Ansible Automation Platform preview release notes
Upcoming changes in Ansible Automation Platform
Abstract
Chapter 1. Preview release notes to help you plan Copy linkLink copied to clipboard!
This document provides early access to information about upcoming changes deemed impactful enough to warrant extra notice. References to version numbers or features are subject to change. This document does not provide a comprehensive list of new features and changes planned for the next release.
Chapter 2. Summary of changes Copy linkLink copied to clipboard!
Note the following upcoming changes:
- Supported upgrade paths
- Event-Driven Ansible ansible.eda and ansible-rulebook changes
- Bring-Your-Own-Knowledge (BYOK) for Ansible Lightspeed intelligent assistant
- New required metrics service
Chapter 3. Supported upgrade paths Copy linkLink copied to clipboard!
To ensure a successful upgrade to the next version of the Ansible Automation Platform, you must follow one of the following supported upgrade paths:
- AAP 2.4 to 2.6 to 2.7
- AAP 2.5 to 2.6 to 2.7
- AAP 2.6 to 2.7
Upgrading directly from Ansible Automation Platform 2.4 to 2.7 or 2.5 to 2.7 is not supported.
If your current environment was installed via RPM, please note that in order to upgrade to AAP 2.7 you must migrate using another installation method. Follow the guidelines for migrating to a new topology. The RPM installer has been removed with the release of version 2.7.
Chapter 4. Event-Driven Ansible ansible.eda and ansible-rulebook changes Copy linkLink copied to clipboard!
4.1. New ansible-rulebook built-in modules Copy linkLink copied to clipboard!
The following event sources and event filters will be available as built-in modules in ansible-rulebook, and removed from ansible.collection.
The following is the list of new built-in modules:
-
eda.builtin.dashes_to_underscores(filter) -
eda.builtin.generic(source) -
eda.builtin.insert_hosts_to_meta(filter) -
eda.builtin.json_filter(filter) -
eda.builtin.normalize_keys(filter) -
eda.builtin.pg_listener(source) -
eda.builtin.range(source) -
eda.builtin.webhook(source)
For backwards compatibility, these plugins remain available in the ansible.eda namespace and are automatically mapped to eda.builtin. However, they are no longer actively maintained in the ansible.eda collection. If you currently have rulebooks that use these filters or sources, update your rulebooks to use the eda.builtin namespace instead of the ansible.eda namespace.
4.2. AWS and Azure event sources movement to the cloud collections Copy linkLink copied to clipboard!
The following list of event sources is being deprecated in ansible.eda collection and moving to the corresponding certified cloud collections. The DE-supported decision environments have been updated to incorporate amazon.aws and azure.azcollection. If you update the DE-supported decision environment, make sure to update your ansible-rulebooks namespace to refer to the updated namespace as mentioned below:
-
ansible.eda.aws_cloudtrailtoamazon.aws.aws_cloudtrail -
ansible.eda.aws_sqs_queuetoamazon.aws.aws_sqs_queue -
ansible.eda.azure_service_bustoazure.azcollection.azure_service_bus
4.3. Event sources transitioning from ansible.eda to community.eda Copy linkLink copied to clipboard!
The following list of event sources is being removed from the certified ansible.eda collection, will not be supported by Red Hat engineering, but they will have community maintenance, and are available as part of the community.eda collection. If you are using any of these filters, make sure to update your ansible-rulebooks to use the community.eda namespace, and you will need a custom decision environment in order to keep running your rulebooks.
You can also keep your existing rulebooks with an older version of DE-supported or DE-minimal, while you update your rulebooks.
-
ansible.eda.filetocommunity.eda.file -
ansible.eda.file_watchtocommunity.eda.file_watch -
ansible.eda.journaldtocommunity.eda.journald -
ansible.eda.tickto use eithereda.builtin.genericoreda.builtin.range -
ansible.eda.url_checktocommunity.eda.url_check
Chapter 5. Bring-Your-Own-Knowledge with the Ansible Lightspeed intelligent assistant Copy linkLink copied to clipboard!
