Migrate from Google Apigee to Zuplo
This guide walks through migrating from Google Apigee (including Apigee X, Apigee hybrid, and legacy Apigee Edge) to Zuplo. It covers the key differences, concept mapping, policy translation, and a step-by-step migration process.
Apigee Edge End of Life
Apigee Edge for Private Cloud v4.53 reached end of life on April 11, 2026. The final version (v4.53.01) reaches end of life on February 26, 2027. After these dates, Google provides no security patches, bug fixes, or support. If you are still running Apigee Edge, now is the time to migrate.
Pre-migration checklist
Before starting your migration, gather the following from your Apigee environment:
- API proxy inventory — List all active API proxies, their base paths, and target endpoints
- OpenAPI specs — Export specs for each proxy (or document endpoints if specs don't exist)
- Policy audit — List every policy attached to each proxy (authentication, rate limiting, transformation, etc.)
- Environment configuration — Document KVM entries, target servers, keystores, and virtual host settings
- Developer portal content — Export API documentation, custom pages, and developer account data
- CI/CD pipeline configuration — Document your current deployment process and any automation scripts
- Traffic patterns — Understand request volumes, peak usage times, and geographic distribution of API consumers
- Custom Java callouts — Identify any Java callouts that will need translation to TypeScript
Why teams migrate from Apigee
Apigee is one of the oldest API management platforms, acquired by Google in 2016. While it offers deep enterprise analytics and compliance features, teams increasingly find the platform difficult to justify:
- Apigee Edge end-of-life — Google has been sunsetting legacy Apigee Edge (on-premises and private cloud) versions, pushing customers to migrate to Apigee X on Google Cloud. This forced migration is an opportunity to evaluate modern alternatives.
- Google Cloud lock-in — Apigee X is tightly coupled to Google Cloud Platform. While Apigee hybrid exists, it adds operational complexity. Teams running multi-cloud or non-GCP backends face unnecessary friction.
- High cost — Apigee pricing starts at approximately $1,500/month for just 100K requests, with separate charges for environments, analytics, and developer portals. Enterprise contracts often require five-figure monthly commitments.
- XML-based policy configuration — Apigee policies are configured in verbose XML files that are difficult to read, maintain, and version control. Custom logic uses a limited JavaScript engine.
- Slow deployment cycles — Apigee deployments can take several minutes to propagate, slowing down the development iteration loop.
- Drupal-based developer portal — Apigee's developer portal is built on Drupal, requiring significant setup, customization, and ongoing maintenance.
Zuplo has a video walkthrough of the Apigee to Zuplo migration process: Migrating from Apigee API Management Made Easy.
Concept mapping: Apigee to Zuplo
| Apigee concept | Zuplo equivalent |
|---|---|
| API Proxy | Routes in your OpenAPI spec |
| ProxyEndpoint | Route path + handler |
| TargetEndpoint | URL forward handler base URL |
| Policy (XML) | Policy (TypeScript) or built-in policy |
| PreFlow / PostFlow | Inbound / outbound policies |
| Conditional flow | Custom code in a custom policy |
| SharedFlow | Reusable custom code module |
| Environment | Environment |
| API Product | API key with metadata |
| Developer App | API key consumer |
| Apigee Developer Portal | Zuplo Developer Portal |
| VerifyAPIKey policy | API Key Authentication |
| OAuthV2 policy | JWT authentication policies |
| SpikeArrest | Rate Limiting |
| Quota | Quota policy |
| KVM (Key Value Map) | Environment variables |
| Management API | Zuplo API |
Step-by-step migration
Step 1: Export your API definitions
Apigee API proxies contain OpenAPI specs or can generate them. Export your API definitions:
- In the Apigee console, navigate to your API proxy.
- Download the OpenAPI spec from the Develop tab, or export the proxy bundle as a ZIP file and extract the spec.
- If no spec exists, create one from your proxy's endpoint and resource definitions.
Step 2: Map Apigee policies to Zuplo policies
The following table maps common Apigee policies to Zuplo equivalents:
| Apigee policy | Zuplo policy |
|---|---|
VerifyAPIKey | API Key Authentication |
OAuthV2 | Open ID JWT Authentication |
BasicAuthentication | Basic Authentication |
SpikeArrest | Rate Limiting |
Quota | Quota |
AssignMessage | Set Headers or Set Body |
ExtractVariables | Custom Code Policy |
XMLToJSON / JSONToXML | XML to JSON or custom code |
RaiseFault | Custom code returning an error Response |
AccessControl | IP Restriction |
CORS | Built-in CORS configuration |
JavaScript callout | Custom Code Policy (TypeScript) |
ServiceCallout | Custom Code Policy using fetch() |
Step 3: Translate policy configuration
Here is an example of translating an Apigee SpikeArrest policy to a Zuplo rate limit policy.
Apigee XML policy:
Code
Zuplo policy configuration:
Code
Apigee's SpikeArrest uses a smoothing algorithm that spreads allowed requests evenly across the time window. Zuplo's rate limiter uses a sliding window algorithm and is globally distributed — limits are enforced across all 300+ edge locations as a single zone, unlike Apigee which synchronizes within a region but not across regions by default.
