Skip to content
Projects
Groups
Snippets
Help
Loading...
Help
Support
Keyboard shortcuts
?
Submit feedback
Contribute to GitLab
Sign in / Register
Toggle navigation
G
gitlab-ce
Project overview
Project overview
Details
Activity
Releases
Repository
Repository
Files
Commits
Branches
Tags
Contributors
Graph
Compare
Issues
0
Issues
0
List
Boards
Labels
Milestones
Merge Requests
1
Merge Requests
1
Analytics
Analytics
Repository
Value Stream
Wiki
Wiki
Snippets
Snippets
Members
Members
Collapse sidebar
Close sidebar
Activity
Graph
Create a new issue
Commits
Issue Boards
Open sidebar
nexedi
gitlab-ce
Commits
c359a449
Commit
c359a449
authored
Aug 21, 2019
by
GitLab Bot
Browse files
Options
Browse Files
Download
Plain Diff
Automatic merge of gitlab-org/gitlab-ce master
parents
3771b48e
0a4d4c0a
Changes
5
Hide whitespace changes
Inline
Side-by-side
Showing
5 changed files
with
70 additions
and
24 deletions
+70
-24
doc/administration/gitaly/index.md
doc/administration/gitaly/index.md
+61
-21
doc/ci/yaml/README.md
doc/ci/yaml/README.md
+2
-2
doc/user/project/integrations/img/download_as_csv.png
doc/user/project/integrations/img/download_as_csv.png
+0
-0
doc/user/project/integrations/prometheus.md
doc/user/project/integrations/prometheus.md
+6
-0
qa/qa/specs/features/browser_ui/1_manage/project/add_project_member_spec.rb
...es/browser_ui/1_manage/project/add_project_member_spec.rb
+1
-1
No files found.
doc/administration/gitaly/index.md
View file @
c359a449
...
...
@@ -64,6 +64,7 @@ The following list depicts what the network architecture of Gitaly is:
topology.
-
A
`(Gitaly address, Gitaly token)`
corresponds to a Gitaly server.
-
A Gitaly server hosts one or more storages.
-
A GitLab server can use one or more Gitaly servers.
-
Gitaly addresses must be specified in such a way that they resolve
correctly for ALL Gitaly clients.
-
Gitaly clients are: Unicorn, Sidekiq, gitlab-workhorse,
...
...
@@ -77,14 +78,16 @@ The following list depicts what the network architecture of Gitaly is:
-
Authentication is done through a static token which is shared among the Gitaly
and GitLab Rails nodes.
Below we describe how to configure a Gitaly server at address
`gitaly.internal:8075`
with secret token
`abc123secret`
. We assume
your GitLab installation has two repository storages,
`default`
and
`storage1`
.
Below we describe how to configure two Gitaly servers one at
`gitaly1.internal`
and the other at
`gitaly2.internal`
with secret token
`abc123secret`
. We assume
your GitLab installation has three repository storages:
`default`
,
`storage1`
and
`storage2`
.
### 1. Installation
First install Gitaly using either Omnibus GitLab or install it from source:
First install Gitaly on each Gitaly server using either
Omnibus GitLab or install it from source:
-
For Omnibus GitLab:
[
Download/install
](
https://about.gitlab.com/install/
)
the Omnibus GitLab
package you want using
**steps 1 and 2**
from the GitLab downloads page but
...
...
@@ -119,7 +122,7 @@ Configure a token on the instance that runs the GitLab Rails application.
### 3. Gitaly server configuration
Next, on the Gitaly server, you need to configure storage paths, enable
Next, on the Gitaly server
s
, you need to configure storage paths, enable
the network listener and configure the token.
NOTE:
**Note:**
if you want to reduce the risk of downtime when you enable
...
...
@@ -175,15 +178,29 @@ Check the directory layout on your Gitaly server to be sure.
gitaly
[
'listen_addr'
]
=
"0.0.0.0:8075"
gitaly
[
'auth_token'
]
=
'abc123secret'
# To use TLS for Gitaly you need to add
gitaly
[
'tls_listen_addr'
]
=
"0.0.0.0:9999"
gitaly
[
'certificate_path'
]
=
"path/to/cert.pem"
gitaly
[
'key_path'
]
=
"path/to/key.pem"
```
1.
Append the following to
`/etc/gitlab/gitlab.rb`
for each respective server:
For
`gitaly1.internal`
:
```
gitaly['storage'] = [
{ 'name' => 'default' },
{ 'name' => 'storage1' },
]
```
For
`gitaly2.internal`
:
# To use TLS for Gitaly you need to add
gitaly
[
'
tls_listen_addr'
]
=
"0.0.0.0:9999"
gitaly
[
'certificate_path'
]
=
"path/to/cert.pem"
gitaly
[
'key_path'
]
=
"path/to/key.pem"
```
gitaly['
storage'] = [
{ 'name' => 'storage2' },
]
```
NOTE:
**Note:**
...
...
@@ -206,13 +223,26 @@ Check the directory layout on your Gitaly server to be sure.
[auth]
token
=
'abc123secret'
```
1.
Append the following to
`/home/git/gitaly/config.toml`
for each respective server:
For
`gitaly1.internal`
:
```
toml
[[storage]]
name
=
'default'
[[storage]]
name
=
'storage1'
```
For
`gitaly2.internal`
:
```
toml
[[storage]]
name
=
'storage2'
```
NOTE:
**Note:**
In some cases, you'll have to set
`path`
for each
`[[storage]]`
in the
...
...
@@ -231,9 +261,13 @@ then all Gitaly requests will fail.
Additionally, you need to
[
disable Rugged if previously manually enabled
](
../high_availability/nfs.md#improving-nfs-performance-with-gitlab
)
.
