Skip to main content
Redhat Developers  Logo
  • Products

    Platforms

    • Red Hat Enterprise Linux
      Red Hat Enterprise Linux Icon
    • Red Hat AI
      Red Hat AI
    • Red Hat OpenShift
      Openshift icon
    • Red Hat Ansible Automation Platform
      Ansible icon
    • See all Red Hat products

    Featured

    • Red Hat build of OpenJDK
    • Red Hat Developer Hub
    • Red Hat JBoss Enterprise Application Platform
    • Red Hat OpenShift Dev Spaces
    • Red Hat OpenShift Local
    • Red Hat Developer Sandbox

      Try Red Hat products and technologies without setup or configuration fees for 30 days with this shared Red Hat OpenShift and Kubernetes cluster.
    • Try at no cost
  • Technologies

    Featured

    • AI/ML
      AI/ML Icon
    • Linux
      Linux Icon
    • Kubernetes
      Cloud icon
    • Automation
      Automation Icon showing arrows moving in a circle around a gear
    • See all technologies
    • Programming languages & frameworks

      • Java
      • Python
      • JavaScript
    • System design & architecture

      • Red Hat architecture and design patterns
      • Microservices
      • Event-Driven Architecture
      • Databases
    • Developer experience

      • Productivity
      • Tools
      • GitOps
    • Automated data processing

      • AI/ML
      • Data science
      • Apache Kafka on Kubernetes
    • Platform engineering

      • DevOps
      • DevSecOps
      • Red Hat Ansible Automation Platform for applications and services
    • Secure development & architectures

      • Security
      • Secure coding
  • Learn

    Featured

    • Kubernetes & cloud native
      Openshift icon
    • Linux
      Rhel icon
    • Automation
      Ansible cloud icon
    • AI/ML
      AI/ML Icon
    • See all learning resources

    E-books

    • GitOps cookbook
    • Podman in action
    • Kubernetes operators
    • The path to GitOps
    • See all e-books

    Cheat sheets

    • Linux commands
    • Bash commands
    • Git
    • systemd commands
    • See all cheat sheets

    Documentation

    • Product documentation
    • API catalog
    • Legacy documentation
  • Developer Sandbox

    Developer Sandbox

    • Access Red Hat’s products and technologies without setup or configuration, and start developing quicker than ever before with our new, no-cost sandbox environments.
    • Explore the Developer Sandbox

    Featured Developer Sandbox activities

    • Get started with your Developer Sandbox
    • OpenShift virtualization and application modernization using the Developer Sandbox
    • Explore all Developer Sandbox activities

    Ready to start developing apps?

    • Try at no cost
  • Blog
  • Events
  • Videos

What’s new in Ansible Certified Content Collection for AWS

March 2, 2026
Alina Buzachis
Related topics:
Automation and managementDatabasesHybrid cloud
Related products:
Red Hat Ansible Automation PlatformRed Hat Ansible Automation Platform via AWS

    In large-scale AWS management, prioritizing speed often compromises long-term stability. This creates an automation debt, where aging dependencies and inconsistent workarounds linger in your codebase until they inevitably trigger a mid-migration failure. With the release of amazon.aws 11.0.0, the Red Hat Ansible Certified Content Collection for AWS shifts its focus from simply adding features to making cloud automation easier to operate, easier to maintain, and resilient enough for long-term enterprise needs. This release emphasizes stability, consistency and supportability, helping teams manage AWS environments with greater confidence.

    Building on the enhancements introduced in version 10.2.0, this release emphasizes stability, consistency, and supportability. By completing previously announced deprecations and aligning with modern AWS tooling, we’re helping teams manage their environments with greater confidence.

    In this article, we’ll highlight what’s new in amazon.aws 11.0.0, recap notable updates from 10.2.0 and outline what users should consider when planning an upgrade.

    Improved stability and maintainability for Amazon S3 automation

    If you’ve ever spent an afternoon chasing a generic “403 Forbidden” error only to realize it was a subtle bucket policy mismatch, you know the frustration of opaque S3 debugging. A major focus of the amazon.aws 11.0.0 release is turning those black box failures into actionable insights by refactoring the internal module_utils/s3  utilities.

    This new release also offers cleaner debugging with centralized error handling through the new S3ErrorHandler. Instead of cryptic logs, you’ll receive descriptive messages that point exactly to the failure point, allowing you to fix issues in minutes rather than hours.

    Behavior is now predictable. By consolidating logic across the collection, the s3_bucket and s3_object behave identically regarding authentication and endpoint handling. No more special cases depending on which module you call. These smarter wrappers now power the s3_bucket and s3_object modules and their _info counterparts, ensuring a consistent experience across your storage automation.

    Major changes and updates

    Version 11.0.0 is a major release and includes the removal of previously deprecated functionality across several modules. Users upgrading from earlier versions should review these changes carefully to ensure a smooth transition.

