Knowledgebase

Bring WordPress to the Edge with Rcs and GeoDNS Print

  • 0

Introduction

WordPress is a user-friendly Content Management System (CMS) that allows you to create high-performance web applications that serve global audiences. Usually, WordPress site users come from different regions attracting performance bottlenecks in some locations.

GeoDNS (Geographical domain name system) is a traffic distribution method that returns specific DNS records depending on a client’s location. By integrating WordPress with GeoDNS, different servers deliver your WordPress site to different audiences depending on the user's location.

This article explains how you can bring WordPress to the edge with Rcs and GeoDNS by leveraging multiple server locations offered by Rcs. You are to deploy your WordPress site to multiple locations and serve users with the same copy of your site with different resource accessibility speeds.

Prerequisites

Before you begin:

  • Migrate your domain name servers to a GeoDNS-compatible provider such as CloudDNSor Cloudflare

  • Deploy the main WordPress server using the Rcs Marketplace application

    If you have an existing WordPress server, mark it as the main server to synchronize other servers participating in your GeoDNS network. This article uses the main server address 192.0.2.1, replace it with your actual WordPress server IP address.

  • Deploy child Ubuntu servers in different locations

    This article uses 9 Ubuntu servers in the following Rcs locations:

    • New Jersey - 192.0.2.100
    • Sao Paulo (Brazil) - 192.0.2.101
    • New Delhi (India) - 192.0.2.102
    • Tel Aviv (Israel) - 192.0.2.103
    • Paris (France / Central Europe) - 192.0.2.104
    • London (UK / Europe North) - 192.0.2.105
    • Melbourne - 192.0.2.106
    • Tokyo (Japan) - 192.0.2.107
    • Johannesburg (South Africa) - 192.0.2.108

    Replace the example IP address class 192.0.2.0 with your actual public Server IP Addresses

  • Using SSH, access each of the servers in separate terminal sessions

    On each child server:

Set Up the Main WordPress Server

The main WordPress server works as the major point of connection for all site visitors. To enable all child servers to work in the WordPress GeoDNS cluster, perform the following actions on the main WordPress server.

  • Synchronize real-time MySQL database changes to all WordPress servers
  • Synchronize WordPress files to all servers
  • Configure Firewall rules to allow access to the MySQL port 3306
  • Transfer WordPress SSL certificates to all WordPress servers

Enable MySQL Database Replication

  1. Navigate to your WordPress web root files directory

     $ cd /var/www/example.com
  2. View the wp-config.php file and note the WordPress database name

     $ cat wp-config.php

    Output:

     /** The name of the database for WordPress */
     define( 'DB_NAME', 'wordpressdb' );
  3. Navigate to the MySQL configuration files directory

     $ cd /etc/mysql/
  4. Using a text editor such as Nano, edit the main configuration file

     $ nano my.cnf
  5. Add the following configurations to the [mysqld] section

     [mysqld]
    
     server-id = 1
     log_bin = /var/log/mysql/mysql-bin.log
     binlog-do-db = wordpressdb
     expire_logs_days = 5

    Save and close the file.

    The above configuration sets the MySQL database server replication ID to 1, keeps log files in the /var/log/mysql directory, sets the wordpressdb database as the replication database, and enables the deletion of binary log files after every 5 days.

  6. Navigate to the mysql.conf.d or mariadb.conf.d directory

     $ cd mariadb.conf.d
  7. Edit the 50-server.cnf file

     $ sudo 50-server.cnf
  8. Find the following section:

     # Instead of skip-networking the default is now to listen only on
     # localhost which is more compatible and is not less secure.
     bind-address            = 127.0.0.1
  9. Change the bind-address value from 127.0.0.1 to 0.0.0.0 to enable connections from all server interfaces

     bind-address            = 0.0.0.0

    Save and close the file.

    The above address declaration allows child servers to access the main MySQL database server using the public IP Address.

  10. Create the MySQL log files directory

     $ sudo mkdir -p /var/log/mysql/
  11. Grant the mysql user full privileges to the directory

     $ sudo chown -R mysql:mysql /var/log/mysql
  12. Restart the MySQL database server

     $ systemctl restart mysqld
  13. Backup the MySQL WordPress database

     $ sudo mysqldump wordpressdb > wpdb.sql
  14. Move the .sql database file to the WordPress webroot directory

     $ sudo mv wpdb.sql /var/www/example.com/
  15. Log in to the MySQL console

     $ sudo mysql
  16. Create a new WordPress replication user. For example wpreplica with a strong password

     > CREATE USER 'wpreplica'@'%' IDENTIFIED BY 'strong-password';
  17. Switch to the WordPress database

     > use wordpressdb;
  18. Grant the user replication privileges on the database

     > GRANT REPLICATION SLAVE ON *.* TO 'wpreplica'@'%';
  19. Refresh MySQL privileges

     > FLUSH PRIVILEGES;
  20. View the database server replication status

     > SHOW MASTER STATUS;

    Output:

     +------------------+----------+--------------+------------------+
     | File             | Position | Binlog_Do_DB | Binlog_Ignore_DB |
     +------------------+----------+--------------+------------------+
     | mysql-bin.000002 |      655 | wordpressdb  |                  |
     +------------------+----------+--------------+------------------+
     1 row in set (0.000 sec)

Keep note of the File and Position to correctly set MySQL database replication on the child servers

Enable WordPress File Synchronization

To synchronize WordPress files from the main server to the child servers, create a secure SSH connection to each of the servers using SSH keys. When enabled, use a file transfer protocol such as Rsync to transfer directory changes every 20 seconds to the destination WordPress web root directory as described below.

  1. Generate a new SSH key

     $ ssh-keygen

    When prompted, press Enter to accept all default options and keep the passphrase field empty to disable password authentication

  2. Register the public SSH key to your child WordPress server

     $ ssh-copy-id 192.0.2.100

    When prompted, accept the remote server fingerprint, then enter the server password to enable your SSH key on the child server. When successful, your output should look like the one below:

    Repeat the above process for each child WordPress server to ensure connectivity from the main server.

  3. Establish an SSH connection to the child WordPress server to test your SSH key

     $ ssh sysadmin@192.0.2.100

    Verify that the SSH connection starts without password authentication.

  4. Create the WordPress webroot directory

     $ sudo mkdir -p /var/www/example.com
  5. Grant the web server full privileges to the directory

     $ sudo chown -R www-data:www-data /var/www/example.com/
  6. Change the non-root user's main group to the web server group www-data. Replace sysadmin with your actual user account

     $ sudo usermod -g www-data sysadmin
  7. Grant the www-data group full privileges to the WordPress webroot directory

     $ sudo chmod -R 775 /var/www/example.com/
  8. Long list the parent directory to view the user and group permissions

     $ ls -l /var/www/

    Output:

     total 8
     drwxrwxr-x 6 www-data www-data 4096 Sep 27 00:45 example.com

    Verify that the group has write, read, and execute privileges on the directory.

  9. Create a new Nginx SSL directory to store SSL certificates

     $ sudo mkdir -p /etc/nginx/ssl
  10. Grant the web server full privileges to the directory

     $ sudo chown -R www-data:www-data /etc/nginx/ssl
  11. Grant the www-data group full privileges to the directory

     $ sudo chmod 775 /etc/nginx/ssl
  12. Close the SSH connection

     $ exit
  13. Using Rsync, transfer files from the main WordPress server to the child WordPress server

     $ rsync -avz /var/www/example.com/ 192.0.2.100:/var/www/example.com/

    When successful, your transfer summary should look like the one below:

     sent 81,149 bytes received 376 bytes 10,870.00 bytes/sec
     total size is 69,002,299 speedup is 846.39
  14. To automate the Rsync process to run every 20 seconds and keep WordPress files updated, create a new bash script in a system-wide directory such as /opt/

     $ sudo nano /opt/wpsync.sh
  15. Add the following contents to the file

     #!/bin/bash
    
     while true; do
         rsync -avz /var/www/example.com/ 192.0.2.100:/var/www/example.com/
         sleep 20 
     done

    Save and close the file.

    The above configuration sets the Rsync command to execute using a while loop every 20 seconds. This updates your WordPress files on the child server each time new file changes are available in the main server directory.

  16. Grant execute privileges on the script

     $ sudo chmod +x /opt/wpsync.sh
  17. Create a new system service to automate the script

     $ sudo nano /etc/systemd/system/wpsync.service
  18. Add the following contents to the file. Replace sysadmin with your actual user account available on the child WordPress server

     [Unit]
     Description=WordPress Files From Main Server to Child Servers
     After=network.target
    
     [Service]
     Type=simple
     ExecStart=/opt/wpsync.sh
     Restart=always
     User=sysadmin
     Group=www-data
    
     [Install]
     WantedBy=multi-user.target

    Save and close the file

    The above configuration runs the Rsync script as a system service and transfers files using the set user and group.

  19. Restart the systemd daemon

     $ sudo systemctl daemon-reload
  20. Enable the service to start at boot time

     $ sudo systemctl enable wpsync.service
  21. Start the service

     $ sudo systemctl start wpsync.service
  22. View the service status and verify that it’s actively running without any error

     $ sudo systemctl status wpsync.service

    Output:

     ● myscript.service - WordPress Files Transfer Service
          Loaded: loaded (/etc/systemd/system/wpsync.service; enabled; preset: enabled)
          Active: active (running) since Tue 2023-09-26 20:34:09 UTC; 4h 30min ago
        Main PID: 54092 (wpsync.sh)
           Tasks: 2 (limit: 1092)
          Memory: 2.2M
             CPU: 3min 55.143s
          CGroup: /system.slice/wpsync.service
                  ├─54092 /bin/bash /opt/WordPress-Sync/sync.sh
                  └─59570 sleep 10
    
     Sep 27 01:04:18 VULTR-SERVER wpsync.sh[59566]: ./
     Sep 27 01:04:20 VULTR-SERVER wpsync.sh[59566]: sent 81,187 bytes  received 376 bytes  14,829.64 bytes/sec
     Sep 27 01:04:20 VULTR-SERVER wpsync.sh[59566]: total size is 69,832,356  speedup is 856.18

You have set up Rsync to synchronize your WordPress webroot files from the main server to the child servers. Repeat the synchronization process for each child server and verify that every server has an Rsync record in the automated script to transfer WordPress files.

Configure Firewall Rules

By default, the Uncomplicated Firewall (UFW) is available on Rcs servers. Configure Firewall rules to allow trusted access to all necessary server ports as described below.

  1. Verify the firewall status

     $ sudo ufw status

    When active, the firewall table should display. When inactive, allow the SSH port 22 and enable the firewall

     $ sudo ufw allow 22/tcp && sudo ufw allow enable
  2. Allow access to the MySQL port 3306 from trusted child WordPress servers

     $ sudo ufw allow from 192.0.2.100 to any port 3306
    
     $ sudo ufw allow from 192.0.2.101 to any port 3306
    
     $ sudo ufw allow from 192.0.2.102 to any port 3306
    
     $ sudo ufw allow from 192.0.2.103 to any port 3306
  3. Allow the HTTP port 80 through the firewall

     $ sudo ufw allow 80/tcp
  4. Allow the HTTPS port 443

     $ sudo ufw allow 443/tcp
  5. Restart the firewall to save changes

     $ sudo ufw reload

Generate and Synchronize WordPress SSL Certificates

WordPress requires a valid SSL certificate to correctly handle HTTPS requests. Generate Let’s Encrypt SSL certificates on the main server and synchronize them for transfer to the child servers to use the same SSL certificate as described below.

  1. Install the Certbot Let’s Encrypt Client Tool

     $ sudo snap install certbot --classic
  2. Generate a new SSL Certificate. Replace example.com with your actual domain name

     $ sudo certbot --nginx -d www.example.com -d example.com --agree-tos

    When prompted, enter your email address to deploy a new SSL certificate to your Nginx configuration file and save it to the /etc/letsencrypt/live/ directory

  3. List files in the /etc/letsencrypt/live/example.com/ directory

     $ sudo ls /etc/letsencrypt/live/example.com/

    Output:

     cert.pem  chain.pem  fullchain.pem  privkey.pem  README

    Verify that the private key and public key .pem files are available in the directory

  4. Allow read permissions on the /etc/letsencrypt/archive directory

     $ sudo chmod 755 -R etc/letsencrypt/archive/

    The /etc/letsencrypt/live directory references the archive directory, to avoid any file transfer errors, the files must be readable

  5. Edit the Rsync synchronization script

     $ sudo nano /opt/wpsync.sh
  6. Add the following directive within the while { loop before the sleep directive

     rsync -av --copy-links /etc/letsencrypt/live/example.com/ 192.0.2.100:/etc/nginx/ssl/

    Save and close the file

    The above configuration checks for changes in the SSL certificate and transfers updated .pem files to the child WordPress server SSL directory

Set Up the Child WordPress Servers

To enable the child WordPress servers to use the synchronized files, prepare the MySQL database, and configure the web server as described in the steps below.

