- Automation Suite on Linux Release Notes
- Automation Suite on EKS/AKS Release Notes

Automation Suite release notes
Release date: December 18, 2024
We have expanded our OS support to include RHEL 9.6. For details on the supported RHEL versions, see Compatibility Matrix.
Release date: September 24, 2025
We have introduced new configuration flags to give you more control over the Kerberos authentication. You can now use the following flags to customize the Kerberos authentication settings:
-
kerberos_auth_config.enable_integrated_sql_auth: This flag allows you to decouple the Kerberos authentication from the SQL authentication login, and to enable or disable Kerberos authentication for SQL across all your products. -
<serviceGroupName>.kerberos_auth_config.enabled: This flag allows you to control the use of Kerberos authentication for SQL authentication at product level. You must replace<serviceGroupName>with the name of your product.
These new flags bring changes to the priority order for SQL Kerberos authentication, as follows:
-
Kerberos authentication for SQL is enabled by default when Kerberos authentication is enabled.
-
If you set
kerberos_auth_config.enable_integrated_sql_authtofalse, Kerberos authentication for SQL is disabled across all your products. -
If you set
<serviceGroupName>.kerberos_auth_config.enabledtofalse, Kerberos SQL authentication is disabled for the specified product.
For more details on Kerberos authentication, see Setting up Kerberos authentication.
We have introduced more prerequisite checks to optimize the overall experience of installing and configuring Automation Suite and to catch missing requirements earlier. Here are some highlights:
-
A new validation check ensures that the
READ_COMMITTED_SNAPSHOToption is enabled in the SQL Server database. We have implemented this check validation for Orchestrator, Apps, and Process Mining. -
We have introduced a prerequisite check in the
mirror-registry.shandhydrate-registry.shscripts to validate the OCI compliance of the external registry before uploading images.
kube-logging. Now, you can forward logs to Splunk using the OpenTelemetry Collector.
For details, see Forwarding logs to external tools.
-
The support bundle now collects logs for the
uipath-authandveleronamespaces. -
The support bundle now captures custom resources.
We continue to provide security updates and patches to address Common Vulnerabilities and Exposures (CVEs).
- Erratum - added June
10, 2025: In multi-node (HA) setups where Grafana is
deployed with two replicas, a lack of common data sources between
the replicas caused issues in user session management. This resulted
in errors such as
Dashboard not foundandInvalid dashboard UID in the requestappearing in the Grafana dashboard. We have fixed this issue. -
We have fixed an issue causing a side-by-side upgrade to fail in an offline environment when Apps was enabled.
-
We have fixed an issue that caused Insights data loss when you reinstalled or upgraded Insights following an Automation Suite upgrade from version 2023.4 or older.
-
We have fixed an Insights annotation issue that would block the Automation Suite installer.
-
We have fixed an issue that caused log collection for RKE2 system commands to run indefinitely.
-
We have fixed an issue causing the
aicenter skill syncandaicenter skill statuscommands to fail during a side-by-side upgrade. This issue occurred due to a syntax error. -
An issue was preventing
exclude=rke2-*from being automatically added to the/etc/yum.conffile on all nodes. This issue occurred particularly in online environments and caused an unintentional upgrade of the RKE2 service on nodes other than the first server. Previously, you had to manually add the exception to the/etc/yum.confon all nodes. We have fixed the issue. -
We have fixed an issue causing unnecessary DNS resolution validation for
redis.<primary-fqdn>andredis-db.<primary-fqdn>during Active/Passive prerequisite checks. This behavior no longer occurs. -
We have fixed an issue that occurred in non-HA Redis scenarios, where the
redis-cluster-0pod could get stuck in a terminating state during node drain operations. This behavior no longer occurs. -
When using style attributes in the HTML tags while customizing your Login page, they reflected accurately in the preview. However, upon saving the changes, the style attributes were deleted automatically. Now, all style attributes used within tags persist after saving your changes.
-
An issue was causing installation or upgrade failures when enabling Connaisseur during the configuration of an external OCI-compliant registry. This issue occurred when the
registries.trust.enabledparameter was set totruein thecluster_config.jsonfile. We have fixed the issue. -
We have fixed an issue causing the upgrade to fail due to the overriding of existing Insights PVC sizes.
