myDetector",
datasources=aws.guardduty.DetectorDatasourcesArgs(
kubernetes=aws.guardduty.DetectorDatasourcesKubernetesArgs(
audit_logs=aws.guardduty.DetectorDatasourcesKubernetesAuditLogsArgs(
enable=False,
),
),
malware_protection=aws.guardduty.DetectorDatasourcesMalwareProtectionArgs(
scan_ec2_instance_with_findings=aws.guardduty.DetectorDatasourcesMalwareProtectionScanEc2InstanceWithFindingsArgs(
ebs_volumes=aws.guardduty.DetectorDatasourcesMalwareProtectionScanEc2InstanceWithFindingsEbsVolumesArgs(
enable=True,
),
),
),
s3_logs=aws.guardduty.DetectorDatasourcesS3LogsArgs(
enable=True,
),
),
enable=True)
import * as pulumi from "@pulumi/pulumi";
import * as aws from "@pulumi/aws";
const myDetector = new aws.guardduty.Detector("myDetector", {
datasources: {
kubernetes: {
auditLogs: {
enable: false,
},
},
malwareProtection: {
scanEc2InstanceWithFindings: {
ebsVolumes: {
enable: true,
},
},
},
s3Logs: {
enable: true,
},
},
enable: true,
});
resources:
myDetector:
type: aws:guardduty:Detector
properties:
datasources:
kubernetes:
auditLogs:
enable: false
malwareProtection:
scanEc2InstanceWithFindings:
ebsVolumes:
enable: true
s3Logs:
enable: true
enable: true
Create Detector Resource
new Detector(name: string, args?: DetectorArgs, opts?: CustomResourceOptions);
@overload
def Detector(resource_name: str,
opts: Optional[ResourceOptions] = None,
datasources: Optional[DetectorDatasourcesArgs] = None,
enable: Optional[bool] = None,
finding_publishing_frequency: Optional[str] = None,
tags: Optional[Mapping[str, str]] = None)
@overload
def Detector(resource_name: str,
args: Optional[DetectorArgs] = None,
opts: Optional[ResourceOptions] = None)
func NewDetector(ctx *Context, name string, args *DetectorArgs, opts ...ResourceOption) (*Detector, error)
public Detector(string name, DetectorArgs? args = null, CustomResourceOptions? opts = null)
public Detector(String name, DetectorArgs args)
public Detector(String name, DetectorArgs args, CustomResourceOptions options)
type: aws:guardduty:Detector
properties: # The arguments to resource properties.
options: # Bag of options to control resource's behavior.
- name string
- The unique name of the resource.
- args DetectorArgs
- The arguments to resource properties.
- opts CustomResourceOptions
- Bag of options to control resource's behavior.
- resource_name str
- The unique name of the resource.
- args DetectorArgs
- The arguments to resource properties.
- opts ResourceOptions
- Bag of options to control resource's behavior.
- ctx Context
- Context object for the current deployment.
- name string
- The unique name of the resource.
- args DetectorArgs
- The arguments to resource properties.
- opts ResourceOption
- Bag of options to control resource's behavior.
- name string
- The unique name of the resource.
- args DetectorArgs
- The arguments to resource properties.
- opts CustomResourceOptions
- Bag of options to control resource's behavior.
- name String
- The unique name of the resource.
- args DetectorArgs
- The arguments to resource properties.
- options CustomResourceOptions
- Bag of options to control resource's behavior.
Detector Resource Properties
To learn more about resource properties and how to use them, see Inputs and Outputs in the Architecture and Concepts docs.
Inputs
The Detector resource accepts the following input properties:
- Datasources
Detector
Datasources Describes which data sources will be enabled for the detector. See Data Sources below for more details.
- Enable bool
Enable monitoring and feedback reporting. Setting to
false
is equivalent to "suspending" GuardDuty. Defaults totrue
.- Finding
Publishing stringFrequency Specifies the frequency of notifications sent for subsequent finding occurrences. If the detector is a GuardDuty member account, the value is determined by the GuardDuty primary account and cannot be modified, otherwise defaults to
SIX_HOURS
. For standalone and GuardDuty primary accounts, it must be configured in this provider to enable drift detection. Valid values for standalone and primary accounts:FIFTEEN_MINUTES
,ONE_HOUR
,SIX_HOURS
. See AWS Documentation for more information.- Dictionary<string, string>
Key-value map of resource tags. If configured with a provider
default_tags
configuration block present, tags with matching keys will overwrite those defined at the provider-level.
