Skip to main content
TrustRadius
Ansible

Ansible

Overview

What is Ansible?

The Red Hat Ansible Automation Platform (acquired by Red Hat in 2015) is a foundation for building and operating automation across an organization. The platform includes tools needed to implement enterprise-wide automation, and can automate resource provisioning, and IT environments…

Read more
Recent Reviews

Ansible is Awesome!

10 out of 10
May 09, 2024
Incentivized
We use AAP to automate our server deployment process, configure network equipment, and install/remove applications and software updates. …
Continue reading
Read all reviews

Awards

Products that are considered exceptional by their customers based on a variety of criteria win TrustRadius awards. Learn more about the types of TrustRadius awards to make the best purchase decision. More about TrustRadius Awards

Popular Features

View all 6 features
  • Parallel Execution (40)
    8.9
    89%
  • Infrastructure Automation (44)
    8.8
    88%
  • Automated Provisioning (41)
    8.5
    85%
  • Reporting & Logging (41)
    7.5
    75%

Reviewer Pros & Cons

View all pros & cons

Video Reviews

3 videos

Is it worth it? | Red Hat Ansible Automation Platform Review
04:14
Red Hat Ansible Automation Platform Review | Words from an Automation Architect
03:12
Red Hat Ansible Automation Platform Review | Systems Admin Thoughts
06:37
Return to navigation

Pricing

View all pricing

Basic Tower

5,000

On Premise
per year

Enterprise Tower

10,000

On Premise
per year

Premium Tower

14,000

On Premise
per year

Entry-level set up fee?

  • No setup fee

Offerings

  • Free Trial
  • Free/Freemium Version
  • Premium Consulting/Integration Services
Return to navigation

Product Demos

WebLogic Continuous Deployment with Red Hat Ansible Automation Platform

YouTube

Trusted Automation Series: F5 BigIP

YouTube

Manage your Cisco devices with Red Hat Ansible Automation Platform

YouTube

Network Automation Basics - First Ansible Playbook

YouTube

Deep Dive - Automated NetOps - Ansible for Network GitOps

YouTube
Return to navigation

Features

Configuration Management

Tools and features offered by configuration management software.

8.4
Avg 8.4
Return to navigation

Product Details

What is Ansible?

The Red Hat Ansible Automation Platform (acquired by Red Hat in 2015) is a foundation for building and operating automation across an organization. The platform includes tools needed to implement enterprise-wide automation, and can automate resource provisioning, and IT environments and configuration of systems and devices. It can be used in a CI/CD process to provision the target environment and to then deploy the application on it.

Its Automation Hub provides a one-stop-shop for Ansible content that is backed by support from Red Hat and its partners to deliver additional reassurance for demanding environments.

The Ansible project and Ansible Engine are open source technologies. The Ansible project is built by the community (ansible.com/community) for the benefit of the community. Ansible Engine is developed by Red Hat with the explicit intent of being used as an enterprise IT platform.

Ansible Technical Details

Deployment TypesOn-premise
Operating SystemsLinux
Mobile ApplicationNo

Frequently Asked Questions

The Red Hat Ansible Automation Platform (acquired by Red Hat in 2015) is a foundation for building and operating automation across an organization. The platform includes tools needed to implement enterprise-wide automation, and can automate resource provisioning, and IT environments and configuration of systems and devices. It can be used in a CI/CD process to provision the target environment and to then deploy the application on it.

Reviewers rate Parallel Execution highest, with a score of 8.9.

The most common users of Ansible are from Enterprises (1,001+ employees).
Return to navigation

Comparisons

View all alternatives
Return to navigation

Reviews and Ratings

(327)

