A database administrator notices malicious activities within their Cloud SQL instance. The database administrator wants to monitor the API calls that read the configuration or metadata of resources. Which logs should the database administrator review?
GHOST1985
Highly Voted 1 year, 7 months agoAzureDP900
1 year, 5 months agoKLei
Most Recent 4 months, 1 week agoroycehaven
5 months, 2 weeks agoAwesomeGCP
1 year, 6 months agoRandom_Mane
1 year, 7 months agoBaburao
1 year, 8 months ago