A company deploys its application as a service on an Amazon Elastic Container Service (Amazon ECS) cluster with theAWS Fargate launch type. A security engineer suspects that some incoming requests are malicious. The security engineer needs to inspect the running container by retrieving log files and memory dump flies.
Which solution will meet these requirements with the LEAST operational effort?
IPLogic
1 day, 23 hours agogkaself
1 month, 2 weeks agolanjr01
4 months, 2 weeks agomatheusrdo
5 months, 4 weeks agoaescudero51
6 months ago5409b91
6 months, 2 weeks agojade290
6 months ago