Digital.ai Deploy 26.1.x Release Notes
Support Policy
For each version of Deploy, we provide maintenance support for 15 months. For more information, see Digital.ai Support Policy.
Upgrade Instructions
The upgrade process depends on your current and target Digital.ai Release versions.
For upgrade instructions, see:
Updated System Requirements
Deploy 26.1 supports the following latest versions of Java, operating systems, and databases. Before upgrading, ensure your environment meets the following requirements:
-
JDK: Supports OpenJDK 21
(Oracle JDK 17 and OpenJDK 17 are no longer supported) -
Windows Server: 2025, 2022
(2019 is no longer supported) -
RHEL: 9.x, 10.x
(8.x is no longer supported) -
PostgreSQL: 17.5, 16.9
(17.2 and 16.6 are no longer supported) -
PostgreSQL (provided with Bitnami Helm Chart): 17.6
-
MySQL: 8.4 LTS
(8.0 LTS is no longer supported) -
SQL Server: 2022 (16.0)
(2019 (15.0) is no longer supported)
For more information, see Installation Prerequisites.
Breaking Changes
Breaking changes in Deploy 26.1 require your attention before upgrading:
RabbitMQ Topology Operator Removed
The RabbitMQ Topology Operator has been removed and its functionality is now handled directly by the upgraded RabbitMQ Operator. If your installation relied on the Topology Operator, review your configuration before upgrading to ensure any topology-related resources (exchanges, queues, bindings) are migrated correctly.
Changed Installation Answer Keys
The following installation answer keys have been renamed:
| Old Key | New Key |
|---|---|
PostgresqlInstall | PostgresqlType |
RabbitmqInstall | RabbitmqType |
Update any saved answers files or automation scripts that reference the old keys before upgrading. Using the old keys will result in an unrecognized-key error during installation.
Experimental External Operator Upgrades
Upgrading between versions of experimental external operators (Bitnami alternatives) such as PostgreSQL, RabbitMQ, or Ingress-NGINX Controller may not work seamlessly. Review the Plan Your Kubernetes Installation or Upgrade before upgrading.
End-of-life Notifications
Here's what is being deprecated or going out of support.
Apache Derby Deprecation Notice
Support for Apache Derby, which can be configured for both Live and Reporting databases in demo or test environments (it is not recommended for production use), is deprecated starting with Deploy 26.1 and will be removed in Deploy 26.3.
The Apache Derby Project was officially retired in October 2025 and no longer receives bug fixes or security updates. As a result, Apache Derby will not be packaged with or supported by Deploy 26.3 and later.
Recommended actions:
If your current Deploy setup uses Apache Derby, you must replace it with another database before upgrading to Deploy 26.3.
Automated migration from Derby to another database isn't supported you must manually export and reimport your data.
- Test and demo environments: You may use H2 database as an alternative.
- Production environments: Use a supported external database.
For more information, see Configure the Deploy SQL Repository and Separate Databases for Reporting and Repository in Deploy.
If you are using Apache Derby and have concerns or questions about migration, please contact the Customer Support team for guidance.
GitOps in Deploy
Deploy introduces GitOps support for bidirectional exchange of infrastructure and environment CIs with a Git repository using YAML files. It enables Infrastructure-as-Code workflows by allowing you to export CIs from Deploy to Git for versioning and review, and to import CIs from Git into Deploy to create or update them. Import and export are performed through a control task.
Supported Git providers: GitHub, GitLab, Azure DevOps, and Bitbucket (HTTPS only).
Key features:
- Establish secure connections to Git repositories using personal access token (PAT) authentication
- Verify Git repository connectivity using Check Connection
- Define and maintain infrastructure and environment CIs as YAML files (compatible with
xl apply) - Store infrastructure and environment CIs as YAML in Git repository
- Import infrastructure and environment CIs from Git into Deploy to create or update them
- Export infrastructure and environment CIs from Deploy to YAML files in Git
- Configure multiple Git directories per Git source, each pointing to a different branch or path
Supported CI types:
- Infrastructure - Host and container definitions
- Environments - Environment structures
Dictionaries, encrypted dictionaries for Environment values, and secret/key fields are not supported for GitOps import/export.
For more information, see:
Large Artifact Deployment
Deploy now supports deploying artifacts 2 GB or larger, addressing the OutOfMemoryError errors seen in releases prior to 26.1. Large artifacts are transferred using a streaming approach instead of being fully loaded into memory, significantly reducing memory pressure during deployment.
All three artifact base types are supported: udm.FileArtifact, udm.ArchiveArtifact, and udm.FolderArtifact.