    Updated AWS SDK dependencies

    To unlock the latest AWS features and security patches, we have bumped the minimum supported versions for the AWS SDKs.  We now require botocore and boto3 version 1.35 or newer, and awscli version 1.34 or newer.

    While older versions might still function, upgrading ensures you aren't running on deprecated foundations that are no longer tested against modern AWS APIs. 

    Red Hat Ansible Automation Platform will display warnings if it detects deprecated SDK versions. Please refer to individual module documentation for version-specific requirements. Check out the module documentation for the minimum required version for each module. 

    Removed deprecated module functionality

    To ensure a more consistent developer experience, we are standardizing return values and parameter types across the collection. These removals represent long-standing deprecations and simplify module behavior while improving consistency across the collection and making your playbooks more readable.

    Enforcing safety and separation of concerns

    We have removed the list mode from the s3_object to enforce a strict separation of concerns. This prevents scenarios where a user might accidentally modify data when they only intended to query it. For lookups, s3_object_info is now the single source of truth. We also removed support for leading slashes (/) in object keys to ensure consistent behavior across all S3 operations. Additionally, we removed the ability to pass dualstack and endpoint_url in s3_object_info, eliminating invalid configuration combinations that could lead to unexpected connectivity issues.

    Standardizing returns for better templating

    We are also enforcing cleaner data structures across the board to improve Jinja2 compatibility. In route53_info, we have retired AWS-style CamelCased returns (i.e.,  ResourceRecordSets and HostedZones) in favor of Ansible-native snake_case formats. This ensures your templates look and feel like the rest of your automation.

    Similarly, iam_user now returns data exclusively under the user key (removing the deprecated iam_user return key), eliminating the guesswork of which key to use for follow-up tasks.

    Simplifying configuration and audits

    Finally, we have streamlined input parameters to reduce complexity. We simplified ec2_security_group by removing support for nested lists of strings in rules.cidr_ip and rules.cidr_ipv6, enforcing a flat, explicit structure that is easier for security teams to audit.

    We also removed the deprecated function parameter from lambda_info, leaving a leaner interface that aligns with modern Lambda definitions.

    Highlights from amazon.aws 10.2.0

    Version 10.2.0 introduced several important updates that set the stage for 11.0.0. If you skipped that update, here are the highlights you’ve missed.

    New and enhanced functionality

    One important update provides enhanced functionality, including better database performance, increased throughput and IOPS limits, and simplified templating.

    • High-performance databases: Mission-critical applications cannot afford storage bottlenecks. We updated rds_instance to support the io2 storage type, giving you access to significantly higher IOPS. This ensures your automated database deployments are ready for the most demanding, data-intensive workloads without manual intervention.
    • Modern EC2 limits: There is nothing worse than your automation failing because a tool imposes lower limits than the cloud provider itself. We increased throughput and IOPS limits for GP3 volumes in ec2_launch_template and ec2_vol. This aligns the collection with current AWS service limits, ensuring you can provision high-performance storage at scale without hitting artificial ceilings.
    • Simplified templating: Parsing DNS records in Jinja2 used to require complex filters and loops. Route53 added the record_values return key, which supports cleaner dot notation. This small change drastically simplifies your template logic, reducing spaghetti code and making your DNS automation easier to read and maintain.

    Minor improvements and bug fixes

    Beyond the headline features, we’ve improved features that often slowed down development. These updates are focused on reliability and debugging speed:

    • Better hybrid cloud support: For teams using S3-compatible object storage, we enhanced how module_utils/s3 handles HTTP 403 and 501 errors. This reduces confusing failure signals when your automation interacts with non-AWS endpoints.
    • Faster IAM debugging: IAM policies are notoriously difficult to troubleshoot. We’ve improved sts_assume_role to provide specific error messaging when a policy document is malformed, saving you from hunting for syntax errors in JSON strings.
    • Security compliance: We fixed a logic gap in s3_bucket to ensure that AES256 encryption is correctly applied even when bucket_key_enabled is set to false. This ensures your security posture matches exactly what you defined in your playbook.
    • Trustworthy documentation: We corrected invalid return value documentation for lambda_info, ensuring that the reference materials you rely on for Jinja2 templating match the actual module behavior.

    Deprecations

    Great automation is built to last, but relying on deprecated features creates technical debt that eventually comes due. While the following deprecations from 10.2.0 won’t be enforced until December 1, 2026, acting now ensures your playbooks remain resilient and aligned with modern standards long before the deadline arrives.

    • VPC DHCP options: We are standardizing naming conventions. Calls using the dhcp_config return value should update to dhcp_options.
    • Route53 records: We are retiring the generic values key in resource record sets in favor of record_values. This new key provides a more robust structure for complex DNS data.

    We recommend updating your playbooks today to ensure a seamless transition and prevent any disruptions to your automated workflows.

    Under the hood: Notes for developers and contributors

    In addition to the user-facing updates, amazon.aws 11.0.0 includes significant internal refactoring. We have removed deprecated internal interfaces, parameters, and legacy configuration options to simplify the codebase and improve maintainability.

    This matters because a cleaner codebase means fewer edge cases and faster bug fixes in the future. If you maintain custom modules, plug-ins, or internal integrations that rely on this collection, we recommend reviewing the full release notes for details on removed internal APIs. This ensures that the foundation of your automation remains robust and maintainable.

    Your upgrade action plan

    Moving to a major version like 11.0.0 is the perfect opportunity to perform a health check on your cloud automation. To ensure a seamless transition, we recommend the following steps:

    1. Audit your environment: Ensure your control nodes are running awscli ≥ 1.34.0 and boto3 / botocore ≥ 1.35.0. These modern SDKs are critical for accessing the latest AWS features and security patches.
    2. Scan your playbooks: Search for the removed parameters we discussed (i.e., the old Route53 CamelCase returns or the deprecated iam_user key).
    3. Update logic: Refactor any automation that relies on the deprecated S3 list mode or EC2 nested lists.
    4. Validate in staging: Because strict key handling is now enforced (e.g., no leading slashes in S3 keys), testing your playbooks in a non-production environment is essential before full deployment.

    Following these steps ensures you aren't just upgrading, but actively improving the resilience of your automation pipeline.

    Final thoughts

    The release of amazon.aws 11.0.0 is about more than just a version bump; it is a commitment to the long-term health of your AWS automation. By refactoring key utilities, removing deprecated features, and aligning with modern AWS SDKs, we are providing a platform that offers more predictable automation, easier debugging, and a stronger foundation for the future.

    Along with the performance enhancements from 10.2.0, these updates enable teams to build automation that isn’t just working for now, but is stable, reliable, and aligned with modern AWS and Ansible best practices. We encourage users to review the release notes, update playbooks as needed, and take advantage of these improvements to simplify and strengthen enterprise AWS automation.

    Get started with Red Hat Ansible Automation Platform Service on AWS. Check out the Amazon Web Services Guide. Try our the hands-on interactive labs. Read the e-book, Using automation to get the most from your public cloud.

    Learn more:

    • Check out Red Hat Summit 2026.
    • For further reading and information, visit other blogs related to Ansible Automation Platform.
    • Check out the YouTube playlist for everything about Ansible Content Collections.
    • Are you new to Ansible automation and want to learn? Check out our getting started guide on developers.redhat.com.
    • Check out the Ansible Automation Platform YouTube channel.
    • Visit the Red Hat Ansible Automation Platform on AWS.

    Related Posts

    • Zero trust automation on AWS with Ansible and Terraform

    • Simplify multi-VPC connectivity with amazon.aws 9.0.0

    • 3 steps to secure network segmentation with Ansible and AWS

    • How to scale smarter with Ansible and amazon.aws 9.0.0

    Recent Posts

    • What’s new in Ansible Certified Content Collection for AWS

    • How to automate Ceph RGW user management on OpenShift with GitOps

    • Red Hat trusted libraries - Trust and integrity for your software supply chain

    • GDAL 3.4 package: Full-featured GIS functionality on RHEL

    • Red Hat OpenShift Service on AWS with hosted control planes enables configuration of cluster monitoring operator for additional observability

    What’s up next?

    Learning Path Ansible_Content_Collections featured_image

    Getting started with Ansible Content Collections

    Discover Ansible Content Collections through practical examples that explain...
    Red Hat Developers logo LinkedIn YouTube Twitter Facebook

    Platforms

    • Red Hat AI
    • Red Hat Enterprise Linux
    • Red Hat OpenShift
    • Red Hat Ansible Automation Platform
    • See all products

    Build

    • Developer Sandbox
    • Developer tools
    • Interactive tutorials
    • API catalog

    Quicklinks

    • Learning resources
    • E-books
    • Cheat sheets
    • Blog
    • Events
    • Newsletter

    Communicate

    • About us
    • Contact sales
    • Find a partner
    • Report a website issue
    • Site status dashboard
    • Report a security problem

    RED HAT DEVELOPER

    Build here. Go anywhere.

    We serve the builders. The problem solvers who create careers with code.

    Join us if you’re a developer, software engineer, web designer, front-end designer, UX designer, computer scientist, architect, tester, product manager, project manager or team lead.

    Sign me up

    Red Hat legal and privacy links

    • About Red Hat
    • Jobs
    • Events
    • Locations
    • Contact Red Hat
    • Red Hat Blog
    • Inclusion at Red Hat
    • Cool Stuff Store
    • Red Hat Summit
    © 2026 Red Hat

    Red Hat legal and privacy links

    • Privacy statement
    • Terms of use
    • All policies and guidelines
    • Digital accessibility

    Report a website issue