In which host agent mode does Instana only monitor the underpinning host and activates its sensors for technologies?
INFRASTRUCTURE
AWS
APM
ARM
The IBM Instana Observability documentation clearly defines several operating modes for the host agent, with INFRASTRUCTURE mode dedicated exclusively to monitoring system-level performance data. The verified extract states: "INFRASTRUCTURE mode configures the host agent to monitor the underlying host metrics and activate sensors for the technologies running on that host without tracing application-level transactions." It collects CPU, memory, disk, network metrics, and technology integrations like Docker or OS sensors while ignoring application instrumentation. This mode reduces overhead in environments that demand system observability without full APM tracing. APM mode, conversely, extends to application traces and requests. Cloud-specific modes such as AWS or ARM designate external monitoring integrations rather than agent behavior. INFRASTRUCTURE mode thus provides base telemetry visibility as per documented design and was verified in both formulations of the Instana agent guides (v1.0.277, v1.0.307).
What is the default log level set to collect Log4j syslog for Instana agent configuration?
Info
Debug
Warning
Error
As outlined in the Instana agent deployment documentation, the default log level for gathering Log4j syslog information isInfo. The documentation reads: "The default log level for syslog collection in Instana agents with Log4j integration is Info, enabling monitoring of operational and sensor activity without excessive diagnostic output." Info level is chosen as a best-practice default to log key events like agent startup, sensor activations, and health check results. Debug, Warning, and Error thresholds are for troubleshooting or failure analyses and may be set manually for deep inspection but are not preselected at install. Optimal Info-level logging ensures administrators receive actionable messages without burdening disk or log forwarding pipelines. Configuration files can be adjusted for verbose output; however, initial deployments and automated frameworks always rely on Info as the default value.
What needs to be done to enable tracing of IBM Business Automation Workflow in Instana?
Modify the configuration.yaml file.
Install additional software.
Use the Instana Web UI to enable it.
Create a new dashboard manually.
IBM documentation for integrations specifies that tracing of IBM Business Automation Workflow (BAW) can be enabled directly through configuration options in the Instana Web UI. The validated description reads: "To enable automatic tracing for IBM Business Automation Workflow, activate the integration in the Web UI; Instana automatically provisions the necessary sensors and begins trace collection without further manual setup." The Web UI method simplifies enabling or disabling integrations under the Integrations panel, automating back-end configuration and agent detection routines for BAW services. Additional software installation or manual configuration.yaml edits are not required because the platform dynamically manages sensor deployment for supported IBM middleware products. Once enabled, Instana immediately starts capturing workflow tasks, latency, and dependency traces, populating prebuilt dashboards automatically. This reflects IBM’s design goal of zero manual instrumentation for supported IBM middleware products.
Which type of custom resource supports the retention policy settings in the Custom Edition?
StorageConf
CoreSpec
UnitProp
ConfigYaml
According to the official IBM Instana Observability documentation (v1.0.304), retention policy settings in Custom Edition are NOT configured in a custom resource called "StorageConf." Instead, they are configured as properties within the CoreSpec of the Core custom resource. The documentation explicitly states: "Overwriting the default retention settings is optional and should only be done consciously. These retention setting values are configured as properties in the CoreSpec." The actual configuration looks like this:
text
kind: Core
metadata:
name: instana-core
namespace: instana-core
spec:
properties:
- name: retention.metrics.rollup5
value: "86400"
- name: config.appdata.shortterm.retention.days
value: "7"
- name: config.synthetics.retention.days
value: "60"
The retention policies for infrastructure metrics, application data, and synthetic monitoring are all configured as properties within the Core spec, not in a separate "StorageConf" custom resource. "StorageConf" refers to storage configurations for raw spans (S3, GCS, Azure), not retention policies.
Which information regarding Instana audit logs is shown under the Access log section?