Ansible Lightspeed intelligent assistant uses retrieval-augmented generation (RAG) to provide contextual answers grounded in Red Hat Ansible Automation Platform (AAP) documentation. With the upcoming Bring Your Own Knowledge (BYOK) capability, administrators can extend the intelligent assistant’s knowledge by adding their organization’s own documentation, such as internal AAP policies, operational procedures, and best practices, into the RAG pipeline. When users ask the intelligent assistant a question, responses are informed by both the organization’s custom content and Red Hat’s AAP documentation, with organizational content taking priority when relevant.
BYOK is designed for both OpenShift Operator and containerized installer deployments of Ansible Automation Platform. Administrators build a custom knowledge image externally using provided tooling, import it into their AAP environment, and configure the intelligent assistant to use it. The image can be updated or replaced over time as organizational documentation evolves.
Chapter 6. New required metrics service Copy linkLink copied to clipboard!
The Metrics Service is now a mandatory component of the Ansible Automation Platform. It is treated as a core architectural requirement, similar to automation controller or platform gateway, and cannot be opted out of during the installation process. This service collects key usage data of Ansible Automation Platform.
To ensure a seamless "zero-config" experience for the majority of users, the installation program follows an opinionated placement strategy. The installation program will automatically select a default node (for example, the first platform gateway node) if not specified, though Ansible Automation Platform admins can explicitly define the [automationmetrics] inventory group. Note that this service requires a new database, so if external databases are going to be utilized in the deploy then those credentials need to be provided to the installation program.
Chapter 7. Deprecated features Copy linkLink copied to clipboard!
- The ee-cloud-services execution environment in Managed Application on Azure
- Python 3.11 and earlier versions are deprecated
7.1. The ee-cloud-services execution environment in Managed Application on Azure Copy linkLink copied to clipboard!
Starting with the release of Ansible Automation Platform (AAP) 2.7, the ee-cloud-services execution environment will not be available in new deployments of Ansible Automation Platform on Microsoft Azure. Existing Ansible Automation Platform on Microsoft Azure customers are encouraged to transition their automation workflows to the ee-supported or build a new execution environment; the execution environment will remain until you choose to remove it.
7.1.1. Recommended migration steps Copy linkLink copied to clipboard!
To ensure your automation continues to run smoothly on version 2.7, follow these best practices:
-
Audit Current Job Templates: Identify which Job Templates currently use
ee-cloud-services. -
Test with ee-supported: Switch the Execution Environment on a test Job Template to
ee-supported. -
Identify Missing Dependencies: If your playbooks fail due to missing Python libraries (e.g.,
boto3,azure-mgmt-compute) or specific Ansible collections, you will need to create a custom EE. -
Build Custom EEs using Ansible Builder: Use the
ee-supportedoree-minimalimage as your base in yourexecution-environment.ymlfile.
For Managed Cloud customers, ensure your private automation hub is configured to sync the latest images from the Red Hat ecosystem to maintain access to the supported ee-supported images.
7.1.2. Summary of support Copy linkLink copied to clipboard!
-
Existing Installs: Upgraded environments may retain
ee-cloud-servicesfor a limited grace period, but it is considered "End of Life." -
Fresh Installs:
ee-supported&ee-minimalare the only cloud-focused EE provided out of the box. -
Event-Driven Ansible
ansible.eda.noopis deprecated and there will not be a replacement.
7.2. Python 3.11 and earlier versions are deprecated Copy linkLink copied to clipboard!
Support for Python 3.11 and all earlier versions is being phased out across all Supported Execution Environments and Minimal Execution Environments. To ensure security compliance and access to the latest performance optimizations, users must migrate to Python 3.12 or higher.
7.2.1. Affected environments Copy linkLink copied to clipboard!
1. Supported Execution Environments
These environments typically include the full standard library and common pre-installed dependencies.
