[Optimizing service performance]
Your company runs an ecommerce website built with JVM-based applications and microservice architecture in Google Kubernetes Engine (GKE) The application load increases during the day and decreases during the night Your operations team has configured the application to run enough Pods to handle the evening peak load You want to automate scaling by only running enough Pods and nodes for the load What should you do?
[Building and implementing service monitoring strategies]
You need to create a Cloud Monitoring SLO for a service that will be published soon. You want to verify that requests to the service will be addressed in fewer than 300 ms at least 90% Of the time per calendar month. You need to identify the metric and evaluation method to use. What should you do?
[Building and implementing service monitoring strategies]
A third-party application needs to have a service account key to work properly When you try to export the key from your cloud project you receive an error "The organization policy constraint larn.disableServiceAccountKeyCreation is enforcedM You need to make the third-party application work while following Google-recommended security practices What should you do?
[Building and implementing CI/CD pipelines for a service]
Your company runs applications in Google Kubernetes Engine (GKE) that are deployed following a GitOps methodology.
Application developers frequently create cloud resources to support their applications. You want to give developers the ability to manage infrastructure as code, while ensuring that you follow Google-recommended practices. You need to ensure that infrastructure as code reconciles periodically to avoid configuration drift. What should you do?
[Building and implementing service monitoring strategies]
You have deployed a fleet Of Compute Engine instances in Google Cloud. You need to ensure that monitoring metrics and logs for the instances are visible in Cloud Logging and Cloud Monitoring by your company's operations and cyber
security teams. You need to grant the required roles for the Compute Engine service account by using Identity and Access Management (IAM) while following the principle of least privilege. What should you do?
Daniela
3 days agoCassandra
11 days agoLeila
18 days agoSherron
25 days agoMakeda
1 month agoWalton
1 month agoGoldie
2 months agoChau
2 months agoLilli
2 months agoAnabel
2 months agoJarvis
3 months agoLindsey
3 months agoCristal
3 months agoZita
3 months agoCyril
4 months agoAdelaide
4 months agoOna
4 months agoKimbery
4 months agoPhung
5 months agoMelvin
5 months agoChrista
5 months agoJennie
5 months agoDana
6 months agoCandida
6 months agoDannette
6 months agoKathrine
6 months agoMerilyn
6 months agoEileen
8 months agoMargarita
8 months agoMauricio
9 months agoFernanda
9 months agoYolando
10 months agoMakeda
10 months agoTiffiny
11 months agoMaile
12 months agoShaunna
1 year agoRebbecca
1 year agoRebecka
1 year agoMaile
1 year agoTeri
1 year agoFelix
1 year agoMelissia
1 year agoGertude
1 year agoJosue
1 year agoAnika
1 year agoMargurite
1 year agoSelma
1 year agoKristian
1 year agoJanna
1 year agoKirby
1 year agoPhyliss
1 year agoSkye
1 year agoPeggie
1 year agoSharan
1 year agoMollie
1 year agoNovella
1 year agoLynette
1 year agoFiliberto
1 year agoToi
1 year agoKeva
1 year agoBerry
2 years agoMaynard
2 years agoRosenda
2 years agoMicheline
2 years agoHelga
2 years agoJoana
2 years agoSunny
2 years agoAliza
2 years agoTracie
2 years agoJimmy
2 years ago