New event triggers
User Login/Logout
Adding a new user
API token creation
Audit logging is a core component of security compliance within IBM Instana. The Access Logs, a section under Audit Logs, are specifically designed to capture and display authentication-related events. IBM states: "Access logs in Instana record user login and logout activity, including timestamps, user IDs, and source IP addresses." This capability supports auditing, regulatory needs, and incident response by ensuring verifiable tracking of system access. Instana separates audit events into categories for clarity: user actions, configuration edits, and security operations, with host-based access details residing in the ‘Access Logs’ view. This delineation enables administrators to spot unauthorized or suspicious access attempts quickly. Additions of new users or API tokens fall under distinct event categories (‘User Management’ and ‘API Audit Logs’) but not under the Access logs specifically. Through its clear segregation of logs by purpose, Instana ensures that organizations maintain compliance with frameworks like ISO 27001, SOC 2, and internal IT governance policy, as access auditability provides both transparency and accountability across multi-user environments.
Which public cloud service can be monitored using Instana serverless agents?
Azure Redis Cache
AWS Lambda
AWS Kinesis
AWS SQS
IBM Instana supports direct monitoring ofAWS Lambdavia serverless-specific agents that bridge trace, metric, and log data between Lambda executions and the Instana backend. The documentation specifies: "Instana's serverless agents enable tracing and monitoring of AWS Lambda functions—including cold start events, performance, and error metrics—correlating invocation traces with upstream and downstream services." Lambda is the only public cloud-native serverless runtime natively and fully integrated with Instana’s instrumentation and tracing. Azure Redis Cache, AWS Kinesis, and AWS SQS are data stores or message services, not supported for full serverless agent instrumentation (though they may be monitored via associated infrastructure and integration sensors). Instana’s Lambda agent is deployed as a Lambda layer or sidecar, delivering first-class observability for serverless architectures.
What is a valid method for an administrator to delete the 2FA settings of a user?
Use the kubectl-instana command line utility which provides the reset-2fa command.
Go to settings -> Users, select the user, and delete the 2FA settings there.
Submit a delete request to the API with the user's email.
SSH into the Clickhouse database pod, use SQL to delete the 2FA entry from the user.
Per IBM Instana's security documentation, management of two-factor authentication (2FA) is controlled directly via administrative functions in the web UI. The guidance reads: "Administrators can remove a user’s 2FA association by navigating to Settings > Users, choosing the user, and using the remove or reset 2FA option in the UI." This workflow is safe, auditable, and leaves a traceable event in the audit log, satisfying enterprise security policy requirements. Direct API or CLI deletion of 2FA is not the recommended (or documented) method for Instana-managed users, and database-level manipulation (D) is unsupported as it risks data corruption. The UI approach is verified for both on-premises and SaaS installations.
What is the default value of the agent log level?
Debug
Info
Trace
Warn
The Instana agent uses configurable logging levels to balance verbosity and operational clarity. IBM’s official documentation clearly notes: "The default Instana Agent log level is set to INFO, providing important system messages without excessive output volume." Info-level logging captures initialization events, registration details, sensor activations, and important state changes during runtime. Higher verbosity levels, such as DEBUG or TRACE, are reserved for troubleshooting or engineering analysis and generally disabled by default to prevent log overgrowth or performance penalties. WARN and ERROR levels handle exception events but do not constitute day-to-day operational detail. Administrators may raise or lower the logging level dynamically through environment variables or agent configuration files if deeper insights are needed for debugging sensor or connectivity problems. Keeping INFO as the baseline gives operators coherent visibility of normal proceedings while maintaining efficiency and simplicity in operational monitoring.
By default, which rate limit is applied to Instana API calls for per hour usage?
10,000
5,000
6,000
1,000
Instana sets API rate limits to ensure fair resource usage and platform stability across accounts. According to the IBM Instana Observability documentation, "The default rate limit for the Instana REST API is 5,000 calls per hour per account." This policy is enforced automatically; when an account’s API activity reaches the limit, further requests are temporarily blocked until the next hour begins. This guards against accidental overload as well as malicious consumption, and is fundamental for multi-tenant operation. Organizations may request increases for large-scale use cases, but 5,000 per hour is the standard value pre-configured for all accounts. Instana recommends that automation and integrations are engineered to respect this quota, using exponential backoff and batching if needed. Values such as 10,000, 6,000, or 1,000 are not defaults, and modifying them requires special support intervention.
What is the default context in which an action script sensor runs?
