Get Involved
Query: List clusters with logging enabled but log encryption is disabled
Description
Explore clusters where logging is activated but without the added security layer of log encryption. This can help identify potential vulnerabilities in your data security practices.
Query
Tables used in this query: