1. 28 6月, 2017 1 次提交
  2. 18 3月, 2017 1 次提交
    • Y
      Added Gitlab::Database.config · 9a20ff1c
      Yorick Peterse 提交于
      This returns the ActiveRecord configuration for the current environment.
      
      While CE doesn't use this very often, EE will use it in a few places for
      the database load balancing code. I'm adding this to CE so we don't end
      up with merge conflicts in this file.
      9a20ff1c
  3. 08 3月, 2017 1 次提交
  4. 06 2月, 2017 1 次提交
    • Y
      Don't use backup AR connections for Sidekiq · f116f87c
      Yorick Peterse 提交于
      Adding two extra connections does nothing other than increasing the
      number of idle database connections. Given Sidekiq uses N threads it can
      never use more than N AR connections at a time, thus we don't need more.
      
      The initializer mentioned the Sidekiq upgrade guide stating this was
      required.  This is false, the Sidekiq upgrade guide states this is
      necessary for Redis and not ActiveRecord.
      
      On GitLab.com this resulted in a reduction of about 80-100 PostgreSQL
      connections.
      
      Fixes #27713
      f116f87c
  5. 25 1月, 2017 1 次提交
    • Y
      Fix race conditions for AuthorizedProjectsWorker · 88e627cf
      Yorick Peterse 提交于
      There were two cases that could be problematic:
      
      1. Because sometimes AuthorizedProjectsWorker would be scheduled in a
         transaction it was possible for a job to run/complete before a
         COMMIT; resulting in it either producing an error, or producing no
         new data.
      
      2. When scheduling jobs the code would not wait until completion. This
         could lead to a user creating a project and then immediately trying
         to push to it. Usually this will work fine, but given enough load it
         might take a few seconds before a user has access.
      
      The first one is problematic, the second one is mostly just annoying
      (but annoying enough to warrant a solution).
      
      This commit changes two things to deal with this:
      
      1. Sidekiq scheduling now takes places after a COMMIT, this is ensured
         by scheduling using Rails' after_commit hook instead of doing so in
         an arbitrary method.
      
      2. When scheduling jobs the calling thread now waits for all jobs to
         complete.
      
      Solution 2 requires tracking of job completions. Sidekiq provides a way
      to find a job by its ID, but this involves scanning over the entire
      queue; something that is very in-efficient for large queues. As such a
      more efficient solution is necessary. There are two main Gems that can
      do this in a more efficient manner:
      
      * sidekiq-status
      * sidekiq_status
      
      No, this is not a joke. Both Gems do a similar thing (but slightly
      different), and the only difference in their name is a dash vs an
      underscore. Both Gems however provide far more than just checking if a
      job has been completed, and both have their problems. sidekiq-status
      does not appear to be actively maintained, with the last release being
      in 2015. It also has some issues during testing as API calls are not
      stubbed in any way. sidekiq_status on the other hand does not appear to
      be very popular, and introduces a similar amount of code.
      
      Because of this I opted to write a simple home grown solution. After
      all, all we need is storing a job ID somewhere so we can efficiently
      look it up; we don't need extra web UIs (as provided by sidekiq-status)
      or complex APIs to update progress, etc.
      
      This is where Gitlab::SidekiqStatus comes in handy. This namespace
      contains some code used for tracking, removing, and looking up job IDs;
      all without having to scan over an entire queue. Data is removed
      explicitly, but also expires automatically just in case.
      
      Using this API we can now schedule jobs in a fork-join like manner: we
      schedule the jobs in Sidekiq, process them in parallel, then wait for
      completion. By using Sidekiq we can leverage all the benefits such as
      being able to scale across multiple cores and hosts, retrying failed
      jobs, etc.
      
      The one downside is that we need to make sure we can deal with
      unexpected increases in job processing timings. To deal with this the
      class Gitlab::JobWaiter (used for waiting for jobs to complete) will
      only wait a number of seconds (30 by default). Once this timeout is
      reached it will simply return.
      
      For GitLab.com almost all AuthorizedProjectWorker jobs complete in
      seconds, only very rarely do we spike to job timings of around a minute.
      These in turn seem to be the result of external factors (e.g. deploys),
      in which case a user is most likely not able to use the system anyway.
      
      In short, this new solution should ensure that jobs are processed
      properly and that in almost all cases a user has access to their
      resources whenever they need to have access.
      88e627cf
  6. 17 12月, 2016 1 次提交
  7. 01 12月, 2016 1 次提交
  8. 11 11月, 2016 3 次提交
  9. 05 11月, 2016 1 次提交
    • D
      Set default Sidekiq retries to 3 · d498ec98
      Drew Blessing 提交于
      By default, Sidekiq will retry 25 times with an exponential backoff.
      This may result in jobs retrying for up to 21 days. Most Sidekiq
      failures occur when attempting to connect to external services -
      Project service hooks, web hooks, mailers, mirror updates, etc.
      We should set a default retry of 3, and if that's not sufficient
      individual workers can override this in the worker class.
      d498ec98
  10. 01 11月, 2016 1 次提交
    • S
      Initialize Sidekiq with the list of queues used by GitLab · cde3963d
      Stan Hu 提交于
      The Sidekiq client API adds an entry to the Sidekiq "queues" list,
      but mail_room and gitlab-shell use redis-rb directly to insert jobs
      into Redis and thus do not make an extra "sadd" call to Redis
      each time a job is inserted. To make it possible to monitor
      these queues via the API, add an initialization step to
      set up the list at startup.
      
      Closes gitlab-com/infrastructure#682
      cde3963d
  11. 05 8月, 2016 1 次提交
  12. 26 7月, 2016 2 次提交
  13. 20 7月, 2016 1 次提交
  14. 19 7月, 2016 1 次提交
  15. 29 6月, 2016 1 次提交
  16. 20 6月, 2016 1 次提交
  17. 14 4月, 2016 1 次提交
  18. 04 4月, 2016 1 次提交
  19. 09 3月, 2016 1 次提交
  20. 22 12月, 2015 1 次提交
  21. 15 12月, 2015 1 次提交
  22. 11 12月, 2015 1 次提交
  23. 04 12月, 2015 1 次提交
  24. 26 8月, 2015 1 次提交
  25. 04 4月, 2015 1 次提交
  26. 31 3月, 2015 1 次提交
  27. 08 12月, 2014 1 次提交
  28. 02 12月, 2014 1 次提交
  29. 28 11月, 2014 1 次提交
    • J
      Add 'MemoryKiller' Sidekiq middleware · 64ab6c9e
      Jacob Vosmaer 提交于
      When enabled, this middleware allows Sidekiq to detect that its RSS has
      exceeded a maximum value, triggering a graceful shutdown. This
      middleware should be combined with external process supervision that
      will restart Sidekiq after the graceful shutdown, such as Runit.
      64ab6c9e
  30. 28 7月, 2014 1 次提交
  31. 07 3月, 2013 1 次提交
    • P
      Allow connection to Redis via unix socket · 67a61c80
      Pierre GUINOISEAU 提交于
      Allow connection to Redis via unix socket, using
      unix:/var/run/redis/redis.sock for example.
      
      Default behaviour does not change, except that the full Redis URL must
      be configured, with redis:// for tcp or unix: for unix socket.
      67a61c80
  32. 09 1月, 2013 2 次提交
  33. 25 12月, 2012 2 次提交
  34. 21 11月, 2012 2 次提交