- Datasources
Detector
Datasources Args Describes which data sources will be enabled for the detector. See Data Sources below for more details.
- Enable bool
Enable monitoring and feedback reporting. Setting to
false
is equivalent to "suspending" GuardDuty. Defaults totrue
.- Finding
Publishing stringFrequency Specifies the frequency of notifications sent for subsequent finding occurrences. If the detector is a GuardDuty member account, the value is determined by the GuardDuty primary account and cannot be modified, otherwise defaults to
SIX_HOURS
. For standalone and GuardDuty primary accounts, it must be configured in this provider to enable drift detection. Valid values for standalone and primary accounts:FIFTEEN_MINUTES
,ONE_HOUR
,SIX_HOURS
. See AWS Documentation for more information.- map[string]string
Key-value map of resource tags. If configured with a provider
default_tags
configuration block present, tags with matching keys will overwrite those defined at the provider-level.
- datasources
Detector
Datasources Describes which data sources will be enabled for the detector. See Data Sources below for more details.
- enable Boolean
Enable monitoring and feedback reporting. Setting to
false
is equivalent to "suspending" GuardDuty. Defaults totrue
.- finding
Publishing StringFrequency Specifies the frequency of notifications sent for subsequent finding occurrences. If the detector is a GuardDuty member account, the value is determined by the GuardDuty primary account and cannot be modified, otherwise defaults to
SIX_HOURS
. For standalone and GuardDuty primary accounts, it must be configured in this provider to enable drift detection. Valid values for standalone and primary accounts:FIFTEEN_MINUTES
,ONE_HOUR
,SIX_HOURS
. See AWS Documentation for more information.- Map<String,String>
Key-value map of resource tags. If configured with a provider
default_tags
configuration block present, tags with matching keys will overwrite those defined at the provider-level.
- datasources
Detector
Datasources Describes which data sources will be enabled for the detector. See Data Sources below for more details.
- enable boolean
Enable monitoring and feedback reporting. Setting to
false
is equivalent to "suspending" GuardDuty. Defaults totrue
.- finding
Publishing stringFrequency Specifies the frequency of notifications sent for subsequent finding occurrences. If the detector is a GuardDuty member account, the value is determined by the GuardDuty primary account and cannot be modified, otherwise defaults to
SIX_HOURS
. For standalone and GuardDuty primary accounts, it must be configured in this provider to enable drift detection. Valid values for standalone and primary accounts:FIFTEEN_MINUTES
,ONE_HOUR
,SIX_HOURS
. See AWS Documentation for more information.- {[key: string]: string}
Key-value map of resource tags. If configured with a provider
default_tags
configuration block present, tags with matching keys will overwrite those defined at the provider-level.
- datasources
Detector
Datasources Args Describes which data sources will be enabled for the detector. See Data Sources below for more details.
- enable bool
Enable monitoring and feedback reporting. Setting to
false
is equivalent to "suspending" GuardDuty. Defaults totrue
.- finding_
publishing_ strfrequency Specifies the frequency of notifications sent for subsequent finding occurrences. If the detector is a GuardDuty member account, the value is determined by the GuardDuty primary account and cannot be modified, otherwise defaults to
SIX_HOURS
. For standalone and GuardDuty primary accounts, it must be configured in this provider to enable drift detection. Valid values for standalone and primary accounts:FIFTEEN_MINUTES
,ONE_HOUR
,SIX_HOURS
. See AWS Documentation for more information.- Mapping[str, str]
Key-value map of resource tags. If configured with a provider
default_tags
configuration block present, tags with matching keys will overwrite those defined at the provider-level.
- datasources Property Map
Describes which data sources will be enabled for the detector. See Data Sources below for more details.
