Checking if rolling updates are possible

Execute the update compatibility command to check if Keycloak supports a rolling update for a change in your deployment.

Use the update compatibility command to determine if you can update your deployment with a rolling update strategy when enabling or disabling features or changing the Keycloak version, configurations or providers and themes. The outcome shows whether a rolling update is possible or if a recreate update is required.

In its current version, it shows that a rolling update is possible when the Keycloak version is the same for the old and the new version. Future versions of Keycloak might change that behavior to use additional information from the configuration, the image and the version to determine if a rolling update is possible.

In the next iteration of this feature, it is possible to use rolling update strategy also when updating to the following patch release of Keycloak. Refer to Rolling updates for patch releases section for more details.

This is fully scriptable, so your update procedure can use that information to perform a rolling or recreate strategy depending on the change performed. It is also GitOps friendly, as it allows storing the metadata of the previous configuration in a file. Use this file in a CI/CD pipeline with the new configuration to determine if a rolling update is possible or if a recreate update is needed.

If you are using the Keycloak Operator, continue to the Avoiding downtime with rolling updates guide and the Auto strategy for more information.

Supported update strategies

Rolling Update

In this guide, a rolling update is an update that can be performed with zero downtime for your deployment, which consists of at least two nodes. Update your Keycloak one by one; shut down one of your old deployment nodes and start a new deployment node. Wait until the new node’s start-up probe returns success before proceeding to the next Keycloak node. See guide Tracking instance status with health checks for details on how to enable and use the start-up probe.

Recreate Update

A recreate update is not compatible with zero-downtime and requires downtime to be applied. Shut down all nodes of the cluster running the old version before starting the nodes with the new version.

Determining the update strategy for an updated configuration

To determine if a rolling update is possible:

  1. Run the update compatibility command to generate the required metadata with the old configuration.

  2. Check the metadata with the new configuration to determine the update strategy.

If you do not use --optimized keep in mind that an update command may implicitly create or update an optimized build for you - if you are running the command from the same machine as a server instance, this may impact the next start of your server.

Consumers of these commands should not rely on the internal behavior or the structure of the metadata file. Instead, they should rely only on the exit code of the check command to benefit from future enhancements on the internal logic to determine when a rolling update is possible.

Generating the Metadata

To generate the metadata, execute the following command using the same Keycloak version and configuration options:

Generate and save the metadata from the current deployment.
bin/kc.[sh|bat] update-compatibility metadata --file=/path/to/file.json

This command accepts all options used by the start command. The command displays the metadata, in JSON format, in the console for debugging purposes. The --file parameter allows you to save the metadata to a file. Use this file with the subsequent check command.

Ensure that all configuration options, whether set via environment variables or CLI arguments, are included when running the above command.

Omitting any configuration options results in incomplete metadata, and could lead to a wrong reported result in the next step.

Checking the Metadata

This command checks the metadata generated by the previous command and compares it with the current configuration and Keycloak version. If you are updating to a new Keycloak version, this command must be executed with the new version.

Check the metadata from a previous deployment.
bin/kc.[sh|bat] update-compatibility check --file=/path/to/file.json
  • Ensure that all configuration options, whether set via environment variables or CLI arguments, are included when running this command.

  • Verify that the correct Keycloak version is used.

Failure to meet these requirements results in an incorrect outcome.

The command prints the result to the console. For example, if a rolling update is possible, it displays:

Rolling Update possible message
[OK] Rolling Update is available.

If no rolling update is possible, the command provides details about the incompatibility:

Rolling Update not possible message
[keycloak] Rolling Update is not available. 'keycloak.version' is incompatible: 26.2.0 -> 26.2.1 (1)
1 In this example, the Keycloak version 26.2.0 is not compatible with version 26.2.1 and a rolling update is not possible.

In the next iteration of this feature, it is possible to use rolling update strategy also when updating to the following patch release of Keycloak. Refer to Rolling updates for patch releases section for more details.

Command exit code

Use the command’s exit code to determine the update type in your automation pipeline:

Exit Code Description

0

Rolling Update is possible.

1

Unexpected error occurred (such as the metadata file is missing or corrupted).

2

Invalid CLI option.

3

Rolling Update is not possible. The deployment must be shut down before applying the new configuration.

4

Rolling Update is not possible. The feature rolling-updates is disabled.

Rolling incompatible changes

The following configuration changes return a "Rolling Update is not possible" result code.

Features

Recreate always

The enabling or disabling of the following features requires a recreate update:

Feature Description

multi-site:v1

Multi-site support

persistent-user-sessions:v1

Persistent online user sessions across restarts and upgrades

Recreate on feature version change

Changing the following features versions triggers a recreate update:

Feature Description

login:v1

Legacy Login Theme

login:v2

New Login Theme

passkeys-conditional-ui-authenticator:v1

Passkeys conditional UI authenticator

Configuration options

Changing the value of one of the following CLI options triggers a recreate update:

Cache
Option Rationale

--cache

The ispn and local configurations are mutually exclusive, changing from one to another will lead to data loss.

