Once you have Kubernetes running on IPv6 only the next step is to install some apps.
This is my first post written on my new WordPress instance, hosted on Kubernetes IPv6 only. If you are reading it, then it is working
Of course apps have their own issues not being configured by default to work with IPv6, so for each app you need to test and work out what configuration details need to be tweaked (assuming the app supports IPv6 in the first place).
To start off with, I installed Kubeapps, to get an application management dashboard, and then used that to install WordPress.
With WordPress installed, I exported the content from my old blog and then imported it into the new instance, and tweaked a few WordPress settings.
The final step was to configure the Mythic Beasts reverse proxy, to make my blog available for legacy IPv4 users.
Installing Kubeapps
If you follow the quick start instructions, or the Getting Started walk through, then, of course, it doesn't work for IPv6, although it is a good place to start. https://github.com/kubeapps/kubeapps#quick-start
You have to click through to the detailed instructions and check the values.yaml
file to see that one of the first configuration settings is enableIPv6
with a default value of false
You can just pass that on the command line, --set enableIPv6=true
, but there were a few other settings I wanted to tweak, so I created a configuration override file and used that to install Kubeapps.
The instructions below use existing services Helm, Nginx Ingress, and cert-manager, already installed in the cluster.
Using HTTPS is best practice, so the first step was to set up a host name in DNS, pointing to my ingress service. With IPv6 I could point directly to the service, if I configure firewalls correctly, but I would need to know the IPv6 address first.
1 2 | apps.example.com CNAME ingress.k1.gryphontechnology.biz. ingress.k1.gryphontechnology.biz AAAA 2a00:1098:80:a1:8:3:0:d3ef |
Using an already deployed ingress service, I already knew the IPv6 address to use, and the ingress service can co-ordinate with the certificate manager to issue a free Let's Encrypt certificate.
As well as configuring IPv6 and HTTPS ingress, I also reduced the minimum CPU requirements as I have a small server that only has limited use and want to also deploy other apps. You can check resource allocation with kubectl describe node
.
Once DNS is set up, e.g. kubeapps.k1.example.com, add the repo, create a config, and use Helm to install Kubeapps:
1 2 3 4 5 6 7 8 9 10 11 12 13 14 15 16 17 18 19 | helm repo add bitnami https: //charts .bitnami.com /bitnami kubectl create namespace kubeapps cat <<EOF | tee kubeapps-config.yaml enableIPv6: true ingress: enabled: true certManager: true hostname: apps.example.com tls: true annotations: cert-manager.io/cluster-issuer: letsencrypt-production postgresql: resources: requests: cpu: 100m EOF helm install kubeapps --namespace kubeapps -f kubeapps-config.yaml bitnami /kubeapps |
Once deployed you can check that the Kubeapps components are running, and that cert-manager has created the needed certificate.
You can then access https://apps.example.com
To log in, you can generate a token:
1 2 3 | kubectl create serviceaccount kubeapps-operator kubectl create clusterrolebinding kubeapps-operator --clusterrole=cluster-admin --serviceaccount=default:kubeapps-operator kubectl describe secret `kubectl get secret | grep kubeapps-operator | awk '{print $1}' ` |
Installing WordPress
With Kubeapps up and running, the Kubeapps console can be used to install WordPress, although, again, IPv6 does not work by default.
The issue was not with WordPress itself, but with the default configuration of the included MariaDB (MySQL), which was configured to only listen on IPv4. This means the components would install and each work independently, but not talk to each other.
Similar to the above, the first step is to set up DNS, using a CNAME to the same ingress:
1 2 | sgryphon.gamertheory.net CNAME ingress.k1.gryphontechnology.biz. ingress.k1.gryphontechnology.biz AAAA 2a00:1098:80:a1:8:3:0:d3ef |
There are a lot of configuration options for WordPress, including the blog name, admin email, password, etc, and some need to be set in the advanced YAML view.
