This is an IBM Automation portal for Cloud Management and AIOps products. To view all of your ideas submitted to IBM, create and manage groups of Ideas, or create an idea explicitly set to be either visible by all (public) or visible only to you and IBM (private), use the IBM Unified Ideas Portal (https://ideas.ibm.com).
Shape the future of IBM!
We invite you to shape the future of IBM, including product roadmaps, by submitting ideas that matter to you the most. Here's how it works:
Search existing ideas
Start by searching and reviewing ideas and requests to enhance a product or service. Take a look at ideas others have posted, and add a comment, vote, or subscribe to updateson them if they matter to you. If you can't find what you are looking for,
Post your ideas
Post an idea.
Get feedback from the IBM team and other customers to refine your idea.
Follow the idea through the IBM Ideas process.
Specific links you will want to bookmark for future use
Hi, My customer has a question about Instana route definitions on OCP. Basically, they have an OCP console address like console-openshift-console.apps.ocpcluster.ibm.com. According to the document; - basedn URL should be like instana.apps.ocpclust...
Distribute the Instana kubectl plugin with Krew
Krew is a popular open source plugin manager for the kubectl command-line tool maintained by the Kubernetes SIG CLI community. The tool helps to discover, install, and update kubectl plugins by offering a centralised plugin repository. The usage o...
The Filter Options on Object Manager should default to "show both"
Every admin should, by default, get a holistic view of what the discovery for a device is actually doing. If they cannot make this a default, then at least make it an option in the settings to make this the default.
Control the self-signed certs generated by Kubernetes for its internal inter-node communication
Kubernetes (k3s) using self-signed SSL certs is a vulnerability and against the security policies of some of our customers. Require a procedure for third-party signed certs to be applied instead of the self-signed certs. This is currently not supp...
Remote Based Access Control (RBAC) for Log Analysis.
I have successfully implemented role-based access control (RBAC) for Log Analysis. The Log Analysis development team sent me instructions on how to implement in my Test environment. I would like to see the RBAC feature implemented in a future rele...
There are several instances today where the customer needs to change a property via swagger or going into the yaml file and adding probe or other component/global properties. This is not a great user experience and it would be ideal if user has th...
Improving Resiliency #1: re-attaching "running OS processes" in secondary node after a failover
Whenever a failover happens, we need the Agents to be capable of re-attaching the running OS processes (attached to each individual SAP Jobs) when its services are restarted/failed-over from Site A to Site B.
The Coriant G30 device can be discovered but all elements like it's interfaces are not discovered, only chassis level and identify as network device i mean only layer 2 and no layer 3 also the neighbor device it connected to also recognised but li...
data retention be extended for beyond 365 days for active as well as ceased devices
For some customers it is essential to have the historic data for more than 12 months. Hence need to have feasibility to extent the retention period beyond 365 days. Also same retention should be available for the devices which are not currently be...
Adding sticky bits setgid and setuid on DB2 directories
System details: ITM version: 6.3.7 SP13OS: Linux OS RHEL 7.9TEPS-DB: DB2 v18.104.22.168TDW-DB: Oracle Database 19c We have received a security compliance finding related with DB2 world writeable directories. The following 2 directories are world writea...
Do not place IBM confidential, company confidential, or personal information into any field.