Rackspace delivers OpenStack private clouds as-a-service, architected like a public cloud and designed for scale and service availability to any data center in the world. It includes a 99.99% API Uptime SLA.
$0.12
per GB/per month
Ansible
Score 9.2 out of 10
N/A
The Red Hat Ansible Automation Platform (acquired by Red Hat in 2015) is a foundation for building and operating automation across an organization. The platform includes tools needed to implement enterprise-wide automation, and can automate resource provisioning, and IT environments and configuration of systems and devices. It can be used in a CI/CD process to provision the target environment and to then deploy the application on it.
$5,000
per year
Red Hat OpenStack Platform
Score 7.5 out of 10
N/A
Red Hat OpenStack Platform is a cloud computing platform that virtualizes resources from industry-standard hardware, organizes those resources into clouds, and manages them so users can access what they need—when they need it.
It was much simpler to deploy and use Red Hat Ansible Automation Platform in our enterprise environment. Red Hat has great training to get our users up to speed. YAML is easy to write (although watch out for spacing) and run playbooks. We can easily generate infrastructure …
Need to get an application up and running, then I would say the open stack is a great place to test it out. Why spend time setting things up when you can let them do it for you? Many people also have experience with using Rackspace in some capacity so its an easier learning curve for many people.
Red Hat Ansible automates server management, configuration updates, and deployments across our server infrastructure, keeping everything consistent, reducing human error, and saving time. Also provides detailed reports on what is done and uses role-based access controls to keep systems secure by controlling who can make changes.
Best suited for - any organization where you have people who already have expertise on OpenStack, Linux & IP networking. Otherwise, the maintenance & operations will be difficult. When the number of deployed VMs reaches its capacity, it becomes very difficult to manage Red Hat OpenStack because there are no in-built fault management & performance management tools available within Red Hat OpenStack. Not suited for - Organizations where people have a culture of working on automated GUI-based tools. Here VMware wins over Red Hat OpenStack. Also where you have mission-critical applications where downtime cannot be tolerated.
It reduces custom scripting efforts because everything can be scripted in simple, human-readable YAML playbooks.
Not only servers, but also network devices, VMs, Containers, Kubernetes clusters, etc., can be automated via Ansible, showcasing its extensive list of supported devices.
It is agentless, which makes it lightweight and allows for easy integration into CI/CD and GitOps pipelines.
Many Tier-1 telcos use Ansible for Day 0/1/2 automation of RAN, transport, and core infrastructure (e.g., network function lifecycle management, NE configuration push, patching VNFs).
I can't think of any right now because I've heard about the Lightspeed and I'm really excited about that. Ansible has been really solid for us. We haven't had any issues. Maybe the upgrade process, but other than that, as coming from a user, it's awesome.
User management really needs improvement - when compared to AWS or GCP.
Security of the overall platform needs to be improved.
The whole architecture needs to be modular which is not. Ex - Upgrading any particular component (nova, neutron, cinder) should be possible without upgrading the whole Red Hat OpenStack version.
The creation of HEAT templates for complex applications is still a challenge & has a dependency on external tools.
Stack creation still requires parameters modification at controllers & compute because of the complex nova-scheduler algorithm.
Even is if it's a great tool, we are looking to renew our licence for our production servers only. The product is very expensive to use, so we might look for a cheaper solution for our non-production servers. One of the solution we are looking, is AWX, free, and similar to AAP. This is be perfect for our non-production servers.
Overall, the product is excellent, with daily-use features for both large and small infrastructure. Ansible does its job quickly and ensures compliance, keeping the environment up to date and safe from open vulnerabilities. Large-scale inventory management and license management. Industry standard followed by best practices to maintain continuity. Budget-friendly compared to other products.
Great in almost every way compared to any other configuration management software. The only thing I wish for is python3 support. Other than that, YAML is much improved compared to the Ruby of Chef. The agentless nature is incredibly convenient for managing systems quickly, and if a member of your term has no terminal experience whatsoever they can still use the UI.
There is a lot of good documentation that Ansible and Red Hat provide which should help get someone started with making Ansible useful. But once you get to more complicated scenarios, you will benefit from learning from others. I have not used Red Hat support for work with Ansible, but many of the online resources are helpful.
I looked into going with Amazon EC2, was very comparable in pricing, services, options, etc. and a bit cheaper too. Why I did not go with Amazon mainly has to do with knowing Rackspace and being familiar with them. It was easier for me to use a Rackspace product then go with Amazon Elastic Compute Cloud
AAP compares favorably with Terraform and Power Automate. I don't have much experience with Terraform, but I find AAP and Ansible easier to use as well as having more capabilities. Power Platform is also an excellent automation tool that is user friendly but I feel that Ansible has more compatibility with a variety of technologies.
POSITIVE: currently used by the IT department and some others, but we want others to use it.
NEGATIVE: We need less technical output for the non-technical. It should be controllable or a setting within playbooks. We also need more graphical responses (non-technical).
POSITIVE: Always being updated and expanded (CaC, EDA, Policy as Code, execution environments, AI, etc..)