- enable Boolean
Enable monitoring and feedback reporting. Setting to
false
is equivalent to "suspending" GuardDuty. Defaults totrue
.- finding
Publishing StringFrequency Specifies the frequency of notifications sent for subsequent finding occurrences. If the detector is a GuardDuty member account, the value is determined by the GuardDuty primary account and cannot be modified, otherwise defaults to
SIX_HOURS
. For standalone and GuardDuty primary accounts, it must be configured in this provider to enable drift detection. Valid values for standalone and primary accounts:FIFTEEN_MINUTES
,ONE_HOUR
,SIX_HOURS
. See AWS Documentation for more information.- Map<String>
Key-value map of resource tags. If configured with a provider
default_tags
configuration block present, tags with matching keys will overwrite those defined at the provider-level.
Outputs
All input properties are implicitly available as output properties. Additionally, the Detector resource produces the following output properties:
- Account
Id string The AWS account ID of the GuardDuty detector
- Arn string
Amazon Resource Name (ARN) of the GuardDuty detector
- Id string
The provider-assigned unique ID for this managed resource.
- Dictionary<string, string>
A map of tags assigned to the resource, including those inherited from the provider
default_tags
configuration block.Please use
tags
instead.
- Account
Id string The AWS account ID of the GuardDuty detector
- Arn string
Amazon Resource Name (ARN) of the GuardDuty detector
- Id string
The provider-assigned unique ID for this managed resource.
- map[string]string
A map of tags assigned to the resource, including those inherited from the provider
default_tags
configuration block.Please use
tags
instead.
- account
Id String The AWS account ID of the GuardDuty detector
- arn String
Amazon Resource Name (ARN) of the GuardDuty detector
- id String
The provider-assigned unique ID for this managed resource.
- Map<String,String>
A map of tags assigned to the resource, including those inherited from the provider
default_tags
configuration block.Please use
tags
instead.
- account
Id string The AWS account ID of the GuardDuty detector
- arn string
Amazon Resource Name (ARN) of the GuardDuty detector
- id string
The provider-assigned unique ID for this managed resource.
- {[key: string]: string}
A map of tags assigned to the resource, including those inherited from the provider
default_tags
configuration block.Please use
tags
instead.
- account_
id str The AWS account ID of the GuardDuty detector
- arn str
Amazon Resource Name (ARN) of the GuardDuty detector
- id str
The provider-assigned unique ID for this managed resource.
- Mapping[str, str]
A map of tags assigned to the resource, including those inherited from the provider
default_tags
configuration block.Please use
tags
instead.
- account
Id String The AWS account ID of the GuardDuty detector
- arn String
Amazon Resource Name (ARN) of the GuardDuty detector
- id String
The provider-assigned unique ID for this managed resource.
- Map<String>
A map of tags assigned to the resource, including those inherited from the provider
default_tags
configuration block.Please use
tags
instead.
Look up Existing Detector Resource
Get an existing Detector resource’s state with the given name, ID, and optional extra properties used to qualify the lookup.
public static get(name: string, id: Input<ID>, state?: DetectorState, opts?: CustomResourceOptions): Detector
@staticmethod
def get(resource_name: str,
id: str,
opts: Optional[ResourceOptions] = None,
account_id: Optional[str] = None,
arn: Optional[str] = None,
datasources: Optional[DetectorDatasourcesArgs] = None,
enable: Optional[bool] = None,
finding_publishing_frequency: Optional[str] = None,
tags: Optional[Mapping[str, str]] = None,
tags_all: Optional[Mapping[str, str]] = None) -> Detector
func GetDetector(ctx *Context, name string, id IDInput, state *DetectorState, opts ...ResourceOption) (*Detector, error)
public static Detector Get(string name, Input<string> id, DetectorState? state, CustomResourceOptions? opts = null)
public static Detector get(String name, Output<String> id, DetectorState state, CustomResourceOptions options)
Resource lookup is not supported in YAML
- name
- The unique name of the resulting resource.
- id
- The unique provider ID of the resource to lookup.
- state
- Any extra arguments used during the lookup.
- opts
- A bag of options that control this resource's behavior.
- resource_name
- The unique name of the resulting resource.
- id
- The unique provider ID of the resource to lookup.
- name
- The unique name of the resulting resource.
- id
- The unique provider ID of the resource to lookup.
- state
- Any extra arguments used during the lookup.
- opts
- A bag of options that control this resource's behavior.
- name
- The unique name of the resulting resource.
- id
- The unique provider ID of the resource to lookup.