Overall memory usage still depends on the Deploy heap size configuration, which should be sized appropriately for your environment and workload. For guidance, see Production Environment Installation.
By default, ZIP archives up to 2 GB are processed in memory. To adjust this threshold, see Customizing Large Artifact Deployments.
Permission Handling
All deployments work as expected. However, for udm.FolderArtifact deployments, when a ZIP archive exceeds 2 GB or the source is a JAR archive, Deploy uses a streaming reader that cannot preserve POSIX permissions. In these cases, Deploy applies adaptive permissions - files matching a configurable executable-detection regex receive 755 (rwxr-xr-x), all others receive 644 (rw-r--r--). TAR-based artifacts preserve POSIX permissions regardless of size.
Key highlights:
- Permissions for JAR archives - From 26.1, JAR-based
udm.FolderArtifactdeployments apply adaptive permissions. Previously, all files received644. - Configurable in-memory threshold - A new
inMemoryThresholdsetting indeploy-artifact-resolver.yamllets you lower the size at which Deploy switches from in-memory to streaming ZIP processing, reducing heap pressure during parallel deployments. - Executable file detection - You can customize which files are detected as executables using a configurable regex. For details, see Customizing Large Artifact Deployments.
Storage Support
Large artifacts are supported with the following storage configurations:
- Internal storage - Filesystem (default)
- External storage - HTTP / HTTPS
Database-backed internal storage and Maven / JFrog Artifactory external storage are limited for artifacts larger than 2 GB. These limitations will be addressed in coming releases.
Limitations
- Artifacts larger than 2 GB aren't supported with database-backed internal artifact storage or Maven / JFrog Artifactory external storage.
- The Deploy CLI doesn't support export, import, or deployment of artifacts larger than 2 GB. Use the Deploy UI or XL CLI instead.
For more information, see:
- Deploy Larger Artifacts > 2 GB
- How Deploy Processes Large Artifacts
- Customizing Large Artifact Deployments
- Production Environment Installation
Kubernetes Installation Updates
Deploy 26.1 introduces Kubernetes version updates, enhancements to the Bitnami alternative external operator installation, XL CLI fixes, and improvements to operator-managed resources.
This release now supports Kubernetes 1.20-1.34.
Bitnami Alternative (Experimental) External Operator Enhancements
The Bitnami alternative (experimental) external operator installation has received several enhancements:
- Private registry support: Operators can now be pulled from a private container registry.
- Resource configuration: CPU and memory requests and limits are now configurable for operator-based installations.
- OpenShift and SCC support: Operator-based installations now support OpenShift, including corrected Security Context Constraints (SCC) handling for all components.
- Preserve PVC: Persistent Volume Claims can now be preserved for operator-based PostgreSQL.
- Improved cleanup: Re-ordered cleanup prompts and removal of stale or redundant external operator resources.
- Fixed resource ordering: Corrected apply order for external Ingress-NGINX resources.
For more information, see Plan Your Kubernetes Installation or Upgrade
Operator-Managed Resources
MAX_RAM_PERCENTAGEconfiguration is now supported for Deploy, Central Configuration (CC), and Task Engine containers, enabling better control over JVM heap memory allocation.- Custom context root configuration now automatically prepends
/if not present.
For more information, see:
- Installation Options Reference for Digital.ai Deploy
- Upgrade Options Reference for Digital.ai Deploy
Plugins and Integrations
Atlassian Bamboo Plugin
The Atlassian Bamboo plugin enables publishing DAR files to Deploy and triggering deployments directly from Bamboo build plans. The plugin supports configurable orchestrators, update deployment behavior, and failure handling options to streamline CI/CD workflows.
For more information, see Atlassian Bamboo Plugin.
AWS Plugin
Deploy now supports deploying AWS Serverless Application Model (SAM) templates through the existing CloudFormation integration. SAM templates can be uploaded and deployed using the aws.cloudformation.Template CI, with automatic processing of the Transform directive.
Key Features:
- Deploy SAM templates using the existing
aws.cloudformation.TemplateCI - Automatic expansion of SAM templates into standard CloudFormation templates
- Full support for serverless resources including Lambda functions, API Gateway, and DynamoDB tables
- Compatible with existing CloudFormation operations
For more information, see AWS Plugin
Azure Plugin
Deploy now supports managed identities for Azure Container Apps, Static Web Apps, and Web App Containers, enabling secure authentication to Azure services without storing credentials.
Key Features:
- Configure system-assigned and user-assigned managed identities
- Support for cross-resource-group identity references
- Available for
ContainerAppSpec,StaticWebAppSpecWebAppContainerSpec, andWebAppSpec
New Properties:
addSystemAssignedIdentity(Boolean): Enable system-assigned identityuserAssignedIdentities(List): Specify identity names or full resource IDs
For more information, see Azure Plugin - Managed Identity Support
Command Plugin
Deploy now supports re-execution of Command plugin steps during update deployments, even when the command definition has not changed. Previously, identical commands were skipped, resulting in only the registration step being performed.
