Skip to content
Projects
Groups
Snippets
Help
Loading...
Help
Support
Keyboard shortcuts
?
Submit feedback
Contribute to GitLab
Sign in / Register
Toggle navigation
G
gitlab-ce
Project overview
Project overview
Details
Activity
Releases
Repository
Repository
Files
Commits
Branches
Tags
Contributors
Graph
Compare
Issues
0
Issues
0
List
Boards
Labels
Milestones
Merge Requests
1
Merge Requests
1
Analytics
Analytics
Repository
Value Stream
Wiki
Wiki
Snippets
Snippets
Members
Members
Collapse sidebar
Close sidebar
Activity
Graph
Create a new issue
Commits
Issue Boards
Open sidebar
nexedi
gitlab-ce
Commits
9afc1ec4
Commit
9afc1ec4
authored
Jul 31, 2020
by
Achilleas Pipinellis
Browse files
Options
Browse Files
Download
Email Patches
Plain Diff
Update with suggestions
parent
0b3d5394
Changes
1
Show whitespace changes
Inline
Side-by-side
Showing
1 changed file
with
47 additions
and
43 deletions
+47
-43
doc/administration/reference_architectures/10k_users.md
doc/administration/reference_architectures/10k_users.md
+47
-43
No files found.
doc/administration/reference_architectures/10k_users.md
View file @
9afc1ec4
...
@@ -629,6 +629,11 @@ The following IPs will be used as an example:
...
@@ -629,6 +629,11 @@ The following IPs will be used as an example:
1.
[
Reconfigure Omnibus GitLab
](
../restart_gitlab.md#omnibus-gitlab-reconfigure
)
for the changes to take effect.
1.
[
Reconfigure Omnibus GitLab
](
../restart_gitlab.md#omnibus-gitlab-reconfigure
)
for the changes to take effect.
NOTE:
**Note:**
If an error
`execute[generate databases.ini]`
occurs, this is due to an existing
[
known issue
](
https://gitlab.com/gitlab-org/omnibus-gitlab/-/issues/4713
)
.
It will be resolved when you run a second
`reconfigure`
after the next step.
1.
Create a
`.pgpass`
file so Consul is able to
1.
Create a
`.pgpass`
file so Consul is able to
reload PgBouncer. Enter the PgBouncer password twice when asked:
reload PgBouncer. Enter the PgBouncer password twice when asked:
...
@@ -636,18 +641,14 @@ The following IPs will be used as an example:
...
@@ -636,18 +641,14 @@ The following IPs will be used as an example:
gitlab-ctl write-pgpass
--host
127.0.0.1
--database
pgbouncer
--user
pgbouncer
--hostuser
gitlab-consul
gitlab-ctl write-pgpass
--host
127.0.0.1
--database
pgbouncer
--user
pgbouncer
--hostuser
gitlab-consul
```
```
1.
Ensure each node is talking to the current master:
1.
[
Reconfigure GitLab
](
../restart_gitlab.md#omnibus-gitlab-reconfigure
)
once again
to resolve any potential errors from the previous steps.
1.
Ensure each node is talking to the current primary:
```
shell
```
shell
gitlab-ctl pgb-console
# You will be prompted for PGBOUNCER_PASSWORD
gitlab-ctl pgb-console
# You will be prompted for PGBOUNCER_PASSWORD
```
```
If there is an error
`psql: ERROR: Auth failed`
after typing in the
password, ensure you previously generated the MD5 password hashes with the correct
format. The correct format is to concatenate the password and the username:
`PASSWORDUSERNAME`
. For example,
`Sup3rS3cr3tpgbouncer`
would be the text
needed to generate an MD5 password hash for the
`pgbouncer`
user.
1.
Once the console prompt is available, run the following queries:
1.
Once the console prompt is available, run the following queries:
```
shell
```
shell
...
@@ -823,13 +824,8 @@ reconfigure a node and change its status from primary to replica and vice versa.
...
@@ -823,13 +824,8 @@ reconfigure a node and change its status from primary to replica and vice versa.
# Set the network addresses that the exporters will listen on
# Set the network addresses that the exporters will listen on
node_exporter
[
'listen_address'
]
=
'0.0.0.0:9100'
node_exporter
[
'listen_address'
]
=
'0.0.0.0:9100'
redis_exporter
[
'listen_address'
]
=
'0.0.0.0:9121'
redis_exporter
[
'listen_address'
]
=
'0.0.0.0:9121'
```
1.
Only the primary GitLab application server should handle migrations. To
prevent database migrations from running on upgrade, add the following
configuration to your
`/etc/gitlab/gitlab.rb`
file:
```
ruby
# Prevent database migrations from running on upgrade
gitlab_rails
[
'auto_migrate'
]
=
false
gitlab_rails
[
'auto_migrate'
]
=
false
```
```
...
