When analyzing Flow Logs for a subnet, how can you filter logs to isolate traffic that was rejected due to a specific security list rule?
Goal: Filter Flow Logs for traffic rejected by a specific security list rule.
Option A: ''action'' = ''REJECT'' identifies rejected traffic; ''securityListRule'' with rule ID pinpoints the exact rule---correct.
Option B: ''status'' and ''securityRule'' aren't standard Flow Log fields (''action'' and ''securityListRule'' are)---incorrect.
Option C: ''direction'' and ''port'' filter traffic but don't specify rejection or rule---incorrect.
Option D: ''type'' and ''rule'' aren't valid Flow Log fields---incorrect.
Conclusion: Option A is the precise filtering method.
Oracle states:
'In Flow Logs, use the 'action' field ('REJECT') and 'securityListRule' field (rule ID) to filter traffic rejected by a specific security list rule.''
This validates Option A. Reference: Flow Logs Fields - Oracle Help Center (docs.oracle.com/en-us/iaas/Content/Network/Concepts/flowlogs.htm#fields).
Quinn
1 months agoWilliam
1 months agoGolda
1 months agoBulah
1 days agoMeaghan
5 days agoAnglea
2 months agoLeonie
2 months agoSolange
2 months agoGrover
13 days agoMelda
14 days agoBrett
15 days agoNettie
19 days agoLettie
20 days agoMatthew
1 months agoRoy
1 months agoAlberto
2 months agoAnglea
3 months ago