Skip to content

datastax/zdm-proxy-automation

Repository files navigation

ZDM Proxy Automation

An automation suite to deploy and manage the Zero Downtime Migration Proxy

Important note

This automation is being widely used by DataStax as part of the Zero Downtime Migration suite. The Ansible automation and the ZDM Utility have been used in numerous migrations of large-scale production environments and we are actively evolving them. They are also fully documented in the official ZDM Documentation.

All the automation material in this repository is licensed under the Apache Licence v2.0. Feel free to clone this repository and use this material as it is, as well as fork it and adapt it as appropriate if your environment or deployment strategy preferences are different.

We endeavor to expand and maintain this automation to ensure it works as expected, and we welcome suggestions from the community. However, we cannot always guarantee that we will implement feature requests or review and merge community contributions in a defined timeframe.

Overview

The Zero Downtime Migration Proxy (ZDM proxy) is an open-source component written in Go and designed to seamlessly handle the real-time client application activity while the client application's data is being migrated between CQL clusters (which we will refer to as Origin and Target). For comprehensive documentation on how to use the ZDM Proxy to perform a zero-downtime migration, please see the official ZDM Documentation.

This automation suite provides several components to make it easier to provision, deploy and manage a cluster of ZDM Proxy instances in development, test and production environments.

The components in this suite are:

  • A collection of Ansible playbooks to create a ZDM Proxy deployment and its companion monitoring stack, perform operations (configuration changes, version upgrades and simple restarts) in a rolling fashion, and collect the logs from all instances.
  • An interactive utility to easily create and configure a Docker container that acts as the Ansible Control Host, from which the Ansible playbooks can be configured and run. The ZDM Utility is written in Go and can be run on any platform.
  • A set of Terraform modules that can be optionally used to provision the infrastructure for a standard, self-contained ZDM deployment in a dedicated VPC, with some orchestration scripts to easily configure and run the Terraform automation. The Terraform automation is currently available for AWS only. Alternatively, you can provision the ZDM infrastructure in other ways (manually or through your own automation) as long as it complies with these infrastructure and connectivity requirements.
  • A Docker Compose descriptor and set of scripts to easily create a local ZDM Proxy setup connecting to two single-node Cassandra clusters for testing and exploration purposes.
  • Some additional convenience scripts.

Ansible automation

The Ansible automation is located in the ansible directory and contains the following playbooks:

  • deploy_zdm_proxy.yml to deploy and configure the desired number of ZDM Proxy instances. The ZDM Proxy processes are deployed as Docker containers and the whole setup is automated by the playbook (including the Docker installation on the proxy hosts).
  • deploy_zdm_monitoring.yml to deploy and configure a Prometheus + Grafana monitoring stack. This playbook ships with three pre-configured Grafana dashboards to monitor the ZDM Proxy instances at application level, their Go runtime environment and the hosts on which they run.
  • rolling_update_zdm_proxy.yml to change the configuration of the ZDM Proxy instances or upgrade them. The playbook performs these operations in a rolling fashion, so they can be executed on an existing ZDM Proxy deployment that is being used, without causing an interruption of its availability.
  • rolling_restart_zdm_proxy.yml to perform a simple rolling restart of the ZDM Proxy instances without any change to the containers.
  • collect_zdm_proxy_logs.yml to collect the logs from all ZDM Proxy instances into a single zip archive.

This automation requires the infrastructure for the ZDM deployment to have already been provisioned. For its infrastructure requirements, please see this documentation page.

For detailed documentation on how to use this automation, please refer to this section of the official ZDM documentation.

Setting up the Ansible Control Host

The Ansible automation must be run from a machine on which Ansible has been installed, known as the Ansible Control Host. This machine must have SSH access to all hosts on which the ZDM Proxy instances will be deployed.

Setup using the ZDM Utility

While it is perfectly possible to set up the Ansible Control Host manually, the ZDM Utility provides an easy and interactive way to spin it up as a Docker container. This utility can be downloaded from here as a pre-built Go executable for a variety of platforms.

For detailed information about using the ZDM Utility, please see this documentation page.

As explained in the prerequisites, you will need to install Docker and enable your regular user to run the docker command without super user permissions.

Alternative manual setup

Using the ZDM Utility is convenient but not necessary. If you choose not to use it, you can install and configure the Ansible Control Host manually. This may be useful if you cannot or do not want to use Docker on the machine from which you will run the playbooks.

