Watch this video on YouTube
A database administrator detects malicious activities within their Cloud SQL instance and intends to monitor API calls that access the configuration or metadata of resources. Which logs should the database administrator review?