Attribute Ratings

Reviews

(1-25 of 47)
Companies can't remove reviews or game the system. Here's why
Greg Jewett | TrustRadius Reviewer
Score 10 out of 10
Vetted Review
Verified User
Incentivized
We started with Tower for automated OS updates and configurations. We have since moved to using configuration as code and Ansible Automation Platform to build F5 configurations and build and automate data migrations. We are looking forward to using event-driven ansible and policy as code as learned at Summit. We love it!
  • Repeating tasks based on a schedule.
  • Agnostic support for so many platforms and systems.
  • Support for federated environments, and custom use cases.
  • Using standard and open developments environments (Python and JSON).
  • Playbook execution result output can sometimes be very messy and hard to understand. Make JSON output pretty and understandable. Allow disclosure triangles to hide/show content and let the playbook dictate that.
  • Allow for a pop-up review of a playbook's credentials, inventory, or other sub-components instead of forcing a new window or tab within the browser. Allow for quick review or audit.
  • Allow for stepping through a playbook, step by step, just like a development IDE or programming environment, inspecting variables and output from plays.
It has helped save us so much time, as it was designed to automate mundane and repetitive tasks that we were using other tools to perform and that required so much manual intervention. It does not work very well within Windows environments, understandably, but I would love to see more integration. I want it to be sexy and attractive to more than just geeky sysadmins.
May 10, 2024

AAP Review.

