Community for SRE, DevOps, Cloud Native, GNU/Linux, and more. 🌎
This repository implements Ghost CMS v5.xx.x from @TryGhost (upstream) on Kubernetes, with our custom image, which has significant improvements to be used on Kubernetes (Dockerfile). See this whole README for more information.
-
Both Ghost and MySQL components run as non-root user in Kubernetes, which significantly improves security, in addition to our custom image enhancements.
-
Multi-arch support (amd64 and arm64).
-
We use the official Node 20 Iron Bookworm image as our build environment. Dockerfile.
-
We introduce a multi-stage build, which reduces the final image size and improves security by removing unnecessary components from the final image.
-
Distroless Node 20 Debian 12 as our runtime environment for the final image stage.
-
Removed gosu, now everything runs as non-root (UID/GID 65532) inside the Distroless container. This change alone reduces 6 critical vulnerabilities and 34 high vulnerabilities reported by Docker Scout in the original Ghost image. References:
-
New Entrypoint flow, using a Node.js script executed by the unprivileged Node user inside the Distroless container, which updates the default themes and starts the Ghost application, an operation that is performed inside the Distroless container itself.
-
We use the latest version of Ghost 5 (when the image is built).
We've made some significant updates to improve the security and efficiency of our Ghost implementation on Kubernetes:
- Multi-arch support: The images are now multi-arch, with support for amd64 and arm64.
- Distroless Image: We use @GoogleContainerTools's Distroless NodeJS as the execution environment for the final image. Distroless images are minimal images that contain only the necessary components to run the application, making them more secure and efficient than traditional images.
- MySQL StatefulSet: We've changed the MySQL implementation to a StatefulSet. This provides stable network identifiers and persistent storage, which is important for databases like MySQL that need to maintain state.
- Init Container: We've added an init container to the Ghost deployment. This container is responsible for setting up the necessary configuration files and directories before the main Ghost container starts, ensuring the right directories are created, correct ownership for user node inside distroless container UID/GID to 65532, and the correct permissions are set. Check deploy/06-ghost-deployment.yaml for details on these changes.
- Entrypoint Script: We've introduced a new entrypoint script that runs as the non-privileged user inside the distroless container. This script is responsible for updating the default themes then starts the Ghost application. This script is executed by the nonroot user without privileges within the Distroless container, which updates default themes and starts the Ghost application, operation performed into the distroless container in runtime. entrypoint.js
# Clone the repository
git clone https://github.com/sredevopsorg/ghost-on-kubernetes.git --depth 1 --branch main --single-branch --no-tags
# Change directory
cd ghost-on-kubernetes
# Create a new branch for your changes (optional but recommended).
git checkout -b my-branch --no-track --detach
- There are some example configuration files in the examples directory. We use the stored configuration as a
kind: Secret
in theghost-on-kubernetes
namespace for Ghost and MySQL configuration. There are two example configuration files:config.development.sample.yaml
: This configuration file is for the Ghost development environment. It uses SQLite as the database. It can be useful if you want to test the Ghost configuration before implementing it in a production environment.config.production.sample.yaml
: This configuration file is for the Ghost production environment. It uses MySQL 8, and is the recommended configuration for production environments. It requires a valid top-level domain (TLD) and configuration for Ingress to access Ghost from the Internet.
- If you need more information on the configuration, check the official Ghost documentation.
Deploying a sophisticated application like Ghost on Kubernetes involves orchestrating several components. Let's break down the essential Kubernetes resources we'll use:
Namespaces in Kubernetes provide a logical separation of resources. We'll use the ghost-on-kubernetes
namespace to contain all resources related to our Ghost deployment. This approach enhances organization and prevents resource conflicts with other applications running on the same cluster.
File: deploy/00-namespace.yaml
apiVersion: v1
kind: Namespace
metadata:
name: ghost-on-kubernetes
labels:
app: ghost-on-kubernetes
# ... other labels
Secrets in Kubernetes allow us to store and manage sensitive data, such as database credentials and TLS certificates, securely. We'll use the following Secrets:
ghost-config-prod
: Stores the Ghost configuration, including database connection details and mail server settings.ghost-on-kubernetes-mysql-env
: Contains environment variables for the MySQL database, including the database name, username, and password.tls-secret
: Holds the TLS certificate and key for enabling HTTPS on our Ghost blog.