Here is an example of translating an Apigee OAuthV2 verification policy to a Zuplo JWT authentication policy.
Apigee OAuthV2 policy:
Code
Zuplo JWT authentication policy configuration:
Code
Apigee can act as a full OAuth 2.0 server (issuing and managing tokens). Zuplo validates tokens issued by external identity providers (Auth0, Cognito, Clerk, Firebase, Supabase, or any OIDC-compliant provider). If you are using Apigee as your OAuth server, you will need to move token issuance to a dedicated identity provider during migration.
Here is an example of translating an Apigee ResponseCache to a Zuplo caching policy.
Apigee ResponseCache policy:
Code
Zuplo caching policy configuration:
Code
Step 4: Translate JavaScript callouts to TypeScript
If you use Apigee JavaScript callouts, rewrite them as Zuplo custom code policies in TypeScript.
Apigee JavaScript callout:
Code
Equivalent Zuplo TypeScript policy:
Code
Step 5: Migrate your developer portal
Apigee's Drupal-based developer portal requires significant setup and maintenance. Zuplo's Developer Portal is automatically generated from your OpenAPI spec and includes:
- Interactive API reference documentation
- Self-serve API key management
- Built-in authentication
- Customizable theming
- Zero maintenance — it updates automatically when your API changes
Step 6: Migrate environment configuration
Apigee KVMs to Zuplo environment variables:
Apigee uses Key Value Maps (KVMs) for environment-specific configuration. In Zuplo, use environment variables:
| Apigee KVM | Zuplo environment variable |
|---|---|
kvm.get("backend-url") | $env(BACKEND_URL) in route config |
context.getVariable("my-kvm.key") | context.env.MY_KEY in custom code |
| Encrypted KVM entries | Secret environment variables |
Step 7: Deploy and migrate traffic
- Deploy your Zuplo project by pushing to your connected Git repository.
- Set up a custom domain for your Zuplo gateway.
- Route a subset of traffic to Zuplo using DNS-based traffic splitting.
- Monitor both gateways and compare behavior.
- Gradually shift all traffic to Zuplo.
- Decommission your Apigee environment.
Apigee Edge to Zuplo: a special case
If you are migrating from legacy Apigee Edge (on-premises or private cloud) rather than Apigee X, the migration to Zuplo is an opportunity to modernize without the complexity of moving to Apigee X:
- Skip the Apigee X migration — Instead of migrating from Edge to X (which Google recommends but requires significant effort), migrate directly to Zuplo.
- Eliminate infrastructure — Apigee Edge requires managing on-premises infrastructure (Cassandra, ZooKeeper, Qpid clusters). Zuplo is fully managed.
- Reduce costs — Apigee X pricing is often higher than Edge licensing. Zuplo offers transparent, usage-based pricing starting with a free tier.
- No GCP dependency — Apigee X requires Google Cloud Platform. Apigee hybrid still requires GCP for its control plane. Zuplo is cloud-agnostic and can front backends on any cloud provider.
Apigee Edge end-of-life timeline
| Version | End-of-life date | Status |
|---|---|---|
| 4.52.00 | August 31, 2024 | EOL reached |
| 4.52.01 | September 30, 2025 | EOL reached |
| 4.52.02 | December 31, 2025 | EOL reached |
| 4.53.00 | April 11, 2026 | EOL reached |
| 4.53.01 | February 26, 2027 | Final version |
After end of life, Google provides no security patches, bug fixes, hot fixes, or technical support for that version.
Common migration gotchas
Encrypted KVM entries cannot be exported. Apigee's management API does not return values for encrypted Key Value Map entries. You will need to manually re-enter these values as Zuplo secret environment variables.
Apigee's OAuth server has no direct equivalent. If you use Apigee to issue and manage OAuth tokens (not just validate them), you will need to move token issuance to a dedicated identity provider such as Auth0, Cognito, or Clerk. Zuplo validates tokens from external providers but does not act as an OAuth server.
Shared flows become reusable modules. Apigee shared flows that are referenced across multiple proxies should be refactored into reusable TypeScript modules. See Reusing Code.
Java callouts require rewriting. Apigee Java callouts have no direct TypeScript equivalent. Evaluate each callout and rewrite the logic as a custom code policy. In most cases, the TypeScript version will be simpler because you have access to the full npm ecosystem and standard web APIs.
Apigee analytics must be replaced. Apigee's built-in analytics dashboards and custom reports do not migrate. Zuplo provides built-in analytics and integrates with observability platforms like Datadog and Google Cloud Logging for advanced reporting.
Test with representative traffic before cutover. Use Zuplo's branch-based deployments to create a preview environment and route a subset of traffic through Zuplo before migrating production traffic. Compare response codes, latencies, and payload correctness between both gateways.
Next steps
- Set up your first Zuplo gateway
- Add rate limiting
- Add API key authentication
- Configure your developer portal
- Set up source control