[Building and implementing service monitoring strategies]
You need to create a Cloud Monitoring SLO for a service that will be published soon. You want to verify that requests to the service will be addressed in fewer than 300 ms at least 90% Of the time per calendar month. You need to identify the metric and evaluation method to use. What should you do?
[Building and implementing service monitoring strategies]
A third-party application needs to have a service account key to work properly When you try to export the key from your cloud project you receive an error "The organization policy constraint larn.disableServiceAccountKeyCreation is enforcedM You need to make the third-party application work while following Google-recommended security practices What should you do?
[Building and implementing CI/CD pipelines for a service]
Your company runs applications in Google Kubernetes Engine (GKE) that are deployed following a GitOps methodology.
Application developers frequently create cloud resources to support their applications. You want to give developers the ability to manage infrastructure as code, while ensuring that you follow Google-recommended practices. You need to ensure that infrastructure as code reconciles periodically to avoid configuration drift. What should you do?
[Building and implementing service monitoring strategies]
You have deployed a fleet Of Compute Engine instances in Google Cloud. You need to ensure that monitoring metrics and logs for the instances are visible in Cloud Logging and Cloud Monitoring by your company's operations and cyber
security teams. You need to grant the required roles for the Compute Engine service account by using Identity and Access Management (IAM) while following the principle of least privilege. What should you do?
[Building and implementing CI/CD pipelines for a service]
You work for a company that manages highly sensitive user dat
a. You are designing the Google Kubernetes Engine (GKE) infrastructure for your company, including several applications that will be deployed in development and production environments. Your design must protect data from unauthorized access from other applications while minimizing the amount of management overhead required. What should you do?
Cassandra
4 days agoLeila
11 days agoSherron
18 days agoMakeda
26 days agoWalton
1 month agoGoldie
1 month agoChau
2 months agoLilli
2 months agoAnabel
2 months agoJarvis
2 months agoLindsey
3 months agoCristal
3 months agoZita
3 months agoCyril
3 months agoAdelaide
4 months agoOna
4 months agoKimbery
4 months agoPhung
4 months agoMelvin
5 months agoChrista
5 months agoJennie
5 months agoDana
5 months agoCandida
5 months agoDannette
6 months agoKathrine
6 months agoMerilyn
6 months agoEileen
8 months agoMargarita
8 months agoMauricio
8 months agoFernanda
9 months agoYolando
10 months agoMakeda
10 months agoTiffiny
11 months agoMaile
11 months agoShaunna
12 months agoRebbecca
1 year agoRebecka
1 year agoMaile
1 year agoTeri
1 year agoFelix
1 year agoMelissia
1 year agoGertude
1 year agoJosue
1 year agoAnika
1 year agoMargurite
1 year agoSelma
1 year agoKristian
1 year agoJanna
1 year agoKirby
1 year agoPhyliss
1 year agoSkye
1 year agoPeggie
1 year agoSharan
1 year agoMollie
1 year agoNovella
1 year agoLynette
1 year agoFiliberto
1 year agoToi
1 year agoKeva
1 year agoBerry
1 year agoMaynard
2 years agoRosenda
2 years agoMicheline
2 years agoHelga
2 years agoJoana
2 years agoSunny
2 years agoAliza
2 years agoTracie
2 years agoJimmy
2 years ago