Skip to Main Content
Cloud Management and AIOps


This is an IBM Automation portal for Cloud Management, Technology Cost Management, Network Automation and AIOps products. To view all of your ideas submitted to IBM, create and manage groups of Ideas, or create an idea explicitly set to be either visible by all (public) or visible only to you and IBM (private), use the IBM Unified Ideas Portal (https://ideas.ibm.com).

Shape the future of IBM!

We invite you to shape the future of IBM, including product roadmaps, by submitting ideas that matter to you the most. Here's how it works:

Search existing ideas

Start by searching and reviewing ideas and requests to enhance a product or service. Take a look at ideas others have posted, and add a comment, vote, or subscribe to updates on them if they matter to you. If you can't find what you are looking for,

Post your ideas
  1. Post an idea.

  2. Get feedback from the IBM team and other customers to refine your idea.

  3. Follow the idea through the IBM Ideas process.

Specific links you will want to bookmark for future use

Welcome to the IBM Ideas Portal (https://www.ibm.com/ideas) - Use this site to find out additional information and details about the IBM Ideas process and statuses.

IBM Unified Ideas Portal (https://ideas.ibm.com) - Use this site to view all of your ideas, create new ideas for any IBM product, or search for ideas across all of IBM.

ideasibm@us.ibm.com - Use this email to suggest enhancements to the Ideas process or request help from IBM for submitting your Ideas.

ADD A NEW IDEA

Clear

Vendor Credentials and Integrations

Showing 27

Auto-detect historical CUR changes and refetch

Currently, Cloudability’s one-month lookback window for AWS CUR changes creates a "data drift" between the cloud provider's billing truth and the FinOps platform. AWS frequently applies retroactive adjustments—such as EDP credits, refund correctio...
about 1 month ago in Cloudability / Vendor Credentials and Integrations 1 Future consideration

Automate Advanced Credentials for new accounts under set up credentialed Payer

We implemented our process to apply the approriate permissions to all new accounts in the payer. But we still need to verify new accounts in the API or UI. Bulk actions is a step in the right direction to allow multiple accounts at a time. But for...
about 1 month ago in Cloudability / Vendor Credentials and Integrations 0 Future consideration

Ability to see status of subscriptions in Cloudability

This will. help us see if the Subscriptions in Azure are active, disabled or deleted
about 2 months ago in Cloudability / Vendor Credentials and Integrations 0 Future consideration

Add integration with Okta

Add integration with Okta.As written in the FAQ page, "Currently Entra ID is one of the most widely used IDP (Identity Provider). There are many other IDPs such as Okta, PingIdentify. At present, we’re only supporting Microsoft Entra ID (aka Azure...
2 months ago in Cloudability / Vendor Credentials and Integrations 0 Future consideration

Allow for Azure Memor Metrics collection via Azure Monitor Logs

Microsoft will be depreciation Memory collection via the Azure Diagnostics extension. This will require the use of a monitor agent and Azure Monitor. Customer already has memory collection using Azure Monitor Logs. Since this isnt current supporte...
8 months ago in Cloudability / Vendor Credentials and Integrations 0 Future consideration

Add Databricks cluster names to Cloudability for Databricks GCP

Cloudability Databricks GCP connector is not bringing in Databricks cluster names. As result it is difficult to use Cloudability to understand which Databricks GCP cluster contributed to costs. Cloudability shows Databricks Azure cluster names. Da...
5 months ago in Cloudability / Data Mapping and Organization / Vendor Credentials and Integrations 2 Future consideration

Refetch should retain account level tags for active/decommissioned accounts

Customer has noticed that after a refetch their account level tags for decommissioned accounts (AWS/Azure/GCP) disappeared. This behaviour is, since account-level tags are not fetched from CUR files and are instead retrieved via API calls, Cloudab...
about 2 months ago in Cloudability / Vendor Credentials and Integrations 0 Future consideration

Omit Azure EnrollmentReader

Currently EnrollmentReader permissions in Cloudability are needed to use Advanced Features. By using EnrollmentReader it is possible to get the necessary information (e.g. RateCard and Pricesheet) but access to other possibly confidential informat...
6 months ago in Cloudability / Vendor Credentials and Integrations 0 Future consideration

'Jira.com' - Support in Cloudability

Hello team, As of now, We support integration of Jira that supports '.atlassian.net' domain. Anything with 'Jira.com' as domain is not accepted in cloudability. This was confirmed with the support team as well. Hence, I'd like to raise this RFE on...
about 2 months ago in Cloudability / Vendor Credentials and Integrations 0 Future consideration

Normalize region naming conventions between datasets for Cloud Service Providers and SaaS Services, E.g. AWS & Databricks on AWS.

Problem:Right now we have Cloudability vendor credentialling set up for our AWS organizations and our AWS-hosted Databricks account. The vendor regions in the data sets has different naming conventions even though in reality they represent the sam...
5 months ago in Cloudability / Vendor Credentials and Integrations 0 Future consideration