Ultimate access to all questions.
Your team is developing a containerized application for deployment on GKE, targeting a five-node cluster within a single region. The application handles sensitive user data, necessitating the removal of such data from logs before they are sent to Cloud Logging. Which two actions should you take to fulfill this requirement?