Validating VPC endpoint configuration
After you install the security agent manually or through GuardDuty automated configuration, you can use this document to validate that the VPC endpoint configuration. You can also use these steps after troubleshooting any runtime coverage issue for a resource type. You can ensure that the steps worked as expected and the coverage status would potentially show up as Healthy.
Use the following steps to validate that VPC endpoint configuration for your resource type is set up correctly in the VPC owner account:
Sign in to the AWS Management Console and open the Amazon VPC console at https://console.aws.amazon.com/vpc/
. -
In the navigation pane, under Virtual private cloud, choose Endpoints.
-
In the Endpoints table, select the row that has the Service name similar to com.amazonaws.
us-east-1
.guardduty-data. The Region (us-east-1
) may be different for your endpoint. -
A panel for endpoint details will appear. Under the Security Groups tab, select the associated Group ID link for more details.
-
In the Security Groups table, select the row that with the associated Security group ID to view the details.
-
Under the Inbound rules tab, ensure that there is an ingress policy with Port range as 443 and Source as 0.0.0.0/0. Inbound rules control the incoming traffic that is allowed to reach the instance. The following image shows the inbound rules for a security group that is associated with the VPC used by the GuardDuty security agent.
If you don't already have a security group that has an in-bound port 443 enabled, Create a security group in the Amazon EC2 User Guide.
If there is an issue while restricting the in-bound permissions to your VPC (or cluster), provide the support to in-bound 443 port from any IP address (0.0.0.0/0).