With Geliştir Cloud Core Panel, you can install the latest version of your AWX on K3S server within minutes and start using it immediately.

AWX is an open-source web-based management platform for managing and visualizing Ansible automation processes. AWX, which is the upstream version of Red Hat Ansible Tower, runs on K3S lightweight Kubernetes distribution, providing enterprise-grade automation management with minimal resource footprint. This combination is specially optimized for resource-constrained environments, edge deployments and development/testing scenarios and offers 60% less resource consumption compared to traditional bare-metal deployments.
It manages infrastructure automation and configuration management processes from a centralized dashboard with RESTful API, webhook integrations, job templates and workflow orchestration features. It provides enterprise security and operational visibility with RBAC (Role-Based Access Control), credential management, inventory synchronization and real-time job monitoring. Thanks to K3S's containerized architecture, it supports GitOps workflows, CI/CD integrations and cloud-native deployment patterns. It increases team collaboration and operational efficiency with multi-tenancy, scheduling and notification systems.
Minimal resource consumption on K3S, containerized architecture, auto-scaling capabilities and cloud-native operational patterns. Edge computing optimization.
Ansible playbook execution, job templates, workflow orchestration, inventory management and credential vault. Visual job tracking and execution history.
RBAC, LDAP/AD integration, encrypted credential storage, audit logging and team-based access control. Compliance reporting capabilities.
RESTful API, webhook triggers, CI/CD pipeline integration, external system connectivity and programmatic automation control. GitOps workflow support.
Server provisioning, configuration management, application deployment automation and infrastructure as code workflows
Multi-cloud deployments, hybrid infrastructure management, environment consistency and automated scaling operations
Security policy enforcement, compliance checking, vulnerability remediation and automated security configuration
Remote device configuration, edge infrastructure automation, distributed system management and IoT device orchestration