This looks like a straightforward question about setting up monitoring and alerting for a Compute Engine instance. I think the key is to focus on detecting the malicious script execution, rather than just looking at CPU usage.
I feel confident I can solve this question. The information provided is clear, and I just need to apply my knowledge of rule priority and execution order.
Shawnda
5 months agoDesirae
5 months agoLauran
5 months agoSherron
5 months agoJamal
6 months agoAlise
6 months agoChana
6 months agoAaron
6 months agoShayne
6 months agoSheridan
7 months agoKanisha
7 months agoReuben
7 months ago