Instana Releases Automatic Application Monitoring Agent Operator for Red Hat OpenShift
May 08, 2019
Share this

Instana released agent technology as an Instana Agent Operator and has achieved Red Hat OpenShift Operator Certification.

This new deployment option offers deployment flexibility to users, who can also run the agent as its own container, host process or microservice.

“The Instana Operator makes it easier and more efficient for companies to deploy and operate their microservice applications,” said Pete Abrams, Instana co-founder and COO. “Instana’s ability to deploy monitoring agents as Operators on Red Hat OpenShift allows DevOps teams to leverage Instana’s ability to automate monitoring configuration and application root cause analysis on top of OpenShift, the industry’s most comprehensive enterprise Kubernetes platform.”

Instana’s Automatic APM solution for microservices is the only automated application monitoring solution that provides full-stack visibility automatically and collects end-to-end traces of every user request. The solution not only recognizes the presence of containers and orchestration, it has automatically deployed monitoring sensors for those infrastructure components.

Instana’s automatic APM solution discovers application infrastructure and service components, deploys monitoring sensors for the application’s technology stack and traces all application requests – without requiring any human configuration or even application restarts. The solution detects changes in the application environment in real-time, adjusting its own models and visualizing the changes and impacts to performance in seconds.

“Kubernetes Operators are appealing because they help encode the human operational logic normally required to manage services running on a Kubernetes-native application and aim to make day-to-day operations easier,” said Julio Tapia, director, Cloud Platforms Partner Ecosystem, Red Hat. “We are thrilled that the Instana Agent Operator is Red Hat OpenShift Operator Certified. By providing Operators on Red Hat OpenShift users can begin experiencing the next level of benefits from a Kubernetes-native infrastructure, with services designed to ‘just work’ across any cloud where Kubernetes runs.”

Instana’s microservice monitoring capabilities include deep visibility into almost a dozen different languages and over 100 different microservice application infrastructure technologies including Docker, Kubernetes, Spring Boot, NGINX, AWS and many more. Monitoring for each technology component includes correlated application level visibility, as well as information tied to each individual request in traces.

The correlated monitoring of applications and infrastructure extends to the OpenShift Kubernetes distribution, providing automated visibility into mission critical applications, their dependencies and their performance.

Share this

The Latest

February 26, 2020

For the past 10 years, the majority of CIOs have had a transformational focus (currently 42%), however, this year, there is strong momentum in CIOs taking on more strategic responsibilities (40%), according to the 2020 State of the CIO research from IDG's CIO ...

February 25, 2020
A widening gap between IT resources and the demands of managing the increasing scale and complexity of enterprise cloud ecosystems is evident, according to <span style="font-style: italic;">Top challenges for CIOs on the road to the AI-driven autonomous cloud</span>, a new report based on a global survey of 800 CIOs conducted by Vanson Bourne and commissioned by Dynatrace ...
February 24, 2020

The tech world may be falling in love with artificial intelligence and automation, but when it comes to managing critical assets, old school tools like spreadsheets are still in common use. A new survey by Ivanti illustrates how these legacy tools are forcing IT to waste valuable time analyzing assets due to incomplete data ...

February 20, 2020

Over 70% of C-Suite decision makers believe business innovation and staff retention are driven by improved visibility into network and application performance, according to Rethink Possible: Visibility and Network Performance – The Pillars of Business Success, a survey
conducted by Riverbed ...

February 19, 2020

Modern enterprises rely upon their IT departments to deliver a seamless digital customer experience. Performance and availability are the foundational stepping stones to delivering that customer experience. Along those lines, this month we released a new research study titled the IT Downtime Detection and Mitigation Report that contains recommendations on how to best prevent, detect or mitigate brownouts and outages, given the context of today’s IT transformation trends ...

February 18, 2020

While Application Performance Management (APM) has become mainstream, with a majority of tech pros using APM tools regularly, there's work to be done to move beyond troubleshooting ...

February 13, 2020

Over the last few decades, IT departments have decreased budgets in part because of recession. As a result, they have are being asked to do more with less. The increase in work has amplified the need for automation ...

February 12, 2020

Many variables must align for optimum APM, and security is certainly among them. I offer the following APM predictions for 2020, which revolve around the reality that we will definitely begin to see much deeper integration of WAN technology on the security front. Look for this integration to take shape in the following ways ...

February 11, 2020

When it comes to growing a successful company, research shows it isn't about getting the most out of employees, but delivering an experience that empowers them to be and do their best. And according to Priming a New Era of Digital Wellness, a new study conducted by Quartz Insights in partnership with Citrix Systems, technology is the secret to doing so ...

February 10, 2020

Only 11% of website decision-makers feel that they have complete insight into the scripts that they use on their websites. However, industry estimates state that about 70% of the code on a website comes from a third-party library or service. Research highlights a clear need to raise awareness of the potential threats associated with the vulnerabilities inherent in third-party code ...