| GitLab Workhorse | Yes | Socket | Port (8181) | X |
| GitLab Workhorse | Yes | Socket | Port (8181) | X |
| NGINX status | Yes | Port | X | 8060 |
| NGINX status | Yes | Port | X | 8060 |
| Prometheus | Yes | Port | X | 9090 |
| Prometheus | Yes | Port | X | 9090 |
| Node exporter | Yes | Port | X | 9100 |
| Node exporter | Yes | Port | X | 9100 |
| Redis exporter | Yes | Port | X | 9121 |
| Redis exporter | Yes | Port | X | 9121 |
| PostgreSQL exporter | Yes | Port | X | 9187 |
| PostgreSQL exporter | Yes | Port | X | 9187 |
| PgBouncer exporter | No | Port | X | 9188 |
| PgBouncer exporter | No | Port | X | 9188 |
| GitLab Exporter | Yes | Port | X | 9168 |
| GitLab Exporter | Yes | Port | X | 9168 |
| Sidekiq exporter | Yes | Port | X | 8082 |
| Sidekiq exporter | Yes | Port | X | 8082 |
| Puma exporter | No | Port | X | 8083 |
| Sidekiq health check | No | Port | X | 8092[^Sidekiq-health] |
| Geo PostgreSQL | No | Socket | Port (5431) | X |
| Puma exporter | No | Port | X | 8083 |
| Redis Sentinel | No | Port | X | 26379 |
| Geo PostgreSQL | No | Socket | Port (5431) | X |
| Incoming email | No | Port | X | 143 |
| Redis Sentinel | No | Port | X | 26379 |
| Elastic search | No | Port | X | 9200 |
| Incoming email | No | Port | X | 143 |
| GitLab Pages | No | Port | X | 80 or 443 |
| Elastic search | No | Port | X | 9200 |
| GitLab Registry | No* | Port | X | 80, 443 or 5050 |
| GitLab Pages | No | Port | X | 80 or 443 |
| GitLab Registry | No | Port | X | 5000 |
| GitLab Registry | No* | Port | X | 80, 443 or 5050 |
| LDAP | No | Port | X | Depends on the component configuration |
| GitLab Registry | No | Port | X | 5000 |
| Kerberos | No | Port | X | 8443 or 8088 |
| LDAP | No | Port | X | Depends on the component configuration |
| OmniAuth | Yes | Port | X | Depends on the component configuration |
| Kerberos | No | Port | X | 8443 or 8088 |
| SMTP | No | Port | X | 465 |
| OmniAuth | Yes | Port | X | Depends on the component configuration |
| Remote syslog | No | Port | X | 514 |
| SMTP | No | Port | X | 465 |
| Mattermost | No | Port | X | 8065 |
| Remote syslog | No | Port | X | 514 |
| Mattermost | No | Port | X | 80 or 443 |
| Mattermost | No | Port | X | 8065 |
| PgBouncer | No | Port | X | 6432 |
| Mattermost | No | Port | X | 80 or 443 |
| Consul | No | Port | X | 8300, 8301(UDP), 8500, 8600[^Consul-notes] |
| PgBouncer | No | Port | X | 6432 |
| Patroni | No | Port | X | 8008 |
| Consul | No | Port | X | 8300, 8301(UDP), 8500, 8600[^Consul-notes] |
| GitLab KAS | No | Port | X | 8150 |
| Patroni | No | Port | X | 8008 |
| Gitaly | No | Port | X | 8075 |
| GitLab KAS | No | Port | X | 8150 |
| Gitaly | No | Port | X | 8075 |
Legend:
Legend:
...
@@ -70,3 +71,5 @@ NOTE:
...
@@ -70,3 +71,5 @@ NOTE:
In some cases, the GitLab Registry will be automatically enabled by default. Please see [our documentation](../packages/container_registry.md) for more details
In some cases, the GitLab Registry will be automatically enabled by default. Please see [our documentation](../packages/container_registry.md) for more details
[^Consul-notes]:If using additional Consul functionality, more ports may need to be opened. See the [official documentation](https://www.consul.io/docs/install/ports#ports-table) for the list.
[^Consul-notes]:If using additional Consul functionality, more ports may need to be opened. See the [official documentation](https://www.consul.io/docs/install/ports#ports-table) for the list.
[^Sidekiq-health]:If Sidekiq health check settings are not set, they will default to the Sidekiq metrics exporter settings. This default is deprecated and is set to be removed in [GitLab 15.0](https://gitlab.com/gitlab-org/gitlab/-/issues/347509).
info:To determine the technical writer assigned to the Stage/Group associated with this page, see https://about.gitlab.com/handbook/engineering/ux/technical-writing/#assignments
---
# Sidekiq Health Check **(FREE SELF)**
GitLab provides liveness and readiness probes to indicate service health and
reachability to the Sidekiq cluster. These endpoints
[can be provided to schedulers like Kubernetes](https://kubernetes.io/docs/tasks/configure-pod-container/configure-liveness-readiness-startup-probes/)
to hold traffic until the system is ready or restart the container as needed.
The health check server can be set up when [configuring Sidekiq](sidekiq.md).
## Readiness
The readiness probe checks whether the Sidekiq workers are ready to process jobs.
```plaintext
GET /readiness
```
Assuming you set up Sidekiq's address and port to be `localhost` and `8092` respectively,
here's an example request:
```shell
curl "http://localhost:8092/readiness"
```
On success, the endpoint returns a `200` HTTP status code, and a response like the following:
```json
{
"status":"ok"
}
```
## Liveness
Checks whether the Sidekiq cluster is running.
```plaintext
GET /liveness
```
Assuming you set up Sidekiq's address and port to be `localhost` and `8092` respectively,
here's an example request:
```shell
curl "http://localhost:8092/liveness"
```
On success, the endpoint returns a `200` HTTP status code, and a response like the following: