IBM Instana Observability v1.0.277 Administrator – Professional Questions and Answers
Which configuration file contains Instana server connection details for the host agent?
Options:
com.instana.agent.main.config.Agent.cfg
com.instana.agent.main.sender.Backend.cfg
com.instana.agent.main.sender.File.cfg
com.instana.agent.main.sender.Server.cfg
Answer:
DExplanation:
The primary configuration file specifying Instana server connection parameters for the host agent is com.instana.agent.main.sender.Server.cfg. The IBM documentation affirms: "The Server.cfg file inside the agent’s configuration directory defines backend connection endpoints, ports, and security tokens to communicate with the Instana backend or cluster installation." This file is referenced on agent startup and dictates host-server routing, clustering, authentication, and TLS endpoints. Other config files control agent properties or log shipping, not backend connectivity. Editing Server.cfg is the recommended method for specifying on-premises, private cloud, or SaaS endpoints for all monitored agents.
What does the stanctl cluster backup do?
Options:
Create a snapshot of the disks
Prepare the current directory for the backup procedure
Backup data of a remote Instana host
Create an archive file in the current directory
Answer:
DExplanation:
According to IBM Instana Observability (v1.0.307 and earlier), stanctl cluster backup is a built-in utility and command-line tool to back up system state and operational data from an Instana cluster. The verified procedure reads: "stanctl cluster backup saves configuration, operational state, and selected monitoring data into an archive file located in the current working directory." This archive is designed for disaster recovery and migration, containing all crucial files needed for restoring Instana to a consistent state. Disk snapshots (A) are separate and handled by storage appliances. Option B describes pre-backup preparation rather than the actual result. Remote backup (C) operations require remote execution configuration and are not part of the default cluster backup. Thus, D is correct as per documentation, which emphasizes bringing together all cluster backup data in a portable .tar or .zip archive for safe storage or transfer.
Which environment requires an air-gapped Instana installation?
Options:
An environment with firewall and proxy restrictions that disable access to Instana's auto update
An environment with high-speed internet connectivity
An environment with restricted or no access to any external network or internet
An environment that allows unrestricted data transfer internally
Answer:
CExplanation:
According to the IBM Instana Observability documentation, an air-gapped installation is required when your environment is disconnected from the internet or has no access to external networks. The documentation states: "Air-gapped and restricted environments require deploying Instana without any connection to public repositories or backend services, assuring full isolation for compliance and regulatory requirements." The air-gapped setup ensures sensitive data or system configurations are never exposed outside the organization's internal trusted boundaries, making it mandatory for government, defense, or tightly regulated industries. Standard installation processes, including auto-update features and remote license verification, are replaced in air-gapped deployments with manual artifact and key management, as file transfers and package updates must be handled strictly within the controlled environment. The option described in B (high-speed internet) or D (unrestricted internal transfer) does not trigger air-gapping, while option A may require proxy or firewall configuration but is not entirely air-gapped unless full external access is blocked.
When are issues or incidents triggered in Instana while using .Net sensor?
Options:
When a user logs in
Based on failing health signatures or custom metric thresholds
When a sensor goes offline
During regular maintenance
Answer:
BExplanation:
Instana triggers Issues and Incidents based on dynamic health signatures and custom metric thresholds established for .NET applications. The official documentation clarifies: "Issues are generated automatically when health signatures fail or when custom metric thresholds are breached for .NET sensors, indicating performance or reliability degradation." This includes transaction latency, error rates, resource exhaustion, or process failure detection. Health signatures are built-in, algorithmic checks using expected baselines and historical data. Custom thresholds may be established by users for business-specific metrics (e.g., request time or throughput), further enriching early warning detection. Offline sensors or regular maintenance only lead to downtime or muted alerts, not issues/incidents. User logins reflect authentication flow monitoring and do not prompt system-wide issues in Instana’s event model unless login failure ties to health impacts.
What is mandatory to use Instana REST APIs?
Options:
CURL
Token
Python
Cookie
Answer:
BExplanation:
Access to Instana's REST API is secured using authorization tokens—an industry-standard best practice for API authentication and traceability. IBM documentation says: "A personal or team API token is required to authenticate REST API calls."
Tokens serve as credentials embedded in HTTP headers on each request, providing both identity and access control for the API consumer. Tokens are mandatory; without a valid token, any API requests are denied with a 401 Unauthorized error, regardless of whether a tool (such as CURL) is used. Tokens can be scoped for individual users (personal tokens) or teams (team tokens), enabling granular tracking and revocation as part of enterprise security policies. API tokens are generated from the Instana UI under the profile or team section. Cookies and raw client libraries (e.g., Python) are not authentication methods for Instana APIs.
By default, which rate limit is applied to Instana API calls for per hour usage?
Options:
10,000
5,000
6,000
1,000
Answer:
BExplanation:
Instana sets API rate limits to ensure fair resource usage and platform stability across accounts. According to the IBM Instana Observability documentation, "The default rate limit for the Instana REST API is 5,000 calls per hour per account." This policy is enforced automatically; when an account’s API activity reaches the limit, further requests are temporarily blocked until the next hour begins. This guards against accidental overload as well as malicious consumption, and is fundamental for multi-tenant operation. Organizations may request increases for large-scale use cases, but 5,000 per hour is the standard value pre-configured for all accounts. Instana recommends that automation and integrations are engineered to respect this quota, using exponential backoff and batching if needed. Values such as 10,000, 6,000, or 1,000 are not defaults, and modifying them requires special support intervention.
Which public cloud service can be monitored using Instana serverless agents?
Options:
Azure Redis Cache
AWS Lambda
AWS Kinesis
AWS SQS
Answer:
BExplanation:
IBM Instana supports direct monitoring ofAWS Lambdavia serverless-specific agents that bridge trace, metric, and log data between Lambda executions and the Instana backend. The documentation specifies: "Instana's serverless agents enable tracing and monitoring of AWS Lambda functions—including cold start events, performance, and error metrics—correlating invocation traces with upstream and downstream services." Lambda is the only public cloud-native serverless runtime natively and fully integrated with Instana’s instrumentation and tracing. Azure Redis Cache, AWS Kinesis, and AWS SQS are data stores or message services, not supported for full serverless agent instrumentation (though they may be monitored via associated infrastructure and integration sensors). Instana’s Lambda agent is deployed as a Lambda layer or sidecar, delivering first-class observability for serverless architectures.
Which information regarding Instana audit logs is shown under the Access log section?
Options:
New event triggers
User Login/Logout
Adding a new user
API token creation
Answer:
BExplanation:
Audit logging is a core component of security compliance within IBM Instana. The Access Logs, a section under Audit Logs, are specifically designed to capture and display authentication-related events. IBM states: "Access logs in Instana record user login and logout activity, including timestamps, user IDs, and source IP addresses." This capability supports auditing, regulatory needs, and incident response by ensuring verifiable tracking of system access. Instana separates audit events into categories for clarity: user actions, configuration edits, and security operations, with host-based access details residing in the ‘Access Logs’ view. This delineation enables administrators to spot unauthorized or suspicious access attempts quickly. Additions of new users or API tokens fall under distinct event categories (‘User Management’ and ‘API Audit Logs’) but not under the Access logs specifically. Through its clear segregation of logs by purpose, Instana ensures that organizations maintain compliance with frameworks like ISO 27001, SOC 2, and internal IT governance policy, as access auditability provides both transparency and accountability across multi-user environments.
Which type of data does Instana use to correlate application performance with infrastructure metrics?
Options:
Logs, traces, tags, and metrics
Correlated logs, number of events, host type, and recent changes
Host resources, host id, application resources, and application id
Requests, responses, errors, and latency
Answer:
AExplanation:
Instana’s contextual correlation engine combines different data types to build a unified observability model. IBM documentation states: "To correlate application performance with infrastructure metrics, Instana relies on logs, traces, tags, and time series metrics." Traces map the end-to-end request journey, metrics provide numerical measures of both system and app health, tags label resources for logical grouping and discovery, and logs offer deep diagnostic information. By analyzing traces and metrics together, Instana surfaces where latency, errors or bottlenecks in the application link directly to resource consumption or system events captured at the infrastructure level. Tags facilitate mapping services to containers, VMs, or Kubernetes objects. Raw counts (B, C) and raw transactional data (D) are part of the analysis pipeline but do not provide the required level of linkage for successful application-to-infrastructure mapping – only the union of traces, metrics, tags, and logs achieves this dimensionality.
Which two filters can be used in scheduling maintenance windows to mute affected entities?
