platform-migration
Platform Migration
Overview
This skill provides comprehensive guidance for migrating infrastructure platforms, cloud providers, container orchestration systems, CI/CD pipelines, and observability stacks. Focus is on infrastructure-level migrations that complement application modernization efforts.
Platform migrations are infrastructure-focused and should be paired with application migration strategies. Use cloud-neutral design patterns to reduce future migration effort, though multi-cloud strategies increase complexity while reducing vendor lock-in.
Core Migration Principles
Key Practices:
- Test everything in non-production first
- Automate using Infrastructure as Code (IaC)
- Migrate incrementally rather than "big bang"
- Maintain both platforms during stabilization
- Budget 20-30% more time than estimated
- Document architecture decisions and rationale
Avoid These Pitfalls:
- Migrating everything at once without phased approach
- Skipping non-production validation
- Ignoring cost estimation for target platform
- Failing to optimize during migration (pure lift-and-shift)
- Inadequate monitoring during transition
- Leaving resources running on both platforms post-migration
Migration Workflow
Step 1: Assessment and Planning
Identify Migration Type:
- Cloud-to-cloud (AWS↔GCP↔Azure)
- Kubernetes cluster migration (EKS→GKE→AKS)
- CI/CD platform change (Jenkins→GitLab→GitHub Actions)
- Monitoring stack migration (Prometheus→Datadog→New Relic)
- Container registry migration (Docker Hub→ECR→GCR→ACR)
- Network infrastructure transformation
- Infrastructure as Code migration (Terraform→CloudFormation→Bicep)
For detailed migration type workflows: See migration-types.md
Step 2: Inventory and Dependencies
- Document all resources in source platform
- Map dependencies between components
- Identify proprietary services without direct equivalents
- Estimate costs in target platform
- Assess technical constraints and requirements
Step 3: Design Target Architecture
- Map source services to target equivalents
- Design network topology and connectivity
- Plan IAM and security model
- Define migration approach (phased, parallel, cutover)
- Create rollback procedures
For IaC-specific migrations: See infrastructure-as-code-migration.md
Step 4: Risk Assessment and Mitigation
- Identify critical dependencies and single points of failure
- Plan for downtime windows
- Establish success criteria and validation tests
- Define rollback triggers and procedures
For comprehensive risk planning: See risk-management.md
Step 5: Pilot Migration
- Select non-critical workload for pilot
- Execute migration following documented procedure
- Validate functionality and performance
- Measure costs and resource utilization
- Document lessons learned and adjust plan
Step 6: Production Migration
- Migrate in planned waves/phases
- Implement data replication and synchronization
- Execute DNS cutover per service
- Monitor performance and errors continuously
- Validate each wave before proceeding
For validation procedures: See post-migration-validation.md
Step 7: Optimization and Cleanup
- Right-size resources based on actual usage
- Optimize costs using platform-native features
- Improve performance with platform capabilities
- Decommission source resources systematically
- Document final architecture
For cost optimization strategies: See cost-optimization-during-migration.md
Common Migration Scenarios
Cloud-to-Cloud Migration
Migrating between AWS, GCP, Azure, or moving from on-premise to cloud. Requires service mapping, network connectivity, and data transfer strategy.
Load: migration-types.md - Section 1: Cloud-to-Cloud Migration
Kubernetes Platform Migration
Moving clusters between EKS, GKE, AKS, or to self-managed Kubernetes. Involves workload migration, persistent storage, service meshes, and ingress controllers.
Load: migration-types.md - Section 2: Kubernetes Platform Migration
CI/CD Platform Changes
Transitioning between Jenkins, GitLab CI, GitHub Actions, CircleCI, or other platforms. Requires pipeline translation and secrets migration.
Load: migration-types.md - Section 3: CI/CD Platform Migration
Monitoring Stack Migration
Changing observability tools like Prometheus→Datadog, CloudWatch→New Relic. Includes metrics, logs, traces, and alerting.
Load: migration-types.md - Section 4: Monitoring Stack Migration
Container Registry Migration
Moving container images between Docker Hub, ECR, GCR, ACR, Harbor, or private registries.
Load: container-registry-migration.md
Network Infrastructure Migration
Transforming VPC configuration, VPN connections, DNS, load balancers, and CDN infrastructure.
Load: network-infrastructure-migration.md
Database Platform Migration
Migrating databases to different cloud providers or managed services.
Load: database-platform-migration.md
Migration Tools and Utilities
For platform-specific migration tools, automation scripts, and utilities:
Load: migration-tools.md
Includes cloud provider migration tools (AWS MGN, Azure Migrate, Google Cloud Migrate), Kubernetes tools (Velero, Kustomize), IaC tools (Terraformer, CDK), and data transfer utilities.