Score 10 out of 10
Vetted Review
Verified User
Incentivized
We are currently transitioning from TrueSight Orchestration to Ansible. Ansible will give us the ability to focus more on enterprise-wide automation as well as the smaller team-by-team cases we were using TrueSight Orchestration for. This will mean the creation of CI/CD pipelines and help connect our silos and reduce blockers in the process.
  • Debugging is easy, as it tells you exactly within your job where the job failed, even when jumping around several playbooks.
  • Ansible seems to integrate with everything, and the community is big enough that if you are unsure how to approach converting a process into a playbook, you can usually find something similar to what you are trying to do.
  • Security in AAP seems to be pretty straightforward. Easy to organize and identify who has what permissions or can only see the content based on the organization they belong to.
  • Ansible doesn't parse data well in some formats. You have to make your inputs pretty before they get to Ansible. WIth our other tools, we can take junk inputs and turn it into usable variables, etc.
  • Training is very expensive, and our company opted not to do it. Instead, we used classes from Udemy or Cloud Guru. I don't see why Redhat couldn't offer cheaper hands-on training options like that. I would also like to see included in these training classes more focus on writing YAML effectively and to Ansible Lint or codebot standards rather than relying on Lint and Codebot to help fix people's code. I think this also slows the adoption of the product within companies, as without training, many people will stop using the product until they are sure they have the time and bandwidth to learn it. With training, they are given that time and instruction.
  • There should be clearer documentation around building modules for the HUB. I struggled greatly with the initial folder structure and the requirements of documents like READMEs and requirements.yml files, etc.
I know my colleagues on the Windows side of things have felt neglected at Ansiblefest as far as sessions that help them figure out how to integrate the tool with their Windows products. Since Ansible is seen as an enterprise-wide tool, it should better support Windows platforms as well, as everything cannot always be run on Linux or a similar OS. Ansible has been great for our basic needs so far in automation. Still, we do struggle with adoption, and sometimes there are just scenarios where, as a non-developer, trying to adapt to the developed way of thinking is difficult. When i was learning Anisble, I had to learn Git and YAML together, as well as any CLI I needed, or what execution environments were. It's a lot to ramp up to and learn all at once.
Score 9 out of 10
Vetted Review
Verified User
Incentivized
We use it for bootstrapping servers and configuration management. We also use it for upgrades of software.
  • Bootstrapping servers
  • Configuration management
  • Security software updates
  • Reporting inventory
  • Connectivity for Windows servers
Automating tasks for management of servers and deployments.
Score 9 out of 10
Vetted Review
Verified User
Incentivized
We use Red Hat Ansible Automation Platform to automate workflows and to correct security settings to meet STIG requirements across multiple disconnected environments.
  • Allow us to create playbooks eliminating the mindless day to day tasks
  • Make changes through automation to keep or environment secure
  • Allows collaboration between teams on projects
  • It has been a steep learning curve for some
Our environment is 60% RHEL so Red Hat Ansible Automation Platform is a good fit. Our Windows Admins are warming up to it, though they still prefer PowerShell for most tasks.
Lenny Shirley II | TrustRadius Reviewer
Score 10 out of 10
Vetted Review
Verified User
Incentivized
We use it to manage our Linux and Windows servers, desktops, and networking devices. Repetition is the biggest thing it solved. Our scope is growing weekly as we bring in more and more teams into the platform and they discover it's capabilities. So far, everyone has thoroughly enjoyed the platform.
  • Repeat
  • Be consistent
  • Take a load of my plate
  • Users and teams, basically the entire access portion
  • More survey options
  • The ability to map external Auth groups to internal teams
Anything you need to repeat more than twice, and anything that can normally only be done by one or two people can now be automated so others can just click Launch. It's especially nice when I can provide a non-techy person the ability to log in, and click launch to do a task that they normally needed to escalate to one or more people to get done, and now instead of them waiting, it's done instantly.
Score 10 out of 10
Vetted Review
Verified User
Incentivized
I use AAP for the creation of Windows gold images, Windows and RHEL server builds, and interfacing with vendor APIs.
  • Streamlining software package installation
  • Detailed information while playbooks are running
  • Ease of use allows us to chain modules into larger playbooks quickly and easily
  • Examples of some loops could be more thorough
  • Some errors need a decoder ring to sort out
I feel that AAP can be used for any repetitive engineering or operations tasks. The initial lift can be heavy and culture can be hard to change. Once the benefits are realized, you will allow those people to move on to proactively improving their environment instead of working in a more reactionary state of mind.
Score 10 out of 10
Vetted Review
Verified User
Incentivized
We use Ansible for automated workflows. This includes onboarding and off-boarding ESX hosts and Linux and Windows servers—bare metal and VMs. We also use Ansible for OS configuration, app deployment, SQL maintenance, addressing vulnerabilities, and patching.
  • Documentation is great.
  • Onboarding and offboarding servers.
  • Patching
  • Ability to search extra vars in job templates.
  • Expanded powershell module.
Everything from onboarding and offboarding to automating everyday tasks.
Score 10 out of 10
Vetted Review
Verified User
Incentivized
Configuration management for a few hundred servers. Automated deployments of our application is done through Red Hat Ansible Automation Platform.
  • Scales extremely well
  • Integrates with a lot of tools/technologies
  • Flexible
  • Error messaging can be better, sometimes it's too much noise or not enough information
  • More supported modules for cloud services within aws
Red Hat Ansible Automation Platform is best suited when managing hundreds or more devices/servers.
Score 10 out of 10
Vetted Review
Verified User
Incentivized
We use Red Hat Ansible Automation Platform to allow for ease of access to playbooks written and maintained by the engineers on our team. This allows for other teams to make easy use of the work done by them in creating and maintaining playbooks. We also use it as a means to schedule jobs to run, such as patching, for windows of time where it isn't reasonable for people to be in office.
  • Scheduled workflows
  • Handling failures in workflows
  • Logs playbook output for future review
  • I actually think they accomplish all the things within my needs quite well.
Patching has been a great use for our team. We also like to use it for building fresh virtual machines to ensure they are STIGd. We don't have a specific place where Red Hat Ansible Automation Platform seems to have issues. Most problems tend to be less tech savvy users failing to understand how to leverage the tool effectively.
Score 9 out of 10
Vetted Review
Verified User
Incentivized
We use Red Hat Ansible Automation Platform for updating servers, both RHEL & Windows across multiple cloud platforms. We use Red Hat Ansible Automation Platform for VM post provisioning to accomplish compliance, AD join, etc. Along the same lines we also use Red Hat Ansible Automation Platform for some Day 2 operations.
  • Once you understand the pieces of Red Hat Ansible Automation Platform it is relatively easy to use.
  • It does integrate with other platforms like Terraform Enterprise.
  • Does provide somewhat decent error logs to help troubleshoot.
  • It does seem to have some limitations on updating without issue at times.
  • Once in a while has some weird issue that creep up out of no where which require server reboots.
It is very capable of accomplishing VM provisioning, patching maintenance, day 2 operations and app installation. It will handle multiple jobs all at once as long as your infrastructure is capable of handling the load.
Score 8 out of 10
Vetted Review
Verified User
Incentivized
We use Red Hat Ansible Automation Platform for workflow automation. The scope of use cases vary from 5 to 100.
  • Easy to develop
  • Efficient
  • Stability of automation
  • More features for Windows
  • APIs for Windows products
  • Better instructions for installation and configuration
It's good for managing the updates of similar systems. It's not very capable of handling the MS Office products related tasks.
Score 10 out of 10
Vetted Review
Verified User
Incentivized
Currently used to provision new machines, install patches and software, ensure compliance with security policies. We're moving forward with continuously adding more functions to the systems and expanding into network, storage, Windows, application installs, etc.
Addressing problems of consistency between systems, reduction of administrative overhead, and improvements in agility.
  • Consistent results
  • Quick execution of complex procedures
  • Fonts in the UI need to be shrink/expand so more detail can be displayed.
  • Add/remove columns in the main dashboard
  • Copying constructed inventories is broken; they no longer update correctly if copied - my experience.
Well suited for anything Ansible-related; not suitable for non-Ansible stuff ... but can be called to execute some automation from Jenkins or some other automation.
RBAC could be improved. Main system has very good support for multiple authentication methods. Installer can be flaky; does require gardening.
Needs unified authentication ... Private Hub and EDA seem to have their own authentication mechanisms.

Score 10 out of 10
Vetted Review
Verified User
Incentivized
Red Hat Ansible Automation Platform is used by different groups to automate their templates and workflows.
  • Ansible playbook implementation
  • Casc configuration as code
  • Inventory management
  • Scheduling
  • Workflow - start from any node
  • Extend maybe execution of the direct bash or powershell code
  • External network share access by other than awx account
Red Hat Ansible Automation Platform becomes standard for ansible-playbook executions.
Build in organizations and teams.
Support for credentials management.
Red Hat support.
Marshall Wells | TrustRadius Reviewer
Score 9 out of 10
Vetted Review
Verified User
Incentivized
We currently use Red Hat Ansible Automation Platform in conjunction with Satellite to manage our RHEL instances. We are moving into migrating AIX automation to the use of Red Hat Ansible Automation Platform and we are adding Windows to the fold. Our initial thrust into those operating systems will be related to configuration management and patching. We anticipate using Red Hat Ansible Automation Platform for other functions tied to surveys. An example would be allowing the help desk for a particular customer to only change passwords for their users on their systems.
  • Ensures the desired state is present on a system or device.
  • Allows for conditional application of changes.
  • Utilizes robust RBAC to limit actions to those allowed a user.
  • Intriguing integration with Event-driven Ansible.
  • Execution environments that allow older playbooks to continue to function.
  • YAML is hard for many to adopt. Moving to a system that is not as white space sensitive would likely increase uptake.
  • AAP and EDA should be more closely aligned. There are differences that can trip users of the integration up. An example would be the way that variables are used.
  • Event-driven Ansible output is not as informative as AAP.
Red Hat Ansible Automation Platform is well suited to ensure that systems are in a specific state - when it is run against those systems. More tooling in the area of periodic scanning would be helpful for compliance folks. In addition, it would be helpful to be able to import a profile to use as a baseline and derive playbooks based on those. One should not necessarily rely on Red Hat Ansible Automation Platform to keep a device from drifting. It is not a Tripwire that will detect and revert a change quickly. However, it could do well if used for periodic scans. Event-driven Ansible shows promise. If it is better integrated with Red Hat Ansible Automation Platform in terms of things like the approach to variables it could become more widely used more quickly.
Score 10 out of 10
Vetted Review
Verified User
Incentivized
We use it in many instances. Mostly for automation for routine jobs. But also for triggering processes for restart.
  • Restart of JBoss EAP severs
  • Building out JBoss servers
  • Various tasks that are repeatable.
  • Surveys could be smarter
  • AAP interface during job runs are a bit glitchy
  • Waiting on Event Driven Ansible
We us it to trigger automated restarts of JBoss EAP instances. This has proven to make support of these servers much easier. We also use the platform to automate the build of our new EAP 8 development servers. Also for scheduled reporting and alerts.
Score 9 out of 10
Vetted Review
Verified User
Incentivized
We use Ansible Automation Platform to automate patching of our Linux based systems in a no downtime fashion and to standardize new server deployments.
  • Scheduling of playbooks
  • Forking Multiple Playbooks with triggers
  • Having the platform use additional modules to add functionality
  • Credential Management works very well
  • Hosts licensing model
  • Consistent naming scheme with Ansible-core ex. templates and playbook
  • Requirements for windows hosts
Perfect for anything to do with Linux including configuring servers from scratch and avoiding the shell.
Score 9 out of 10
Vetted Review
ResellerIncentivized
Ansible has helped reduce time and most importantly configure servers in a constant manner. Idempotent nature of Ansible has helped us make sure that the servers deployed are exactly what we want them to be and nothing else.
We have scheduled automated patching on our RHEL servers.
We have automated server deployment where we provision both Windows and Linux servers.
We automate deploying of Windows IIS server and RHEL 7,8 and 9 Server with CIS hardening on them.
  • RHEL Patching
  • Post patching/Configure of RHEL servers
  • Configuration of applications on RHEL servers
  • Automating Infrastructure management with Configuration as Code approach
  • Good integration with RH Satellite
  • Dynamic scheduling of Job templates (i.e: Scheduling based on a schedule which is already created)
It is best to manage RHEL or WIndows servers for System Administrators.
It is also good for Network admins, as they can know the sate of their machine in an instant and deploy configurations to them.
Ansible works best on organization where they promote collaboration.
It might not be too good where teams are seperated, because the organization might not get full benifit only one team is using AAP, rather than the whole team.
May 08, 2024