- state
- Any extra arguments used during the lookup.
- opts
- A bag of options that control this resource's behavior.
- name
- The unique name of the resulting resource.
- id
- The unique provider ID of the resource to lookup.
- state
- Any extra arguments used during the lookup.
- opts
- A bag of options that control this resource's behavior.
- Account
Id string The AWS account ID of the GuardDuty detector
- Arn string
Amazon Resource Name (ARN) of the GuardDuty detector
- Datasources
Detector
Datasources Describes which data sources will be enabled for the detector. See Data Sources below for more details.
- Enable bool
Enable monitoring and feedback reporting. Setting to
false
is equivalent to "suspending" GuardDuty. Defaults totrue
.- Finding
Publishing stringFrequency Specifies the frequency of notifications sent for subsequent finding occurrences. If the detector is a GuardDuty member account, the value is determined by the GuardDuty primary account and cannot be modified, otherwise defaults to
SIX_HOURS
. For standalone and GuardDuty primary accounts, it must be configured in this provider to enable drift detection. Valid values for standalone and primary accounts:FIFTEEN_MINUTES
,ONE_HOUR
,SIX_HOURS
. See AWS Documentation for more information.- Dictionary<string, string>
Key-value map of resource tags. If configured with a provider
default_tags
configuration block present, tags with matching keys will overwrite those defined at the provider-level.- Dictionary<string, string>
A map of tags assigned to the resource, including those inherited from the provider
default_tags
configuration block.Please use
tags
instead.
- Account
Id string The AWS account ID of the GuardDuty detector
- Arn string
Amazon Resource Name (ARN) of the GuardDuty detector
- Datasources
Detector
Datasources Args Describes which data sources will be enabled for the detector. See Data Sources below for more details.
- Enable bool
Enable monitoring and feedback reporting. Setting to
false
is equivalent to "suspending" GuardDuty. Defaults totrue
.- Finding
Publishing stringFrequency Specifies the frequency of notifications sent for subsequent finding occurrences. If the detector is a GuardDuty member account, the value is determined by the GuardDuty primary account and cannot be modified, otherwise defaults to
SIX_HOURS
. For standalone and GuardDuty primary accounts, it must be configured in this provider to enable drift detection. Valid values for standalone and primary accounts:FIFTEEN_MINUTES
,ONE_HOUR
,SIX_HOURS
. See AWS Documentation for more information.- map[string]string
Key-value map of resource tags. If configured with a provider
default_tags
configuration block present, tags with matching keys will overwrite those defined at the provider-level.- map[string]string
A map of tags assigned to the resource, including those inherited from the provider
default_tags
configuration block.Please use
tags
instead.
- account
Id String The AWS account ID of the GuardDuty detector
- arn String
Amazon Resource Name (ARN) of the GuardDuty detector
- datasources
Detector
Datasources Describes which data sources will be enabled for the detector. See Data Sources below for more details.
- enable Boolean
Enable monitoring and feedback reporting. Setting to
false
is equivalent to "suspending" GuardDuty. Defaults totrue
.- finding
Publishing StringFrequency Specifies the frequency of notifications sent for subsequent finding occurrences. If the detector is a GuardDuty member account, the value is determined by the GuardDuty primary account and cannot be modified, otherwise defaults to
SIX_HOURS
. For standalone and GuardDuty primary accounts, it must be configured in this provider to enable drift detection. Valid values for standalone and primary accounts:FIFTEEN_MINUTES
,ONE_HOUR
,SIX_HOURS
. See AWS Documentation for more information.- Map<String,String>
Key-value map of resource tags. If configured with a provider
default_tags
configuration block present, tags with matching keys will overwrite those defined at the provider-level.- Map<String,String>
A map of tags assigned to the resource, including those inherited from the provider
default_tags
configuration block.Please use
tags
instead.
- account
Id string The AWS account ID of the GuardDuty detector
- arn string
Amazon Resource Name (ARN) of the GuardDuty detector
- datasources
Detector
Datasources Describes which data sources will be enabled for the detector. See Data Sources below for more details.
