How to deploy Ghost CMS on Kubernetes

How to deploy Ghost CMS on Kubernetes

This repository implements Ghost CMS v5.xx.x from @TryGhost (upstream) on Kubernetes, with our custom image, which has significant improvements to be used on Kubernetes (Dockerfile). See this whole README for more information.

[

GitHub - sredevopsorg/ghost-on-kubernetes: Ghost on Kubernetes by SREDevOps.org - Deploy Ghost v5 on Kubernetes (k8s, k3s, etc) with our hardened distroless non root custom image.

Ghost on Kubernetes by SREDevOps.org - Deploy Ghost v5 on Kubernetes (k8s, k3s, etc) with our hardened distroless non root custom image. - sredevopsorg/ghost-on-kubernetes

How to deploy Ghost CMS on KubernetesGitHubsredevopsorg

How to deploy Ghost CMS on Kubernetes

](github.com/sredevopsorg/ghost-on-kubernetes..)

Recent Changes

We've made some significant updates to improve the security and efficiency of our Ghost implementation on Kubernetes:

  1. Multi-arch support: The images are now multi-arch, with support for amd64 and arm64.
  2. Distroless Image: We use @GoogleContainerTools's Distroless NodeJS as the execution environment for the final image. Distroless images are minimal images that contain only the necessary components to run the application, making them more secure and efficient than traditional images.
  3. MySQL StatefulSet: We've changed the MySQL implementation to a StatefulSet. This provides stable network identifiers and persistent storage, which is important for databases like MySQL that need to maintain state.
  4. Init Container: We've added an init container to the Ghost deployment. This container is responsible for setting up the necessary configuration files and directories before the main Ghost container starts, ensuring the right directories are created, correct ownership for user node inside distroless container UID/GID to 65532, and the correct permissions are set. Check deploy/06-ghost-deployment.yaml for details on these changes.
  5. Entrypoint Script: We've introduced a new entrypoint script that runs as the non-privileged user inside the distroless container. This script is responsible for updating the default themes then starts the Ghost application. This script is executed by the nonroot user without privileges within the Distroless container, which updates default themes and starts the Ghost application, operation performed into the distroless container in runtime. entrypoint.js

Features

  • Both Ghost and MySQL components run as non-root user in Kubernetes, which significantly improves security, in addition to our custom image enhancements.
  • Multi-arch support (amd64 and arm64).
  • We use the official Node 20 Iron Bookworm image as our build environment. Dockerfile.
  • We introduce a multi-stage build, which reduces the final image size and improves security by removing unnecessary components from the final image.
  • Distroless Node 20 Debian 12 as our runtime environment for the final image stage.
  • New Entrypoint flow, using a Node.js script executed by the unprivileged Node user inside the Distroless container, which updates the default themes and starts the Ghost application, an operation that is performed inside the Distroless container itself.
  • We use the latest version of Ghost 5 (when the image is built).
  • Removed gosu, now everything runs as non-root (UID/GID 65532) inside the Distroless container. This change alone reduces 6 critical vulnerabilities and 34 high vulnerabilities reported by Docker Scout in the original Ghost image. References:

Installation

0. Clone the repository or fork it

Clone the repository

git clone github.com/sredevopsorg/ghost-on-kubernetes.. --depth 1 --branch main --single-branch --no-tags

Change directory

cd ghost-on-kubernetes

Create a new branch for your changes (optional but recommended).

git checkout -b my-branch --no-track --detach

1. Check the example configurations

  • There are some example configuration files in the examples directory. We use the stored configuration as a kind: Secret in the ghost-on-kubernetes namespace for Ghost and MySQL configuration. There are two example configuration files:
    • config.development.sample.yaml: This configuration file is for the Ghost development environment. It uses SQLite as the database. It can be useful if you want to test the Ghost configuration before implementing it in a production environment.
    • config.production.sample.yaml: This configuration file is for the Ghost production environment. It uses MySQL 8, and is the recommended configuration for production environments. It requires a valid top-level domain (TLD) and configuration for Ingress to access Ghost from the Internet.
  • If you need more information on the configuration, check the official Ghost documentation.

