-
Notifications
You must be signed in to change notification settings - Fork 9.3k
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
resource/aws_guardduty_detector: S3 events with GuardDuty #14607
Comments
I'm willing to implement this myself. The AWS API and corresponding AWS Go SDK methods have a IMHO, the most straight forward way to add this feature would be to add a boolean parameter called something like For better provider resource/AWS API parity we might want to add a What's the preferred way to add this feature to this resource? |
Hi @pietro 👋 Thank you for reaching out and for your interest in implementing this! We typically prefer following the API structures for consistency with other AWS tooling (CLI, etc.) and to prevent future maintenance/deprecation issues with our own abstractions. 👍 Briefly looking at the API reference, the equivalent Terraform configuration we would expect here would be something like: resource "aws_guardduty_detector" "example" {
# ... other configuration ...
datasources {
s3_logs {
enable = true
}
}
} |
@ewbankkit any update on this |
Any update, please? |
hi @pietro Willing to resume or should someone else pick this up? |
This functionality has been released in v3.50.0 of the Terraform AWS Provider. Please see the Terraform documentation on provider versioning or reach out if you need any assistance upgrading. For further feature requests or bug reports with this functionality, please create a new GitHub issue following the template. Thank you! |
I'm going to lock this issue because it has been closed for 30 days ⏳. This helps our maintainers find and focus on the active issues. |
Community Note
Description
Could you create a Terraform resource to enable S3 events with GuardDuty?
New or Affected Resource(s)
Details / documentation here: https://docs.aws.amazon.com/guardduty/latest/ug/s3_detection.html
Relevant AWS CLI command:
aws guardduty update-member-detectors --detector-id 12abc34d567e8fa901bc2d34e56789f0 --account-ids 123456789012 --data-sources '{"S3Logs":{"Enable":true}}'
Potential Terraform Configuration
References
The text was updated successfully, but these errors were encountered: