Release Notes


Migration Toolkit for Applications 7.3

New features, known issues, and resolved issues

Red Hat Customer Content Services

Abstract

Migration Toolkit for Applications 7.3 accelerates large-scale application modernization efforts across hybrid cloud environments on Red Hat OpenShift. This solution provides insight throughout the adoption process, at both the portfolio and application levels: inventory, assess, analyze, and manage applications for faster migration to OpenShift via the user interface.
This document describes new features and improvements, known issues, and resolved issues for the Migration Toolkit for Applications, version 7.3.

Making open source more inclusive

Red Hat is committed to replacing problematic language in our code, documentation, and web properties. We are beginning with these four terms: master, slave, blacklist, and whitelist. Because of the enormity of this endeavor, these changes will be implemented gradually over several upcoming releases. For more details, see our CTO Chris Wright’s message.

Chapter 1. MTA 7.3.2

The MTA 7.3.2 section describes the new features and enhancements, fixed issues, and known issues.

1.1. Technical changes

The following technical changes have been made in Migration Toolkit for Applications (MTA) 7.3.2:

  • After the Migration Toolkit for Applications (MTA) 7.3.2 version, the Eclipse IDE plugin for MTA will be deprecated and is planned to be removed in future releases. Red Hat will provide bug fixes and support for this feature during the current release lifecycle, but this feature will no longer receive enhancements and will be removed.

1.2. Fixed issues

This section provides the following bug fixes and resolved issues that have a significant impact on the Migration Toolkit for Applications (MTA) 7.3.2.

MTA now generates consistent results after analyzing large .EAR binary files

Previously, when analyzing binary applications, MTA relied on the Maven search index to determine whether embedded dependencies were internal to the application or were publicly available (usually classified as open-source dependency). Depending on the availability of the Maven search index, an open-source dependency could be wrongly classified as internal to the application and was included as a dependency in the analysis results. In this case, the analysis returned more incidents and greater effort to address issues found in dependencies. This issue has been resolved in MTA 7.3.2 by adding the flag --disable-maven-search to the analyze command. When disabled, the analysis will consistently classify dependencies. (MTA-5588)

1.3. Known issues

This section provides highlighted known issues in Migration Toolkit for Applications (MTA) version 7.3.2.

MTA user interface connection breaks when you sort dependencies by labels after an analysis

When you sort the dependencies by labels after analyzing an application in the MTA user interface, the user interface displays an error about retrieving data. Currently, there is no workaround available. (MTA-5981)

Analysis performance may degrade in a disconnected environment or when Maven central is not available

When you run an analysis by using the MTA on a host with no access to Maven central and without disabling the Maven search index (--disable-maven-search=false), the analysis performance may degrade, as MTA tries to access it.

As a workaround, Maven search can be disabled: you can manually set --disable-maven-search=true for CLI analysis and set disable_maven_search: true in the Tackle custom resource of the MTA operator for an analysis in the user interface. (MTA-6045)

An application analysis lasts longer when Maven credentials are missing

If you do not manually assign Maven credentials to an application that requires them or do not set these credentials as default, an application analysis might last longer. In addition, the Analyzer and Tech Discovery steps complete with the following error:

error: 'unable to ask for Konveyor rule entry'

To work around this problem, assign Maven credentials to the application or set these credentials as default before running the application analysis.

Chapter 2. MTA 7.3.1

This MTA 7.3.1 section lists the new features and enhancements, fixed issues, and known issues.

2.1. New features

This section provides the new features and improvements of the Migration Toolkit for Applications (MTA) 7.3.1.

FIPS is now supported in MTA

Federal Information Processing Standards (FIPS) are a set of computer security standards developed by the United States federal government in line with the Federal Information Security Management Act (FISMA).

Migration Toolkit for Applications (MTA) has been tested and works on FIPS-enabled MTA clusters.

2.2. Fixed issues

This section provides the following bug fixes and resolved issues and other problems that have a significant impact on the Migration Toolkit for Applications (MTA) 7.3.1.

MTA reports generated after a CLI analysis now display the issue description

Previously, after running an analysis in the CLI, MTA incorrectly displayed the incident message with the issue description for issues listed in the static report. This issue has been resolved in MTA 7.3.1. (MTA-5293)

MTA user interface now completes application analysis in clusters with low resources

Previously, when you ran containerized application analysis in a cluster with slower disk I/O or low storage, the technology discovery took longer and the analysis failed because the rule execution timed out with the error unable to ask for Konveyor rule entry. This issue has been resolved in MTA 7.3.1. (MTA-5369)

Custom rules are now triggered for applications without the pom file

Previously, MTA did not trigger custom rules for applications without the pom file. This issue has been resolved in MTA 7.3.1. MTA-5049

MTA now triggers custom rules for application analysis

Previously, MTA did not trigger custom rules when analyzing applications. This issue has been resolved in MTA 7.3.1. (MTA-4885)

MTA now analyzes Java applications without false positives

Previously, MTA sometimes generated a false positive by matching line 1 of a Java file. This issue has been resolved in MTA 7.3.1. (MTA-4918)

MTA CLI analysis is now optimized for multi-module binaries with dependencies

Previously, when you analyzed multi-module binaries in the MTA CLI, the analysis could take a long time to complete if dependency resolution failed. This issue has been resolved in MTA 7.3.1. (MTA-5398)

MTA CLI now allows disabling dependency rules for analysis

Previously, MTA CLI ran dependency rules during application analysis without an option to skip such rules. This issue has been resolved in MTA 7.3.1. (MTA-5399)

MTA user interface now allows the SSH URL of a Git repository as a source

Previously, MTA user interface did not permit you to enter the SSH URL of a Git repository as the source application. This issue has been resolved in MTA 7.3.1. (MTA-5385)

MTA user interface now creates a Tackle custom resource that requires authentication

Previously in MTA user interface, creation of Tackle CR with the feature_auth_required field set to true failed. This issue has been resolved in MTA 7.3.1. (MTA-5386)

MTA now runs Java rules when analyzing Java binaries in Windows

Previously, when you performed a containerless analysis of compiled Java applications in Windows, MTA did not match a Java rule and generated a Java Model (code 969) error. As a result, some rules did not trigger issues in the analysis report. This issue has been resolved in MTA 7.3.1. (MTA-5427)

MTA CLI now analyzes non-Java applications in containerized mode

Previously, when you analyzed non-Java applications, MTA initiated the analysis in containerless mode. This issue has been resolved in MTA 7.3.1. (MTA-5068)

Resources limits and requests are now present on all pods

Previously in MTA 7.3.1, all pods created by the mta-operator and the pod for the operator have resource limits and requests set. This way they also work in an environment where resource limits and requests are required, for example, when a project has resource quotas defined. (MTA-5426)

2.3. Known issues

This section provides highlighted known issues in Migration Toolkit for Applications (MTA) version 7.3.1.

Running analysis on large .EAR binary files obtains differents results

When analyzing binary applications, MTA relies on the Maven search index to determine whether dependencies are internal to the application or whether the application is installed as an open-source dependency. Depending on the availability of the Maven search index, it is assumed that an open-source dependency is internal to the application and includes the dependency in the analysis results. In this case, analysis returns more incidents and greater effort to address issues found in dependencies, even if the user does not expect to see those results. (MTA-5588)

MTA CLI generates a process error in log after Java binary analysis in Windows

When you analyze Java binaries in Windows, MTA CLI generates a process error when deleting files in the exploded directory after moving the decompiled files to the Java project path. This error does not affect the analysis results. Currently, there is no workaround for this issue. (MTA-5355)

MTA CLI does not detect dependencies for Gradle projects

When you analyze Gradle projects in containerless mode, the MTA CLI does not detect dependencies during analysis. (MTA-4033)

MTA user interface static reports do not display rule description in incidents

In incidents that are found in the static report after analysis, MTA user interface does not describe the rule that triggered the incident. (MTA-5643)

.NET Framework application analysis fails in the MTA CLI

When you analyze .NET Framework applications in Windows containers by using the MTA CLI, the analysis fails for the following environment variables:

DOTNET_PROVIDER_IMG: quay.io/konveyor/dotnet-external-provider:release-0.7

RUNNER_IMG: quay.io/konveyor/kantra:latest

PODMAN_BIN: C:\Program Files\Docker\Docker\resources\bin\docker.exe

Workaround: Use the following version of the Dotnet provider image:

set DOTNET_PROVIDER_IMG=quay.io/konveyor/dotnet-external-provider:v0.5.0 (MTA-5203)

For a complete list of all known issues, see the list of MTA 7.3.1 known issues in Jira.

Chapter 3. MTA 7.3.0

The MTA 7.3.0 section lists the new features and enhancements, technology preview and developer preview features, fixed issues, and known issues.

3.1. New features

This section provides the new features and improvements of the Migration Toolkit for Applications (MTA) 7.3.0.

Asset generation is available in MTA CLI (Developer Preview)

Starting with MTA 7.3.0, you can run the discover and generate commands in the CLI:

  • The discover command generates the discovery manifest that preserves the platform and runtime configurations defined in the Cloud Foundry (CF) application manifest.
  • The generate command uses the discovery manifest to generate the deployment manifest in a Kubernetes-native format to prepare it for Red Hat OpenShift Container Platform deployments. You can also use the command to generate non-Kubernetes manifests such as a Dockerfile.

(MTA-4610)

MTA uses Red Hat Build of Keycloak for user authentication

MTA 7.3.0 uses the Red Hat Build of Keycloak (RHBK) instance for user authentication and authorization. The MTA Operator manages the RHBK instance and configures a dedicated realm with necessary roles and permissions. For RHBK, the secret and the pod name have changed. The pod name for RHBK is changed to rhbk-operator. (MTA-4540)

CLI flag to list all languages in an application is available (Developer Preview)

In MTA 7.3.0, you can list all languages in an application by using the --list-languages flag in the CLI. The listed language that has no supported providers requires a custom rule set and the --override-provider-settings flag when you analyze the application.

(MTA-4798)

Support for Python and Node.js language providers is available (Technology Preview)

In addition to the Java and Go language providers, support for the Python and Node.js language providers is now available for the application analysis in MTA 7.3.0. As a result, you can now perform the following actions for these providers in the MTA user-interface (UI):

  • Add custom migration targets.
  • Run custom rules.

(MTA-4542)

3.2. Technology preview features

This section provides a list of all Technology Preview features available in Migration Toolkit for Applications (MTA) 7.3.0.

For more information about the support scope of Red Hat Technology Preview features, see Technology Preview Features Support Scope.

Support for Python and Node.js language providers is available

In addition to the Java and Go language providers, support for the Python and Node.js language providers is now available for the application analysis in MTA 7.3.0. As a result, you can now perform the following actions for these providers in the MTA user-interface (UI):

  • Add custom migration targets.
  • Run custom rules.

(MTA-4542)

3.3. Developer Preview features

This section provides a list of all Developer Preview features available in Migration Toolkit for Applications (MTA) 7.3.0.

For more information about the support scope of Red Hat Developer Preview features, see Developer Preview Features Support Scope.

Asset generation is available in MTA CLI

Starting with MTA 7.3.0, you can run the discover and generate commands in the CLI:

  • The discover command generates the discovery manifest that preserves the platform and runtime configurations defined in the Cloud Foundry (CF) application manifest.
  • The generate command uses the discovery manifest to generate the deployment manifest in a Kubernetes-native format to prepare it for Red Hat OpenShift Container Platform deployments. You can also use the command to generate non-Kubernetes manifests such as a Dockerfile.

(MTA-4610)

Listing all languages in an application is available

In MTA 7.3.0, you can list all languages in an application by using the --list-languages flag in the CLI. The listed language that has no supported providers requires a custom rule set and the --override-provider-settings flag when you analyze the application.

(MTA-4798)

3.4. Fixed issues

This section provides the following bug fixes and resolves issues and other problems that have a significant impact on the Migration Toolkit for Applications (MTA) 7.3.0.

MTA CLI now excludes the target folder when analyzing compiled Java Maven projects

Previously, for compiled Java Maven projects, the MTA CLI included incidents by analyzing the target folder. This generated different reports for Java Maven projects before and after running the mvn-clean-package command. This issue has been resolved in MTA 7.3.0. (MTA-5078)

Application credential update now triggers a new discovery task

Previously, when you updated the source or Maven credential for an application, a new discovery task was not triggered in the MTA user interface. This issue has been resolved in MTA 7.3.0. (MTA-5121)

3.5. Known issues

This section provides highlighted known issues in Migration Toolkit for Applications (MTA) version 7.3.0.