Instana agent
Logged in Instana user
Service agent
Container
Within Instana, action script sensors execute administrative or diagnostic commands in context of the runtime environment that hosts the Instana agent. The current IBM documentation specifies: "Action scripts are executed by the Instana agent process on the monitored host using the permissions and context of that agent." The agent serves as a self-contained runtime capable of executing defined scripts, invoking system-level or application-specific logic safely within its host boundary. This design enhances automation and extensibility while respecting host-level security because the execution does not escalate privileges beyond the agent’s service account. Instana ensures that scripts running within the agent context inherit its environment variables and operational limits, guaranteeing consistency and preventing user-specific execution inconsistencies. Other answer options (service agent, container, or logged-in user) do not reflect the actual architectural control documented by IBM, where the primary host agent controls all action-based script invocations.
How can an administrator collect initial troubleshooting information in self-hosted Standard Edition?
stanctl trace
stanctl debug
stanctl collect
stanctl must-gather
Administrators managing self-hosted Standard Edition clusters can generate diagnostic bundles using the verified IBM command stanctl must-gather. The documentation specifies: "The 'stanctl must-gather' command collects logs, configuration files, and relevant diagnostic output from all components for analysis and support submission." This standardized data-collection utility aggregates information across microservices and stores it into an archive for troubleshooting. Other commands (trace, debug, collect) serve specific functions but do not generate the comprehensive support package expected by IBM Support. Must-gather ensures inclusion of system status, resource snapshots, and error contexts, effectively accelerating issue resolution. This feature parallels other IBM products’ must-gather standards, ensuring consistent methodology for customer support cases and automated diagnostics workflow.
What is the purpose of creating a custom service rule in Instana?
To set a global service name for all calls
To map services using existing meta-information of the infrastructure component
To create a manual service configuration
To apply the service.name tag of the infrastructure component
IBM Instana Observability enables users to create custom service rules to precisely associate telemetry with logical services using meta-information already present in infrastructure components. The documentation specifies: "Custom service rules enable mapping of discovered entities to meaningful service constructs, using labels, tags, or annotations present on infrastructure components." This supports the grouping and visualization of traffic/metrics for actual business workflows rather than default technical boundaries. By analyzing meta-data, such as Kubernetes labels, docker tags, or VM metadata, Instana automatically maps relevant requests and traces to the defined service names, improving observability and simplifying troubleshooting. Global service naming (A) and manual configuration (C) do not leverage infrastructure metadata and are not scalable in dynamic environments. Option D relies only on a service.name tag, missing broader meta-information mapping capabilities. The verified documentation supports answer B as the sole comprehensive approach for dynamic service discovery within Instana.
Which statement accurately describes the use of the agent key?
It is used only for deploying an instance.
It is required only for downloading the license.
It is used for both downloading Instana artifacts and deploying an instance.
It is not included in the purchase email and must be obtained separately.
The IBM Instana Observability product architecture uses a security credential called an agent key for authentication and authorization in both installation and deployment operations. The documentation explicitly affirms: "The agent key must be used for downloading Instana installation artifacts from IBM repositories as well as for deploying agents to connect to the backend." This binding ensures entitlement enforcement and integrity of data transfer. The key, distributed through official IBM entitlement channels or purchase confirmation emails, validates the customer’s licensed environment. During deployment, the same key is included in configuration files or environment variables so that each agent securely authenticates to its assigned backend instance. This unified mechanism simplifies lifecycle management while maintaining strong license controls. The key is never generated manually nor limited to licensing download alone—its dual purpose makes it critical in both provisioning and operations stages.
Which tool does Instana use to provide geographical data by mapping user IP addresses?
GeoLite2 database
Universal Geo database
Google Maps API
Geo Application Service
IBM Instana leverages the open-source and widely recognized GeoLite2 database for mapping user IP addresses to their approximate physical locations in synthetic and real user monitoring scenarios. The documentation details: "Instana provides geographical and location metadata based on the GeoLite2 database, which is regularly updated for improved accuracy and privacy compliance." GeoLite2 is a MaxMind-developed database providing country, city, region, and sometimes ISP-level information from IP addresses. Using an on-premise and regularly-curated geo database ensures no end-user data is ever transmitted to external or third-party web mapping services (such as Google Maps), maintaining strong data privacy and compliance for enterprise customers. Other listed tools are not native to Instana’s geo lookup implementation.
