A company hosts a web application on an Apache web server. The application runs on Amazon EC2 instances that are in an Auto Scaling group. The company configured the EC2 instances to send the Apache web server logs to an Amazon CloudWatch Logs group that the company has configured to expire after 1 year.
Recently, the company discovered in the Apache web server logs that a specific IP address is sending suspicious requests to the web application. A security engineer wants to analyze the past week of Apache web server logs to determine how many requests that the IP address sent and the corresponding URLs that the IP address requested.
What should the security engineer do to meet these requirements with the LEAST effort?
AgboolaKun
Highly Voted 1 year, 1 month agodhewa
Most Recent 2 months, 2 weeks agoshailvardhan
6 months, 1 week agoi7ovemyself
9 months, 3 weeks agoRaphaello
11 months, 3 weeks agoAamee
1 year ago[Removed]
1 year, 1 month agolalee2
1 year, 1 month agoSumi81
1 year, 1 month agokk2000
1 year, 1 month ago