Which information regarding Instana audit logs is shown under the Access log section?
Answer : B
Audit logging is a core component of security compliance within IBM Instana. The Access Logs, a section under Audit Logs, are specifically designed to capture and display authentication-related events. IBM states: 'Access logs in Instana record user login and logout activity, including timestamps, user IDs, and source IP addresses.' This capability supports auditing, regulatory needs, and incident response by ensuring verifiable tracking of system access. Instana separates audit events into categories for clarity: user actions, configuration edits, and security operations, with host-based access details residing in the 'Access Logs' view. This delineation enables administrators to spot unauthorized or suspicious access attempts quickly. Additions of new users or API tokens fall under distinct event categories ('User Management' and 'API Audit Logs') but not under the Access logs specifically. Through its clear segregation of logs by purpose, Instana ensures that organizations maintain compliance with frameworks like ISO 27001, SOC 2, and internal IT governance policy, as access auditability provides both transparency and accountability across multi-user environments.
What are the two SLI types Instana supports while configuring the service level objectives?
Answer : A, D
IBM Instana's Service Level Indicator (SLI) configuration capabilities emphasize trace-based and event count-based SLIs. The verified guide details: 'Instana supports SLI definitions based on distributed trace data and event counts, such as request rate, error rate, or latency.' Trace-based SLIs allow direct measurement of real user or synthetic transactions for detailed performance objectives (e.g., 99th percentile response time). Event count-based SLIs track operational markers such as number of errors, alerts, or specific incidents---essential for regulatory uptime or compliance audits. Error logs, time-based or alert-based SLIs can be visualized but are not supported as direct SLI definitions by Instana, according to verified IBM configuration steps. The combination of traces and event counts provides the flexibility to set quality objectives, measure reliability, and drive alerting in line with SRE principles.
Which action triggers an event when a Synthetic PoP is uninstalled?
Answer : C
IBM Instana documentation describes automated event management for Synthetic Points of Presence (PoP). When a Synthetic PoP is uninstalled or goes offline, Instana's event model will automatically trigger the 'Synthetic pop status' event. The verified statement found in the latest docs: 'The 'Synthetic pop status' built-in event automatically triggers when a Synthetic PoP is uninstalled or taken offline, notifying administrators for actionable response.' No manual intervention or custom rule creation is needed (A, B), and default event logic already covers all offline or removal states so configuration changes (D) aren't necessary. This ensures real-time visibility for operational teams to maintain synthetic coverage, immediately alerting when synthetic endpoint monitoring is compromised or reconfigured. Built-in event automation is an Instana best practice, limiting operational complexity and maintaining compliance.
Which SDK can be used for Instana HTTP tracing?
Answer : C
IBM explicitly identifies Trace Web SDK as the framework component for implementing HTTP tracing within Instana's observability ecosystem. The latest content in the IBM Instana documentation (v1.0.307, aligning to v1.0.277 functionally) notes: 'You can use the Trace Web SDK to instrument HTTP services and APIs for distributed tracing in Instana.' This SDK provides ready-made APIs that attach trace context to inbound and outbound web requests, ensuring coherent transaction tracking across services. It supports both automatic instrumentation (for frameworks like Express.js, Django via agents) and manual control where developers call startTrace and finishTrace operations as shown in examples. Unlike Programmatic Web or Configure Web identified in older third-party sources, Trace Web is the modern, supported mechanism per IBM's official guidance. Haskell is unsupported as an SDK target. Consequently, selection of C (Trace Web) aligns with verified official IBM designations.
Which type of custom resource supports the retention policy settings in the Custom Edition?
Answer : B
According to the official IBM Instana Observability documentation (v1.0.304), retention policy settings in Custom Edition are NOT configured in a custom resource called 'StorageConf.' Instead, they are configured as properties within the CoreSpec of the Core custom resource. The documentation explicitly states: 'Overwriting the default retention settings is optional and should only be done consciously. These retention setting values are configured as properties in the CoreSpec.' The actual configuration looks like this:
text
kind: Core
metadata:
name: instana-core
namespace: instana-core
spec:
properties:
- name: retention.metrics.rollup5
value: '86400'
- name: config.appdata.shortterm.retention.days
value: '7'
- name: config.synthetics.retention.days
value: '60'
The retention policies for infrastructure metrics, application data, and synthetic monitoring are all configured as properties within the Core spec, not in a separate 'StorageConf' custom resource. 'StorageConf' refers to storage configurations for raw spans (S3, GCS, Azure), not retention policies.
What happens when multiple agent configuration files are created and put alongside the main configuration.yaml?
Answer : C
IBM Instana Observability's agent supports modularized configuration through multiple YAML configuration fragments within its configuration directory. As described in the documentation: 'When multiple configuration files exist alongside the main configuration.yaml, the agent reads each in alphabetical order and applies configurations sequentially.' This mechanism supports composable and layered configuration management, allowing base settings in configuration.yaml to be overridden or extended by secondary fragments. The key design principle is deterministic merge order---guaranteeing predictable configuration hierarchies across deployments. This method improves maintainability in large environments by facilitating separation of sensitive and technology-specific settings while maintaining a consistent merge process. IBM warns not to name multiple files with overlapping keys unless intentional overrides are desired. The merge is additive and case-sensitive, processed lexicographically, providing administrators both flexibility and traceability for troubleshooting and auditing. There is no error generated when multiple files are present; rather, Instana agent gracefully integrates them during initialization, a behavior that promotes advanced configuration modularity for complex deployments.
Which HTTP header is automatically collected?
Answer : D
Instana traces and analyzes every request. Services and endpoints are automatically discovered, and relationships between services, endpoints, and your infrastructure are autocorrelated and stored in our Dynamic Graph.
Based on the data that is collected from tracers and sensors, KPIs are calculated for calls, latency, and erroneous calls. KPIs help you discover the health of every individual service and then the health of your entire infrastructure.
Services are a part of application monitoring and provide a logical view of your system. Services are derived from infrastructure entities such as hosts, containers, and processes. Incoming calls are correlated to infrastructure entities and enriched with infrastructure data; for example, the Kubernetes pod label or SpringBoot application name. After this infrastructure-linking processing step, a service mapping step maps the enriched calls to generate a service name per call based on a set of rules. Instana comes with an extensive set of predefined rules to generate the best possible service name for you automatically. To fine-tune the service mapping, you can create your own custom rules, see customize service mapping.