  1. Switch to the WordPress webroot directory

     $ cd /var/www/example.com
  2. Long list files and verify that all WordPress files are available in the web root directory

     $ ls -l

    Output:

     drwxr-xr-x  9 sysadmin www-data    4096 Aug 29 14:14 wp-admin
     -rw-r--r--  1 sysadmin www-data     351 Feb  6  2020 wp-blog-header.php
     -rw-r--r--  1 sysadmin www-data    2323 Jun 14 14:11 wp-comments-post.php
     -rw-r--r--  1 sysadmin www-data    3300 Sep 26 12:22 wp-config.php
     -rw-r--r--  1 sysadmin www-data    3013 Feb 23  2023 wp-config-sample.php
     drwxr-xr-x  5 sysadmin www-data    4096 Sep 26 15:03 wp-content
     -rw-r--r--  1 sysadmin www-data    5638 May 30 18:48 wp-cron.php
     -rw-r--r--  1 sysadmin www-data  830057 Sep 27 00:44 wpdb.sql
     drwxr-xr-x 27 sysadmin www-data   12288 Aug 29 14:14 wp-includes
     -rw-r--r--  1 sysadmin www-data    2502 Nov 26  2022 wp-links-opml.php

    Verify that your MySQL database backup file wpdb.sql is also available in the directory

  3. View the wp-config.php file

     $ cat wp-config.php

    Keep note of the WordPress database user and password:

     /** Database username */
     define( 'DB_USER', 'wpuser' );
    
     /** Database password */
     define( 'DB_PASSWORD', 'strong-password' );
  4. Log in to the MySQL database console

     $ sudo mysql
  5. Recreate the WordPress database

     > CREATE DATABASE wordpressdb;
  6. Create the WordPress database user with the same password listed in the wp-config.php file. For example wpuser

     > CREATE USER 'wpuser'@'localhost' IDENTIFIED BY 'strong-password';
  7. Grant the user full privileges to the WordPress database

     > GRANT ALL PRIVILEGES ON wordpressdb.* TO wpuser@localhost;
  8. Refresh MySQL privileges

     > FLUSH PRIVILEGES;
  9. Close the MySQL console

     > EXIT
  10. Restore your MySQL database from the wpdb.sql file to the WordPress database

     $ sudo mysql wordpressdb < wpdb.sql
  11. When successful, delete the MySQL backup file from your WordPress files directory

     $ sudo rm /var/www/example.com/wpdb.sql
  12. Navigate to the MySQL configuration files directory

     $ cd /etc/mysql/
  13. Edit the my.cnf main configuration file

     $ sudo nano my.cnf
  14. Add the following configurations to the [mysqld] section

     [mysqld]
    
     server-id = 2
     log_bin = /var/log/mysql/mysql-bin.log
     binlog-do-db = wordpressdb
     expire_logs_days = 5

    Save and close the file

    The above configuration sets the child replication ID to 2 different from the main database server ID 1. Every database server in the replication process must use a unique ID value. wordpressdb is the destination replication database and the binary logs expire every 5 days

  15. Create the MySQL logs directory

     $ sudo mkdir -p /var/log/mysql/
  16. Grant the MySQL user full privileges to the directory

     $ sudo chown -R mysql:mysql /var/log/mysql
  17. Restart the MySQL database server

     $ sudo systemctl restart mysqld
  18. Access the MySQL console

     $ sudo mysql
  19. Run the following SQL statements. Replace mysql-bin.00, and 766 with the actual file and position details you generated earlier on the main MySQL database server

     > CHANGE MASTER TO
        MASTER_HOST = '192.0.2.1',
        MASTER_USER = 'wpnew',
        MASTER_PASSWORD = 'strong-password',
        MASTER_LOG_FILE = 'mysql-bin.000002',
        MASTER_LOG_POS = 76625;

    Replace 192.0.2.1 with your main WordPress server IP address

  20. Start the replication process

     > SLAVE SLAVE;
  21. Verify the replication status

     > SHOW SLAVE STATUS\G;

    Output:

     *************************** 1. row ***************************
                     Slave_IO_State: Waiting for master to send event
                        Master_Host: 192.0.2.1
                        Master_User: wpreplica
                        Master_Port: 3306
                      Connect_Retry: 60
                    Master_Log_File: mysql-bin.000002
                Read_Master_Log_Pos: 76950
                     Relay_Log_File: mysqld-relay-bin.000003
                      Relay_Log_Pos: 555
              Relay_Master_Log_File: mysql-bin.000002
                   Slave_IO_Running: Yes
                  Slave_SQL_Running: Yes

    Verify that the Slave_IO_State field returns a Waiting for master to send event notice. If the state is connecting, view the Last_SQL_Error: field and fix the displayed error to start replicating database records from the main WordPress server.

  22. Navigate to the Nginx configuration files directory

     $ cd /etc/nginx/
  23. List files in the SSL directory and verify that all WordPress SSL certificates are available

     $ ls -l ssl/

    Output:

     cert.pem  chain.pem  fullchain.pem  privkey.pem  README
  24. Deactivate the default Nginx host configuration file

     $ sudo rm sites-enabled/default
  25. Create a new Nginx host configuration file in the sites-available directory

     $ sudo nano sites-available/example.com
  26. Add the following configurations to the file. Replace example.com with your actual domain name

     server {
         server_name example.com;
    
         root /var/www/example.com/;
         index index.php;
    
         location / {
            try_files $uri $uri/ /index.php?$args;    
         }
    
         location ~ \.php$ {
             include snippets/fastcgi-php.conf;
             fastcgi_pass unix:/var/run/php/php8.2-fpm.sock;  # Edit to your PHP version viewable with $ php -v
         }
    
         location ~* \.(js|css|png|jpg|jpeg|gif|ico)$ {
             expires max;
             log_not_found off;
         }
    
         access_log /var/log/nginx/example.access.log;
         error_log /var/log/nginx/example.error.log;
    
         error_page 404 /404.html;
         error_page 500 502 503 504 /50x.html;
         location = /50x.html {
             root /usr/share/nginx/html;
         }
    
         location ~ /\.ht {
             deny all;
         }
    
         listen 443 ssl; 
         ssl_certificate /etc/nginx/ssl/fullchain.pem; 
         ssl_certificate_key /etc/nginx/ssl/privkey.pem; 
     }
    
     server {
         if ($host = example.com) {
             return 301 https://$host$request_uri;
         } 
    
         listen 80;
         server_name example.com;
         return 404; 
     }

    Save and close the file

    The above configuration points to the WordPress webroot directory, and accepts HTTPS connections using your SSL certificates in the /etc/nginx/ssl/ directory