NOTE: Make sure to also give the deployment a meaningful name, which needs to be set in the main form, not the YAML.
1 2 3 4 5 6 | wordpressUsername: xxxxxxxx wordpressPassword: yyyyyyyy wordpressEmail: sly@gamertheory.net wordpressFirstName: Sly wordpressLastName: Gryphon wordpressBlogName: Software / Wetware |
Similar to the above, best practice is to enable ingress with HTTPS and use cert-manager to automatically provision certificates.
1 2 3 4 5 6 7 8 9 | ingress: enabled: true certManager: true hostname: sgryphon.gamertheory.net annotations: { cert-manager.io/cluster-issuer : letsencrypt-production } tls: true |
As well as setting up ingress for HTTPS, I also configured the default scheme to HTTPS, and then also configured the liveness and readiness probes accordingly, so the check to port 8080 has a header indicating the protocol is HTTPS (otherwise the check will be rejected).
1 2 3 4 5 6 7 8 9 10 | wordpressScheme: https . . . livenessProbe: httpGet: httpHeaders: [ { name : X-Forwarded-Proto , value : https } ] readinessProbe: httpGet: httpHeaders: [ { name : X-Forwarded-Proto , value : https } ] |
Configure MariaDB (MySQL) to list on IPv6
The important part for IPv6 was to ensure MySQL was listening on all addresses, not just IPv4.
To do this you have set the mariadb > primary > configuration
property in the deployment settings to have the default configuration settings (for bitnami) except change bind-address
to be ::
(or *
). You need to specify the whole file, even though only one line is changed from what we be generated.
1 2 3 4 5 6 7 8 9 10 11 12 13 14 15 16 17 18 19 20 21 22 23 24 25 26 27 28 29 | mariadb: primary: ## Configure MariaDB Primary with a custom my.cnf file ## configuration: |- [ mysqld ] skip-name-resolve explicit_defaults_for_timestamp basedir=/opt/bitnami/mariadb plugin_dir=/opt/bitnami/mariadb/plugin port=3306 socket=/opt/bitnami/mariadb/tmp/mysql.sock tmpdir=/opt/bitnami/mariadb/tmp max_allowed_packet=16M bind-address= : : pid-file=/opt/bitnami/mariadb/tmp/mysqld.pid log-error=/opt/bitnami/mariadb/logs/mysqld.log character-set-server=UTF8 collation-server=utf8_general_ci [ client ] port=3306 socket=/opt/bitnami/mariadb/tmp/mysql.sock default-character-set=UTF8 plugin_dir=/opt/bitnami/mariadb/plugin [ manager ] port=3306 socket=/opt/bitnami/mariadb/tmp/mysql.sock pid-file=/opt/bitnami/mariadb/tmp/mysqld.pid |
As well as the WordPress, ingress, and MariaDB IPv6 settings, I also reduced the CPU minimum resource requirements:
1 2 3 | resources: requests: cpu: 100m |
I also added a storageClass
to both the WordPress and MariaDB persistence
sections, that I used to connect the persistent volume storage. In my case I was using some local volumes (see below), but this will vary depending on your deployed solution.
1 2 3 4 5 6 7 8 9 | persistence: storageClass: local-storage . . . mariadb: primary: persistence: storageClass: local-storage |
WordPress Storage
There are many storage options for Kubernetes. To start off with I used a basic local storage configuration.
Once WordPress was deployed (above), the database and web pods will be in a paused state waiting for storage to be available, with the status "pod has unbound immediate PersistentVolumeClaims".
I did not have automatic storage provisioning set up, so needed to manually add storage.
You can check the pod status (kubectl get pods --all-namespaces
), specific pods (kubectl describe pod <pod-name>
), and the two waiting storage claims (kubectl get PersistentVolumeClaim
).
