Configuring EKS Runtime Monitoring for multiple-account environments (API)
In a multiple-account environments, only the delegated GuardDuty administrator account can enable or disable EKS Runtime Monitoring for the member accounts, and manage GuardDuty agent management for the EKS clusters belonging to the member accounts in their organization. The GuardDuty member accounts can't modify this configuration from their accounts. The delegated GuardDuty administrator account account manages their member accounts using AWS Organizations. For more information about multi-account environments, see Managing multiple accounts.
This section provides steps to configure EKS Runtime Monitoring and manage the GuardDuty security agent for the EKS clusters that belong to the delegated GuardDuty administrator account.
Based on the Approaches to manage GuardDuty security agent in Amazon EKS clusters, you can choose a preferred approach and follow the steps as mentioned in the following table.
Preferred approach to manage GuardDuty security agent |
Steps |
---|---|
Manage security agent through GuardDuty (Monitor all EKS clusters) |
Run the updateDetector API by using
your own regional detector ID and passing the
Set the status for GuardDuty will manage the deployment of and updates to the security agent for all the Amazon EKS clusters in your account. Alternatively, you can use the AWS CLI command by using your
own regional detector ID. To find the The following example enables both
|
Monitor all EKS clusters but exclude some of them (using exclusion tag) |
|
Monitor selective EKS clusters (using inclusion tag) |
|
Manage the security agent manually |
|
This section includes steps to enable EKS Runtime Monitoring and manage security agent for all member accounts. This includes the delegated GuardDuty administrator account, existing member accounts, and the new accounts that join the organization.
Based on the Approaches to manage GuardDuty security agent in Amazon EKS clusters, you can choose a preferred approach and follow the steps as mentioned in the following table.
Preferred approach to manage GuardDuty security agent |
Steps |
---|---|
Manage security agent through GuardDuty (Monitor all EKS clusters) |
To selectively enable EKS Runtime Monitoring for your member
accounts, run the updateMemberDetectors API
operation using your own Set the status for GuardDuty will manage the deployment of and updates to the security agent for all the Amazon EKS clusters in your account. Alternatively, you can use the AWS CLI command by using your
own regional detector ID. To find the The following example enables both
NoteYou can also pass a list of account IDs separated by a space. When the code has successfully executed, it returns an
empty list of |
Monitor all EKS clusters but exclude some of them (using exclusion tag) |
|
Monitor selective EKS clusters (using inclusion tag) |
|
Manage the security agent manually |
|
This section includes the steps to enable EKS Runtime Monitoring and manage GuardDuty security agent for existing active member accounts in your organization.
Based on the Approaches to manage GuardDuty security agent in Amazon EKS clusters, you can choose a preferred approach and follow the steps as mentioned in the following table.
Preferred approach to manage GuardDuty security agent |
Steps |
---|---|
Manage security agent through GuardDuty (Monitor all EKS clusters) |
To selectively enable EKS Runtime Monitoring for your member
accounts, run the updateMemberDetectors API
operation using your own Set the status for GuardDuty will manage the deployment of and updates to the security agent for all the Amazon EKS clusters in your account. Alternatively, you can use the AWS CLI command by using your
own regional detector ID. To find the The following example enables both
NoteYou can also pass a list of account IDs separated by a space. When the code has successfully executed, it returns an
empty list of |
Monitor all EKS clusters but exclude some of them (using exclusion tag) |
|
Monitor selective EKS clusters (using inclusion tag) |
|
Manage the security agent manually |
|
The delegated GuardDuty administrator account can auto-enable EKS Runtime Monitoring and choose an approach for how to manage the GuardDuty security agent for new accounts that join your organization.
Based on the Approaches to manage GuardDuty security agent in Amazon EKS clusters, you can choose a preferred approach and follow the steps as mentioned in the following table.
Preferred approach to manage GuardDuty security agent |
Steps |
---|---|
Manage security agent through GuardDuty (Monitor all EKS clusters) |
To selectively enable EKS Runtime Monitoring for your new accounts,
invoke the UpdateOrganizationConfiguration
API operation using your own Set the status for GuardDuty will manage the deployment of and updates to the security agent for all the Amazon EKS clusters in your account. Alternatively, you can use the AWS CLI command by using your
own regional detector ID. To find the The following example enables both
To find the
When the code has successfully executed, it returns an
empty list of |
Monitor all EKS clusters but exclude some of them (using exclusion tag) |
|
Monitor selective EKS clusters (using inclusion tag) |
|
Manage the security agent manually |
|
This section includes the steps to configure EKS Runtime Monitoring and manage security agent for individual active member accounts.
Based on the Approaches to manage GuardDuty security agent in Amazon EKS clusters, you can choose a preferred approach and follow the steps as mentioned in the following table.
Preferred approach to manage GuardDuty security agent |
Steps |
---|---|
Manage security agent through GuardDuty (Monitor all EKS clusters) |
To selectively enable EKS Runtime Monitoring for your member
accounts, run the updateMemberDetectors API
operation using your own Set the status for GuardDuty will manage the deployment of and updates to the security agent for all the Amazon EKS clusters in your account. Alternatively, you can use the AWS CLI command by using your
own regional detector ID. To find the The following example enables both
NoteYou can also pass a list of account IDs separated by a space. When the code has successfully executed, it returns an
empty list of |
Monitor all EKS clusters but exclude some of them (using exclusion tag) |
|
Monitor selective EKS clusters (using inclusion tag) |
|
Manage the security agent manually |
|