AAP and On-Prem

Score 2 out of 10
Vetted Review
Verified User
Incentivized
I wanted to use AAP to automate areas in my program infrastructure
  • central location for all jobs
  • one stop shop for ansible
  • credential management
  • it has been very difficult to connect this on my on-premise networks
  • it has been very difficult connecting to my servers across windows, Cisco and linux
  • it's not simple to connect many users to my gitlab repository
it has been very difficult to get this thing installed on my on-premise networks and we had to disable too many required stigs to get this product approved by security
Score 9 out of 10
Vetted Review
Verified User
Incentivized
To better validate the applications we support, we have built an extensive set of Ansible jobs, some are scheduled and some are on-demand.
  • Easily create the scheduled or on-demand validation jobs
  • Ansible jobs could be run by other users via granting the proper privilege
  • No agent required on the hosting server
  • More flow control functionality in Ansible Job Flow
  • Better IDE
We had a set of validation scripts running on hosts before we adopt Ansible Automation Platform. Accessibility and security was a major concern. Also, the scheduling was cron-based and not flexible. Moving to Ansible help us resolve such issues/concerns.
Score 10 out of 10
Vetted Review
Verified User
Incentivized
We use the AAP as a building block in many end-to-end infrastructure and platform related build and deployment processes as well as a foundation for maintaining IaC and CasC principles that we adhere in the organization. The major complaint would be related to fair number of bugs the most of the new releases contain. The regression testing process can be improved at this point. Also, sometimes the bug fixes don’t get backported to the previous minor release, which forces us to perform more frequent upgrades. It impacts the platform availability due to increased number of maintenance windows required to support the product. At this point we always run on N-1 minor release to ensure stability (over new features and bugs that a just released version normally contains). It would be great if all the bug fixes are backported to the previous minor releases.
  • Distributed deployment options
  • RBAC
  • Identity providers options
  • UI has always been a problem and a cause of the users complaints. Specifically the option of following the job output.
The product is invaluable in the areas where post infra deployment configuration is required. It is not too suited for infra deployment as it is hard to maintain and remediate the state.
Score 10 out of 10
Vetted Review
Verified User
Incentivized
Firewall Policy Automation to allow app teams to directly generate their required access on the Firewall, Load Balancer automation for building VIPs and moving traffic with pipelines, creating new networks in IP space and on network devices, network compliance that enforces audit requirements on several platforms, automated credential rotation on infrastructure, data gathering, TLS certificate installs, monitoring, and automated self-healing, as well as hundreds of automation tasks outside of the infrastructure teams.
  • Automation for every platform due to agentless architecture.
  • Easy adoption due to human readable code and simple-to-use GUI.
  • Great API that can be called from ServiceNow forms, Pipelines, GitHub Webhooks, or anywhere else.
  • A secure vault that is customizable and can plug into systems like Hashicorp or CyberArk to pull updated credentials in real-time when a job runs.
  • Workflows should have more flexible paths than just success or failure.
  • The upgrade process can be challenging with differences in security and environment.
  • There is an opportunity to add CICD functionality into the tool.
  • For development, it would be nice to have the option of editing a repo directly from AAP to allow quick tests/reruns. Then, allow it to push the updates back or create a new branch/PR in GitHub.
  • The RBAC is good but could use improvements. One example would be an option that allows admins to assume the access of another user to validate it works as expected.
Ansible and AAP is well suited for orchestrating over many platforms. Its agentless architecture makes it ideal for infrastructure that cannot support an agent. It has a strong module library for the most common products, services, and platforms. It is by far the best language for anyone new to coding or automation to jump in and quickly get to a productive state. While AAP is capable of automating nearly anything, there are still advantages of using other platforms in its place. For example, Chef has been valuable for server automation because of the availability of existing cookbooks. For systems that can run an agent, having the individual nodes perform their own checks can scale a little better than the centralized model of AAP. But running an agent also means the potential risk of resource over utilization.
June 01, 2023