File: deploy/01-mysql-config.yaml
File: deploy/04-ghost-config.yaml
File: deploy/01-tls.yaml
apiVersion: v1
kind: Secret
metadata:
name: ghost-config-prod
namespace: ghost-on-kubernetes
# ... other metadata
type: Opaque
stringData:
config.production.json: |-
{
# ... Ghost configuration
}
PersistentVolumeClaims (PVCs) in Kubernetes enable us to request persistent storage volumes. We'll use two PVCs:
k8s-ghost-content
: Provides persistent storage for Ghost's content, including images, themes, and uploaded files.ghost-on-kubernetes-mysql-pvc
: Offers persistent storage for the MySQL database, ensuring data persistence across pod restarts and reschedulings.
File: deploy/02-pvc.yaml
apiVersion: v1
kind: PersistentVolumeClaim
metadata:
name: k8s-ghost-content
namespace: ghost-on-kubernetes
# ... other metadata
spec:
# ... PVC specification
Services in Kubernetes provide a way to expose our applications running on a set of pods as a network service. We'll define two services:
ghost-on-kubernetes-service
: Exposes the Ghost application internally within the cluster on port 2368.ghost-on-kubernetes-mysql-service
: Exposes the MySQL database internally on port 3306, allowing the Ghost application to connect to the database.
File: deploy/03-service.yaml
apiVersion: v1
kind: Service
metadata:
name: ghost-on-kubernetes-service
namespace: ghost-on-kubernetes
# ... other metadata
spec:
# ... Service specification
A StatefulSet in Kubernetes is designed to manage stateful applications, such as databases, that require persistent storage and stable network identities. We'll use a StatefulSet to deploy a single replica of the MySQL database.
File: deploy/05-mysql.yaml
apiVersion: apps/v1
kind: StatefulSet
metadata:
name: ghost-on-kubernetes-mysql
namespace: ghost-on-kubernetes
# ... other metadata
spec:
# ... StatefulSet specification
Deployments in Kubernetes manage the deployment and scaling of stateless applications. We'll use a Deployment to deploy a single replica of the Ghost application.
File: deploy/06-ghost-deployment.yaml
apiVersion: apps/v1
kind: Deployment
metadata:
name: ghost-on-kubernetes
namespace: ghost-on-kubernetes
# ... other metadata
spec:
# ... Deployment specification
An Ingress resource in Kubernetes acts as a reverse proxy, routing external traffic to services within the cluster. We'll use an Ingress to expose our Ghost blog to the internet using a domain name.
File: deploy/07-ingress.yaml
apiVersion: networking.k8s.io/v1
kind: Ingress
metadata:
name: ghost-on-kubernetes-ingress
namespace: ghost-on-kubernetes
# ... other metadata
spec:
# ... Ingress specification
With our Kubernetes resources defined, we can now deploy Ghost on our cluster. Follow these general steps:
-
Create the Namespace:
kubectl apply -f deploy/00-namespace.yaml
-
Create the Secrets:
kubectl apply -f deploy/01-mysql-config.yaml kubectl apply -f deploy/04-ghost-config.yaml kubectl apply -f deploy/01-tls.yaml
-
Create the PersistentVolumeClaims:
kubectl apply -f deploy/02-pvc.yaml
-
Create the Services:
kubectl apply -f deploy/03-service.yaml
-
Deploy the MySQL Database:
kubectl apply -f deploy/05-mysql.yaml
-
Deploy the Ghost Application:
kubectl apply -f deploy/06-ghost-deployment.yaml
-
Expose Ghost with Ingress (Optional):
kubectl apply -f deploy/07-ingress.yaml
Congratulations! You've successfully deployed Ghost on a Kubernetes cluster. This setup provides a robust and scalable foundation for your blogging platform. Remember to customize the configurations, such as storage class, resource limits, and domain name, to suit your specific requirements.
We welcome contributions from the community! Please check the CONTRIBUTING.md file for more information on how to contribute to this project.
- This project is licensed under the MIT License. Please check the LICENSE file for more information.
- The Ghost CMS is licensed under the MIT License.
- The node image and the Distroless image are licensed by their respective owners.