Skip to Main Content
Cloud Management and AIOps


This is an IBM Automation portal for Cloud Management, Technology Cost Management, Network Automation and AIOps products. To view all of your ideas submitted to IBM, create and manage groups of Ideas, or create an idea explicitly set to be either visible by all (public) or visible only to you and IBM (private), use the IBM Unified Ideas Portal (https://ideas.ibm.com).

Shape the future of IBM!

We invite you to shape the future of IBM, including product roadmaps, by submitting ideas that matter to you the most. Here's how it works:

Search existing ideas

Start by searching and reviewing ideas and requests to enhance a product or service. Take a look at ideas others have posted, and add a comment, vote, or subscribe to updates on them if they matter to you. If you can't find what you are looking for,

Post your ideas
  1. Post an idea.

  2. Get feedback from the IBM team and other customers to refine your idea.

  3. Follow the idea through the IBM Ideas process.

Specific links you will want to bookmark for future use

Welcome to the IBM Ideas Portal (https://www.ibm.com/ideas) - Use this site to find out additional information and details about the IBM Ideas process and statuses.

IBM Unified Ideas Portal (https://ideas.ibm.com) - Use this site to view all of your ideas, create new ideas for any IBM product, or search for ideas across all of IBM.

ideasibm@us.ibm.com - Use this email to suggest enhancements to the Ideas process or request help from IBM for submitting your Ideas.

Status Under review
Workspace IBM Turbonomic ARM
Categories Policies
Created by Guest
Created on Mar 5, 2026

Support for AWS AMI Teardown/Security Lifecycle Policy -- extending pod spec abstraction to EC2/IaaS

My client has a Cloud Security policy where every 30 days, every VM Appliance in AWS is torn down and rebuilt. This creates an issue where after rebuild, that resource is tracked by Turbo under a new UUID and historical data is not tied back to the fresh resource. From an Eng standpoint, the way I'd imagine this getting implemented is similar to our abstraction of historical utilization for ephemeral containers/pods. The below recommendation was not sufficient and is preventing us from moving forward with implementing EC2 automation, Terraform, SNOW, etc.

In relation to the 30-day AMI Lifecycle Policy in AWS, you may remember our discussion on this topic with your former TAM. Earlier this week, we’d discussed two possibilities for how ABC Corp is managing this today — terminating (deleting) EC2 instances or simply stopping the instance from running. On the backend, Turbonomic tracks historical utilization data based on the ARN/uuid of an instance. When an instance is terminated this identifier can no longer be tracked across instances. As a result, we’re not able to tie historical utilization data of a terminated instance to a freshly provisioned EC2 instance. If the instance is simply stopped, this issue will not occur. If the same tagging remains in place, you can use dynamic resource groups in Turbonomic to ensure that the same scaling policies apply even if historical data does not remain.

Idea priority High