Ansible Review

BHANUCHANDRA KOMMALAPATI | TrustRadius Reviewer
Score 10 out of 10
Vetted Review
Verified User
Incentivized
we are using Ansible for patching and configuration management
  • OS patching
  • server build
  • Configration management
  • sameple playbooks from Red Hat community
  • Pricing
  • more focus for windows
for confiration and server deployements it is very good to use
Score 9 out of 10
Vetted Review
Verified User
Incentivized
The platform addresses several business problems, such as:

1.) Manual and repetitive tasks: Ansible Automation Platform helps eliminate manual, repetitive tasks by automating them. This reduces human error, increases efficiency, and allows IT teams to focus on more strategic initiatives.

2.) Configuration management: Managing configurations across a large number of systems can be challenging. Ansible Automation Platform enables centralized management of configurations, ensuring consistency and compliance across the infrastructure.

3.) Application deployment and orchestration: Deploying and managing applications across different environments can be time-consuming and error-prone. Ansible Automation Platform simplifies application deployment and provides orchestration capabilities to streamline the process.

4.) Infrastructure provisioning: Provisioning and managing infrastructure resources can be complex, especially in cloud or hybrid environments. Ansible Automation Platform helps automate infrastructure provisioning, enabling organizations to scale resources efficiently and consistently.
  • Configuration management at scale
  • Infrastructure as code
  • Cross-platform and cross-environment compatibility
  • Managing systems off corporate network; i.e. company provided equipment.
  • Think windows MDM... how do we manage systems off of corporate network.
Based on its idempotent nature, Red Hat Ansible Automation Platform is well suited for the following scenarios:

1.) Configuration management: Ansible excels in managing and maintaining consistent configurations across a large number of systems. Whether it's configuring software, network devices, or infrastructure components, Ansible's idempotent operations ensure that desired states are achieved and maintained, even in complex environments.

2.) Continuous deployment and integration (CI/CD): Ansible is well suited for automating application deployment and orchestrating CI/CD pipelines. Its idempotent execution ensures consistent and reproducible deployments, making it easier to roll out updates, manage multiple environments, and integrate with popular CI/CD tools.

3.) Infrastructure provisioning and orchestration: Ansible is an excellent choice for provisioning and managing infrastructure resources. Its idempotent playbooks enable organizations to automate the creation and configuration of servers, virtual machines, containers, and cloud resources, allowing for scalable and consistent infrastructure provisioning.

4.) System administration and operations: Ansible's idempotent nature makes it ideal for system administration tasks and operational automation. Whether it's managing user accounts, updating software packages, or performing routine maintenance tasks, Ansible ensures that operations are executed reliably and consistently across different systems and environments.

Ansible is the way...
May 24, 2023

Automate This

Score 10 out of 10
Vetted Review
Verified User
Incentivized
Help customers automate repetitive functions and ensure consistent deployments
  • easy to read and understand code
  • essentially documents the environment
  • doesn't require an agent
  • inventory in AAP
  • blue green deployments from AAP
  • documentation has a lot of room for improvement
AAP is well suited for customers that need to automate their configuration but don't necessarily have a lot of in house expertise and would benefit from the support of Red Hat.
Return to navigation