2. Review the default values and make changes as needed

Understanding the Ghost Deployment Architecture on Kubernetes

Deploying a sophisticated application like Ghost on Kubernetes involves orchestrating several components. Let's break down the essential Kubernetes resources we'll use:

Namespaces: Isolating Our Ghost Instance

Namespaces in Kubernetes provide a logical separation of resources. We'll use the ghost-on-kubernetes namespace to contain all resources related to our Ghost deployment. This approach enhances organization and prevents resource conflicts with other applications running on the same cluster.

apiVersion: v1 kind: Namespace metadata: name: ghost-on-kubernetes labels: app: ghost-on-kubernetes

... other labels

Secrets: Securely Storing Sensitive Information

Secrets in Kubernetes allow us to store and manage sensitive data, such as database credentials and TLS certificates, securely. We'll use the following Secrets:

  • ghost-config-prod: Stores the Ghost configuration, including database connection details and mail server settings.
  • ghost-on-kubernetes-mysql-env: Contains environment variables for the MySQL database, including the database name, username, and password.
  • tls-secret: Holds the TLS certificate and key for enabling HTTPS on our Ghost blog.

    apiVersion: v1 kind: Secret metadata: name: ghost-config-prod namespace: ghost-on-kubernetes

    ... other metadata

    type: Opaque stringData: config.production.json: |- {

    ... Ghost configuration

    }

PersistentVolumeClaims: Persistent Storage for Our Blog

PersistentVolumeClaims (PVCs) in Kubernetes enable us to request persistent storage volumes. We'll use two PVCs:

  • k8s-ghost-content: Provides persistent storage for Ghost's content, including images, themes, and uploaded files.
  • ghost-on-kubernetes-mysql-pvc: Offers persistent storage for the MySQL database, ensuring data persistence across pod restarts and reschedulings.

    apiVersion: v1 kind: PersistentVolumeClaim metadata: name: k8s-ghost-content namespace: ghost-on-kubernetes

    ... other metadata

    spec:

    ... PVC specification

Services: Exposing Ghost and MySQL Within the Cluster

Services in Kubernetes provide a way to expose our applications running on a set of pods as a network service. We'll define two services:

  • ghost-on-kubernetes-service: Exposes the Ghost application internally within the cluster on port 2368.
  • ghost-on-kubernetes-mysql-service: Exposes the MySQL database internally on port 3306, allowing the Ghost application to connect to the database.

    apiVersion: v1 kind: Service metadata: name: ghost-on-kubernetes-service namespace: ghost-on-kubernetes

    ... other metadata

    spec:

    ... Service specification

StatefulSet: Managing the MySQL Database

A StatefulSet in Kubernetes is designed to manage stateful applications, such as databases, that require persistent storage and stable network identities. We'll use a StatefulSet to deploy a single replica of the MySQL database.

apiVersion: apps/v1 kind: StatefulSet metadata: name: ghost-on-kubernetes-mysql namespace: ghost-on-kubernetes

... other metadata

spec:

... StatefulSet specification

Deployment: Managing the Ghost Application

Deployments in Kubernetes manage the deployment and scaling of stateless applications. We'll use a Deployment to deploy a single replica of the Ghost application.

apiVersion: apps/v1 kind: Deployment metadata: name: ghost-on-kubernetes namespace: ghost-on-kubernetes

... other metadata

spec:

... Deployment specification

Ingress: Exposing Ghost to the Outside World

An Ingress resource in Kubernetes acts as a reverse proxy, routing external traffic to services within the cluster. We'll use an Ingress to expose our Ghost blog to the internet using a domain name.

apiVersion: networking.k8s.io/v1 kind: Ingress metadata: name: ghost-on-kubernetes-ingress namespace: ghost-on-kubernetes

... other metadata

spec:

... Ingress specification

Bringing It All Together: Deploying Ghost on Kubernetes

With our Kubernetes resources defined, we can now deploy Ghost on our cluster. Follow these general steps:

  1. Create the Namespace:

    kubectl apply -f deploy/00-namespace.yaml

  1. Create the Secrets:

    kubectl apply -f deploy/01-mysql-config.yaml kubectl apply -f deploy/04-ghost-config.yaml kubectl apply -f deploy/01-tls.yaml

  1. Create the PersistentVolumeClaims:

    kubectl apply -f deploy/02-pvc.yaml

  1. Create the Services:

    kubectl apply -f deploy/03-service.yaml

  1. Deploy the MySQL Database:

    kubectl apply -f deploy/05-mysql.yaml

  1. Deploy the Ghost Application:

    kubectl apply -f deploy/06-ghost-deployment.yaml

  1. Expose Ghost with Ingress (Optional):

    kubectl apply -f deploy/07-ingress.yaml

Your Ghost Blog Is Live!

Congratulations! You've successfully deployed Ghost on a Kubernetes cluster. This setup provides a robust and scalable foundation for your blogging platform. Remember to customize the configurations, such as storage class, resource limits, and domain name, to suit your specific requirements.

Contributing

We welcome contributions from the community! Please check the CONTRIBUTING.md file for more information on how to contribute to this project.

License and Credits

  • This project is licensed under the GNU General Public License v3.0. Please check the LICENSE file for more information.
  • The Ghost CMS is licensed under the MIT License.
  • The node image and the Distroless image are licensed by their respective owners.