For more information, see Command Plugin
GitOps Plugin
The GitOps Plugin is a bundled plugin in the Deploy task engine that enables Git-based automation for managing configuration items (CIs). It provides configuration types that connect Deploy to Git repositories, allowing you to import and export infrastructure and environment definitions as YAML files.
Features:
- Establish secure connections to Git repositories using personal access token (PAT) authentication from your Git provider
- Verify Git repository connectivity using Check Connection
- Import infrastructure and environment CIs from YAML files in Git into Deploy
- Export infrastructure and environment CIs from Deploy to YAML files in Git
Configuration types:
| CI Type | Description |
|---|---|
git.GitSource | Defines the connection to a Git repository |
git.GitDirectory | Maps a folder in Git by defining its branch, repository path, and optional export target directories. Must be created under a git.GitSource |
For more information, see GitOps Plugin.
OSB Plugin
The OSB plugin now includes configurable Preserve Existing deployment settings on the osb.Configuration CI. These properties control whether existing configurations on the target OSB domain are preserved or overwritten during deployment, and can be set directly in the deployment package or through the Deploy UI:
preserveExistingEnvValues- Preserve existing environment valuespreserveExistingCredentials- Preserve existing credentialspreserveExistingAccessControlPolicies- Preserve existing access control policiespreserveExistingOperationalValues- Preserve existing operational valuespreserveExistingSecurityAndPolicyConfig- Preserve existing security and policy configuration
For more information, see Oracle Service Bus Plugin.
WAS Plugin
Deploy now supports Interactive Authentication for wsadmin execution in the WebSphere AS plugin. When enabled, the plugin no longer passes credentials as command-line arguments. Instead, credentials are securely provided through a daemon process after the wsadmin prompt appears, helping prevent exposure of usernames and passwords in process logs and command history.
Key Features:
- Secure credential handling through a daemon process instead of command-line arguments
- Prevents exposure of usernames and passwords in process logs and command history
- Requires headless mode configuration on the target WebSphere server
For more information, see IBM WebSphere AS Plugin.
Bug Fixes-26.1.1
- D-42475 - Resolved an issue where rollback in WLS deployments did not complete all steps, which could cause subsequent deployments to fail.
- D-42631 - Fixed EKS connections that use AssumeRole and ExternalID so that the assumed credentials are applied correctly for cluster access.
Bug Fixes-26.1.0
- D-41080 - Fixed an issue where deployments to Aurora PostgreSQL failed when executing
\ccommands due to.pgpassnot being used correctly by PostgreSql 11.11 and above. - D-41171 - Fixed incorrect namespace references during SCC installation on OpenShift. Resolved an issue where the Security Context Constraints (SCC) installation on OpenShift used incorrect resource names and context references when Deploy or Release was installed in a custom namespace. The configuration has been updated to correctly reference the target namespace, ensuring SCC setup completes successfully in non-default environments.
- S-124914 - Fixed CVE-2025-11226, CVE-2025-41254, CVE-2025-48924, CVE-2025-55163 vulnerabilities.
- D-41496 - Fixed plugin-management pod failure when using an external PostgreSQL database during temporary pod operations.
- D-40993 - Fixed incorrect application path handling when packaging nested
udm.applicationobjects. Deploy now consistently creates version1.0under the correct application even if an additional path is included in the manifest. - D-41486 - Fixed a segmentation fault issue in XL CLI on RHEL 9. XL CLI now runs reliably on RHEL 9 without crashing with a core dump error.
- D-42188 - Fixed Helm chart deployment failure caused by template validation not considering cluster state. The plugin now uses server-side dry-run validation, ensuring Helm templates are validated against the actual cluster configuration.
- D-41946 - Fixed incorrect handling of regex values in string resources for WAS plugin deployments. Regex values are now preserved correctly without unintended escaping, ensuring accurate configuration in WAS.
- D-42010 - Fixed deployment failure in the Kubernetes plugin caused by missing
isAKSattribute handling during update deployments. The plugin now correctly supports AKS-related logic without causing runtime errors during deployment execution. - S-127409 - Fixed an issue in the Helm plugin where chart repository passwords with special characters caused failures on UNIX systems. Password handling is now updated to ensure compatibility across environments and sensitive values are properly masked in logs.
- D-42267 -
xl generatenow correctly creates theartifacts/folder, preserving ZIP directory structure during extraction.