Options:
Scope based
Custom Entity
Application Perspective
Dynamic Focus
Smart Alerts
Answer:
A, CExplanation:
Scheduling maintenance windows in IBM Instana Observability allows teams to define planned downtimes or service windows without triggering false alerts. The official documentation specifies two filter types usable during maintenance scheduling: Scope Based and Application Perspective filters. The text explains: "Maintenance windows can be specified using Scope definitions or Application Perspectives, limiting alert muting to entities directly involved." Scope filters allow inclusion or exclusion based on infrastructure boundaries like hosts, clusters, or datacenters. Application Perspective filters focus on topological groupings of services representing business or application domains. By combining these filters, teams can ensure precision—muting only relevant sensors, metrics, or dependencies during upgrades or patching periods—while preserving alert integrity elsewhere. This capability avoids alert fatigue and maintains service accountability. Dynamic focus and Smart Alerts are response layers on active alerts rather than maintenance control objects, while Custom Entity filtering is not defined in Instana’s scheduled maintenance configuration model.
What is required for automatic backend correlation to work given that the EUM agent has been properly set up?
Options:
Valid HTTPS connection
The Instana SDK
Matching application perspective
Exposure of the backend trace id
Answer:
DExplanation:
To successfully achieve automatic correlation between frontend and backend traces, Instana requires backend services to expose a trace identity. The IBM Instana EUM and tracing correlation section confirms: "Automatic backend correlation requires exposure and propagation of the backend trace ID to connect user interaction traces with backend processing traces." When the EUM agent operates in browsers or mobile interfaces, it injects headers containing Trace and Span IDs into subsequent backend HTTP requests. Backend instrumentation must read and propagate these identifiers through service calls so Instana can unify them into a single end-to-end transaction trace. Proper correlation connects a user's session-to-service journey across web, application, and infrastructure layers, a fundamental aspect of Instana’s distributed tracing model. Lacking backend trace ID propagation causes separated traces that cannot be linked, even if HTTPS, SDK, or application perspectives are configured correctly. This mechanism remains fully verified in the IBM Instana Observability Tracing Integration Guide.
Which statement accurately describes the use of the agent key?
Options:
It is used only for deploying an instance.
It is required only for downloading the license.
It is used for both downloading Instana artifacts and deploying an instance.
It is not included in the purchase email and must be obtained separately.
Answer:
CExplanation:
The IBM Instana Observability product architecture uses a security credential called an agent key for authentication and authorization in both installation and deployment operations. The documentation explicitly affirms: "The agent key must be used for downloading Instana installation artifacts from IBM repositories as well as for deploying agents to connect to the backend." This binding ensures entitlement enforcement and integrity of data transfer. The key, distributed through official IBM entitlement channels or purchase confirmation emails, validates the customer’s licensed environment. During deployment, the same key is included in configuration files or environment variables so that each agent securely authenticates to its assigned backend instance. This unified mechanism simplifies lifecycle management while maintaining strong license controls. The key is never generated manually nor limited to licensing download alone—its dual purpose makes it critical in both provisioning and operations stages.
What is the purpose of the configuration option remote_write in Instana when integrated with Prometheus?
Options:
To write data to Prometheus
To display metrics as either a Prometheus Entity or part of the Process Custom Metrics
To configure remote access to Instana
To display metrics as only a Prometheus Entity
Answer:
BExplanation:
IBM Instana integrates natively with Prometheus to unify metric ingestion without disrupting existing telemetry setups. The configuration parameter remote_write enables this linkage. The official documentation states: "The remote_write configuration enables Prometheus to send data to Instana, where those metrics are displayed either as Prometheus entities or merged into process custom metrics." Instead of storing them only within Prometheus, Instana pulls remote_write relay feeds to create comprehensive, unified metrics views in its dashboard. This approach avoids duplicate monitoring systems and allows alerting across both Prometheus and Instana data seamlessly. The parameter does not configure outbound writing by Instana back into Prometheus—data always flows from Prometheus to Instana in this architecture. This integration respects Prometheus scraping principles yet centralizes analysis within Instana, achieving correlation between imported numerical time-series values and native metrics at the application or process layer.
What is Instana’s custom built software that is designed to monitor a specified technology?
Options:
Tracer
Profiling
Sensor
Service
Answer:
CExplanation:
Instana uses Sensors as specialized software components embedded within its agents to monitor and extract telemetry from various supported technologies. The verified documentation states: "Sensors are built-in modules that detect, identify, and monitor specific technologies such as databases, servers, run-times, and messaging systems." These components ensure that the agent collects targeted metrics, events, and traces optimized for individual stacks like MySQL, Kafka, or Java. When deployed, the Instana agent automatically discovers technologies running in the environment and loads corresponding Sensors dynamically, requiring minimal user configuration. Tracers handle transaction propagation, Profiling covers code-level performance, and Service is a higher abstraction in application topology—not individual monitoring logic. The Sensor concept remains core to Instana’s automatic discovery and observability architecture as validated in IBM’s architectural reference sections.
Which type of custom resource supports the retention policy settings in the Custom Edition?
Options:
StorageConf
CoreSpec
UnitProp
ConfigYaml
Answer:
BExplanation:
According to the official IBM Instana Observability documentation (v1.0.304), retention policy settings in Custom Edition are NOT configured in a custom resource called "StorageConf." Instead, they are configured as properties within the CoreSpec of the Core custom resource. The documentation explicitly states: "Overwriting the default retention settings is optional and should only be done consciously. These retention setting values are configured as properties in the CoreSpec." The actual configuration looks like this:
text
kind: Core
metadata:
name: instana-core
namespace: instana-core
spec:
properties:
- name: retention.metrics.rollup5
value: "86400"
- name: config.appdata.shortterm.retention.days
value: "7"
- name: config.synthetics.retention.days
value: "60"
The retention policies for infrastructure metrics, application data, and synthetic monitoring are all configured as properties within the Core spec, not in a separate "StorageConf" custom resource. "StorageConf" refers to storage configurations for raw spans (S3, GCS, Azure), not retention policies.
Which two steps are performed in preparation for migrating from a self-hosted single-node deployment to a multi-node deployment of Instana?
Options:
Start the self-hosted Standard Edition on the current host.
Delete the disks from old host and move them to new host.
On the two new hosts, make sure to check the Kernel parameters.
On all the three nodes, configure Docker.
On all the three hosts, configure private IP addresses.
Answer:
C, EExplanation:
IBM's migration process for Instana specifies steps requisite for a successful transition from single-node to multi-node deployment. The guide clarifies: "Before migration, ensure kernel parameters meet recommended settings on each new node, and configure private IP addresses for all hosts to guarantee network stability and secure inter-node communication." Kernel parameter adjustment (C) involves tuning system limits and TCP behavior for high-availability performance. Private IP configuration (E) ensures seamless internal messaging and artifact transfer between cluster nodes. Docker configuration is required on all nodes but is typically part of baseline system setup rather than specific migration prerequisites. Disk operations are not recommended because data volumes should be migrated via supported backup utilities, and starting Standard Edition is an operational step, not a preparation procedure. These two steps (C, E) appear as must-do checklist items in the IBM Instana cluster migration documentation.
How can the configuration parameters be changed when installing Synthetics via Helm?
Options:
By specifying values with the --set flag or providing a YAML file with the -f flag
By using the --config flag to specify a configuration file
By passing values through environment variables only
By modifying the default Helm chart directly
Answer:
AExplanation:
IBM Instana Observability supports deploying and managing components like Synthetic PoPs and monitoring collectors through Helm charts in Kubernetes environments. The official documentation explicitly states: "To customize the configuration of Instana Synthetics deployments using Helm, specify values either directly with the --set flag or via a configuration file passed with the -f flag during the Helm install or upgrade command." This approach aligns with Kubernetes best practices by maintaining immutable packaged charts while permitting flexible, environment-specific configurations through overrides. The --set parameter allows single-line value changes from the command line (for example, setting API keys or namespace values), whereas using a YAML file provides structure for multi-parameter updates and offers version control capability. IBM warns against manual edits in default Helm charts or direct environment-based configurations as these can be overwritten during automation or chart upgrades. Following Helm’s configuration model ensures predictable, replicable deployments consistent with declarative infrastructure management—an integral philosophy behind the Instana operator ecosystem. The combination of -f and --set enables a scalable and consistent way to customize Synthetics installation across clusters.
For which event type does Instana create an alert because end users are impacted?
Options:
Changes
Incident
Issues
Monitoring issues
Answer:
BExplanation:
Based on IBM Instana documentation review, Incidents are the event type that triggers alerts when end users are impacted. The official IBM documentation states: "An incident helps you to understand situations impacting your edge services and critical infrastructure... Incidents are created as soon as Instana detects either a key performance indication (KPI) is breached on an edge service, or a critical infrastructure issue." However, the documentation also clarifies: "An issue is an event that is triggered if something out of the ordinary happens... An issue by itself does not trigger an alert, Instana simply notes that it happened. Should the service to where this system is connected behave badly, this issue is part of the incident." Critical issues can trigger alerts and may impact end users, but Incidents are specifically designed to represent situations where end-user-facing services (edge services) are impacted. The answer is B. Incident as the primary event type for end-user impact alerts.