EC2 Instances
When creating an AWS integration with Cloudhouse Guardian (Guardian), you can choose to detect and add your EC2 instance(s) to Guardian for monitoring. The following topic describes how to configure your EC2 instance(s) in Guardian; what aspects of the EC2 instance you want to be scanned, how they should be scanned, and where that data should be stored. For more information on how to set up an AWS integration, see AWS Integration.
When detecting an EC2 instance via Guardian, you can choose to detect one or both of the following node types:
Node Types |
Description |
---|---|
Instance nodes |
This option detects any Windows or Linux nodes within your EC2 instance(s). |
Configuration data nodes |
This option detects the EC2 configuration data associated with the EC2 instance(s). |
These nodes represent the EC2 virtual machine instance and its associated configuration. For more information on the differences between these nodes, see below.
AWS Integration
On the AWS Integration page, if the EC2 Instances checkbox is selected from the list of Check Things You Want To Detect checkboxes, the following options are displayed:
Option |
Description |
---|---|
Detect EC2 Virtual Machines (e.g. the Windows/Linux VMs) checkbox |
The option to detect the EC2 Virtual Machine (VM) instance, that is, the operating system and its associated components. For example, users, services and packages. If selected, the Operating System column in the Detected tab (Inventory > Detected) displays any detected instance nodes as 'A type of Windows' or 'A type of Linux'. |
Host name property drop-down list |
The name of the AWS property that will be used to detect the nodes. Select an option from the drop-down list. |
Linux Credentials drop-down |
When scanning Linux nodes, provide your Linux credentials according to the following:
If no value is provided, the nodes are added to the Detected tab, regardless of whether the Automatically start monitoring and scanning newly detected nodes checkbox is selected. |
Windows Credentials drop-down |
When scanning Windows nodes, provide your Windows credentials according to the following:
If no value is provided, the nodes are added to the Detected tab, regardless of whether the Automatically start monitoring and scanning newly detected nodes checkbox is selected. |
Detect EC2 Virtual Machines Configurations checkbox |
The option to detect the EC2 configuration data associated with the EC2 instance. This option detects any security groups, policies, storage properties, load balancers, and other options attached to the AWS EC2 instance. If selected, once the integration is created, any detected configuration data node(s) are displayed with 'Config' appended to its name and the OS type is 'AWS EC2 VM Configuration' to differentiate it from the associated instance. For example, 'Windows Server 2022 Config'. |
Once the correct values have been set for the above fields, you can choose the Detection Options for your integration. By default, any detected nodes are displayed within the Detected tab of your Guardian instance, with the appended identifier attributed to that EC2 instance's node type.
If you choose to promote a detected node to the Monitored tab (Inventory > Monitored) for regular scanning, it will be automatically added to the corresponding dynamic node group. For example, configuration nodes are added to ‘AWS EC2 Virtual Machine Configuration’ node groups regardless of whether they are Windows or Linux.
Note: If a Windows node group is not present in your Guardian instance, it will be automatically created upon the addition of a monitored Windows node. For more information, see Node Groups.
However, if you choose to select the Automatically start monitoring and scanning newly detected nodes checkbox, all detected nodes are added to the Monitored tab. Here, they are automatically added to the corresponding Windows, Linux ,or AWS EC2 Virtual Machine Configuration node groups.
Once you have set the correct values for each of the EC2 options displayed, you can continue completing the options to add the AWS integration to the Integrations tab (