Obtaining Log Configurations
Adding Log Configurations
Updating Log Configurations
Querying Flow Logs
Querying Access Control Logs
Querying Attack Logs