- enable boolean
Enable monitoring and feedback reporting. Setting to
false
is equivalent to "suspending" GuardDuty. Defaults totrue
.- finding
Publishing stringFrequency Specifies the frequency of notifications sent for subsequent finding occurrences. If the detector is a GuardDuty member account, the value is determined by the GuardDuty primary account and cannot be modified, otherwise defaults to
SIX_HOURS
. For standalone and GuardDuty primary accounts, it must be configured in this provider to enable drift detection. Valid values for standalone and primary accounts:FIFTEEN_MINUTES
,ONE_HOUR
,SIX_HOURS
. See AWS Documentation for more information.- {[key: string]: string}
Key-value map of resource tags. If configured with a provider
default_tags
configuration block present, tags with matching keys will overwrite those defined at the provider-level.- {[key: string]: string}
A map of tags assigned to the resource, including those inherited from the provider
default_tags
configuration block.Please use
tags
instead.
- account_
id str The AWS account ID of the GuardDuty detector
- arn str
Amazon Resource Name (ARN) of the GuardDuty detector
- datasources
Detector
Datasources Args Describes which data sources will be enabled for the detector. See Data Sources below for more details.
- enable bool
Enable monitoring and feedback reporting. Setting to
false
is equivalent to "suspending" GuardDuty. Defaults totrue
.- finding_
publishing_ strfrequency Specifies the frequency of notifications sent for subsequent finding occurrences. If the detector is a GuardDuty member account, the value is determined by the GuardDuty primary account and cannot be modified, otherwise defaults to
SIX_HOURS
. For standalone and GuardDuty primary accounts, it must be configured in this provider to enable drift detection. Valid values for standalone and primary accounts:FIFTEEN_MINUTES
,ONE_HOUR
,SIX_HOURS
. See AWS Documentation for more information.- Mapping[str, str]
Key-value map of resource tags. If configured with a provider
default_tags
configuration block present, tags with matching keys will overwrite those defined at the provider-level.- Mapping[str, str]
A map of tags assigned to the resource, including those inherited from the provider
default_tags
configuration block.Please use
tags
instead.
- account
Id String The AWS account ID of the GuardDuty detector
- arn String
Amazon Resource Name (ARN) of the GuardDuty detector
- datasources Property Map
Describes which data sources will be enabled for the detector. See Data Sources below for more details.
- enable Boolean
Enable monitoring and feedback reporting. Setting to
false
is equivalent to "suspending" GuardDuty. Defaults totrue
.- finding
Publishing StringFrequency Specifies the frequency of notifications sent for subsequent finding occurrences. If the detector is a GuardDuty member account, the value is determined by the GuardDuty primary account and cannot be modified, otherwise defaults to
SIX_HOURS
. For standalone and GuardDuty primary accounts, it must be configured in this provider to enable drift detection. Valid values for standalone and primary accounts:FIFTEEN_MINUTES
,ONE_HOUR
,SIX_HOURS
. See AWS Documentation for more information.- Map<String>
Key-value map of resource tags. If configured with a provider
default_tags
configuration block present, tags with matching keys will overwrite those defined at the provider-level.- Map<String>
A map of tags assigned to the resource, including those inherited from the provider
default_tags
configuration block.Please use
tags
instead.
Supporting Types
DetectorDatasources, DetectorDatasourcesArgs
- Kubernetes
Detector
Datasources Kubernetes Configures Kubernetes protection. See Kubernetes and Kubernetes Audit Logs below for more details.
- Malware
Protection DetectorDatasources Malware Protection Configures Malware Protection. See Malware Protection, Scan EC2 instance with findings and EBS volumes below for more details.
- S3Logs
Detector
Datasources S3Logs Configures S3 protection. See S3 Logs below for more details.
- Kubernetes
Detector
Datasources Kubernetes Configures Kubernetes protection. See Kubernetes and Kubernetes Audit Logs below for more details.
- Malware
Protection DetectorDatasources Malware Protection Configures Malware Protection. See Malware Protection, Scan EC2 instance with findings and EBS volumes below for more details.
- S3Logs
Detector
Datasources S3Logs Configures S3 protection. See S3 Logs below for more details.
- kubernetes
Detector
Datasources Kubernetes Configures Kubernetes protection. See Kubernetes and Kubernetes Audit Logs below for more details.
- malware
Protection DetectorDatasources Malware Protection Configures Malware Protection. See Malware Protection, Scan EC2 instance with findings and EBS volumes below for more details.
