exam questions

Exam AWS Certified Solutions Architect - Professional All Questions

View all questions & answers for the AWS Certified Solutions Architect - Professional exam

Exam AWS Certified Solutions Architect - Professional topic 1 question 647 discussion

A company is creating a centralized logging service running on Amazon EC2 that will receive and analyze logs from hundreds of AWS accounts. AWS PrivateLink is being used to provide connectivity between the client services and the logging service.
In each AWS account with a client, an interface endpoint has been created for the logging service and is available. The logging service running on EC2 instances with a Network Load Balancer (NLB) are deployed in different subnets. The clients are unable to submit logs using the VPC endpoint.
Which combination of steps should a solutions architect take to resolve this issue? (Choose two.)

  • A. Check that the NACL is attached to the logging service subnet to allow communications to and from the NLB subnets. Check that the NACL is attached to the NLB subnet to allow communications to and from the logging service subnets running on EC2 instances.
  • B. Check that the NACL is attached to the logging service subnets to allow communications to and from the interface endpoint subnets. Check that the NACL is attached to the interface endpoint subnet to allow communications to and from the logging service subnets running on EC2 instances.
  • C. Check the security group for the logging service running on the EC2 instances to ensure it allows ingress from the NLB subnets.
  • D. Check the security group for the logging service running on the EC2 instances to ensure it allows ingress from the clients.
  • E. Check the security group for the NLB to ensure it allows ingress from the interface endpoint subnets.
Show Suggested Answer Hide Answer
Suggested Answer: AC 🗳️

Comments

Chosen Answer:
This is a voting comment (?). It is better to Upvote an existing comment if you don't have anything to add.
Switch to a voting comment New
cloudgc
Highly Voted 3 years, 8 months ago
A&C are correct. NLB will see traffic from interface endpoint subnet and logging service subnet. Logging service SG will see traffic only from NLB IP.
upvoted 37 times
hnsuper
2 years, 1 month ago
NLB will Client IP preservation enabled by default. But Client IP preservation has no effect on inbound traffic from AWS PrivateLink. The source IP of the AWS PrivateLink traffic is always the private IP address of the Network Load Balancer. So Logging service SG will see traffic only from NLB IP. https://docs.aws.amazon.com/elasticloadbalancing/latest/network/load-balancer-target-groups.html
upvoted 2 times
...
...
Bulti
Highly Voted 3 years, 8 months ago
A&C. The client of the Logging service running on EC2 is NLB and not the interface endpoint. the flow is Client->VPCE(PrivateLink)->NLB->Logging service. So the answer is A & C 100%.
upvoted 13 times
rcher
3 years, 8 months ago
Agreed, and i implemented this architecture for my work. NLB sits in front of the Logging Services, so the NACL and Sec groups for the corresponding logging instances (and its subnet) need to check for the NLB ingress. A/C for me
upvoted 2 times
...
nitinz
3 years, 8 months ago
you got it right.
upvoted 1 times
...
...
CProgrammer
Most Recent 1 year, 5 months ago
A: NACLs for communication between NLB and logging service subnets are irrelevant as they reside within the same VPC. C: Security groups for communication between NLB and logging service EC2 instances are managed internally by the NLB. D: Clients don't directly communicate with logging service EC2 instances; they interact via the NLB. regarding B, For successful communication, NACLs attached to the logging service subnets must explicitly allow inbound traffic from the interface endpoint subnets. This ensures that traffic originating from the client services, passing through the interface endpoints, is permitted to enter the logging service subnets and reach the EC2 instances hosting the logging application.
upvoted 1 times
...
[Removed]
2 years, 3 months ago
Selected Answer: AC
https://aws.amazon.com/premiumsupport/knowledge-center/security-network-acl-vpc-endpoint/ 1. The Inbound security group rules of the Network Load Balancer’s targets allow communication from the private IP address of the Network Load Balancer nodes The rules within the network ACL associated with the Network Load Balancer’s targets allow communication from the private IP address of the Network Load Balancer nodes
upvoted 1 times
...
JohnPi
2 years, 8 months ago
Selected Answer: BD
B +D is corect
upvoted 1 times
...
foureye2004
2 years, 11 months ago
I think A&D and include C. With NLB, for security group attached to target EC2 instance (front by NLB) need to allow not only IP of NLB but also IP from client (If target type is an instance), assume that we use EC2 only, so target type instance is fitted. https://aws.amazon.com/premiumsupport/knowledge-center/security-group-load-balancer/
upvoted 1 times
...
kangtamo
2 years, 12 months ago
Selected Answer: AC
Agree with AC: NLB
upvoted 2 times
...
bobsmith2000
3 years, 1 month ago
A is not correct. The Q states "The logging service is deployed in many SUBNETS", A states "Check that the NACL is attached to the logging service SUBNET"
upvoted 1 times
Ddssssss
3 years ago
the singulars and plurals in A are off. First it says subnets, then subnet, then subnets, then subnet. I think A is correct, just bad grammar.
upvoted 2 times
...
...
cldy
3 years, 6 months ago
A. Check that the NACL is attached to the logging service subnet to allow communications to and from the NLB subnets. Check that the NACL is attached to the NLB subnet to allow communications to and from the logging service subnets running on EC2 instances. C. Check the security group for the logging service running on the EC2 instances to ensure it allows ingress from the NLB subnets.
upvoted 2 times
...
AzureDP900
3 years, 6 months ago
It seems B & D for me. I need to revisit this question again !
upvoted 2 times
...
nsei
3 years, 7 months ago
From this resource https://docs.aws.amazon.com/elasticloadbalancing/latest/network/load-balancer-target-groups.html#client-ip-preservation: "Client IP preservation has no effect on AWS PrivateLink traffic. The source IP of the AWS PrivateLink traffic is always the private IP address of the Network Load Balancer." ... hence the answer is A&C
upvoted 3 times
...
andylogan
3 years, 7 months ago
It's A C since the client of the Logging service running on EC2 is NLB
upvoted 1 times
...
wakame
3 years, 7 months ago
Hi guys, NLB does not do Source NAT unlike ALB, but is the correct answer still A & C?
upvoted 1 times
wakame
3 years, 7 months ago
I found out that there are the following specifications, so I solved it. https://docs.aws.amazon.com/elasticloadbalancing/latest/network/load-balancer-target-groups.html#client-ip-preservation In the case of using PrivateLink, NLB has a specification that It transrates Source IP to NLB Private IP.
upvoted 3 times
...
...
tgv
3 years, 7 months ago
AAA CCC --- I don't understand what NLB not having security group has to do with A/C. I'm thinking that the clients are sending traffic to the NLB (not some kind of round robin directly on the EC2 instances). The communication between NLB and EC2 instances still has to be configured. It doesn't work out of the box
upvoted 1 times
...
blackgamer
3 years, 7 months ago
A and C
upvoted 2 times
...
WhyIronMan
3 years, 7 months ago
I'll go with B,D
upvoted 4 times
...
nopenope111
3 years, 7 months ago
B&D. NLB is not like ALB. it just passes the traffic to EC2. EC2 needs to allow ingress from outside.
upvoted 2 times
...
Community vote distribution
A (35%)
C (25%)
B (20%)
Other
Most Voted
A voting comment increases the vote count for the chosen answer by one.

Upvoting a comment with a selected answer will also increase the vote count towards that answer by one. So if you see a comment that you already agree with, you can upvote it instead of posting a new comment.

SaveCancel
Loading ...