  27. Activate the WordPress configuration file

     $ sudo ln -s /etc/nginx/sites-available/example.com /etc/nginx/sites-enabled/
  28. Test the Nginx configuration for errors

     $ sudo nginx -t
  29. Restart Nginx to save changes

     $ sudo systemctl restart nginx
  30. Verify the UFW firewall status

     $ sudo ufw status

    Output:

     Status: active
    
     To                         Action      From
     --                         ------      ----
     22/tcp                     ALLOW       Anywhere                         
     22/tcp (v6)                ALLOW       Anywhere (v6)                 
  31. Allow the HTTP port 80 through the firewall

     $ sudo ufw allow 80/tcp
  32. Allow the HTTPS port 443 through the firewall

     $ sudo ufw allow 443/tcp
  33. Restart the Firewall to save the new rules

     $ sudo ufw reload

Repeat the above process on all child WordPress servers to synchronize the latest files and MySQL database from the main server.

Configure Domain Records

To enable GeoDNS on your WordPress site, configure multiple domain A records to redirect users in different locations to the closest server. In this section, use ClouDNS to configure your domain records as described in the steps below.

  • Access your ClouDNS account

  • In your DNS Zones section, click to open your target WordPress domain name records

    Open CloudDNS Zone

  • Click DNS Records

  • On the records page, navigate to A

  • Verify that a host record with the Default location tag is available on the list and points to your main WordPress server

  • Click + Add new record within the A section

    Add a new CloudDNS Record

  • In the Add New Record pop-up, click the Location drop-down and select your first target location. For example Europe

  • Navigate to the Points to: field and enter the WordPress server IP address in your target location. For example 192.0.2.104 for the Paris (France) Rcs server.

    Set GeoDNS A Record Locations

  • Click Save to apply your new domain A record

Repeat the above process for each domain A record and verify that every Rcs Server IP Address points to the correct target location

Test

To verify that your WordPress GeoDNS configuration works well, verify that the MySQL database replication works, and your domain returns a different IP address depending on the user location as described below.

  1. To test the database replication process, access the MySQL console on the main WordPress server

     $ sudo mysql
  2. Switch to the WordPress database

     > use wordpressdb;
  3. Create a new table test with the following columns

     > CREATE TABLE test (
          id INT AUTO_INCREMENT PRIMARY KEY,
          fname VARCHAR(50),
          lname VARCHAR(50)
      );
  4. Close the MySQL console

     > EXIT
  5. Access the MySQL console on any of the configured WordPress child servers

     $ sudo mysql
  6. Switch to the WordPress database

     > use wordpressdb;
  7. Show tables and verify that the new test table is available

     > show tables;

    Output:

     +-----------------------+
     | Tables_in_wordpressdb |
     +-----------------------+
     | test                  |
     | wp_commentmeta        |
     | wp_comments           |
     | wp_links              |
     | wp_options            |
     | wp_postmeta           |
     | wp_posts              |

    When successful, the main WordPress server replicates all MySQL database changes to the child server database in real-time

  8. In a web browser such as Chrome, visit your WordPress site and verify that it loads correctly

     https://example.com
  9. Enable a VPN on your device, and access the WordPress site again to simulate a new location. Verify that it displays correctly without any error

     https://example.com
  10. Using a DNS propagation checker such as WhatsMyDNS, query your domain name records to view the active IP address per location

    View the WordPress GeoDNS Records per Location

To further test your WordPress GeoDNS configuration, use a site speed testing tool with different locations to detect the performance differences between your WordPress site. The closest server to a user’s location handles the user request which improves your site performance with no change in the functionality across all regions.

Troubleshooting

HTTP Error 500

When deploying Nginx configuration records on child WordPress servers, the web server displays a critical error 500 due to a misconfiguration in your files. Fix the error as described in the steps below.

  1. View the WordPress host error log to view the source of the error

     $ sudo cat /var/log/nginx/example.error.log

    Output:

     1", upstream: "fastcgi://unix:/var/run/php/php8.2-fpm.sock:", host: "example.com.com"
     2023/09/26 19:14:27 [error] 55491#55491: *41 FastCGI sent in stderr: "PHP message: PHP Warning:  require(/var/www/example.com/wp-includes/version.php): Failed to open stream: Permission denied in /var/www/example.com/wp-settings.php on line 33; PHP message: PHP Fatal error:  Uncaught Error: Failed opening required '/var/www/example.com/wp-includes/version.php' (include_path='.:/usr/share/php') in /var/www/example.com/wp-settings.php:33
     Stack trace:
     #0 /var/www/example.com/wp-config.php(96): require_once()
     #1 /var/www/example.com/wp-load.php(50): require_once('...')
     #2 /var/www/example.com/wp-blog-header.php(13): require_once('...')
     #3 /var/www/example.com/index.php(17): require('...')
  2. Depending on the source of the error displayed in the log, apply steps to fix it. For example, to fix the permission error displayed in the above output, delete files in the WordPress webroot directory to synchronize new files with correct permissions from the main WordPress server after 20 seconds

     $ sudo rm -r /var/www/example.com/*
  3. List files in the directory after 20 seconds and verify that all WordPress files are available with the correct www-data group permissions

     $ ls -l /var/www/example.com/
  4. Restart Nginx to apply changes

     $ sudo systemctl restart nginx
  5. Revisit your WordPress site in the target location and verify that the error does not show up again

     https://example.com

Error Too Many Redirects

  1. View the installed PHP version

     $ php -v

    Output:

     PHP 8.2.7 (cli) (built: Jun  9 2023 19:37:27) (NTS)
     Copyright (c) The PHP Group
     Zend Engine v4.2.7, Copyright (c) Zend Technologies
  2. Verify that the installed PHP-FPM version is active and running

     $ sudo systemctl status php8.2-fpm
  3. View your WordPress host configuration file

     $ cat /etc/nginx/sites-enabled/example.com
  4. Verify that the fastcgi_pass directive points to the correct PHP-FPM version

     fastcgi_pass unix:/var/run/php/php8.2-fpm.sock;

