A company deploys its application as a service on an Amazon Elastic Container Service (Amazon ECS) cluster with theAWS Fargate launch type. A security engineer suspects that some incoming requests are malicious. The security engineer needs to inspect the running container by retrieving log files and memory dump flies.
Which solution will meet these requirements with the LEAST operational effort?
IPLogic
4 months, 3 weeks agogkaself
6 months, 1 week agolanjr01
9 months, 1 week agomatheusrdo
10 months, 3 weeks agoaescudero51
10 months, 4 weeks ago5409b91
11 months, 1 week agojade290
11 months ago