-
Feature Request
-
Resolution: Unresolved
-
Normal
-
None
-
2.6
-
False
-
-
False
1] What is the nature and description of the request?
The customer is requesting an enhancement to Ansible Automation Platform (AAP) Job Templates and Workflow Templates to improve hostname selection during template launch.
Currently, when launching a Job Template or Workflow Template, the "Limit" field and Survey inputs do not provide a search or lookup capability against the inventory. Users must already know and manually enter the exact fully qualified domain name (FQDN) of the target host(s). This limitation becomes impractical and error-prone in environments with large inventories.
The requested enhancement is to introduce an interactive hostname search and suggestion mechanism that allows users to search inventory hosts dynamically during template launch.
2] Why does the customer need this? (Business Requirements)
- The customer manages large inventories with 3,000+ hostnames, making manual entry of hostnames inefficient and error-prone.
- Users often do not know the exact FQDN of the target hosts at launch time.
- Setting execution limits for multiple hosts is a common operational requirement in large-scale environments.
- The lack of a search feature results in poor usability and reduced operational efficiency.
- Improving hostname discovery during job launch will:
-
- Reduce human error
-
- Speed up automation execution
-
- Improve overall user experience for operators and administrators
3] How would you like to achieve this? (Functional Requirements)
- Provide a searchable inventory lookup for hostnames in:
-
- Job Template "Limit" field
-
- Workflow Template "Limit" field
-
- Survey questions that accept host or inventory-based input
- Implement type-ahead / auto-suggestion functionality, where hostnames are suggested based on the first few characters entered.
- Support multi-selection of hosts from the search results.
- Ensure the search is scalable and performant for inventories containing thousands of hosts.
- The feature should respect existing RBAC and inventory access controls, showing only hosts the user is authorized to access.