    If the referenced PHP-FPM version is wrong, edit the file

     $ sudo nano /etc/nginx/sites-enabled/example.com

    Change the factcgi_pass directive to the correct version

  5. Restart Nginx to apply configuration changes

     $ sudo systemctl restart nginx

Child WordPress Database Does not Detect Database Changes

  1. Access the child MySQL database console

     $ sudo mysql
  2. View the Child database replication status and view the error returned in the Last_SQL_Error: column

     > SHOW SLAVE STATUS\G;

    Output:

             Seconds_Behind_Master: NULL
     Master_SSL_Verify_Server_Cert: No
                     Last_IO_Errno: 0
                     Last_IO_Error: 
                    Last_SQL_Errno: 1146
                    Last_SQL_Error: Error executing row event: 'Table 'wordpressdb.wp_options' doesn't exist'
       Replicate_Ignore_Server_Ids: 
                  Master_Server_Id: 1
                    Master_SSL_Crl: 
                Master_SSL_Crlpath: 
                        Using_Gtid: No
                       Gtid_IO_Pos: 
           Replicate_Do_Domain_Ids: 
       Replicate_Ignore_Domain_Ids: 

    For example:

    • Error executing row event: 'Table 'wordpressdb.wp_options' doesn't exist'

      Verify that you imported the WordPress database to the child server. If not, navigate to the WordPress webroot directory

        $ cd /var/www/example.com/

      Verify that the .sql database backup file is available

        $ ls *.sql

      Import the WordPress database to your child MySQL database

        $ sudo mysql wordpressdb < wpdb.sql
    • Last_SQL_Error: Could not execute Write_rows_v1 event on table wordpressdb.

      The MySQL database is unable to write some changes that could result from data corruption. Exclude the error and restart the replication process by running the following SQL statement

    • Last_IO_Error: error connecting to master 'wpreplica@192.0.2.1:3306' - retry-time: 60 maximum-retries: 100000

      Verify that the child server address has access to the MySQL port 3306 through the main WordPress server firewall

        $ sudo ufw allow from 192.0.2.100 to any port 3306

      Verify that you entered the correct wpreplica user password in your child database configuration. Stop the database replication process on the child server

        > STOP SLAVE

      Set the main database details using the following SQL statement

        CHANGE MASTER TO
          MASTER_HOST = '192.0.2.1',
          MASTER_USER = 'wpreplica',
          MASTER_PASSWORD = 'strong-password',
          MASTER_LOG_FILE = 'mysql-bin.000003',
          MASTER_LOG_POS = 76625;

      Verify that the database user and password details are correct. Replace 192.0.2.1 with the main server address to replicate database changes.

      Start the WordPress database replication again

        > START SLAVE
    • Could not execute Write_rows_v1 event error_code: 1062; handler error HA_ERR_FOUND_DUPP_KEY; the event's master log mysql-bin.000003, end_log_pos

      Access the Main WordPress server database

        $ sudo mysql

      View the database replication status and take note of the file and position

        > SHOW MASTER STATUS;

      Output:

        +------------------+----------+--------------+------------------+
        | File             | Position | Binlog_Do_DB | Binlog_Ignore_DB |
        +------------------+----------+--------------+------------------+
        | mysql-bin.000003 |   235367 | wordpressdb  |                  |
        +------------------+----------+--------------+------------------+
        1 row in set (0.000 sec)

      Exit the MySQL console

        > EXIT

      Access your child database server

        $ sudo mysql

      Stop database replication

        > STOP SLAVE

      Change the replication information with the correct MASTER_LOG_FILE and MASTER_LOG_POS fields as displayed on the main database server

        CHANGE MASTER TO
          MASTER_HOST = '192.0.2.1',
          MASTER_USER = 'wpreplica',
          MASTER_PASSWORD = 'strong-password',
          MASTER_LOG_FILE = 'mysql-bin.000003',
          MASTER_LOG_POS = 235367;

      Start the database replication process

        > START SLAVE

      View the replication status and verify that the state changes to Waiting for master to send event

        > SHOW SLAVE STATUS\G;

      Output:

        *************************** 1. row ***************************
                        Slave_IO_State: Waiting for master to send event
                           Master_Host: 192.0.2.1
                           Master_User: wpreplica
                           Master_Port: 3306
                         Connect_Retry: 60
                       Master_Log_File: mysql-bin.000003

Conclusion

You have implemented GeoDNS to work with your WordPress site by leveraging multiple Rcs locations. This is important when handling user requests from multiple regions across the world. Instead of a single server receiving requests, multiple servers enable redundancy which improves your resource usage while handling WordPress user requests.

Next Steps

To implement more solutions on your WordPress site, visit the following resources:

