Ultimate access to all questions.
What is the most operationally efficient solution for a network engineer to collect and analyze logs, including client IP address, target IP address, target port, and user agent, for users accessing an application hosted on Amazon EC2 instances behind an Application Load Balancer (ALB) after a network security breach?