Reference Documentation
Migration Principles
Load: migration-principles.md
Complete best practices, anti-patterns, and key considerations for any platform migration.
Risk Management
Load: risk-management.md
Risk identification, mitigation strategies, contingency planning, and rollback procedures.
Post-Migration Validation
Load: post-migration-validation.md
Validation checklists, testing procedures, performance benchmarking, and cutover verification.
Cost Optimization
Load: cost-optimization-during-migration.md
Cost analysis, optimization strategies, and budget management during migration.
Output Formats
When generating migration artifacts, produce:
- Migration Plan: Detailed phases, timelines, dependencies, resources
- Architecture Diagrams: Source and target architecture with transition states
- Service Mapping: Complete mapping between source and target services
- Runbooks: Step-by-step execution procedures with rollback steps
- Validation Checklists: Acceptance criteria and testing procedures
- Risk Register: Identified risks, impact, probability, mitigation
- Cost Analysis: Comparative cost breakdown with optimization opportunities
More from dauquangthanh/hanoi-rainbow
frontend-design-review
Conducts comprehensive frontend design reviews covering UI/UX design quality, design system validation, accessibility compliance, responsive design patterns, component library architecture, and visual design consistency. Evaluates design specifications, Figma/Sketch files, design tokens, interaction patterns, and user experience flows. Identifies usability issues, accessibility violations, design system deviations, and provides actionable recommendations for improvement. Produces detailed design review reports with severity-rated findings, visual examples, and implementation guidelines. Use when reviewing frontend designs, validating design systems, ensuring accessibility compliance, evaluating component libraries, assessing responsive designs, or when users mention design review, UI/UX review, Figma review, design system validation, accessibility audit, or frontend design quality.
276frontend-ui-ux-design
Creates comprehensive frontend UI/UX designs including user interfaces, design systems, component libraries, responsive layouts, and accessibility implementations. Produces wireframes, mockups, design specifications, and implementation guidelines. Use when designing user interfaces, creating design systems, building component libraries, implementing responsive designs, ensuring accessibility compliance, or when users mention UI design, UX design, interface design, design systems, user experience, or frontend design patterns.
167keycloak-administration
Provides comprehensive KeyCloak administration guidance including realm management, user/group administration, client configuration, authentication flows, identity brokering, authorization policies, security hardening, and troubleshooting. Covers SSO configuration, SAML/OIDC setup, role-based access control (RBAC), user federation (LDAP/AD), social login integration, multi-factor authentication (MFA), and high availability deployments. Use when configuring KeyCloak, setting up SSO, managing realms and clients, troubleshooting authentication issues, implementing RBAC, or when users mention "KeyCloak", "SSO", "OIDC", "SAML", "identity provider", "IAM", "authentication flow", "user federation", "realm configuration", or "access management".
165oracle-cloud
Provides comprehensive Oracle Cloud Infrastructure (OCI) guidance including compute instances, networking (VCN, load balancers, VPN), storage (block, object, file), database services (Autonomous Database, MySQL, NoSQL), container orchestration (OKE), identity and access management (IAM), resource management, cost optimization, and infrastructure as code (Terraform OCI provider, Resource Manager). Produces infrastructure code, deployment scripts, configuration guides, and architectural diagrams. Use when designing OCI architecture, provisioning cloud resources, migrating to Oracle Cloud, implementing OCI security, setting up OCI databases, deploying containerized applications on OKE, managing OCI resources, or when users mention "Oracle Cloud", "OCI", "Autonomous Database", "VCN", "OKE", "OCI Terraform", "Resource Manager", "Oracle Cloud Infrastructure", or "OCI migration".
82backend-design
Designs comprehensive backend systems including RESTful APIs, microservices, database architecture, authentication/authorization, caching strategies, message queues, and scalability patterns. Produces API specifications, database schemas, architecture diagrams, and implementation guides. Use when designing backend services, APIs, data models, distributed systems, authentication flows, or when users mention backend architecture, API design, database design, microservices, or server-side development.
55requirement-review
Conducts comprehensive requirements review including completeness validation, clarity assessment, consistency checking, testability evaluation, and standards compliance. Produces detailed review reports with findings, gaps, conflicts, and improvement recommendations. Use when reviewing requirements documents (BRD, SRS, user stories), validating acceptance criteria, assessing requirements quality, identifying gaps and conflicts, or ensuring standards compliance (IEEE 830, INVEST criteria). Trigger when users mention "review requirements", "validate requirements", "check requirements quality", "find requirement issues", or "assess BRD/SRS quality".
52