When analyzing Flow Logs for a subnet, how can you filter logs to isolate traffic that was rejected due to a specific security list rule?
Goal: Filter Flow Logs for traffic rejected by a specific security list rule.
Option A: ''action'' = ''REJECT'' identifies rejected traffic; ''securityListRule'' with rule ID pinpoints the exact rule---correct.
Option B: ''status'' and ''securityRule'' aren't standard Flow Log fields (''action'' and ''securityListRule'' are)---incorrect.
Option C: ''direction'' and ''port'' filter traffic but don't specify rejection or rule---incorrect.
Option D: ''type'' and ''rule'' aren't valid Flow Log fields---incorrect.
Conclusion: Option A is the precise filtering method.
Oracle states:
'In Flow Logs, use the 'action' field ('REJECT') and 'securityListRule' field (rule ID) to filter traffic rejected by a specific security list rule.''
This validates Option A. Reference: Flow Logs Fields - Oracle Help Center (docs.oracle.com/en-us/iaas/Content/Network/Concepts/flowlogs.htm#fields).
Currently there are no comments in this discussion, be the first to comment!