On-Premises to Cloud Courriel : Migration Guide

On-Premises to Cloud Courriel : Migration Guide

Guide de migration de la messagerie sur site vers le cloud

Jun 28, 2020

Publié par

Publié par

Bird

Bird

-

Catégorie :

Catégorie :

Email

Email

Ready to see Bird
in action?

Ready to see Bird
in action?

On-Premises to Cloud Email Migration Guide

Nous entendons souvent la question suivante : "Disposez-vous d'une sorte de manuel de jeu décrivant le processus de migration d'une installation sur site vers Bird" ?

Et bien oui, c'est le cas. Continuez à lire.

First, some back story. Le Bird Cloud service was created in 2014 out of the enormous success of the On-Premises Momentum MTA solution. Momentum sits au core of the Bird Cloud, providing high-speed delivery and traffic shaping for thousands of customers on the cloud service. Because of this, Momentum receives a large portion of our engineering attention, but the results of that work are often buried in performance improvements that don’t get a great deal of press.  Momentum customers see the benefits of this work every time a new public release of Momentum is published.

This does NOT mean that Bird is just “Momentum in the Cloud”. MessageBird is much more than that and can have added benefits for customers who choose to migrate or use them in a hybrid approach.  In addition, we have made it very easy for PowerMTA customers to migrate or use PowerMTA with Bird in a hybrid configuration as well. Le rest of this document will describe in detail how you can migrate your message streams from Momentum or PowerMTA à la Bird Cloud service. 

Tici are really two separate scenarios to consider when migrating to Bird from Momentum or PowerMTA. 

  1.  You are ready to leave the on-premises world entirely, shut down your physical data centers and no longer manage any on-premises MTA directly.  This means eliminating Momentum or PowerMTA from your deployment and sending messages directly to SparkPost for message handling. Or

  2. You have reason to keep some on-premises footprint for one reason or another.  Some possibilities might be:

  • des flux de livraison spécifiques qui nécessitent un prétraitement en Momentum

  • division de la capacité pour les besoins en rafales ou en reprise après sinistre

  • soutenir les anciens clients de PMTA tout en transférant les nouveaux clients vers SparkPost

 …then you want to forward the other messages on to Bird for onward message handling.  

In either situation, you need to be aware that Bird will only accept SMTP messages for delivery that are injected over port 587 or 2525 and use SMTP_Auth with a specific username and password (Voir la documentation SMTP ici). We also highly recommend connecting with a TLS connection, but that is not strictly required. If you are replacing your MTA layer entirely (scenario 1), then you may also want to consider using the Transmissions API REST which can accept messages over HTTPS connections. Documentation on that API is ici.

Quelle option dois-je choisir ?

Pour savoir si vous êtes dans l'option 1 ou l'option 2, tenez compte des facteurs suivants :

  • Utilisez-vous le moteur de script Lua de Momentumpour tout ce qui est plus compliqué que l'acheminement des messages ?

    • Lua is a comprehensive script tool for manipulating messages in-line, but the vast majority of our users only use it to select a binding for delivery.  If that is the case, you can modify your generation code to add an Attribut ip_pool à la X-MSYS-API header and have Bird assign the route for you. 

    • Si vous utilisez Lua pour faire des choses plus compliquées comme le filtrage de corps, la réécriture de Mail_From ou le calcul de la cadence des messages, et qu'il n'est pas possible de déplacer cette logique dans votre application d'injection, vous pouvez envisager de basculer dans le camp de l'option 2.

  • Votre système de génération est-il capable d'envoyer des messages sur le port 587 en utilisant TLS et SMTP_Auth ?

    • Certains systèmes de gestion de campagne ne peuvent envoyer du courrier qu'en clair sur le port 25. Cela pose un problème de sécurité pour Bird . Vous pouvez donc envisager l'option n° 2.

  • Utilisez-vous la syntaxe de substitution PowerMTA ou une autre modification de message en ligne ?

    • If you can move this function up into your generators or use the Bird Modèle de langue, then you can still use option 1, but otherwise, you may need to think about keeping a PMTA node online for this message modification before shipping to Bird for delivery.

  • Do you require any inbound AV/AS scanning before injection? While this is possible in Momentum and PowerMTA, eBird assumes you have already performed all those checks.  You may want to consider doing that before injection.

No matter which way you go, it is sure to affect your commercial relationship.  As you can imagine, this is not our first rodeo. Be sure to loop in your Commercial Account Manager and Customer Success Manager so we can help you through the details and make sure you are getting the best value for your dollar.

