system-migration
System Migration
Overview
Provides comprehensive guidance for system-level migrations including operating system changes, hardware platform transitions, mainframe modernization, virtualization, and data center migrations. Focuses on system infrastructure that underlies applications and platforms.
Key Points:
- System migrations often involve multiple skills: OS + database + application coordination
- Plan for 30-50% more time than initial estimates
- Parallel run periods reduce risk but increase cost
- Mainframe migrations are typically multi-year projects
- Physical to virtual conversions rarely have issues with modern hardware
- Always validate hardware compatibility before OS migrations
Workflow Decision Tree
Choose your migration path based on the system type:
1. Operating System Migration
Use for: Linux distribution changes, Windows to Linux, OS version upgrades Load: migration-types.md for detailed workflows
2. Hardware Platform Migration
Use for: Mainframe to x86, architecture changes, system consolidation Load: migration-types.md for platform-specific guidance
3. Virtualization Migration
Use for: Physical to Virtual (P2V), Virtual to Virtual (V2V), cloud migrations Load: migration-types.md for virtualization patterns
4. Data Center Migration
Use for: Facility moves, infrastructure consolidation, hybrid cloud Load: migration-types.md for data center procedures
Standard Migration Workflow
Phase 1: Assessment & Planning
- Document current system state (OS version, kernel, packages, services, configurations)
- Identify application and hardware compatibility requirements
- Determine migration strategy (in-place upgrade vs fresh install)
- Create detailed migration plan with timeline and resources
Phase 2: Preparation
- Complete full system backups (OS, configurations, data)
- Set up target system environment
- Test migration procedures in non-production
- Prepare rollback plan and validation criteria
Phase 3: Execution
- Perform migration following tested procedure
- Migrate configurations and customize for target system
- Install and configure applications
- Validate system functionality
Phase 4: Validation & Cutover
- Run validation tests (See validation-and-testing.md)
- Conduct parallel run period if applicable
- Execute cutover to production
- Monitor closely post-migration
Core Best Practices
✅ Thorough Testing - Test everything in non-production environments first ✅ Complete Backups - Multiple backups at different stages before migration ✅ Automation - Script repeatable tasks to reduce errors and ensure consistency ✅ Gradual Migration - Migrate in phases, not all at once ✅ Rollback Plan - Always have a tested way to revert changes ✅ Documentation - Document every configuration, decision, issue, and resolution
Reference Files
Load these reference files based on specific migration needs:
-
Migration Types: See migration-types.md when:
- Planning OS migrations (Linux distro changes, Windows to Linux)
- Executing hardware platform migrations (mainframe to x86)
- Performing virtualization migrations (P2V, V2V)
- Conducting data center migrations
-
System Configuration Migration: See system-configuration-migration.md when:
- Migrating network configurations
- Transferring user accounts and permissions
- Moving system services and cron jobs
- Replicating firewall and security settings
-
Validation and Testing: See validation-and-testing.md when:
- Designing test plans for migrations
- Validating system functionality post-migration
- Conducting performance benchmarking
- Testing disaster recovery procedures
-
Rollback Procedures: See rollback-procedures.md when:
- Planning rollback strategies
- Migration fails or encounters critical issues
- Need to revert to original system state
-
Tools and Resources: See tools-and-resources.md when:
- Selecting migration tools (rsync, dd, clonezilla, etc.)
- Choosing automation frameworks
- Need monitoring and validation utilities
-
Best Practices: See best-practices.md when:
- Need comprehensive checklist for migration execution
- Planning communication and stakeholder management
- Establishing monitoring and alerting strategies
-
Anti-Patterns: See anti-patterns.md when:
- Need to avoid common migration mistakes
- Reviewing migration plans for potential issues
- Troubleshooting failed or problematic migrations
More from dauquangthanh/hanoi-rainbow
frontend-design-review
Conducts comprehensive frontend design reviews covering UI/UX design quality, design system validation, accessibility compliance, responsive design patterns, component library architecture, and visual design consistency. Evaluates design specifications, Figma/Sketch files, design tokens, interaction patterns, and user experience flows. Identifies usability issues, accessibility violations, design system deviations, and provides actionable recommendations for improvement. Produces detailed design review reports with severity-rated findings, visual examples, and implementation guidelines. Use when reviewing frontend designs, validating design systems, ensuring accessibility compliance, evaluating component libraries, assessing responsive designs, or when users mention design review, UI/UX review, Figma review, design system validation, accessibility audit, or frontend design quality.
276frontend-ui-ux-design
Creates comprehensive frontend UI/UX designs including user interfaces, design systems, component libraries, responsive layouts, and accessibility implementations. Produces wireframes, mockups, design specifications, and implementation guidelines. Use when designing user interfaces, creating design systems, building component libraries, implementing responsive designs, ensuring accessibility compliance, or when users mention UI design, UX design, interface design, design systems, user experience, or frontend design patterns.
168keycloak-administration
Provides comprehensive KeyCloak administration guidance including realm management, user/group administration, client configuration, authentication flows, identity brokering, authorization policies, security hardening, and troubleshooting. Covers SSO configuration, SAML/OIDC setup, role-based access control (RBAC), user federation (LDAP/AD), social login integration, multi-factor authentication (MFA), and high availability deployments. Use when configuring KeyCloak, setting up SSO, managing realms and clients, troubleshooting authentication issues, implementing RBAC, or when users mention "KeyCloak", "SSO", "OIDC", "SAML", "identity provider", "IAM", "authentication flow", "user federation", "realm configuration", or "access management".
165oracle-cloud
Provides comprehensive Oracle Cloud Infrastructure (OCI) guidance including compute instances, networking (VCN, load balancers, VPN), storage (block, object, file), database services (Autonomous Database, MySQL, NoSQL), container orchestration (OKE), identity and access management (IAM), resource management, cost optimization, and infrastructure as code (Terraform OCI provider, Resource Manager). Produces infrastructure code, deployment scripts, configuration guides, and architectural diagrams. Use when designing OCI architecture, provisioning cloud resources, migrating to Oracle Cloud, implementing OCI security, setting up OCI databases, deploying containerized applications on OKE, managing OCI resources, or when users mention "Oracle Cloud", "OCI", "Autonomous Database", "VCN", "OKE", "OCI Terraform", "Resource Manager", "Oracle Cloud Infrastructure", or "OCI migration".
83backend-design
Designs comprehensive backend systems including RESTful APIs, microservices, database architecture, authentication/authorization, caching strategies, message queues, and scalability patterns. Produces API specifications, database schemas, architecture diagrams, and implementation guides. Use when designing backend services, APIs, data models, distributed systems, authentication flows, or when users mention backend architecture, API design, database design, microservices, or server-side development.
55requirement-review
Conducts comprehensive requirements review including completeness validation, clarity assessment, consistency checking, testability evaluation, and standards compliance. Produces detailed review reports with findings, gaps, conflicts, and improvement recommendations. Use when reviewing requirements documents (BRD, SRS, user stories), validating acceptance criteria, assessing requirements quality, identifying gaps and conflicts, or ensuring standards compliance (IEEE 830, INVEST criteria). Trigger when users mention "review requirements", "validate requirements", "check requirements quality", "find requirement issues", or "assess BRD/SRS quality".
52