When analyzing Flow Logs for a subnet, how can you filter logs to isolate traffic that was rejected due to a specific security list rule?
Goal: Filter Flow Logs for traffic rejected by a specific security list rule.
Option A: ''action'' = ''REJECT'' identifies rejected traffic; ''securityListRule'' with rule ID pinpoints the exact rule---correct.
Option B: ''status'' and ''securityRule'' aren't standard Flow Log fields (''action'' and ''securityListRule'' are)---incorrect.
Option C: ''direction'' and ''port'' filter traffic but don't specify rejection or rule---incorrect.
Option D: ''type'' and ''rule'' aren't valid Flow Log fields---incorrect.
Conclusion: Option A is the precise filtering method.
Oracle states:
'In Flow Logs, use the 'action' field ('REJECT') and 'securityListRule' field (rule ID) to filter traffic rejected by a specific security list rule.''
This validates Option A. Reference: Flow Logs Fields - Oracle Help Center (docs.oracle.com/en-us/iaas/Content/Network/Concepts/flowlogs.htm#fields).
Quinn
1 months agoWilliam
1 months agoGolda
2 months agoLeonida
4 days agoBulah
14 days agoMeaghan
18 days agoAnglea
3 months agoLeonie
3 months agoSolange
3 months agoGrover
27 days agoMelda
27 days agoBrett
28 days agoNettie
1 months agoLettie
1 months agoMatthew
2 months agoRoy
2 months agoAlberto
2 months agoAnglea
3 months ago