Pour le camp de l'option n° 1 (faire une croix dessus) :

Let’s assume you are OK with option 1 and you are ready to shut down your on-premises MTAs and you have decided to continue using the SMTP injection method, not changing your message creation systems at all.  Your generation systems should create a fully formatted SMTP message, then push to Bird over TLS using SMTP_AUTH where the username and password are as described on cette page. Remember that the “password” is the API key you generate in your Bird account with the SMTP delivery option turned on.

If you are in the Option #1 camp, consider switching to the REST API right out of your generation system. In most cases, we find that customers’ processing systems are already using JSON over HTTP and have to convert to SMTP before injection. You can skip that step and send it directly to us as une charge utile REST formatée en JSON.

If you choose to inject with the REST API, you may need to alter your content creation system a bit, but it may be worth it.  Pour en savoir plus, cliquez ici.

One of the biggest concerns large ESPs have with a Migration is IP Warming. Typically they have spent many years grooming their inventory of IP addresses with great care so the thought of abandoning all that work is painful. Bird has worked out a Bring Your Own IP (BYOIP) process that takes care of that issue. If you have at least one contiguous /24 CIDR block, Bird can use those existing IPs for delivery which saves you the pain of having to warm them up again. If you are able to take advantage of that option, you can skip the section here on IP warmup.

Si vous vous sentez prêt à passer à l'étape suivante, passez directement à la rubrique "Réaliser".

Tirer parti de l'option n° 2 (prétraitement sur site) :

Si, en revanche, vous faites partie de l'équipe de l'option n° 2, vous devrez apporter quelques modifications à la configuration de votre déploiement. La façon la moins pénible de migrer certains flux de messages de Momentum ou PMTA vers Bird tout en continuant à utiliser l'injection SMTP à partir de vos systèmes de génération est d'ajouter une route spéciale dans votre configuration.

Pour Momentum:

  1. Set up a version of Momentum > 3.6.23. 

  2. Install a valid SSL Certificate and open outbound port 587 so Momentum can talk to Bird Configure an outbound domain so you can route a message through Momentum to Bird. 

  3. With the configuration below, any message hitting this configuration will be routed to smtp.sparkpostmail.com using port 587 and SMTP_Auth with the username and password defined there.outbound_smtp_auth { } Keep_Message_Dicts_In_Memory = true Domain "smtp.sparkpostmail.com" {   Remote_SMTP_Port = "587"   Outbound_SMTP_AUTH_Type = "LOGIN"   Outbound_SMTP_AUTH_user = "SMTP_Injection"   Outbound_SMTP_AUTH_pass = "17258redacted8bd6cd7a8redacted8c22bce" }

  4. Configure the bindings you want to relay through MessageBird with TLS and gateway them to the domain you defined above.

    Note :
    TLS is not strictly required but is a strong recommendation. If TLS is not possible for some reason, then IP whitelisting the API keys is also a strong recommendation.


    binding “CustomerA-Outbound” {   Gateway = "smtp-demo.sparkpostelite.com"     TLS = "required"     TLS_Certificate = "/etc/pki/tls/certs/trymsys.net.crt"     TLS_Key = "/etc/pki/tls/certs/trymsys.net.key"     TLS_Ciphers = "DEFAULT" }

Pour PowerMTA:

  1. Set up a version of PowerMTA > 4.5.0

  2. Installez un certificat SSL valide et ouvrez le port de sortie 587 pour que PowerMTA puisse communiquer avec Bird.

  3. Configure an outbound domain path so you can route a message through PowerMTA to Bird. With the configuration below, any message hitting this configuration will be routed to smtp.sparkpostmail.com using port 587 and SMTP_Auth with the username and password defined there.  In PowerMTA, this is also where you can set TLS. Remarque : ce point est également documenté de manière plus détaillée here 

<domain sparkpost.rollup>    use-unencrypted-plain-auth yes    auth-username SMTP_Injection    auth-password YourAPIKeygoesherewhenyougenerateit    route smtp.sparkpostmail.com:587    use-starttls yes    require-starttls yes    max-smtp-out 10 </domain>

4. Configurez les VMTA que vous souhaitez relayer via Bird avec la configuration de rollup {sparkpost} que vous avez définie ci-dessus.

<virtual-mta SparkPostRelay>     <domain *>         queue-to {sparkpost}     </domain> </virtual-mta>

Once you have those configuration changes made, any messages sent to the selected “binding” or “VMTA” should be routed automatically through Bird for delivery.  

Faire bouger les choses

When you start down this road, don’t make the mistake of thinking this is an overnight operation.  Doing this right will take some time and care.  