- s3Logs
Detector
Datasources S3Logs Configures S3 protection. See S3 Logs below for more details.
- kubernetes
Detector
Datasources Kubernetes Configures Kubernetes protection. See Kubernetes and Kubernetes Audit Logs below for more details.
- malware
Protection DetectorDatasources Malware Protection Configures Malware Protection. See Malware Protection, Scan EC2 instance with findings and EBS volumes below for more details.
- s3Logs
Detector
Datasources S3Logs Configures S3 protection. See S3 Logs below for more details.
- kubernetes
Detector
Datasources Kubernetes Configures Kubernetes protection. See Kubernetes and Kubernetes Audit Logs below for more details.
- malware_
protection DetectorDatasources Malware Protection Configures Malware Protection. See Malware Protection, Scan EC2 instance with findings and EBS volumes below for more details.
- s3_
logs DetectorDatasources S3Logs Configures S3 protection. See S3 Logs below for more details.
- kubernetes Property Map
Configures Kubernetes protection. See Kubernetes and Kubernetes Audit Logs below for more details.
- malware
Protection Property Map Configures Malware Protection. See Malware Protection, Scan EC2 instance with findings and EBS volumes below for more details.
- s3Logs Property Map
Configures S3 protection. See S3 Logs below for more details.
DetectorDatasourcesKubernetes, DetectorDatasourcesKubernetesArgs
- Audit
Logs DetectorDatasources Kubernetes Audit Logs Configures Kubernetes audit logs as a data source for Kubernetes protection. See Kubernetes Audit Logs below for more details.
- Audit
Logs DetectorDatasources Kubernetes Audit Logs Configures Kubernetes audit logs as a data source for Kubernetes protection. See Kubernetes Audit Logs below for more details.
- audit
Logs DetectorDatasources Kubernetes Audit Logs Configures Kubernetes audit logs as a data source for Kubernetes protection. See Kubernetes Audit Logs below for more details.
- audit
Logs DetectorDatasources Kubernetes Audit Logs Configures Kubernetes audit logs as a data source for Kubernetes protection. See Kubernetes Audit Logs below for more details.
- audit_
logs DetectorDatasources Kubernetes Audit Logs Configures Kubernetes audit logs as a data source for Kubernetes protection. See Kubernetes Audit Logs below for more details.
- audit
Logs Property Map Configures Kubernetes audit logs as a data source for Kubernetes protection. See Kubernetes Audit Logs below for more details.
DetectorDatasourcesKubernetesAuditLogs, DetectorDatasourcesKubernetesAuditLogsArgs
- Enable bool
If true, enables Kubernetes audit logs as a data source for Kubernetes protection. Defaults to
true
.
- Enable bool
If true, enables Kubernetes audit logs as a data source for Kubernetes protection. Defaults to
true
.
- enable Boolean
If true, enables Kubernetes audit logs as a data source for Kubernetes protection. Defaults to
true
.
- enable boolean
If true, enables Kubernetes audit logs as a data source for Kubernetes protection. Defaults to
true
.
- enable bool
If true, enables Kubernetes audit logs as a data source for Kubernetes protection. Defaults to
true
.
- enable Boolean
If true, enables Kubernetes audit logs as a data source for Kubernetes protection. Defaults to
true
.
DetectorDatasourcesMalwareProtection, DetectorDatasourcesMalwareProtectionArgs
- Scan
Ec2Instance DetectorWith Findings Datasources Malware Protection Scan Ec2Instance With Findings Configure whether Malware Protection is enabled as data source for EC2 instances with findings for the detector. See Scan EC2 instance with findings below for more details.
- Scan
Ec2Instance DetectorWith Findings Datasources Malware Protection Scan Ec2Instance With Findings Configure whether Malware Protection is enabled as data source for EC2 instances with findings for the detector. See Scan EC2 instance with findings below for more details.
- scan
Ec2Instance DetectorWith Findings Datasources Malware Protection Scan Ec2Instance With Findings Configure whether Malware Protection is enabled as data source for EC2 instances with findings for the detector. See Scan EC2 instance with findings below for more details.
- scan
Ec2Instance DetectorWith Findings Datasources Malware Protection Scan Ec2Instance With Findings Configure whether Malware Protection is enabled as data source for EC2 instances with findings for the detector. See Scan EC2 instance with findings below for more details.
