
Ultimate access to all questions.
A security team is auditing a company's AWS deployment and is concerned that two applications might be accessing resources that should be restricted by network ACLs and security groups. These applications are deployed across two Amazon EKS clusters using the Amazon VPC CNI plugin, located in separate subnets within the same VPC, with Cluster Autoscaler enabled. The team needs to identify which POD IP addresses are communicating with which services across the VPC, while minimizing the number of flow logs and focusing only on the traffic from these two applications. What solution will meet these requirements with the least operational overhead?
A
Create VPC flow logs in the default format. Create a filter to gather flow logs only from the EKS nodes. Include the srcaddr field and the dstaddr field in the flow logs.
B
Create VPC flow logs in a custom format. Set the EKS nodes as the resource Include the pkt-srcaddr field and the pkt-dstaddr field in the flow logs.
C
Create VPC flow logs in a custom format. Set the application subnets as resources. Include the pkt-srcaddr field and the pkt-dstaddr field in the flow logs.
D
Create VPC flow logs in a custom format. Create a filter to gather flow logs only from the EKS nodes. Include the pkt-srcaddr field and the pkt-dstaddr field in the flow logs.