A company uses AWS Organizations and has Amazon Elastic Kubernetes Service (Amazon EKS) clusters in many AWS accounts. A security engineer integrates Amazon EKS with AWS CloudTrail. The CloudTrail trails are stored in an Amazon S3 bucket in each account to monitor API calls. The security engineer observes that CloudTrail logs are not displaying Kubernetes pod creation events. What should the security engineer do to view the Kubernetes events from Amazon CloudWatch? A. Configure the EKS clusters to use private S3 VPC endpoints. Configure the S3 buckets for logging. B. Enable Kubernetes API server component logs for each cluster. C. Enable cross-origin resource sharing (CORS) in the S3 bucket that is used for logging. D. Configure CloudWatch. View the events in the CloudWatch console.  Suggested Answer: B Community Answer: B This question is in SCS-C02 AWS Certified Security – Specialty Exam For getting AWS Certified Security – Specialty Certificate Disclaimers: The website is not related to, affiliated with, endorsed or authorized by Amazon. Trademarks, certification & product names are used for reference only and belong to Amazon. The website does not contain actual questions and answers from Amazon's Certification Exam.
Please login or Register to submit your answer