-
We fixed a bug that was breaking SAML2 when basic authentication was disabled, along with various other bugs.
Kerberos keytab rotation does not trigger token regeneration
Erratum - added September 24, 2025: An issue causes Kerberos keytab rotation to not immediately regenerate authentication tokens, which may lead to temporary connectivity disruptions between services and the database.
To address the issue, you must manually trigger the Kerberos ticket renewal cronjob by running the following command:
kubectl delete job tgt-rotate-manual -n uipath --ignore-not-found ; kubectl create job tgt-rotate-manual --from=cronjob/kerberos-tgt-update -n uipathkubectl delete job tgt-rotate-manual -n uipath --ignore-not-found ; kubectl create job tgt-rotate-manual --from=cronjob/kerberos-tgt-update -n uipath
We fixed the issue in Automation Suite 2023.10.11.
GPU enablement fails with external registries containing project names
ImagePullBackoff error.
If you are using an external registry with a project name, update the NVIDIA device plugin daemonset with the following command:
# Replace REGISTRY_WITH_PROJECT_NAME with the correct value (Eg. my.registry.io:443/myproject)
# Replcae TAG with the correct value. You can get this from the <installer_directory>/versions/docker-images.json file (Eg. v0.17.1)
kubectl set image daemonset/nvidia-device-plugin-daemonset \
-n kube-system \
nvidia-device-plugin-ctr=<REGISTRY_WITH_PROJECT_NAME>/k8s-device-plugin:<TAG># Replace REGISTRY_WITH_PROJECT_NAME with the correct value (Eg. my.registry.io:443/myproject)
# Replcae TAG with the correct value. You can get this from the <installer_directory>/versions/docker-images.json file (Eg. v0.17.1)
kubectl set image daemonset/nvidia-device-plugin-daemonset \
-n kube-system \
nvidia-device-plugin-ctr=<REGISTRY_WITH_PROJECT_NAME>/k8s-device-plugin:<TAG>We fixed the issue in Automation Suite 2023.10.11.
Orchestrator does not start when using user-assigned managed identity
storage.useClientID parameter from being set when you select a user-assigned managed identity for object storage. As a result, tOrchestrator
cannot start in environments where access is restricted to user-assigned managed identities.
To address the issue, you must manually set the parameter in ArgoCD, as follows:
- In the ArgoCD Orchestrator application, go to Details > Parameters.
- In the values text box, set
storage.isExternal : trueand save.
We fixed the issue in Automation Suite 2023.10.11.
Thanos compactor stops on corrupted blocks
Erratum - added September 24, 2025: An issue causes the Thanos compactor to stop compacting metrics when it encounters corrupted blocks in the object store. This prevents compaction and leads to increased storage usage.
To address the issue, refer to the Troubleshooting section.
We fixed the issue in Automation Suite 2023.10.11.
Task Mining Kerberos initialization failure
kerberos-discoverygroup-user-keytab secret is missing or when the discoverygroup app is not included in the enabledApps parameter of the IntegratedAuth app.
To address the issue, refer to the Troubleshooting section.
We fixed the issue in Automation Suite 2023.10.10.
Agent node addition failure in offline environments
Erratum - added June 26, 2025: An issue causes the addition process of agent nodes in offline environments to fail. Agent node additions require the temporary registry to be running. To address the issue, you must re-enable the temporary registry to successfully join the agent node.
We fixed the issue in Automation Suite 2023.10.10.
Installation fails due to CA certificates with large policy OIDs
CertificatePolicies section with policy OID values exceeding 4 bytes. This issue prevents Automation Suite from recognizing these CA certificates,
interrupting the installation process.
CertificatePolicies section do not exceed 4 bytes, or avoid using CA generators that add the CertificatePolicies section to the certificates.
We fixed the issue in Automation Suite 2023.10.10.
RKE2 custom configuration overwrite during upgrade
/etc/rancher/rke2/config.yaml) to be overwritten during upgrades.
To address the issue, you must reapply your custom changes to the configuration file after each upgrade.
