A company deploys its application as a service on an Amazon Elastic Container Service (Amazon ECS) cluster with theAWS Fargate launch type. A security engineer suspects that some incoming requests are malicious. The security engineer needs to inspect the running container by retrieving log files and memory dump flies.
Which solution will meet these requirements with the LEAST operational effort?
IPLogic
5 days, 11 hours agogkaself
1 month, 3 weeks agolanjr01
4 months, 3 weeks agomatheusrdo
6 months agoaescudero51
6 months, 1 week ago5409b91
6 months, 3 weeks agojade290
6 months, 1 week ago