To do so, if your machine runs Ubuntu you can use the script setup_ansible_control_host.sh located in orchestration-scripts. Note: you will need to uncomment and populate some required variables at the top of the script before running it. For different Linux distributions, feel free to adapt this script accordingly.

Terraform automation

The Terraform automation contains a set of modules to provision infrastructure and configure the networking for a standard, self-contained ZDM deployment in a dedicated VPC to which your existing VPC can be peered. This automation is currently only available for AWS. Other cloud providers may be supported in the future.

Using this Terraform automation is completely optional: the infrastructure can be provisioned manually or by any other means, as long as it complies with the requirements documented here.

The following diagram shows the infrastructure and networking layout provisioned in AWS using these modules. Note that Target can be any cluster in any infrastructure, as long as it is reachable by the ZDM Proxy instances on the port on which the cluster listens for client connections.

AWS infrastructure and networking layout provisioned by Terraform

In the terraform/aws directory there are the following modules:

  • The root module no-peering-deployment-root-aws, which creates the ZDM VPC and its components (yellow area of the diagram).
  • The root module self-contained-deployment-root-aws: which creates the ZDM VPC and its components (yellow area of the diagram) and also peers this VPC with one existing specified VPC ("Origin VPC", grey area of the diagram). Additional VPCs can be peered to the ZDM VPC manually if necessary.
  • The submodules used by these root modules.

To launch the Terraform automation, you can use one of the two bash scripts provided in the directory orchestration-scripts:

  • run_terraform_zdm_no_peering.sh to configure and execute the no-peering-deployment-root-aws Terraform module.
  • run_terraform_zdm.sh to configure and execute the self-contained-deployment-root-aws Terraform module.

Both scripts require some configuration, in the form of required and optional variables at the top of each script. You will need to uncomment and populate these variables as appropriate. If you are using the option with peering, the peering connection will be created automatically, but you may still need to make changes to the security groups of your cluster and / or client application instances to allow communication with the ZDM instances, depending on your specific configuration.

An optional custom suffix can be specified, e.g. to distinguish infrastructure for different ZDM deployments within the same AWS account. In this case, the suffix is appended to the name of each resource (separated by a dash), and an Owner AWS tag set to the suffix value is assigned to each resource. This allows to easily see all infrastructure for a certain deployment by filtering by its Owner tag.

When you execute the script, the Terraform output will be displayed and at the end you will see:

  • The variables with which the script has been executed. If you need to tear down all the infrastructure provisioned, you can go to the directory of the root module that you used and execute the command terraform destroy followed by all these variables (these are also persisted to file tf_latest_vars.txt in this directory).
  • The output of the automation, with the IP addresses of the instances that were provisioned and the ZDM VPC ID. This output is also saved to file zdm_output.txt in the zdm-proxy-automation base directory.

In addition, the Terraform automation creates the following two files:

  • zdm_ansible_inventory, which contains the newly provisioned instance IPs in a file that can be passed directly to the Ansible automation to indicate which instances it must operate on.
  • zdm_ssh_config, a custom SSH configuration file that allows you to easily connect to the jumphost or ZDM Proxy instances from an external machine with a single command. See here for details.

Docker Compose for Local Development

The Compose file docker_compose.yml in the base directory of this repository and the scripts in the compose directory can be used to spin up a local ZDM deployment using containers. This can be convenient for exploration and local testing, including testing of the Ansible automation.

The ZDM deployment thus created includes:

  • A proxy network of type bridge.
  • Two single-node Cassandra clusters, with specified versions, which are used as Origin and Target.
  • A jumphost container, from which the Ansible automation is run (specifically, the playbook to deploy the ZDM Proxy).
  • Three Docker containers representing three Linux machines, which are used to run the ZDM Proxy instances as Docker containers (using Docker-in-Docker).
  • A client machine, on which the CQLSH standalone client is installed to test the ZDM Proxy deployment.

As prerequisites, ensure that:

You will be using the docker-compose command, which in some installations may be available as docker compose.

To create this deployment, simply run:

docker-compose up

For more details on Docker Compose, please refer to the official documentation.

To issue CQL requests through the proxy, launch cqlsh on the client container (zdm-proxy-automation_client_1) connecting to a proxy instance:

docker exec -it zdm-proxy-automation_client_1 cqlsh zdm-proxy-automation_proxy_1

From this shell, you can execute read and write CQL requests that will be handled by the proxy and routed appropriately.