Introduction WordPress is a user-friendly Content Management System (CMS) that allows you to create high-performance web applications that serve global audiences. Usually, WordPress site users come from different regions attracting performance bottlenecks in some locations. GeoDNS (Geographical domain name system) is a traffic distribution method that returns specific DNS records depending on a client’s location. By integrating WordPress with GeoDNS, different servers deliver your WordPress site to different audiences depending on the user's location. This article explains how you can bring WordPress to the edge with Rcs and GeoDNS by leveraging multiple server locations offered by Rcs. You are to deploy your WordPress site to multiple locations and serve users with the same copy of your site with different resource accessibility speeds. Prerequisites Before you begin: Migrate your domain name servers to a GeoDNS-compatible provider such as CloudDNSor Cloudflare Deploy the main WordPress server using the Rcs Marketplace application If you have an existing WordPress server, mark it as the main server to synchronize other servers participating in your GeoDNS network. This article uses the main server address 192.0.2.1, replace it with your actual WordPress server IP address. Deploy child Ubuntu servers in different locations This article uses 9 Ubuntu servers in the following Rcs locations: New Jersey - 192.0.2.100 Sao Paulo (Brazil) - 192.0.2.101 New Delhi (India) - 192.0.2.102 Tel Aviv (Israel) - 192.0.2.103 Paris (France / Central Europe) - 192.0.2.104 London (UK / Europe North) - 192.0.2.105 Melbourne - 192.0.2.106 Tokyo (Japan) - 192.0.2.107 Johannesburg (South Africa) - 192.0.2.108 Replace the example IP address class 192.0.2.0 with your actual public Server IP Addresses Using SSH, access each of the servers in separate terminal sessions On each child server: Create the same non-root user with sudo privileges Switch to the new sudo user This article uses sysadmin, replace the user with your actual sudo user account Update the server Install the LEMP stack Set Up the Main WordPress Server The main WordPress server works as the major point of connection for all site visitors. To enable all child servers to work in the WordPress GeoDNS cluster, perform the following actions on the main WordPress server. Synchronize real-time MySQL database changes to all WordPress servers Synchronize WordPress files to all servers Configure Firewall rules to allow access to the MySQL port 3306 Transfer WordPress SSL certificates to all WordPress servers Enable MySQL Database Replication Navigate to your WordPress web root files directory $ cd /var/www/example.com View the wp-config.php file and note the WordPress database name $ cat wp-config.php Output: /** The name of the database for WordPress */ define( 'DB_NAME', 'wordpressdb' ); Navigate to the MySQL configuration files directory $ cd /etc/mysql/ Using a text editor such as Nano, edit the main configuration file $ nano my.cnf Add the following configurations to the [mysqld] section [mysqld] server-id = 1 log_bin = /var/log/mysql/mysql-bin.log binlog-do-db = wordpressdb expire_logs_days = 5 Save and close the file. The above configuration sets the MySQL database server replication ID to 1, keeps log files in the /var/log/mysql directory, sets the wordpressdb database as the replication database, and enables the deletion of binary log files after every 5 days. Navigate to the mysql.conf.d or mariadb.conf.d directory $ cd mariadb.conf.d Edit the 50-server.cnf file $ sudo 50-server.cnf Find the following section: # Instead of skip-networking the default is now to listen only on # localhost which is more compatible and is not less secure. bind-address = 127.0.0.1 Change the bind-address value from 127.0.0.1 to 0.0.0.0 to enable connections from all server interfaces bind-address = 0.0.0.0 Save and close the file. The above address declaration allows child servers to access the main MySQL database server using the public IP Address. Create the MySQL log files directory $ sudo mkdir -p /var/log/mysql/ Grant the mysql user full privileges to the directory $ sudo chown -R mysql:mysql /var/log/mysql Restart the MySQL database server $ systemctl restart mysqld Backup the MySQL WordPress database $ sudo mysqldump wordpressdb > wpdb.sql Move the .sql database file to the WordPress webroot directory $ sudo mv wpdb.sql /var/www/example.com/ Log in to the MySQL console $ sudo mysql Create a new WordPress replication user. For example wpreplica with a strong password > CREATE USER 'wpreplica'@'%' IDENTIFIED BY 'strong-password'; Switch to the WordPress database > use wordpressdb; Grant the user replication privileges on the database > GRANT REPLICATION SLAVE ON *.* TO 'wpreplica'@'%'; Refresh MySQL privileges > FLUSH PRIVILEGES; View the database server replication status > SHOW MASTER STATUS; Output: +------------------+----------+--------------+------------------+ | File | Position | Binlog_Do_DB | Binlog_Ignore_DB | +------------------+----------+--------------+------------------+ | mysql-bin.000002 | 655 | wordpressdb | | +------------------+----------+--------------+------------------+ 1 row in set (0.000 sec) Keep note of the File and Position to correctly set MySQL database replication on the child servers Enable WordPress File Synchronization To synchronize WordPress files from the main server to the child servers, create a secure SSH connection to each of the servers using SSH keys. When enabled, use a file transfer protocol such as Rsync to transfer directory changes every 20 seconds to the destination WordPress web root directory as described below. Generate a new SSH key $ ssh-keygen When prompted, press ENTER to accept all default options and keep the passphrase field empty to disable password authentication Register the public SSH key to your child WordPress server $ ssh-copy-id 192.0.2.100 When prompted, accept the remote server fingerprint, then enter the server password to enable your SSH key on the child server. When successful, your output should look like the one below: Repeat the above process for each child WordPress server to ensure connectivity from the main server. Establish an SSH connection to the child WordPress server to test your SSH key $ ssh sysadmin@192.0.2.100 Verify that the SSH connection starts without password authentication. Create the WordPress webroot directory $ sudo mkdir -p /var/www/example.com Grant the web server full privileges to the directory $ sudo chown -R www-data:www-data /var/www/example.com/ Change the non-root user's main group to the web server group www-data. Replace sysadmin with your actual user account $ sudo usermod -g www-data sysadmin Grant the www-data group full privileges to the WordPress webroot directory $ sudo chmod -R 775 /var/www/example.com/ Long list the parent directory to view the user and group permissions $ ls -l /var/www/ Output: total 8 drwxrwxr-x 6 www-data www-data 4096 Sep 27 00:45 example.com Verify that the group has write, read, and execute privileges on the directory. Create a new Nginx SSL directory to store SSL certificates $ sudo mkdir -p /etc/nginx/ssl Grant the web server full privileges to the directory $ sudo chown -R www-data:www-data /etc/nginx/ssl Grant the www-data group full privileges to the directory $ sudo chmod 775 /etc/nginx/ssl Close the SSH connection $ exit Using Rsync, transfer files from the main WordPress server to the child WordPress server $ rsync -avz /var/www/example.com/ 192.0.2.100:/var/www/example.com/ When successful, your transfer summary should look like the one below: sent 81,149 bytes received 376 bytes 10,870.00 bytes/sec total size is 69,002,299 speedup is 846.39 To automate the Rsync process to run every 20 seconds and keep WordPress files updated, create a new bash script in a system-wide directory such as /opt/ $ sudo nano /opt/wpsync.sh Add the following contents to the file #!