Cassandra to PostgreSQL Migration Guidelines

This guide walks you through migrating Kong Gateway from a Cassandra DB-backed traditional deployment to a PostgreSQL-backed hybrid deployment.

This guide uses a blue-green migration approach. In this approach, DNS switching helps cut traffic over from a Blue environment to a Green environment. This provides the ability to roll back faster if an issue is detected.

We recommend using decK, Kong’s declarative configuration management tool.

Migration steps:

  1. Build a target Kong Gateway hybrid environment with PostgreSQL. This acts as your blank canvas.
  2. Use decK to export (dump) configuration from the old traditional Cassandra-backed deployment.
  3. Use decK to import (sync) the configuration to the new hybrid PostgreSQL-backed deployment.
  4. Create basic auth credentials and local RBAC users using either the Admin Api or Kong Manager.
  5. When the Kong Gateway configuration has been migrated over to the green environment, slowly redirect traffic via canary into the green environment. This lowers the risk of the release with a fast rollback mechanism in place.

Considerations

While the document provides high level guidelines, actual migration steps may differ based on the following factors:

  • Complexity of the Kong deployment environment
  • Kong plugins
  • Custom plugins
  • External touch points to the Gateway (for example, OIDC with external IdPs)
  • Number of configuration entities, for example services and routes
  • If running an older version of Kong Gateway, we recommend doing a Kong Gateway version upgrade before the database migration. This reduces the moving parts in the upgrade procedure.
  • If you’re using Cassandra, you likely have a traditional deployment. We recommend taking this opportunity to review the deployment topology options for Kong Gateway and converting to a hybrid mode deployment, if possible.

The following diagram shows the architecture of a hybrid mode deployment, which means there is a split between the Kong Gateway control and data planes. You can follow the same database migration approach for Kong Gateway instances deployed in traditional mode.

migration image

Prerequisites

  • The Kong Gateway blue environment (using Cassandra) and green environment (using PostgreSQL) are running the same Gateway version.
  • In the following examples, blue is deployed in traditional mode and green is deployed in hybrid mode. If you prefer to migrate to a traditional deployment, you can still follow the steps, but you don’t need to worry about performing separate control plane and data plane tasks.

Migration approach

The following steps should be tested in a non-production environment. Any gaps in the target state should be identified and remediated before running it in production.

StepNameDescription
1Platform buildBuild the green environment with Kong Gateway using the same version as the blue environment
2Database setupBuild a new Postgres DB and connect it to the green environment
3Regression testingDeploy your setup into the new system and regression test it. Clean up the deployment when testing is completed .

Preparation

StepNameDescription
1Change embargoPlace a change embargo on the old environment preventing new deployments or configuration changes
2Blue environment backupMake a backup of the blue environment’s Cassandra database and place it into redundant storage
3Observability setupCreate dashboards to track the health of the new environment
4Go/No Go checkpointGo/No Go decision point for the migration execution

Execution

The goal of this phase is to reproduce the Kong Gateway configuration in the blue environment and perform regression and smoke testing ahead of live traffic cut-over.

StepNameDescription
1Configuration dump- Execute the deck dump command against the blue environment for each workspace to build a YAML representation of the Kong estate
- Execute deck dump —rbac-resources-only against the blue environment for each workspace to build a YAML representation of any RBAC resources created
- If using the Kong Dev Portal, run the portal fetch command via the Portal CLI to build a representation of the Dev Portal assets for a workspace
2Configuration sync- Change decK to work with the green environment, and execute deck sync to push the configuration to the green environment
- Change the Portal CLI to work against the green environment, and execute portal deploy to push the Dev Portal configuration against the new environment
3Regression testingExecute regression tests against the green environment backed by PostgreSQL
4Go/No Go checkpointIf all tests pass, proceed with traffic cut over

Traffic cut over

The purpose of this phase is to migrate traffic in a controlled manner, with a rapid fallback mechanism if a problem is detected. You can increase or decrease the wait times before increasing the canary split depending on the risk tolerance.

StepNameDescription
1Canary 1% of traffic to the new green environmentCanary 1% of traffic to the new environment and monitor the traffic health.
2Canary 5% of traffic to the new green environmentIncrease traffic split to 5% and monitor.
3Canary 10% of traffic to the new green environmentIncrease traffic split to 10% and monitor.
4Canary 50% of traffic to the new green environmentIncrease traffic split to 50% and monitor.
5Switch 100% of traffic to the new green environmentPerform a full DNS switch over to point to the new green environment.
6Take down old platformAfter 24 hours when confidence is high, take down the old platform.

Next steps

  • If using the Basic Authentication plugin, the passwords are hashed and encrypted in the database. A decK dump doesn’t export these credentials, so it is impossible to get the passwords out of the database in the cleartext. You must migrate these credentials using the Admin Api or Kong Manager.

  • Admin users on the Kong Gateway control plane are not propagated using decK. Migrate them using the Kong Admin API.

After migration, basic authentication credentials can be managed by decK. See the following topics to learn how to manage secrets with deck: