Migrate an existing deployment to FIPS-compliant containers¶
Available on Entry, Enterprise, and Enterprise Advanced plans (not available on Professional)
From Mattermost v11, each release ships in two image variants: a standard Enterprise build (mattermost/mattermost-enterprise-edition) and a FIPS-compliant build (mattermost/mattermost-enterprise-fips-edition). Migrating an existing deployment to the FIPS image is primarily a matter of replacing the image and restarting Mattermost. No data migration is required, and rollback is symmetric.
This guide covers migrating an existing Mattermost Server deployment running on Docker or Kubernetes. FIPS images are only supported for Docker- and Kubernetes-based deployments; Linux package and tarball installations can’t be migrated to FIPS in place.
Mattermost’s FIPS offering also covers the Mattermost Operator and a self-hosted Push Proxy. Migrating those components is out of scope for this guide.
For background on what the FIPS build is and how it’s constructed, see the FIPS/STIG tab on Deploy Mattermost using Containers.
Before you begin¶
Back up your database and configuration. Always take a full backup before changing the image. See the backup and disaster recovery documentation.
Confirm your deployment type. FIPS images are supported on Docker, Docker Compose, and Kubernetes only. If you’re running Mattermost from a Linux package or tarball, you can’t migrate in place.
Check your Mattermost version. FIPS images are available from v11.0 onward and use the same release tags as the standard Enterprise images. Plan to migrate to the matching FIPS tag for your current version.
Plan for additional plugins. The FIPS image includes Boards, Playbooks, and Agents prepackaged and running in FIPS mode. Any additional plugins you’ve installed will continue to run inside the FIPS image, but they run in non-FIPS mode. This is expected behavior, not a configuration error.
PostgreSQL password length. Beginning with Mattermost v11.7, the Postgres password used by the Mattermost server must be at least 14 characters when running the FIPS image. If your current password is shorter, complete these steps before swapping the image:
Rotate the password in PostgreSQL. For example, connecting as a Postgres superuser and replacing
mmuserand<new password>to match your deployment:ALTER USER mmuser WITH PASSWORD '<new password>';
Update the password where your deployment stores it: in the official Docker deployment, the
POSTGRES_PASSWORDvalue in.env; in Operator-managed Kubernetes deployments, the database Secret referenced by yourMattermostcustom resource (commonly underspec.database.external.secret).Proceed to the image swap procedure for your deployment type below. Recreating the container as part of the migration applies the new credentials — no separate restart is required.
Plan for downtime. The migration requires pulling the new image and restarting the Mattermost container or pod.
Migrate a Kubernetes deployment¶
These steps assume your deployment is managed by the Mattermost Operator using a Mattermost custom resource.
In the steps below, replace [namespace] with the namespace your Mattermost installation runs in. If you omit -n [namespace], kubectl uses your current context’s default namespace.
Find the name of your Mattermost custom resource:
kubectl -n [namespace] get mattermost
Edit the
Mattermostcustom resource to point at the FIPS image. You can edit the live resource directly:kubectl -n [namespace] edit mattermost [installation-name]
Or update your manifest file and re-apply it.
In
spec.image, change the value frommattermost/mattermost-enterprise-editiontomattermost/mattermost-enterprise-fips-edition. Keepspec.versionaligned with your current release tag. For example:spec: image: mattermost/mattermost-enterprise-fips-edition version: 11.6.1
If you edited a manifest file, apply it:
kubectl -n [namespace] apply -f <your-mattermost-manifest>.yaml
Watch the Mattermost pods until the new ones reach
Runningand the old ones terminate:kubectl -n [namespace] get pods -w
Verify the running pods are using the FIPS image:
kubectl -n [namespace] get pods -o jsonpath='{range .items[*]}{.metadata.name}{"\t"}{.spec.containers[*].image}{"\n"}{end}'
Migrate a Docker or Docker Compose deployment¶
These steps are written for the official Mattermost Docker deployment, which selects the Mattermost image and tag through .env variables (MATTERMOST_IMAGE and MATTERMOST_IMAGE_TAG) referenced from docker-compose.yml as mattermost/${MATTERMOST_IMAGE}:${MATTERMOST_IMAGE_TAG}. If you’re using a custom Docker setup that hardcodes the image in docker-compose.yml or uses different variable names, adapt these steps accordingly.
Stop the Mattermost container:
docker compose stop mattermost
Edit your
.envfile. ChangeMATTERMOST_IMAGEfrommattermost-enterprise-editiontomattermost-enterprise-fips-edition. LeaveMATTERMOST_IMAGE_TAGset to your current release tag — FIPS images are published under the same tags as the standard Enterprise images.MATTERMOST_IMAGE=mattermost-enterprise-fips-edition MATTERMOST_IMAGE_TAG=<tag>
Pull the FIPS image:
docker compose pull mattermost
Recreate the Mattermost container so the new
.envvalues are applied:docker compose up -d --force-recreate mattermost
Verify the running container is using the FIPS image:
docker inspect mattermost --format '{{.Config.Image}}'
After migration¶
Confirm Mattermost starts cleanly. Tail the logs and watch for startup errors. On Kubernetes, target a specific Mattermost pod:
kubectl -n [namespace] logs -f [pod-name]
On Docker:
docker compose logs -f mattermost
Sign in and verify core functionality (sending messages, file uploads, search).
Confirm the prepackaged plugins (Boards, Playbooks, Agents) load successfully. In the System Console, go to Plugins > Plugin Management and confirm they’re enabled and healthy.
If you have additional plugins installed, confirm they still load. They’ll run in non-FIPS mode inside the FIPS image — this is expected.
Roll back¶
If the migration doesn’t go as planned, rolling back is symmetric: revert the image reference and redeploy. No data migration is involved.
Kubernetes: Edit the
Mattermostcustom resource and changespec.imageback tomattermost/mattermost-enterprise-edition. Re-apply or save, and watch the rollout.Docker / Docker Compose: Restore the original
MATTERMOST_IMAGEvalue in.env(mattermost-enterprise-edition) and rundocker compose pull mattermostfollowed bydocker compose up -d --force-recreate mattermost.