This looks like a straightforward question about setting up monitoring and alerting for a Compute Engine instance. I think the key is to focus on detecting the malicious script execution, rather than just looking at CPU usage.
I feel confident I can solve this question. The information provided is clear, and I just need to apply my knowledge of rule priority and execution order.
Shawnda
3 months agoDesirae
3 months agoLauran
3 months agoSherron
4 months agoJamal
4 months agoAlise
4 months agoChana
4 months agoAaron
4 months agoShayne
5 months agoSheridan
5 months agoKanisha
5 months agoReuben
5 months ago