This is an IBM Automation portal for Cloud Management and AIOps products. To view all of your ideas submitted to IBM, create and manage groups of Ideas, or create an idea explicitly set to be either visible by all (public) or visible only to you and IBM (private), use the IBM Unified Ideas Portal (https://ideas.ibm.com).
Shape the future of IBM!
We invite you to shape the future of IBM, including product roadmaps, by submitting ideas that matter to you the most. Here's how it works:
Search existing ideas
Start by searching and reviewing ideas and requests to enhance a product or service. Take a look at ideas others have posted, and add a comment, vote, or subscribe to updateson them if they matter to you. If you can't find what you are looking for,
Post your ideas
Post an idea.
Get feedback from the IBM team and other customers to refine your idea.
Follow the idea through the IBM Ideas process.
Specific links you will want to bookmark for future use
Need documentation on how to uninstall Instana for K8 and Docker self hosted installation
We need documentation on how to uninstall Instana and the resources created during the installation of Instana on K8. These steps are helpful especially recovering from failed installation so that the customer could retry the steps.
Reduce Instana infrastructure footprint by reducing metrics resolution
First, we installed on self-hosted Instana Backend on Docker (on-premies). However, the backend didn't respond to the production load and lost monitoring data. Then, We decided to go forward with Openshift Installation. However, the recommended Op...
The Filter Options on Object Manager should default to "show both"
Every admin should, by default, get a holistic view of what the discovery for a device is actually doing. If they cannot make this a default, then at least make it an option in the settings to make this the default.
Control the self-signed certs generated by Kubernetes for its internal inter-node communication
Kubernetes (k3s) using self-signed SSL certs is a vulnerability and against the security policies of some of our customers. Require a procedure for third-party signed certs to be applied instead of the self-signed certs. This is currently not supp...
Remote Based Access Control (RBAC) for Log Analysis.
I have successfully implemented role-based access control (RBAC) for Log Analysis. The Log Analysis development team sent me instructions on how to implement in my Test environment. I would like to see the RBAC feature implemented in a future rele...
There are several instances today where the customer needs to change a property via swagger or going into the yaml file and adding probe or other component/global properties. This is not a great user experience and it would be ideal if user has th...
Improving Resiliency #1: re-attaching "running OS processes" in secondary node after a failover
Whenever a failover happens, we need the Agents to be capable of re-attaching the running OS processes (attached to each individual SAP Jobs) when its services are restarted/failed-over from Site A to Site B.
The Coriant G30 device can be discovered but all elements like it's interfaces are not discovered, only chassis level and identify as network device i mean only layer 2 and no layer 3 also the neighbor device it connected to also recognised but li...
data retention be extended for beyond 365 days for active as well as ceased devices
For some customers it is essential to have the historic data for more than 12 months. Hence need to have feasibility to extent the retention period beyond 365 days. Also same retention should be available for the devices which are not currently be...
Do not place IBM confidential, company confidential, or personal information into any field.