@@ -888,12 +884,9 @@ Read more about [roles](https://docs.gitlab.com/omnibus/roles/).
...
@@ -888,12 +884,9 @@ Read more about [roles](https://docs.gitlab.com/omnibus/roles/).
# Set the network addresses that the exporters will listen on
# Set the network addresses that the exporters will listen on
node_exporter
[
'listen_address'
]
=
'0.0.0.0:9100'
node_exporter
[
'listen_address'
]
=
'0.0.0.0:9100'
redis_exporter
[
'listen_address'
]
=
'0.0.0.0:9121'
redis_exporter
[
'listen_address'
]
=
'0.0.0.0:9121'
```
1.
To prevent reconfigure from running automatically on upgrade, run:
```
shell
# Prevent database migrations from running on upgrade
sudo touch
/etc/gitlab/skip-auto-reconfigur
e
gitlab_rails
[
'auto_migrate'
]
=
fals
e
```
```
1.
[
Reconfigure Omnibus GitLab
](
../restart_gitlab.md#omnibus-gitlab-reconfigure
)
for the changes to take effect.
1.
[
Reconfigure Omnibus GitLab
](
../restart_gitlab.md#omnibus-gitlab-reconfigure
)
for the changes to take effect.
...
@@ -1029,14 +1022,6 @@ To configure the Sentinel Cache server:
...
@@ -1029,14 +1022,6 @@ To configure the Sentinel Cache server:
gitlab_rails
[
'auto_migrate'
]
=
false
gitlab_rails
[
'auto_migrate'
]
=
false
```
```
1.
To prevent database migrations from running on upgrade, run:
```
shell
sudo touch
/etc/gitlab/skip-auto-reconfigure
```
Only the primary GitLab application server should handle migrations.
1.
[
Reconfigure Omnibus GitLab
](
../restart_gitlab.md#omnibus-gitlab-reconfigure
)
for the changes to take effect.
1.
[
Reconfigure Omnibus GitLab
](
../restart_gitlab.md#omnibus-gitlab-reconfigure
)
for the changes to take effect.
1.
Go through the steps again for all the other Consul/Sentinel nodes, and
1.
Go through the steps again for all the other Consul/Sentinel nodes, and
make sure you set up the correct IPs.
make sure you set up the correct IPs.
...
@@ -1457,11 +1442,6 @@ On each node:
...
@@ -1457,11 +1442,6 @@ On each node:
-->
-->
1.
Save the file and
[
reconfigure GitLab
](
../restart_gitlab.md#omnibus-gitlab-reconfigure
)
.
1.
Save the file and
[
reconfigure GitLab
](
../restart_gitlab.md#omnibus-gitlab-reconfigure
)
.
1.
Confirm that Gitaly can perform callbacks to the internal API:
```
shell
sudo
/opt/gitlab/embedded/service/gitlab-shell/bin/check
-config
/opt/gitlab/embedded/service/gitlab-shell/config.yml
```
### Gitaly TLS support
### Gitaly TLS support
...
@@ -1571,17 +1551,35 @@ you want using steps 1 and 2 from the GitLab downloads page.
...
@@ -1571,17 +1551,35 @@ you want using steps 1 and 2 from the GitLab downloads page.
#### Redis ###
#### Redis ###
########################################
########################################
## Must be the same in every sentinel node
## Redis connection details
redis
[
'master_name'
]
=
'gitlab-redis'
## First cluster that will host the cache
gitlab_rails
[
'redis_cache_instance'
]
=
'redis://:<REDIS_PRIMARY_PASSWORD_OF_FIRST_CLUSTER>@gitlab-redis-cache'