- scan_
ec2_ Detectorinstance_ with_ findings Datasources Malware Protection Scan Ec2Instance With Findings Configure whether Malware Protection is enabled as data source for EC2 instances with findings for the detector. See Scan EC2 instance with findings below for more details.
- scan
Ec2Instance Property MapWith Findings Configure whether Malware Protection is enabled as data source for EC2 instances with findings for the detector. See Scan EC2 instance with findings below for more details.
DetectorDatasourcesMalwareProtectionScanEc2InstanceWithFindings, DetectorDatasourcesMalwareProtectionScanEc2InstanceWithFindingsArgs
- Ebs
Volumes DetectorDatasources Malware Protection Scan Ec2Instance With Findings Ebs Volumes Configure whether scanning EBS volumes is enabled as data source for the detector for instances with findings. See EBS volumes below for more details.
- Ebs
Volumes DetectorDatasources Malware Protection Scan Ec2Instance With Findings Ebs Volumes Configure whether scanning EBS volumes is enabled as data source for the detector for instances with findings. See EBS volumes below for more details.
- ebs
Volumes DetectorDatasources Malware Protection Scan Ec2Instance With Findings Ebs Volumes Configure whether scanning EBS volumes is enabled as data source for the detector for instances with findings. See EBS volumes below for more details.
- ebs
Volumes DetectorDatasources Malware Protection Scan Ec2Instance With Findings Ebs Volumes Configure whether scanning EBS volumes is enabled as data source for the detector for instances with findings. See EBS volumes below for more details.
- ebs_
volumes DetectorDatasources Malware Protection Scan Ec2Instance With Findings Ebs Volumes Configure whether scanning EBS volumes is enabled as data source for the detector for instances with findings. See EBS volumes below for more details.
- ebs
Volumes Property Map Configure whether scanning EBS volumes is enabled as data source for the detector for instances with findings. See EBS volumes below for more details.
DetectorDatasourcesMalwareProtectionScanEc2InstanceWithFindingsEbsVolumes, DetectorDatasourcesMalwareProtectionScanEc2InstanceWithFindingsEbsVolumesArgs
- Enable bool
If true, enables Malware Protection as data source for the detector. Defaults to
true
.
- Enable bool
If true, enables Malware Protection as data source for the detector. Defaults to
true
.
- enable Boolean
If true, enables Malware Protection as data source for the detector. Defaults to
true
.
- enable boolean
If true, enables Malware Protection as data source for the detector. Defaults to
true
.
- enable bool
If true, enables Malware Protection as data source for the detector. Defaults to
true
.
- enable Boolean
If true, enables Malware Protection as data source for the detector. Defaults to
true
.
DetectorDatasourcesS3Logs, DetectorDatasourcesS3LogsArgs
- Enable bool
Enable monitoring and feedback reporting. Setting to
false
is equivalent to "suspending" GuardDuty. Defaults totrue
.
- Enable bool
Enable monitoring and feedback reporting. Setting to
false
is equivalent to "suspending" GuardDuty. Defaults totrue
.
- enable Boolean
Enable monitoring and feedback reporting. Setting to
false
is equivalent to "suspending" GuardDuty. Defaults totrue
.
- enable boolean
Enable monitoring and feedback reporting. Setting to
false
is equivalent to "suspending" GuardDuty. Defaults totrue
.
- enable bool
Enable monitoring and feedback reporting. Setting to
false
is equivalent to "suspending" GuardDuty. Defaults totrue
.
- enable Boolean
Enable monitoring and feedback reporting. Setting to
false
is equivalent to "suspending" GuardDuty. Defaults totrue
.
Import
Using pulumi import
, import GuardDuty detectors using the detector ID. For example:
$ pulumi import aws:guardduty/detector:Detector MyDetector 00b00fd5aecc0ab60a708659477e9617
The ID of the detector can be retrieved via the AWS CLI using aws guardduty list-detectors
.
Package Details
- Repository
- AWS Classic pulumi/pulumi-aws
- License
- Apache-2.0
- Notes
This Pulumi package is based on the
aws
Terraform Provider.
Try AWS Native preview for resources not in the classic version.