We fixed the issue in Automation Suite 2023.10.10.
Licensing SQL connection error
Erratum - added June 26, 2025: Licensing SQL connection errors occur when the Data Source property specified both a named instance and a port.
We fixed the issue in Automation Suite 2023.10.10.
RKE2 certificate rotation command issue on agent nodes
Erratum - added April 28, 2025: An issue causes the RKE2 certificate rotation command to run on the agent nodes even though it is not supported. This issue occurs during the Automation Suite upgrade process.
infra-installer.sh and
replace the rke2 certificate rotate command with [[
${NODE_ROLE} != "agent" ]] && rke2 certificate rotate to exclude
the agent nodes.
This issue is fixed in Automation Suite 2023.10.8.
Kubernetes upgrade failure
certificate-injector-webhook in deployment.apps. To address the issue, you must run the following command:
kubectl delete configmap -n uipath-infra certificate-injector-webhook-configmap --ignore-not-foundkubectl delete configmap -n uipath-infra certificate-injector-webhook-configmap --ignore-not-foundWe fixed the issue in Automation Suite 2023.10.9.
Document Understanding deployment issue post-upgrade
du-digitizer-worker deployment from the old Automation Suite version not being fully cleaned up after the upgrade. Starting with Automation Suite
2023.10.0, the deployment was renamed to du-digitizer-worker-deployment.
documentunderstanding application, manually delete the old du-digitizer-worker deployment. After deletion, re-sync the documentunderstanding application.
We fixed the issue in Automation Suite 2023.10.8.
Orchestrator database validation issue
sql.create_db parameter is set to true in cluster_config.json.
/opt/UiPathAutomationSuite/UiPath_Installer/Prerequisite_Checks/scripts/validation.json and set advancedDbConfig.connectionStringParameter to "", under "service": "orchestrator", as shown in the following example:
"advancedDbConfig": [{
"dbName": "AutomationSuite_Orchestrator_test",
"connectionStringParameter": "",
"optionalCommands":["ALTER DATABASE AutomationSuite_Orchestrator SET READ_COMMITTED_SNAPSHOT ON;"]
}]"advancedDbConfig": [{
"dbName": "AutomationSuite_Orchestrator_test",
"connectionStringParameter": "",
"optionalCommands":["ALTER DATABASE AutomationSuite_Orchestrator SET READ_COMMITTED_SNAPSHOT ON;"]
}]We fixed the issue in Automation Suite 2023.10.9.
Incomplete Docker registry cleanup process
Erratum - added April 15, 2025: An issue prevents the registry cleanup command from effectively clearing the unused Docker images from all registry pods. To address the issue, refer to the Troubleshooting section.
We fixed the issue in Automation Suite 2023.10.9.
Upgrade fails due to MongoDB to SQL Server migration
Erratum - added April 15, 2025: We have identified an issue impacting the side-by-side and the in-place upgrade of Automation Suite 2022.10 or earlier to Automation Suite 2023.10.0 or later. Due to a faulty migration from MongoDB to SQL Server, the upgrade operation fails if you have Apps enabled and use Kerberos authentication for the SQL Server database.
The recommended solution is to upgrade to Automation Suite 2023.10.9.
Kube-proxy health check not working
node-monitor component, which monitors the node for issues such as checking kube-proxy health or if ip_forward is enabled, and cordons the node if issues arise, is not working for specific nodes such as GPU, task-mining, or as-robot. We have fixed this issue in Automation Suite 2023.10.9.
Kerberos tickets do not automatically renew
Erratum - added April 15, 2025: Kerberos tickets fail to automatically renew after cluster restoration, requiring manual sync of the Windows Auth app.
This issue is fixed in Automation Suite 2023.10.9.
Service upgrade fails during pre-service script execution
scale-down-insights-looker-deployment.sh, fails in certain scenarios. To address this issue, refer to .
The issue is fixed in Automation Suite 2023.10.9.
Same requirement for enabling user and SQL authentication
kerberos_auth_config.enabled and
kerberos_auth_config.enable_integrated_sql_auth parameters to
true.