I used simple local storage, so first I created some folders:
1 2 3 | mkdir /var/opt/k8s-data mkdir /var/opt/k8s-data/wordpress-sgryphon-mariadb-pv mkdir /var/opt/k8s-data/wordpress-sgryphon-pv |
I then created a PersistentVolume matching the local-storage claim for MariaDB, which detected the change and completed the deployment. You need to configure the nodeAffinity
with the hostname where you have the local storage.
1 2 3 4 5 6 7 8 9 10 11 12 13 14 15 16 17 18 19 20 21 22 23 24 25 | cat <<EOF | tee wordpress-sgryphon-mariadb-pv.yaml apiVersion: v1 kind: PersistentVolume metadata: name: wordpress-sgryphon-mariadb-pv spec: capacity: storage: 8Gi accessModes: - ReadWriteOnce persistentVolumeReclaimPolicy: Retain storageClassName: local-storage local: path: /var/opt/k8s-data/wordpress-sgryphon-mariadb-pv nodeAffinity: required: nodeSelectorTerms: - matchExpressions: - key: kubernetes.io/hostname operator: In values: - kube001.example.com EOF kubectl apply -f wordpress-sgryphon-mariadb-pv.yaml |
To confirm MySQL is accessible, I used netcat to check the service port was open (this was part of the debugging to work out that it wasn't listening on IPv6).
1 | nc -z - v 2001:db8:1234:5678:8:3:0:3456 3306 |
Once the database is up and running, you can do similar for the front end storage:
1 2 3 4 5 6 7 8 9 10 11 12 13 14 15 16 17 18 19 20 21 22 23 24 25 | cat <<EOF | tee wordpress-sgryphon-pv.yaml apiVersion: v1 kind: PersistentVolume metadata: name: wordpress-sgryphon-pv spec: capacity: storage: 10Gi accessModes: - ReadWriteOnce persistentVolumeReclaimPolicy: Retain storageClassName: local-storage local: path: /var/opt/k8s-data/wordpress-sgryphon-pv nodeAffinity: required: nodeSelectorTerms: - matchExpressions: - key: kubernetes.io/hostname operator: In values: - kube001.example.com EOF kubectl apply -f wordpress-sgryphon-pv.yaml |
Once both storage volumes are assigned and both pods are running you should be able to access WordPress admin on the configured URL via HTTPS, https://sgryphon.gamertheory.net/wp-admin/
.
Migrating WordPress
Once WordPress was up and running, it was not too difficult to export from my old instance, and import to the new instance, via the WordPress management dashboard.
I also reconfigured my theme and customisations, and a few other plug ins, including:
- ActivityPub – Support for the ActivityPub federation protocol, allowing others to follow (subscribe to) your blog.
- Webmention – Support for the modern W3C standard for Pingbacks and Trackbacks.
- Semantic-Linkbacks – Advanced formatting of webmentions, pingbacks, trackbacks, etc.
- SyntaxHighlighter Evolved – For formatting code blocks.
IPv4 reverse proxy
Mythic Beasts provides an IPv4 reverse proxy, that will allow IPv4 only users to access my IPv6 only site.
In the hosting control panel I am able to register the third party domains I own (with several authentication methods available), and then configure services with the host name and the endpoint address (of my ingress service).
Then in my DNS I configure IPv4 A records from my blog host name to the Mythic Beasts reverse proxy address.
1 2 | ingress.k1.gryphontechnology.biz A 93.93.129.174 ingress.k1.gryphontechnology.biz A 46.235.225.189 |
Once configured, I can test with an IPv4 only client (turn off IPv6) and make sure that it can display my blog (with the translation from IPv4 to IPv6 being done by the Mythic Beasts reverse proxy).
If you have an IPv4 address available you could do similar using either an external reverse proxy, or by assigning the address to your ingress service.
You are currently accessing this page from IP address 2a00:1098:0:80:1000:3b:1:1. If it is an IPv6 address, then it shows the IPv6 only deployment is working; if it is an IPv4 address, then it shows the reverse proxy is working. You can also test your IPv6 support at https://test-ipv6.com/.
Mentions