Manage containers in your private automation hub
Private automation hub functions as an internal container registry for your organization. It allows you to store, manage, and govern the container images, or automation execution environments, that your teams use to run automation.
Private automation hub functions as an internal container registry for your organization. It allows you to store, manage, and govern the container images, or automation execution environments, that your teams use to run automation.
To effectively manage these containers, first learn the difference between the two types of registries in your workflow:
- External registries (the source): Public or third-party registries where you source your initial images. Common examples include the Red Hat Ecosystem Catalog (registry.redhat.io) or Quay.io. You can pull images from these registries to your local environment.
- Private automation hub registry, or your remote registry (the destination): Your internal, secure registry hosted on private automation hub. You push your curated and approved images here. Your Ansible Automation Platform infrastructure then pulls these images from private automation hub to execute jobs.
Populate your private automation hub container registry Copy linkLink copied!
The automation hub remote registry is used for storing and managing automation execution environments.
When you have built or sourced an execution environment, you can push that execution environment to the registry portion of private automation hub to create a container repository. Then, you can grant your team access to the container repository, and customize the repository with a README, relevant links and other information for your team's use.
-
Pull an execution environment from an external registry (like registry.redhat.io) to your local machine.
-
Tag the image locally for your private automation hub registry.
-
Push the image to your private automation hub.
-
Configure access permissions and documentation (such as READMEs) within private automation hub so your teams can use the image.
As of April 1st, 2025, quay.io is adding three additional endpoints. As a result, you must adjust the allow/block lists within your firewall systems lists to include the following endpoints:
-
cdn04.quay.io -
cdn05.quay.io -
cdn06.quay.io
To avoid problems pulling container images, customers must allow outbound TCP connections (ports 80 and 443) to the following hostnames:
-
cdn.quay.io -
cdn01.quay.io -
cdn02.quay.io -
cdn03.quay.io -
cdn04.quay.io -
cdn05.quay.io -
cdn06.quay.io
This change should be made to any firewall configuration that specifically enables outbound connections to registry.redhat.io or registry.access.redhat.com.
Use the hostnames instead of IP addresses when configuring firewall rules.
After making this change, you can continue to pull images from registry.redhat.io or registry.access.redhat.com. You do not require a quay.io login, or need to interact with the quay.io registry directly in any way to continue pulling Red Hat container images.
Pull execution environments for use in automation hub Copy linkLink copied!
Before you can push execution environments to your private automation hub, you must first pull them from an existing registry and tag them for use.
Before you begin Copy linkLink copied!
- You have permissions to pull automation execution environments from
registry.redhat.io.
About this task Copy linkLink copied!
The following example details how to pull an execution environment from the Red Hat Ecosystem Catalog (registry.redhat.io).
Procedure Copy linkLink copied!
Results Copy linkLink copied!
To verify that the execution environment you pulled is contained in the list, take these steps:
- List the images in local storage:
$ podman images - Check the execution environment name, and verify that the tag is correct.
Tag container images Copy linkLink copied!
Tag automation execution environments to add an additional name to automation execution environments stored in your automation hub container repository. If no tag is added to an automation execution environment, automation hub defaults to latest for the name.
Before you begin Copy linkLink copied!
- You have change automation execution environment tags permissions.
Procedure Copy linkLink copied!
- From the navigation panel, select .
- Select your automation execution environments.
- Click the Images tab.
- Click the icon ⋮, and click .
- Add a new tag in the text field and click .
- Optional: Remove current tags by clicking on any of the tags for that image.
Results Copy linkLink copied!
- Click the Activity tab and review the latest changes.
Pull and sync images from automation hub to your local system Copy linkLink copied!
Pull Ansible Automation Platform execution environments from the automation hub registry to your local machine. Use the provided podman pull command for the latest version in the repository, or specify a tag to copy a specific execution environment.
Pull an image Copy linkLink copied!
Use the user interface to pull an execution environment from your private automation hub remote registry to make a copy to your local machine.
Before you begin Copy linkLink copied!
- You must have permission to view and pull from a private container repository.
- If you are pulling automation execution environments from a password or token-protected registry, create a credential first.
Procedure Copy linkLink copied!
- From the navigation panel, select .
- Select your execution environment.
- In the Pull this image entry, click .
- Paste and run the command in your terminal.
Results Copy linkLink copied!
- Run
podman imagesto view images on your local machine.
Sync images from a container registry Copy linkLink copied!
You can pull automation execution environments from the private automation hub remote registry to sync an image to your local machine. To sync an execution environment from a remote registry, you must first configure a remote registry.
Before you begin Copy linkLink copied!
You must have permission to view and pull from a private container repository.
Procedure Copy linkLink copied!
Create a credential Copy linkLink copied!
To pull automation execution environments images from a password or token-protected registry, you must create a credential.
About this task Copy linkLink copied!
In earlier versions of Ansible Automation Platform, you were required to deploy a registry to store execution environment images. On Ansible Automation Platform 2.0 and later, the system operates as if you already have a remote registry up and running. To store execution environment images, add the credentials of only your selected remote registries.
Procedure Copy linkLink copied!
- Log in to Ansible Automation Platform.
- From the navigation panel, select .
- Click to create a new credential.
- Enter an authorization Name, Description, and Organization.
- In the Credential Type drop-down, select Container Registry.
- Enter the Authentication URL. This is the remote registry address.
- Enter the Username and Password or Token required to log in to the remote registry.
- Optional: To enable SSL verification, select Verify SSL.
- Click .
Remote registry team permissions Copy linkLink copied!
Configure team access to container repositories in private automation hub to control who can access and manage execution environments.
New teams do not have any assigned permissions by default. You must add permissions when first creating a team or edit an existing team to add or remove permissions.
The following table lists permissions you can grant to teams to ensure they have the correct level of access and privileges to your remote registries.
| Permission name | Description |
|---|---|
| Create new containers |
Users can create new containers |
| Change container namespace permissions |
Users can change permissions on the container repository |
| Change container |
Users can change information on a container |
| Change execution environment tags |
Users can modify execution environment tags |
| Push to existing container |
Users can push an execution environment to an existing container |
Add a README to your container repository Copy linkLink copied!
Add a README to your container repository to provide instructions to your users on how to work with the container. Automation hub container repositories support Markdown for creating a README. By default, the README is empty.
Before you begin Copy linkLink copied!
- You have permissions to change containers.
Procedure Copy linkLink copied!
- Log in to Ansible Automation Platform.
- From the navigation panel, select .
- Select your execution environment.
- On the Detail tab, click .
- In the Raw Markdown text field, enter your README text in Markdown.
- Click when you are finished.
What to do next Copy linkLink copied!
After you add a README, you can edit it at any time by clicking and repeating steps 4 and 5.