
Answer-first summary for fast verification
Answer: 1. Configure a traffic mirror filter to capture the UDP data. 2. Configure Traffic Mirroring to capture the traffic for the EC2 instance's elastic network interface. 3. Configure a packet inspection package on a new EC2 instance in the monitoring account. Use the elastic network interface of the new EC2 instance as the target for the traffic mirror. 4. Extract the data by using the packet inspection package. 5. Provide the data to the third-party vendor.
The correct approach must adhere to the company's requirement that prohibits direct access to production systems and mandates all log analysis to be performed in a dedicated monitoring account. Option A suggests using VPC flow logs, which do not capture the actual packet data but rather metadata about the traffic, making it unsuitable for debugging the specific issue with the pricing service's responses. Option B proposes setting up traffic mirroring and packet inspection within the production environment, which violates the company's policy against direct access to production systems. Option D involves logging into the production EC2 instance to capture data, which also violates the company's policy. Option C is the correct choice as it configures traffic mirroring to capture the necessary UDP data and uses a packet inspection package on a new EC2 instance in the monitoring account, thus adhering to the company's requirements by not directly accessing production systems and performing log analysis in the dedicated monitoring account.
Author: LeetQuiz Editorial Team
Ultimate access to all questions.
No comments yet.
A financial trading company operates its trading platform on Amazon EC2 instances, which interact with a third-party pricing service over UDP on port 50000. Recently, the pricing service has been returning incorrectly formatted responses, causing processing failures. The third-party vendor needs to debug the issue by capturing request and response data but is restricted from directly accessing production systems. The company mandates that all log analysis must occur in a dedicated monitoring account. What steps should a network engineer follow to capture the necessary data while adhering to these requirements?
A
B
C
D