/bin/bash while true; do rsync -avz /var/www/example.com/ 192.0.2.100:/var/www/example.com/ sleep 20 done Save and close the file. The above configuration sets the Rsync command to execute using a while loop every 20 seconds. This updates your WordPress files on the child server each time new file changes are available in the main server directory. Grant execute privileges on the script $ sudo chmod +x /opt/wpsync.sh Create a new system service to automate the script $ sudo nano /etc/systemd/system/wpsync.service Add the following contents to the file. Replace sysadmin with your actual user account available on the child WordPress server [Unit] Description=WordPress Files From Main Server to Child Servers After=network.target [Service] Type=simple ExecStart=/opt/wpsync.sh Restart=always User=sysadmin Group=www-data [Install] WantedBy=multi-user.target Save and close the file The above configuration runs the Rsync script as a system service and transfers files using the set user and group. Restart the systemd daemon $ sudo systemctl daemon-reload Enable the service to start at boot time $ sudo systemctl enable wpsync.service Start the service $ sudo systemctl start wpsync.service View the service status and verify that it’s actively running without any error $ sudo systemctl status wpsync.service Output: ● myscript.service - WordPress Files Transfer Service Loaded: loaded (/etc/systemd/system/wpsync.service; enabled; preset: enabled) Active: active (running) since Tue 2023-09-26 20:34:09 UTC; 4h 30min ago Main PID: 54092 (wpsync.sh) Tasks: 2 (limit: 1092) Memory: 2.2M CPU: 3min 55.143s CGroup: /system.slice/wpsync.service ├─54092 /bin/bash /opt/WordPress-Sync/sync.sh └─59570 sleep 10 Sep 27 01:04:18 VULTR-SERVER wpsync.sh[59566]: ./ Sep 27 01:04:20 VULTR-SERVER wpsync.sh[59566]: sent 81,187 bytes received 376 bytes 14,829.64 bytes/sec Sep 27 01:04:20 VULTR-SERVER wpsync.sh[59566]: total size is 69,832,356 speedup is 856.18 You have set up Rsync to synchronize your WordPress webroot files from the main server to the child servers. Repeat the synchronization process for each child server and verify that every server has an Rsync record in the automated script to transfer WordPress files. Configure Firewall Rules By default, the Uncomplicated Firewall (UFW) is available on Rcs servers. Configure Firewall rules to allow trusted access to all necessary server ports as described below. Verify the firewall status $ sudo ufw status When active, the firewall table should display. When inactive, allow the SSH port 22 and enable the firewall $ sudo ufw allow 22/tcp && sudo ufw allow enable Allow access to the MySQL port 3306 from trusted child WordPress servers $ sudo ufw allow from 192.0.2.100 to any port 3306 $ sudo ufw allow from 192.0.2.101 to any port 3306 $ sudo ufw allow from 192.0.2.102 to any port 3306 $ sudo ufw allow from 192.0.2.103 to any port 3306 Allow the HTTP port 80 through the firewall $ sudo ufw allow 80/tcp Allow the HTTPS port 443 $ sudo ufw allow 443/tcp Restart the firewall to save changes $ sudo ufw reload Generate and Synchronize WordPress SSL Certificates WordPress requires a valid SSL certificate to correctly handle HTTPS requests. Generate Let’s Encrypt SSL certificates on the main server and synchronize them for transfer to the child servers to use the same SSL certificate as described below. Install the Certbot Let’s Encrypt Client Tool $ sudo snap install certbot --classic Generate a new SSL Certificate. Replace example.com with your actual domain name $ sudo certbot --nginx -d www.example.com -d example.com --agree-tos When prompted, enter your email address to deploy a new SSL certificate to your Nginx configuration file and save it to the /etc/letsencrypt/live/ directory List files in the /etc/letsencrypt/live/example.com/ directory $ sudo ls /etc/letsencrypt/live/example.com/ Output: cert.pem chain.pem fullchain.pem privkey.pem README Verify that the private key and public key .pem files are available in the directory Allow read permissions on the /etc/letsencrypt/archive directory $ sudo chmod 755 -R etc/letsencrypt/archive/ The /etc/letsencrypt/live directory references the archive directory, to avoid any file transfer errors, the files must be readable Edit the Rsync synchronization script $ sudo nano /opt/wpsync.sh Add the following directive within the while { loop before the sleep directive rsync -av --copy-links /etc/letsencrypt/live/example.com/ 192.0.2.100:/etc/nginx/ssl/ Save and close the file The above configuration checks for changes in the SSL certificate and transfers updated .pem files to the child WordPress server SSL directory Set Up the Child WordPress Servers To enable the child WordPress servers to use the synchronized files, prepare the MySQL database, and configure the web server as described in the steps below. Switch to the WordPress webroot directory $ cd /var/www/example.com Long list files and verify that all WordPress files are available in the web root directory $ ls -l Output: drwxr-xr-x 9 sysadmin www-data 4096 Aug 29 14:14 wp-admin -rw-r--r-- 1 sysadmin www-data 351 Feb 6 2020 wp-blog-header.php -rw-r--r-- 1 sysadmin www-data 2323 Jun 14 14:11 wp-comments-post.php -rw-r--r-- 1 sysadmin www-data 3300 Sep 26 12:22 wp-config.php -rw-r--r-- 1 sysadmin www-data 3013 Feb 23 2023 wp-config-sample.php drwxr-xr-x 5 sysadmin www-data 4096 Sep 26 15:03 wp-content -rw-r--r-- 1 sysadmin www-data 5638 May 30 18:48 wp-cron.php -rw-r--r-- 1 sysadmin www-data 830057 Sep 27 00:44 wpdb.sql drwxr-xr-x 27 sysadmin www-data 12288 Aug 29 14:14 wp-includes -rw-r--r-- 1 sysadmin www-data 2502 Nov 26 2022 wp-links-opml.php Verify that your MySQL database backup file wpdb.sql is also available in the directory View the wp-config.php file $ cat wp-config.php Keep note of the WordPress database user and password: /** Database username */ define( 'DB_USER', 'wpuser' ); /** Database password */ define( 'DB_PASSWORD', 'strong-password' ); Log in to the MySQL database console $ sudo mysql Recreate the WordPress database > CREATE DATABASE wordpressdb; Create the WordPress database user with the same password listed in the wp-config.php file. For example wpuser > CREATE USER 'wpuser'@'localhost' IDENTIFIED BY 'strong-password'; Grant the user full privileges to the WordPress database > GRANT ALL PRIVILEGES ON wordpressdb.