--cache-config-file

Changing the configuration file could result in incompatible cache or transport configurations, resulting in clusters not forming as expected.

--cache-stack

Changing stack will result in the cluster not forming during rolling update and will lead to data loss.

--cache-embedded-mtls-enabled

Enabling/Disabling TLS will result in the cluster not forming during rolling update and will lead to data loss.

--cache-remote-host

Connecting to a new remote cache will cause previously cached data to be lost.

--cache-remote-port

Connecting to a new remote cache will cause previously cached data to be lost.

Keycloak does not verify changes to the content of the cache configuration file provided via --cache-config-file. If you change this file, you need to review and test your changes to ensure that nodes using the new configuration can form a cluster with the nodes running the old configuration. If a cluster cannot be formed, you should shut down Keycloak running the old configuration first before migrating to the new configuration.

Database
Option Rationale

--db

Migration to a new database vendor should be applied to all cluster members to ensure data consistency.

--db-schema

Migration to a new database schema should be applied to all cluster members to ensure data consistency.

--db-url-database

Migration to a new database name should be applied to all cluster members to ensure data consistency.

--db-url-host

All cluster members should be connecting to the same database to ensure data consistency.

--db-url-port

All cluster members should be connecting to the same database to ensure data consistency.

Keycloak allows changes to the --db-url option to be rolled out in order to facilitate changes to JDBC properties. Great care should be taken when updating this value as changes to the host, port or database name could lead to distinct cluster members connecting to a different database, resulting in data consistency issues.

Rolling updates for patch releases

This behavior is currently in preview mode, and it is not recommended for use in production.

It is possible to configure the Keycloak compatibility command to allow rolling updates when upgrading to a newer patch version in the same major.minor release stream.

To enable this behavior for compatibility check command enable feature rolling-updates:v2 as shown in the following example.

bin/kc.[sh|bat] update-compatibility check --file=/path/to/file.json --features=rolling-updates:v2

Note there is no change needed when generating metadata using metadata command.

Recommended Configuration:

  • Enable sticky sessions in your loadbalancer to avoid users bouncing between different versions of Keycloak as this could result in users needing to refresh their Account Console and Admin UI multiple times while the upgrade is progressing.

Supported functionality during rolling updates:

  • Users can log in and log out for OpenID Connect clients.

  • OpenID Connect clients can perform all operations, for example, refreshing tokens and querying the user info endpoint.

Known limitations:

  • If there have been changes to the Account Console or Admin UI in the patch release, and the user opened the Account Console or Admin UI before or during the upgrade, the user might see an error message and be asked to reload the application while navigating in browser during or after the upgrade.

  • If the two patch releases of Keycloak use different versions of the embedded Infinispan, no rolling update of Keycloak be performed.

Further reading

The Keycloak Operator uses the functionality described above to determine if a rolling update is possible. See the Avoiding downtime with rolling updates guide and the Auto strategy for more information.

Relevant options

Value

features

Enables a set of one or more features.

CLI: --features
Env: KC_FEATURES

account-api[:v1], account[:v3], admin-api[:v1], admin-fine-grained-authz[:v1,v2], admin[:v2], authorization[:v1], ciba[:v1], client-policies[:v1], client-secret-rotation[:v1], client-types[:v1], clusterless[:v1], declarative-ui[:v1], device-flow[:v1], docker[:v1], dpop[:v1], dynamic-scopes[:v1], fips[:v1], hostname[:v2], impersonation[:v1], instagram-broker[:v1], ipa-tuura-federation[:v1], kerberos[:v1], log-mdc[:v1], login[:v2,v1], logout-all-sessions[:v1], multi-site[:v1], oid4vc-vci[:v1], opentelemetry[:v1], organization[:v1], par[:v1], passkeys-conditional-ui-authenticator[:v1], passkeys[:v1], persistent-user-sessions[:v1], preview, quick-theme[:v1], recovery-codes[:v1], rolling-updates[:v1,v2], scripts[:v1], step-up-authentication[:v1], token-exchange-external-internal[:v2], token-exchange-standard[:v2], token-exchange[:v1], transient-users[:v1], update-email[:v1], user-event-metrics[:v1], web-authn[:v1]

features-disabled

Disables a set of one or more features.

CLI: --features-disabled
Env: KC_FEATURES_DISABLED

account, account-api, admin, admin-api, admin-fine-grained-authz, authorization, ciba, client-policies, client-secret-rotation, client-types, clusterless, declarative-ui, device-flow, docker, dpop, dynamic-scopes, fips, impersonation, instagram-broker, ipa-tuura-federation, kerberos, log-mdc, login, logout-all-sessions, multi-site, oid4vc-vci, opentelemetry, organization, par, passkeys, passkeys-conditional-ui-authenticator, persistent-user-sessions, preview, quick-theme, recovery-codes, rolling-updates, scripts, step-up-authentication, token-exchange, token-exchange-external-internal, token-exchange-standard, transient-users, update-email, user-event-metrics, web-authn

On this page