AI Center storage migration failure
uipathctl from correctly setting executeMigration to true during the migration process from Ceph in-cluster storage to external object storage in AI Center.
executeMigration to true in ArgoCD for AI Center and then proceed with a resync, ensuring to prune. This issue is fixed in Automation Suite 2023.10.8.
Email alerts configuration failure post upgrade
Erratum - added February 13, 2025: An issue affects the functionality of email alerts configuration and the setup of multiple receivers after upgrading from Automation Suite 2022.10. To address this issue, see Troubleshooting.
This issue is fixed in Automation Suite 2023.10.8.
FQDN update failure
update_fqdn parameter to not being properly set in the service-cluster-configurations secret.
update_fqdn and update_fqdn_state parameters and update the service-cluster-configurations secret using the following command:
kubectl patch secret service-cluster-configurations -n uipath-infra --type=json -p='[
{"op": "remove", "path": "/data/UPDATE_FQDN"},
{"op": "remove", "path": "/data/UPDATE_FQDN_STATE"}
]'kubectl patch secret service-cluster-configurations -n uipath-infra --type=json -p='[
{"op": "remove", "path": "/data/UPDATE_FQDN"},
{"op": "remove", "path": "/data/UPDATE_FQDN_STATE"}
]'This issue is fixed in Automation Suite 2023.10.8.
We recommend that you regularly check the deprecation timeline for any updates regarding features that will be deprecated and removed.
Product versions
To find out what has changed on each Automation Suite product, visit the following links.
If the product is greyed out, this new Automation Suite version does not bring any changes to it.
Internal third-party component versions
This Automation Suite release bundles the following internal components:
|
Component |
Version |
|---|---|
|
RKE2 |
1.30.5+rke2r1 |
|
ArgoCD |
2.12.6 |
|
ceph |
17.2.6 |
|
rook-ceph |
1.14.6 |
| prometheus-pushgateway |
1.10.0 |
|
cert-manager |
1.16.1 |
|
rancher-istio |
105.4.0-up1.23.2 |
| rancher-monitoring-crd |
105.1.0-up61.3.2 |
| rancher-gatekeeper |
104.0.1-up3.13.0 |
| rancher-monitoring |
105.1.0-up61.3.2 |
|
longhorn |
1.6.3 |
|
longhorn-crd |
1.1.100 |
|
reloader |
1.0.95 |
|
csi-driver-smb |
1.16.0 |
|
velero |
1.14.1 |
|
redis-operator |
7.4.6-2 |
|
redis-cluster |
7.4.6-102 |
|
oauth2-proxy |
7.7.1 |
|
kube-logging/logging-operator |
4.9.1 |
|
config-reloader |
v0.0.5 |
Migration tool version
The migration tool version you need depends on the standalone products you plan to migrate and the targeted Automation Suite version. For more details, see Migration compatibility matrix.
For instructions on migrating a standalone product to the current version of Automation Suite, see Full migration.
- Support for new RHEL version
- New flags for enhanced Kerberos authentication
- New prerequisite checks
- Changes to the logs forwarding method
- Support bundle enhancements
- Logging enhancement
- Security enhancements
- Bug fixes
- Known issues
- Kerberos keytab rotation does not trigger token regeneration
- GPU enablement fails with external registries containing project names
- Orchestrator does not start when using user-assigned managed identity
- Thanos compactor stops on corrupted blocks
- Task Mining Kerberos initialization failure
- Agent node addition failure in offline environments
- Installation fails due to CA certificates with large policy OIDs
- RKE2 custom configuration overwrite during upgrade
- Licensing SQL connection error
- RKE2 certificate rotation command issue on agent nodes
- Kubernetes upgrade failure
- Document Understanding deployment issue post-upgrade
- Orchestrator database validation issue
- Incomplete Docker registry cleanup process
- Upgrade fails due to MongoDB to SQL Server migration
- Kube-proxy health check not working
- Kerberos tickets do not automatically renew
- Service upgrade fails during pre-service script execution
- Same requirement for enabling user and SQL authentication
- AI Center storage migration failure
- Email alerts configuration failure post upgrade
- FQDN update failure
- Deprecation timeline
- Bundling details
- Product versions
- Internal third-party component versions
- Migration tool version