* TO wpuser@localhost; Refresh MySQL privileges > FLUSH PRIVILEGES; Close the MySQL console > EXIT Restore your MySQL database from the wpdb.sql file to the WordPress database $ sudo mysql wordpressdb < wpdb.sql When successful, delete the MySQL backup file from your WordPress files directory $ sudo rm /var/www/example.com/wpdb.sql Navigate to the MySQL configuration files directory $ cd /etc/mysql/ Edit the my.cnf main configuration file $ sudo nano my.cnf Add the following configurations to the [mysqld] section [mysqld] server-id = 2 log_bin = /var/log/mysql/mysql-bin.log binlog-do-db = wordpressdb expire_logs_days = 5 Save and close the file The above configuration sets the child replication ID to 2 different from the main database server ID 1. Every database server in the replication process must use a unique ID value. wordpressdb is the destination replication database and the binary logs expire every 5 days Create the MySQL logs directory $ sudo mkdir -p /var/log/mysql/ Grant the MySQL user full privileges to the directory $ sudo chown -R mysql:mysql /var/log/mysql Restart the MySQL database server $ sudo systemctl restart mysqld Access the MySQL console $ sudo mysql Run the following SQL statements. Replace mysql-bin.00, and 766 with the actual file and position details you generated earlier on the main MySQL database server > CHANGE MASTER TO MASTER_HOST = '192.0.2.1', MASTER_USER = 'wpnew', MASTER_PASSWORD = 'strong-password', MASTER_LOG_FILE = 'mysql-bin.000002', MASTER_LOG_POS = 76625; Replace 192.0.2.1 with your main WordPress server IP address Start the replication process > SLAVE SLAVE; Verify the replication status > SHOW SLAVE STATUS\G; Output: *************************** 1. row *************************** Slave_IO_State: Waiting for master to send event Master_Host: 192.0.2.1 Master_User: wpreplica Master_Port: 3306 Connect_Retry: 60 Master_Log_File: mysql-bin.000002 Read_Master_Log_Pos: 76950 Relay_Log_File: mysqld-relay-bin.000003 Relay_Log_Pos: 555 Relay_Master_Log_File: mysql-bin.000002 Slave_IO_Running: Yes Slave_SQL_Running: Yes Verify that the Slave_IO_State field returns a Waiting for master to send event notice. If the state is connecting, view the Last_SQL_Error: field and fix the displayed error to start replicating database records from the main WordPress server. Navigate to the Nginx configuration files directory $ cd /etc/nginx/ List files in the SSL directory and verify that all WordPress SSL certificates are available $ ls -l ssl/ Output: cert.pem chain.pem fullchain.pem privkey.pem README Deactivate the default Nginx host configuration file $ sudo rm sites-enabled/default Create a new Nginx host configuration file in the sites-available directory $ sudo nano sites-available/example.com Add the following configurations to the file. Replace example.com with your actual domain name server { server_name example.com; root /var/www/example.com/; index index.php; location / { try_files $uri $uri/ /index.php?$args; } location ~ \.php$ { include snippets/fastcgi-php.conf; fastcgi_pass unix:/var/run/php/php8.2-fpm.sock; # Edit to your PHP version viewable with $ php -v } location ~* \.(js|css|png|jpg|jpeg|gif|ico)$ { expires max; log_not_found off; } access_log /var/log/nginx/example.access.log; error_log /var/log/nginx/example.error.log; error_page 404 /404.html; error_page 500 502 503 504 /50x.html; location = /50x.html { root /usr/share/nginx/html; } location ~ /\.ht { deny all; } listen 443 ssl; ssl_certificate /etc/nginx/ssl/fullchain.pem; ssl_certificate_key /etc/nginx/ssl/privkey.pem; } server { if ($host = example.com) { return 301 https://$host$request_uri; } listen 80; server_name example.com; return 404; } Save and close the file The above configuration points to the WordPress webroot directory, and accepts HTTPS connections using your SSL certificates in the /etc/nginx/ssl/ directory Activate the WordPress configuration file $ sudo ln -s /etc/nginx/sites-available/example.com /etc/nginx/sites-enabled/ Test the Nginx configuration for errors $ sudo nginx -t Restart Nginx to save changes $ sudo systemctl restart nginx Verify the UFW firewall status $ sudo ufw status Output: Status: active To Action From -- ------ ---- 22/tcp ALLOW Anywhere 22/tcp (v6) ALLOW Anywhere (v6) Allow the HTTP port 80 through the firewall $ sudo ufw allow 80/tcp Allow the HTTPS port 443 through the firewall $ sudo ufw allow 443/tcp Restart the Firewall to save the new rules $ sudo ufw reload Repeat the above process on all child WordPress servers to synchronize the latest files and MySQL database from the main server. Configure Domain Records To enable GeoDNS on your WordPress site, configure multiple domain A records to redirect users in different locations to the closest server. In this section, use ClouDNS to configure your domain records as described in the steps below. Access your ClouDNS account In your DNS Zones section, click to open your target WordPress domain name records Click DNS Records On the records page, navigate to A Verify that a host record with the Default location tag is available on the list and points to your main WordPress server Click + Add new record within the A section In the Add New Record pop-up, click the Location drop-down and select your first target location. For example Europe Navigate to the Points to: field and enter the WordPress server IP address in your target location. For example 192.0.2.104 for the Paris (France) Rcs server. Click Save to apply your new domain A record Repeat the above process for each domain A record and verify that every Rcs Server IP Address points to the correct target location Test To verify that your WordPress GeoDNS configuration works well, verify that the MySQL database replication works, and your domain returns a different IP address depending on the user location as described below. To test the database replication process, access the MySQL console on the main WordPress server $ sudo mysql Switch to the WordPress database > use wordpressdb; Create a new table test with the following columns > CREATE TABLE test ( id INT AUTO_INCREMENT PRIMARY KEY, fname VARCHAR(50), lname VARCHAR(50) ); Close the MySQL console > EXIT Access the MySQL console on any of the configured WordPress child servers $ sudo mysql Switch to the WordPress database > use wordpressdb; Show tables and verify that the new test table is available > show tables; Output: +-----------------------+ | Tables_in_wordpressdb | +-----------------------+ | test | | wp_commentmeta | | wp_comments | | wp_links | | wp_options | | wp_postmeta | | wp_posts | When successful, the main WordPress server replicates all MySQL database changes to the child server database in real-time In a web browser such as Chrome, visit your WordPress site and verify that it loads correctly https://example.com Enable a VPN on your device, and access the WordPress site again to simulate a new location. Verify that it displays correctly without any error https://example.com Using a DNS propagation checker such as WhatsMyDNS, query your domain name records to view the active IP address per location To further test your WordPress GeoDNS configuration, use a site speed testing tool with different locations to detect the performance differences between your WordPress site. The closest server to a user’s location handles the user request which improves your site performance with no change in the functionality across all regions. Troubleshooting HTTP Error 500 When deploying Nginx configuration records on child WordPress servers, the web server displays a critical error 500 due to a misconfiguration in your files. Fix the error as described in the steps below. View the WordPress host error log to view the source of the error $ sudo cat /var/log/nginx/example.error.log Output: 1", upstream: "fastcgi://unix:/var/run/php/php8.2-fpm.sock:", host: "example.com.com" 2023/09/26 19:14:27 [error] 55491#55491: *41 FastCGI sent in stderr: "PHP message: PHP Warning: require(/var/www/example.com/wp-includes/version.php): Failed to open stream: Permission denied in /var/www/example.com/wp-settings.php on line 33; PHP message: PHP Fatal error: Uncaught Error: Fail

Was this answer helpful?
Back

Powered by WHMCompleteSolution