Skip to content

Commit

Permalink
fix:change order following styleguide
Browse files Browse the repository at this point in the history
  • Loading branch information
marcoschreurs committed Dec 4, 2023
1 parent dc4c1e1 commit 893e7c4
Showing 1 changed file with 12 additions and 6 deletions.
18 changes: 12 additions & 6 deletions guardduty.tf
Original file line number Diff line number Diff line change
Expand Up @@ -25,24 +25,27 @@ resource "aws_guardduty_detector" "audit" {
}

resource "aws_guardduty_organization_configuration_feature" "ebs_malware_protection" {
provider = aws.audit

detector_id = aws_guardduty_detector.audit.id
name = "EBS_MALWARE_PROTECTION"
auto_enable = var.aws_guardduty.ebs_malware_protection_status == true ? "ALL" : "NONE"
provider = aws.audit
}

resource "aws_guardduty_organization_configuration_feature" "eks_audit_logs" {
provider = aws.audit

detector_id = aws_guardduty_detector.audit.id
name = "EKS_AUDIT_LOGS"
auto_enable = var.aws_guardduty.eks_audit_logs_status == true ? "ALL" : "NONE"
provider = aws.audit
}

resource "aws_guardduty_organization_configuration_feature" "eks_runtime_monitoring" {
provider = aws.audit

detector_id = aws_guardduty_detector.audit.id
name = "EKS_RUNTIME_MONITORING"
auto_enable = var.aws_guardduty.eks_runtime_monitoring_status == true ? "ALL" : "NONE"
provider = aws.audit


additional_configuration {
Expand All @@ -52,22 +55,25 @@ resource "aws_guardduty_organization_configuration_feature" "eks_runtime_monitor
}

resource "aws_guardduty_organization_configuration_feature" "lambda_network_logs" {
provider = aws.audit

detector_id = aws_guardduty_detector.audit.id
name = "LAMBDA_NETWORK_LOGS"
auto_enable = var.aws_guardduty.lambda_network_logs_status == true ? "ALL" : "NONE"
provider = aws.audit
}

resource "aws_guardduty_organization_configuration_feature" "rds_login_events" {
provider = aws.audit

detector_id = aws_guardduty_detector.audit.id
name = "RDS_LOGIN_EVENTS"
auto_enable = var.aws_guardduty.rds_login_events_status == true ? "ALL" : "NONE"
provider = aws.audit
}

resource "aws_guardduty_organization_configuration_feature" "s3_data_events" {
provider = aws.audit

detector_id = aws_guardduty_detector.audit.id
name = "S3_DATA_EVENTS"
auto_enable = var.aws_guardduty.s3_data_events_status == true ? "ALL" : "NONE"
provider = aws.audit
}

0 comments on commit 893e7c4

Please sign in to comment.