## The same password for Redis authentication you set up for the master node.
gitlab_rails
[
'redis_cache_sentinels'
]
=
[
redis
[
'master_password'
]
=
'<redis_primary_password>'
{
host:
'10.6.0.71'
,
port:
26379
},
{
host:
'10.6.0.72'
,
port:
26379
},
{
host:
'10.6.0.73'
,
port:
26379
},
]
## A list of sentinels with `host` and `port`
## Second cluster that will host the queues, shared state, and actionable
gitlab_rails
[
'redis_sentinels'
]
=
[
gitlab_rails
[
'redis_queues_instance'
]
=
'redis://:<REDIS_PRIMARY_PASSWORD_OF_SECOND_CLUSTER>@gitlab-redis-persistent'
{
'host'
=>
'10.6.0.11'
,
'port'
=>
26379
},
gitlab_rails
[
'redis_shared_state_instance'
]
=
'redis://:<REDIS_PRIMARY_PASSWORD_OF_SECOND_CLUSTER>@gitlab-redis-persistent'
{
'host'
=>
'10.6.0.12'
,
'port'
=>
26379
},
gitlab_rails
[
'redis_actioncable_instance'
]
=
'redis://:<REDIS_PRIMARY_PASSWORD_OF_SECOND_CLUSTER>@gitlab-redis-persistent'
{
'host'
=>
'10.6.0.13'
,
'port'
=>
26379
},
gitlab_rails
[
'redis_queues_sentinels'
]
=
[
{
host:
'10.6.0.81'
,
port:
26379
},
{
host:
'10.6.0.82'
,
port:
26379
},
{
host:
'10.6.0.83'
,
port:
26379
},
]
gitlab_rails
[
'redis_shared_state_sentinels'
]
=
[
{
host:
'10.6.0.81'
,
port:
26379
},
{
host:
'10.6.0.82'
,
port:
26379
},
{
host:
'10.6.0.83'
,
port:
26379
},
]
gitlab_rails
[
'redis_actioncable_sentinels'
]
=
[
{
host:
'10.6.0.81'
,
port:
26379
},
{
host:
'10.6.0.82'
,
port:
26379
},
{
host:
'10.6.0.83'
,
port:
26379
},
]
]
#######################################
#######################################
...
@@ -1625,7 +1623,7 @@ you want using steps 1 and 2 from the GitLab downloads page.
...
@@ -1625,7 +1623,7 @@ you want using steps 1 and 2 from the GitLab downloads page.
node_exporter
[
'listen_address'
]
=
'0.0.0.0:9100'
node_exporter
[
'listen_address'
]
=
'0.0.0.0:9100'
# Rails Status for prometheus
# Rails Status for prometheus
gitlab_rails
[
'monitoring_whitelist'
]
=
[
'10.6.0.
8
1/32'
,
'127.0.0.0/8'
]
gitlab_rails
[
'monitoring_whitelist'
]
=
[
'10.6.0.
12
1/32'
,
'127.0.0.0/8'
]
```
```
TIP:
**Tip:**
TIP:
**Tip:**
...
@@ -1733,10 +1731,11 @@ On each node perform the following:
...
@@ -1733,10 +1731,11 @@ On each node perform the following:
# Add the monitoring node's IP address to the monitoring whitelist and allow it to
# Add the monitoring node's IP address to the monitoring whitelist and allow it to
# scrape the NGINX metrics
# scrape the NGINX metrics
gitlab_rails
[
'monitoring_whitelist'
]
=
[
'10.6.0.
8
1/32'
,
'127.0.0.0/8'
]
gitlab_rails
[
'monitoring_whitelist'
]
=
[
'10.6.0.
12
1/32'
,
'127.0.0.0/8'
]
nginx
[
'status'
][
'options'
][
'allow'
]
=
[
'10.6.0.
8
1/32'
,
'127.0.0.0/8'
]
nginx
[
'status'
][
'options'
][
'allow'
]
=
[
'10.6.0.
12
1/32'
,
'127.0.0.0/8'
]
```
```
1.
Save the file and
[
reconfigure GitLab
](
../restart_gitlab.md#omnibus-gitlab-reconfigure
)
.
1.
If you're using
[
Gitaly with TLS support
](
#gitaly-tls-support
)
, make sure the
1.
If you're using
[
Gitaly with TLS support
](
#gitaly-tls-support
)
, make sure the
`git_data_dirs`
entry is configured with
`tls`
instead of
`tcp`
:
`git_data_dirs`
entry is configured with
`tls`
instead of
`tcp`
:
...
@@ -1795,6 +1794,11 @@ On each node perform the following:
...
@@ -1795,6 +1794,11 @@ On each node perform the following:
1.
Save the file and
[
reconfigure GitLab
](
../restart_gitlab.md#omnibus-gitlab-reconfigure
)
.
1.
Save the file and
[
reconfigure GitLab
](
../restart_gitlab.md#omnibus-gitlab-reconfigure
)
.
1.
Run
`sudo gitlab-rake gitlab:gitaly:check`
to confirm the node can connect to Gitaly.
1.
Run
`sudo gitlab-rake gitlab:gitaly:check`
to confirm the node can connect to Gitaly.
1.
Confirm that Gitaly can perform callbacks to the internal API:
```
shell
sudo
/opt/gitlab/embedded/service/gitlab-shell/bin/check
-config
/opt/gitlab/embedded/service/gitlab-shell/config.yml
```
1.
Tail the logs to see the requests:
1.
Tail the logs to see the requests:
```
shell
```
shell
...
...
Write
Preview
Markdown
is supported
0%
Try again
or
attach a new file
Attach a file
Cancel
You are about to add
0
people
to the discussion. Proceed with caution.
Finish editing this message first!
Cancel
Please
register
or
sign in
to comment