.NET Framework application analysis fails in the MTA CLI

When you analyze .NET Framework applications in Windows containers by using the MTA CLI, the analysis fails for the following environment variables:

  • DOTNET_PROVIDER_IMG: quay.io/konveyor/dotnet-external-provider:release-0.7
  • RUNNER_IMG: quay.io/konveyor/kantra:latest
  • PODMAN_BIN: C:\Program Files\Docker\Docker\resources\bin\docker.exe

Workaround: Use the following version of the Dotnet provider image: set DOTNET_PROVIDER_IMG=quay.io/konveyor/dotnet-external-provider:v0.5.0

(MTA-5203)

Non-Java applications are analyzed in containerless mode in the MTA CLI

When you analyze non-Java applications, MTA initiates the analysis in containerless mode.

Workaround: set the --run-local=false flag to analyze non-Java applications. (MTA-5068)

Application analysis fails to get a list of dependencies for Node.js in the MTA UI

When you run an application analysis for the Node.js language provider by using the MTA user-interface (UI), the analysis completes with the following error displayed in the analysis log:

level=error msg="failed to get list of dependencies for provider" error="dependency provider path not set" provider=nodejs'

Workaround: Set the Analysis Mode setting to source-only.

Note

The Node.js provider does not have a dependency capability. Therefore, a dependency list cannot be generated. The same applies for the Python provider.

(MTA-5070)

Dependency rule of a custom rules file in analysis is not fired

A custom dependency rule is not fired, and no related migration issue is found. (MTA-3863)

No multi-user access restrictions on resources

An analyzer task does not have multi-user access restrictions on resources. For example, an analyzer task created by a user can be canceled by any other user. (MTA-3819)

Legal Notice

Copyright © 2025 Red Hat, Inc.
The text of and illustrations in this document are licensed by Red Hat under a Creative Commons Attribution–Share Alike 3.0 Unported license ("CC-BY-SA"). An explanation of CC-BY-SA is available at http://creativecommons.org/licenses/by-sa/3.0/. In accordance with CC-BY-SA, if you distribute this document or an adaptation of it, you must provide the URL for the original version.
Red Hat, as the licensor of this document, waives the right to enforce, and agrees not to assert, Section 4d of CC-BY-SA to the fullest extent permitted by applicable law.
Red Hat, Red Hat Enterprise Linux, the Shadowman logo, the Red Hat logo, JBoss, OpenShift, Fedora, the Infinity logo, and RHCE are trademarks of Red Hat, Inc., registered in the United States and other countries.
Linux® is the registered trademark of Linus Torvalds in the United States and other countries.
Java® is a registered trademark of Oracle and/or its affiliates.
XFS® is a trademark of Silicon Graphics International Corp. or its subsidiaries in the United States and/or other countries.
MySQL® is a registered trademark of MySQL AB in the United States, the European Union and other countries.
Node.js® is an official trademark of Joyent. Red Hat is not formally related to or endorsed by the official Joyent Node.js open source or commercial project.
The OpenStack® Word Mark and OpenStack logo are either registered trademarks/service marks or trademarks/service marks of the OpenStack Foundation, in the United States and other countries and are used with the OpenStack Foundation's permission. We are not affiliated with, endorsed or sponsored by the OpenStack Foundation, or the OpenStack community.
All other trademarks are the property of their respective owners.
Red Hat logoGithubredditYoutubeTwitter

Learn

Try, buy, & sell

Communities

About Red Hat Documentation

We help Red Hat users innovate and achieve their goals with our products and services with content they can trust. Explore our recent updates.

Making open source more inclusive

Red Hat is committed to replacing problematic language in our code, documentation, and web properties. For more details, see the Red Hat Blog.

About Red Hat

We deliver hardened solutions that make it easier for enterprises to work across platforms and environments, from the core datacenter to the network edge.

Theme

© 2026 Red Hat
Back to top