We assume that your Gitaly server can be reached at
`gitaly.internal:8075`
from your GitLab server, and that Gitaly can read and
write to
`/mnt/gitlab/default`
and
`/mnt/gitlab/storage1`
respectively.
We assume that your
`gitaly1.internal`
Gitaly server can be reached at
`gitaly1.internal:8075`
from your GitLab server, and that Gitaly server
can read and write to
`/mnt/gitlab/default`
and
`/mnt/gitlab/storage1`
.
We assume also that your
`gitaly2.internal`
Gitaly server can be reached at
`gitaly2.internal:8075`
from your GitLab server, and that Gitaly server
can read and write to
`/mnt/gitlab/storage2`
.
**For Omnibus GitLab**
...
...
@@ -241,8 +275,9 @@ write to `/mnt/gitlab/default` and `/mnt/gitlab/storage1` respectively.
```
ruby
git_data_dirs
({
'default'
=>
{
'gitaly_address'
=>
'tcp://gitaly.internal:8075'
},
'storage1'
=>
{
'gitaly_address'
=>
'tcp://gitaly.internal:8075'
},
'default'
=>
{
'gitaly_address'
=>
'tcp://gitaly1.internal:8075'
},
'storage1'
=>
{
'gitaly_address'
=>
'tcp://gitaly1.internal:8075'
},
'storage2'
=>
{
'gitaly_address'
=>
'tcp://gitaly2.internal:8075'
},
})
gitlab_rails
[
'gitaly_token'
]
=
'abc123secret'
...
...
@@ -268,9 +303,11 @@ write to `/mnt/gitlab/default` and `/mnt/gitlab/storage1` respectively.
repositories
:
storages
:
default
:
gitaly_address
:
tcp://gitaly.internal:8075
gitaly_address
:
tcp://gitaly
1
.internal:8075
storage1
:
gitaly_address
:
tcp://gitaly.internal:8075
gitaly_address
:
tcp://gitaly1.internal:8075
storage2
:
gitaly_address
:
tcp://gitaly2.internal:8075
gitaly
:
token
:
'
abc123secret'
...
...
@@ -350,8 +387,9 @@ To configure Gitaly with TLS:
```
ruby
git_data_dirs
({
'default'
=>
{
'gitaly_address'
=>
'tls://gitaly.internal:9999'
},
'storage1'
=>
{
'gitaly_address'
=>
'tls://gitaly.internal:9999'
},
'default'
=>
{
'gitaly_address'
=>
'tls://gitaly1.internal:9999'
},
'storage1'
=>
{
'gitaly_address'
=>
'tls://gitaly1.internal:9999'
},
'storage2'
=>
{
'gitaly_address'
=>
'tls://gitaly2.internal:9999'
},
})
gitlab_rails
[
'gitaly_token'
]
=
'abc123secret'
...
...
@@ -377,9 +415,11 @@ To configure Gitaly with TLS:
repositories
:
storages
:
default
:
gitaly_address
:
tls://gitaly.internal:9999
gitaly_address
:
tls://gitaly
1
.internal:9999
storage1
:
gitaly_address
:
tls://gitaly.internal:9999
gitaly_address
:
tls://gitaly1.internal:9999
storage2
:
gitaly_address
:
tls://gitaly2.internal:9999
gitaly
:
token
:
'
abc123secret'
...
...
doc/ci/yaml/README.md
View file @
c359a449
...
...
@@ -524,7 +524,7 @@ single conjoined expression. That is:
-
`only:`
means "include this job if all of the conditions match".
-
`except:`
means "exclude this job if any of the conditions match".
The the
individual keys are logically joined by an AND:
With
`only`
,
individual keys are logically joined by an AND:
> (any of refs) AND (any of variables) AND (any of changes) AND (if kubernetes is active)
...
...
@@ -1735,7 +1735,7 @@ This example creates three paths of execution:
1.
If
`needs:`
is set to point to a job that is not instantiated
because of
`only/except`
rules or otherwise does not exist, the
job will fail.
1.
Note that on day one of the launch, we are temporarily limiting the
1.
Note that on day one of the launch, we are temporarily limiting the
maximum number of jobs that a single job can need in the
`needs:`
array. Track
our
[
infrastructure issue
](
https://gitlab.com/gitlab-com/gl-infra/infrastructure/issues/7541
)
for details on the current limit.
...
...
doc/user/project/integrations/img/download_as_csv.png
0 → 100644
View file @
c359a449
33 KB
doc/user/project/integrations/prometheus.md
View file @
c359a449
...
...
@@ -269,6 +269,12 @@ Note the following properties:
![
single stat panel type
](
img/prometheus_dashboard_single_stat_panel_type.png
)
### Downloading data as CSV
Data from Prometheus charts on the metrics dashboard can be downloaded as CSV.
![
Downloading as CSV
](
img/download_as_csv.png
)
### Setting up alerts for Prometheus metrics **(ULTIMATE)**
#### Managed Prometheus instances
...
...
qa/qa/specs/features/browser_ui/1_manage/project/add_project_member_spec.rb
View file @
c359a449
...
...
@@ -19,7 +19,7 @@ module QA
page
.
add_member
(
user
.
username
)
end
expect
(
page
).
to
have_content
(
/
#{
user
.
name
}
(. )?@
#{
user
.
username
}
Given access/
)
expect
(
page
).
to
have_content
(
/
@
#{
user
.
username
}
(\n| )?
Given access/
)
end
end
end
...
...
Write
Preview
Markdown
is supported
0%
Try again
or
attach a new file
Attach a file
Cancel
You are about to add
0
people
to the discussion. Proceed with caution.
Finish editing this message first!
Cancel
Please
register
or
sign in
to comment