  1. Setup your Bird account and fully test using a development subaccount so you can filter out that traffic later.  You will need to do this for either option because you will need the API key for the SMTP_Auth password either way.

  2. If you are using SMTP injection, plan to add an X-MSYS-API header to incorporate all the metadata and message attributes needed.  Any X-Headers should be re-written as metadata and you should include the ip_pool and campaign attributes as well. A sample is available here

  3. If you are NOT using BYOIP, then you should make sure you set up slightly different sending domains for use with MessageBird so that you can run both environments in parallel for as long as it is needed.  If your current sending domain is monentreprise.com, maybe set up sp.mycompany.com specifically for Bird delivery.  This allows you to migrate slowly and carefully while not compromising either domain.

  4. Make sure you have full domain alignment and security features enabled.  In DNS, set up DKIM, SPF, DMARC, bounce and tracking domains so they all look like they belong to the same organization.

  5. Configure Réchauffement automatique de l'IP on your defined IP_Pools.  If you are using the previously mentioned BYOIP option, you can ignore the warmup step.

  6. Start with one message stream and move forward from there.  Just like IP Warmup, you don’t want to do this all at once. Redirect a few hundred messages first, then 10% of the volume, then 20% the following day and increase until you have moved all the volume over. If you are an ESP, select a customer you can work with and test the process with their feedback.  If it all works well, move on to the next one. If you run into problems, take the time to fix it and work it into the process for the next one.

  7. Automate as much as possible with API.  Outside of the DNS changes, the SparkPost config can be mostly automated with quelques appels à l'API.

Collecte de données auprès de Bird

MessageBird reports message delivery in a webhooks feed or in the message events API.  Accessing Bird plain text logs is just not possible. You can pull this data back to your environment with a webhooks collector or by calling the API sur les événements periodically and consuming the data.  We recommend using webhooks and have quelques recommandations on doing that right.  In its most basic form, a PHP webhook collector can be deployed in a few  lines of code:

<?php $verb = $_SERVER['REQUEST_METHOD'];   if ($verb == "POST") {     $jsonStr = file_get_contents("php://input");     http_response_code(200);     $rnum = rand(1000,9999);     $t = date("YmdHis") . $rnum;     $Jfile = './data/data_'.$t.'.txt';     if (file_exists($Jfile)) {        $fn = basename($Jfile,".txt");       $seq = 0;       $ftail = substr($fn,-2,1);       if ($ftail == "-"){         $seq = substr($fn,-1);       }       $seq++;       $Jfile = basename($Jfile,".txt")."-".$seq.".txt";     }       $fh = fopen($Jfile, "w") or die("Unable to create file!");       fwrite($fh, $jsonStr);       fclose($fh);   } ?>

While you are experimenting, you can try them out with free collectors such as http://webhook.site/.

Once you have collected all the webhook data, you can read that into a data store for additional processing.  There are also ways to push Webhooks through services like StitchData and Segment.

The same information is available in the Events API if you have a need to PULL the data and cannot accept PUSH data.  Here is a sample Event API call:
GET https://api.sparkpost.com/api/v1/events/message?/

recipients=recipient@example.com&templates=my-template&events

That API is fully documented with samples here:  https://developers.sparkpost.com/api/events/#events-get-search-for-message-events

If you really need the event data back in a form that looks like PMTA or Momentum logging, that is possible as well if you employ some additional conditioning code. The great news is there are quelques exemples to steal from already.

Récapitulation

  1. Make sure you talk to your Sales and Success Management team.  We’ve done this before and can help you through it quickly and cost-effectively.

  2. Figure out if you are in Camp #1 (possibilité de passer entièrement d'un système On-Prem à un autre) or Camp #2 (Toujours besoin d'un MTA sur site).

  3. Sign up for a compte de test gratuit to evaluate the integration details.

  4. Decide on SMTP or REST API injection methods.

  5. Si vous utilisez l'injection SMTP, trouvez un moyen d'intégrer les données d'en-tête et les attributs du message dans un en-tête X-MSYS-API.

  6. Confirm if you can use our BYOIP process.

  7. Mettez à jour votre DNS avec de nouveaux domaines si nécessaire.

  8. Build a small sample to test your migration.  You may need to adjust your config.

  9. Augmenter le volume jusqu'à ce que tout le trafic soit migré

  10. Si vous faites partie du camp n° 1, vous pouvez enfin fermer vos MTA sur site une fois que tout le trafic a été migré.

Your new standard in Marketing, Pay & Sales. It's Bird

The right message -> to the right person -> au right time.

Your new standard in Marketing, Pay & Sales. It's Bird

The right message -> to the right person -> at the right time.