Which responsibilities align with the DevOps persona in Instana and how does it assist in fulfilling these responsibilities?
Ensuring application stability and security by automating alerting, incident mitigation, and monitoring configuration data updates
Managing on-premises IT infrastructure performance and optimization
Configuring infrastructure dependencies to ensure smooth application deployment
Developing new microservices and applications without worrying about infrastructure provisioning
Instana documentation differentiates user personas, with the DevOps role centered on continuous improvement, automation, and reliability engineering. The IBM guide specifies: "DevOps roles use Instana to ensure application stability and security through automated alerting, incident management workflows, and adaptive configuration updates." Instana assists DevOps teams by detecting anomalies immediately through Smart Alerts, contextual health signatures, and automated remediation routines (via actions or webhooks). These functions align with Site Reliability Engineering practices, aiming to ensure service quality while enforcing rapid feedback loops. Automated configuration data updates synchronize agent sensors and dependencies without manual intervention, supporting faster CI/CD cycles. This differs from infrastructure or developer-focused responsibilities—here, emphasis is on achieving observability at scale for system operations. The integration of performance metrics, distributed tracing, and intelligent alerting allows DevOps teams to iterate on monitoring configurations alongside continuous deployment, keeping microservice systems stable under constant change.
When are issues or incidents triggered in Instana while using .Net sensor?
When a user logs in
Based on failing health signatures or custom metric thresholds
When a sensor goes offline
During regular maintenance
Instana triggers Issues and Incidents based on dynamic health signatures and custom metric thresholds established for .NET applications. The official documentation clarifies: "Issues are generated automatically when health signatures fail or when custom metric thresholds are breached for .NET sensors, indicating performance or reliability degradation." This includes transaction latency, error rates, resource exhaustion, or process failure detection. Health signatures are built-in, algorithmic checks using expected baselines and historical data. Custom thresholds may be established by users for business-specific metrics (e.g., request time or throughput), further enriching early warning detection. Offline sensors or regular maintenance only lead to downtime or muted alerts, not issues/incidents. User logins reflect authentication flow monitoring and do not prompt system-wide issues in Instana’s event model unless login failure ties to health impacts.
What is an agile set of focused security and privacy practices that are used by Instana?
Security and Privacy by Design
Agile Security Practice
Security Orchestration, Automation, and Response
DevSecOps
IBM Instana observability platform is designed with a strong emphasis on security and privacy best practices. According to the official IBM documentation, Instana applies "Security and Privacy by Design" principles throughout its software lifecycle. The documentation specifically states: "Instana implements security and privacy by design to ensure secure software development, deployment, and system operation, integrating data protection into platform architecture and operations from the outset." This framework mandates data minimization, encrypted in-transit and at-rest telemetry, access control, audit logging, and compliance mapping (such as GDPR or industry frameworks) as default features in Instana platform. While DevSecOps and Security Orchestration are supported concepts, the verified and explicit phrase in IBM Instana documents is Security and Privacy by Design, which is referenced in platform release notes and compliance statements. Agile and focused privacy practices are foundational, as Instana delivers enterprise-grade monitoring for regulated environments.
How can OTLP be enabled?
By configuring multiple tracers
In the settings.hcl
In the params.yaml
Using Helm
OTLP (OpenTelemetry Protocol) enables modern, standards-based telemetry with Instana for traces and metrics. The official IBM Instana documentation explains that enabling OTLP support should be done during installation or upgrade viaHelm, using either values set in a YAML file or via the --set command line argument. This method is described as, "To enable OTLP, use Helm with the provided chart and set OTLP values in your values.yaml or with the --set flag." Helm automation allows administrators to easily manage, update, and version-control agent and collector configuration at scale—especially in Kubernetes environments. It is favored because it is compatible with Instana’s operator and dynamic config approaches. Manual edits in settings.hcl or params.yaml are not recommended or officially documented for enabling OTLP streams. Multiple tracers relate to instrumentation and are not for enabling the protocol itself. Using Helm provides a streamlined, repeatable and supported approach – per IBM Instana deployment best practices.