2. Minimal Execution Environments
These are stripped-down, security-hardened environments used for Custom EE’s.
7.2.2. Action required Copy linkLink copied to clipboard!
Audit custom-built binaries. Python 3.11 minimal layers will no longer receive security vulnerability (CVE) patches.
Recommendation: Move to the python:3.12+ or equivalent Minimal EE instance.
7.2.3. Why this is happening Copy linkLink copied to clipboard!
Python 3.12+ offers significant improvements that older environments cannot support, specifically:
- Improved Error Messages: More precise tracebacks for faster debugging.
- Performance: Advancements in the Faster CPython project.
- Security: Removal of deprecated APIs and older TLS versions that are increasingly vulnerable.
Chapter 8. Removed features Copy linkLink copied to clipboard!
- Removal of direct component API access
- Removal of RPM Installer in Ansible Automation Platform 2.7
8.1. Removal of direct component API access Copy linkLink copied to clipboard!
The next version of Ansible Automation Platform marks the completion of the platform unification initiative introduced in Ansible Automation Platform 2.5. With this release, the platform gateway becomes the sole entry point for all Ansible Automation Platform interactions, replacing direct API access to automation controller, automation hub, and Event-Driven Ansible.
This change centralizes organization management, authentication, and access control through a single, unified interface — providing a more consistent and secure experience across all automation capabilities within the platform.
Any existing direct integrations with automation controller, automation hub, or Event-Driven Ansible APIs must be migrated to route through the platform gateway prior to upgrading to the next version of Ansible Automation Platform.
8.1.1. Previous compatibility support Copy linkLink copied to clipboard!
Ansible Automation Platform 2.5 and 2.6 maintained backward compatibility with pre-unification access patterns to provide a transition period for customers migrating to the unified platform. This compatibility layer is now removed. Integrations that continued to function through an upgrade from 2.4 to 2.6 will require remediation before upgrading.
8.1.2. Pre-upgrade migration assessment Copy linkLink copied to clipboard!
Before upgrading, review your environment for the following direct-access patterns, all of which require a migration plan:
| Area | What to Review |
|---|---|
| User & Org Management | Any organization, team, or user management interfacing directly with automation controller or automation hub APIs or collections |
| Authentication | Legacy users authenticating with basic auth directly to automation controller |
| Tokens & OAuth | Legacy Personal Access Tokens (PATs) or OAuth applications connecting directly to automation controller |
| Image Management | Any container registry processes managing images directly on private automation hub |
| Access Control | RBAC configurations managed directly on individual components rather than through platform gateway |
| Job Management | Job template or job re-execution triggers to launch jobs directly to automation controller |
| Inventory Management | Managing Inventory using automation controller to add, edit, or remove inventory groups or nodes |
| Project Management | Managing SCM projects using automation controller to add, edit, or remove projects. |
All of the above must be migrated to use the equivalent functionality provided by the platform gateway.
8.1.3. Direct access detection tooling Copy linkLink copied to clipboard!
To help you assess the scope of your migration effort, Red Hat has developed a tooling to identify legacy direct-access interactions across your Ansible Automation Platform deployment of 2.6 for containerized & operator based installations (additional details forthcoming).
8.2. Removal of RPM installer in Ansible Automation Platform 2.7 Copy linkLink copied to clipboard!
In Ansible Automation Platform 2.5 release, the RPM installer was deprecated. Starting with Ansible Automation Platform 2.7, we are no longer providing the installer, and customers who have Ansible Automation Platform installed using RPM must migrate to either the containerised or Openshift Ansible Automation Platform Operator. Follow the guidelines for migrating to a new topology. Customers must first migrate to the new supported topology on the version that they are currently running (that is, Ansible Automation Platform 2.6 RPM to Ansible Automation Platform 2.6 containerised) before upgrading to Ansible Automation Platform 2.7.