The Making of This Site (Hugo, Caddy, + GCP)
February 20, 2020
Categories: Tags:Alternate title: Just use Netlify.
TL;DR: Deploy a Hugo site to GCP for free in less time than it will take you to read this article (Github Repo with all referenced commands)
EDIT: In October 2020 I updated the hosting of this site to use GCS + Cloudflare](https://devopsdirective.com/posts/2020/10/gcs-cloudflare-hosting/).
Table of Contents:
- Choosing a Site Generator
- Initial Setup
- Choosing a Hosting Solution
- Local Configuration (HTTP-only for Now)
- Deploying to GCP
- Closing Thoughts
Choosing a Site Generator
With GeoCities no longer a viable option for hosting websites in 2020 (apparently Yahoo Japan shut down the final remnants in March 2019) I needed a more modern solution to host this site.
After a brief look at the leading static site generators Jekyll, Hugo, Next.js, Gatsby, etc… I came to the conclusion that almost any of these would work just fine for my needs. I ended up choosing Hugo for two main reasons:
1) Language: It’s written in Go, a language I have wanted to learn. Having this site with Hugo may provide a nudge of motivation to make some contribution to the Hugo project.
2) Speed: Site build times are near instant for this (tiny) site, but that would be true for any generator with so few pages. However, people have performed a number of benchmarks showing Hugo’s performance as a site grows.
Initial Setup
The Hugo documentation is concise and they have an easy-to-follow quick start guide found here: https://gohugo.io/getting-started/quick-start/
I’m currently (as of February 2020) still using the suggested Ananke theme with a few minor styling tweaks, but eventually will probably spend some more time customizing the theme.
Choosing a Hosting Solution
With the site generator working, I then needed to decide how to host the site. In the past, I have used Github Pages to host static sites, but I noticed that they explicitly prohibit “Get-rich-quick schemes” (which learning & writing about DevOps and Cloud infrastructure is) so that was out of the running.
I also looked at hosting within an AWS / GCP](https://cloud.google.com/storage) / Azure bucket. These are all super easy to set up and scale effortlessly, but if you want to use a domain with HTTPS enabled, you end up having to jump through some hoops configuring a Content Delivery Network.
I then came across Caddy, a web server with automatic HTTPS configuring using Let’s Encrypt which seemed ideal for this use case!
NOTE: If you are following along and setting up your own site, for most people, the best option at this point would be to stop here and go to https://www.netlify.com/. They have a generous free tier plan and offer direct integration with github/gitlab/bitbucket to handle automatic build/deploys triggered by Git commits. I achieved a similar end result with GCP Compute Engine + Cloud Build (a topic for another post) that provides me a bit more control/extensibility, but Netlify covers most use cases with a fantastic user experience!
Local Configuration (HTTP-only for Now)
Since my computer is running macOS, but ultimately the site would be deployed on a server running some variant of Linux, my default is to use containers to eliminate any configuration headaches with slight differences between the two environments.
This appears to be the defacto standard Caddy docker image https://hub.docker.com/r/abiosoft/caddy with over 10M pulls so I used that as the base.
There are two options for accessing the files that Caddy needs to host within the container. (1) Copy them into the container image OR (2) mount a location the host filesystem into the container with -v
or --mount
docker flags when running the container.
Either option would be fine, but option 1 is nice for a small site because it ensures the entire site and its dependencies are included within the container image. As the site grows, I may switch to storing the site files outside of the container image.
Bundling the site files into the container can be accomplished with a 2 line Dockerfile.
FROM abiosoft/caddy:1.0.3
COPY ./public /srv
Here ./public
is the local directory where Hugo builds the site, and /srv
is the directory within the container Caddy expects to find the files it is serving. The following 4 commands will build the site, build the container, and run the container:
export IMAGE_NAME=my-hugo-caddy-docker-image
hugo -D # -D flag tells Hugo to build drafts
docker build ./ --tag $IMAGE_NAME
docker run -p 2015:2015 $IMAGE_NAME
The -p
forwards the port from the host system into the container allowing us to connect to http://localhost:2015/ and that request will be forwarded into the container on port 2015 where Caddy is listening.
Deploying to GCP
With the container image working, I was then ready to deploy it somewhere. There are a variety of options to do this, but I chose to use a GCP Compute Engine f1-micro
virtual machine instance running Google’s Container-Optimized OS. Container-Optimized OS provides nice security features configured by default making it a good OS option for containerized applications. While the f1-micro
instance is small (0.2 vCPUs + 600MB Memory), running one is included in the GCP’s always free usage limits making this deployment cost me a grand total of $0!
Since this site is about DevOps, I clearly needed to automate the entire setup process, which I did here: https://github.com/sidpalas/hugo-gcp-deploy.
I also decided to create a new GCP project for this site. Doing this makes it easy to clean things up should I decide to take the site down by simply deleting the entire project without having to worry about accidentally leaving some resources running.
If you are more comfortable working with the GCP web interface, that is perfectly fine, but the following process should do the trick
NOTE: for any of the following commands $PROJECT_ID
would need to be replaced with your GCP project id. I also like to explicitly pass the project ID into the commands to ensure they are executed in the correct location (Just in case I happened to have changed my default project configuration).
export PROJECT_ID=my-awesome-project-1234
1) Enable Billing for the Project
Even though the resources used here are included in the free tier, Google requires having a payment method on file. This is the one step I recommend doing via the console as the command line command is still in alpha:
https://console.cloud.google.com/billing/linkedaccount?project=$PROJECT_ID
2) Enable the Compute Engine and Container Registry APIs
This is necessary to provision the VM and to be able to push container images.
gcloud services enable compute.googleapis.com --project=$PROJECT_ID
gcloud services enable containerregistry.googleapis.com --project=$PROJECT_ID
3) Reserve a static IP address
If the VM needs to restart (or if I wanted to move to a larger machine type), a static IP ensures it won’t change unexpectedly and mess up DNS configuration.
gcloud compute addresses create my-site-external-ip \
--project=$PROJECT_ID \
--region=us-central1
4) Add firewall rules
By default, Compute Engine VMs do not allow HTTP or HTTPS traffic. Adding firewall rules allow those requests to make it to the web server.
gcloud compute firewall-rules create default-allow-http \
--project=$PROJECT_ID \
--target-tags=http-server \
--allow tcp:80
gcloud compute firewall-rules create default-allow-https \
--project=$PROJECT_ID \
--target-tags=https-server \
--allow tcp:443
The target-tags allow the VM configuration to utilize these rules.
5) Create the Virtual Machine (Finally!)
When creating the VM, the static IP and firewall rule tags are used to configure it:
gcloud compute instances create my-f1-micro-instance \
--project=$PROJECT_ID \
--zone=us-central1-a \
--machine-type=f1-micro \
--image=projects/cos-cloud/global/images/cos-69-10895-385-0 \
--address=my-site-external-ip \
--tags=http-server,https-server
This takes a few minutes to provision.
6) Configure Docker(s)
In order to configure my local Docker install to push images to Google Container Registry I had to run:
gcloud auth configure-docker
To set up Docker and the GCR credentials within in container optimized OS running on the VM I had to run the following:
gcloud compute ssh my-f1-micro-instance \
--project=$PROJECT_ID \
--zone=us-central1-a -- \
docker-credential-gcr configure-docker
7) Deploy
Before deploying the site, I had to add a Caddyfile to the container image to configure the server. The default configuration will serve the site on port 2015 which is inaccessible on our VM (because my firewall rules only allow traffic on ports 80 and 443). The following will tell Caddy to serve on port 80 and accept requests from any domain (documentation):
# This test configuration will be replaced later when setting up HTTPS
:80 {
browse
log stdout
errors stdout
}
I also updated the Dockerfile to copy this Caddyfile into the container image:
FROM abiosoft/caddy:1.0.3
COPY ./public /srv
# This environment variable gets used later during the container start up
# to accept the Let's Encrypt subscriber agreement (without requiring user input)
ENV ACME_AGREE=true
COPY ./Caddyfile /etc/Caddyfile
With the configuration ready, I needed to get the container image into the google container registry by building, tagging, and then pushing it:
export IMAGE_NAME=my-hugo-caddy-docker-image
export IMAGE_TAG=incrementing-tag-001 # change this with each deploy to ensure latest image is used
docker build ./ --tag $IMAGE_NAME
docker tag $IMAGE_NAME gcr.io/$PROJECT_ID/$IMAGE_NAME:$IMAGE_TAG
docker push gcr.io/$PROJECT_ID/$IMAGE_NAME:$IMAGE_TAG
If the site is already running, it needs to be cleaned up before the new container can be deployed or else it would fail when trying to bind to the same host ports. This can be accomplished using:
gcloud compute ssh my-f1-micro-instance \
--project=$PROJECT_ID \
--zone=us-central1-a -- \
'docker container stop $(docker container ls -aq) && docker container rm $(docker container ls -aq)'
Having to do this step is one downside to bundling the entire site into the container image, the site has to be down for a second or two while the new version starts up. If the site was mounted into the container, the server could keep running and the files could be copied onto the host filesystem with no downtime.
Finally, we can issue a docker run
to run the new container image:
gcloud compute ssh my-f1-micro-instance \
--project=$PROJECT_ID \
--zone=us-central1-a -- \
'docker run -d --restart=unless-stopped -p 80:80 -p 443:443 -v $HOME/.caddy:/root/.caddy gcr.io/$PROJECT_ID/$IMAGE_NAME:$IMAGE_TAG'
NOTE: the -v $HOME/.caddy:/root/.caddy
mount isn’t necessary here, but later once we request the TLS certificate, this will allow the certificate files to persist across container redeploys, avoiding extra requests to Let’s Encrypt which could lead to being rate limited.
8) We’re Live!
At this point, I was able to visit the external IP address from step 3 and see the website.
I even scripted the whole process so that it takes less than 5 minutes:
9) Configuring DNS
The final element of the setup is to point a domain to the IP address which I accomplished with the following settings:
Name Type TTL Data
@ A 1h 123.456.78.90
www CNAME 1h my-awesome-domain.com.
(The CNAME record maps the www subdomain to the primary domain without www)
10) Enabling HTTPS
The final element of the setup is to enable HTTPS within Caddy. This can be accomplished by modifying the Caddyfile
to include the domains and an email address for the TLS configuration:
my-awesome-domain.com www.my-awesome-domain.com {
tls [email protected]
browse
log stdout
errors stdout
}
After redeploying and waiting for the DNS settings to propagate I was able to access my site and bask in the glory of the HTTPS connection symbol!
Closing Thoughts
Overall I’m happy with this configuration and am amazed that all of this can be accomplished for free using mostly open-source software! It was also useful to continue gaining experience with the tools and platforms.
My hope is now that everything is set up and configured, the amount of maintenance effort required should be low. Time will tell…
In a future post, I will cover how I used Google Cloud Build to automate the deployment process. I also plan to do some benchmarking to see just what kind of load this tiny server can handle!