summaryrefslogtreecommitdiff
path: root/config/initializers/sidekiq.rb
Commit message (Collapse)AuthorAgeFilesLines
* sidekiq: terminate child processes at shutdownNick Thomas2019-03-041-0/+3
| | | | | | | | | | | | | | | | | | Sidekiq jobs frequently spawn long-lived child processes to do work. In some circumstances, these can be reparented to init when sidekiq is terminated, leading to duplication of work and strange concurrency problems. This commit changes sidekiq so that, if run as a process group leader, it will forward `INT` and `TERM` signals to the whole process group. If the memory killer is active, it will also use the process group when resorting to `kill -9` to shut down. These changes mean that a naive `kill <pid-of-sidekiq>` will now do the right thing, killing any child processes spawned by sidekiq, as long as the process supervisor placed it in its own process group. If sidekiq isn't a process group leader, this new code is skipped.
* Revert "Restart Unicorn and Sidekiq when GRPC throws 14:Endpoint read failed"Nick Thomas2019-02-281-1/+1
| | | | This reverts commit 006753110a462e62f549cdf3c410e73eed068dbf.
* Turn on backtrace for sidekiq in developmentThong Kuah2019-02-251-0/+4
| | | | This enables easier debugging in GDK
* Bump gitlab-reliable-fetcher gemValery Sizov2018-12-171-1/+3
|
* Merge branch 'store-correlation-logs' into 'master'Stan Hu2018-12-071-0/+3
|\ | | | | | | | | Log and pass correlation-id between Unicorn, Sidekiq and Gitaly See merge request gitlab-org/gitlab-ce!22844
| * Log and pass correlation-id between Unicorn, Sidekiq and GitalyKamil Trzciński2018-12-061-0/+3
| | | | | | | | | | | | | | | | The Correlation ID is taken or generated from received X-Request-ID. Then it is being passed to all executed services (sidekiq workers or gitaly calls). The Correlation ID is logged in all structured logs as `correlation_id`.
* | Disable Sidekiq feature flag check if features table does not existStan Hu2018-12-061-1/+1
|/ | | | | | | | The GitLab Development Kit initialization failed because the Sidekiq initializer was attempting to look up a feature flag when the `features` table hadn't been created yet. Closes https://gitlab.com/gitlab-org/gitlab-ce/issues/54718
* Clear BatchLoader context between Sidekiq jobsDouwe Maan2018-11-221-0/+1
|
* Add experimental support for Pumaan-multithreadingAndrew Newdigate2018-10-251-2/+0
| | | | | | This allows us (and others) to test drive Puma without it affecting all users. Puma can be enabled by setting the environment variable "EXPERIMENTAL_PUMA" to a non empty value.
* Add reliable fetcher for Sidekiqadd_reliable_fetcherValery Sizov2018-10-031-3/+7
|
* Remove background job throttling feature51509-remove-sidekiq-limit-fetchValery Sizov2018-09-241-2/+0
| | | | We remove this feature as it never worked properly
* Disable the Sidekiq Admin Rack sessionStan Hu2018-08-311-0/+6
| | | | | | | | | | | | | GitLab already has its own session store, so this extra Sidekiq session is unnecessary. In addition, the GitLab session store properly sets the Secure flag, unlike the default Rack session. CSRF protection in the Sidekiq /admin page continues to work with the existing GitLab session. See https://github.com/mperham/sidekiq/pull/3183 for more details. Part of #49120
* Move rbtrace initialization into SidekiqStan Hu2018-07-301-0/+2
|
* Add support for Sidekiq JSON loggingStan Hu2018-04-041-1/+8
| | | | Closes #20060
* Restart Unicorn and Sidekiq when GRPC throws 14:Endpoint read failedJacob Vosmaer (GitLab)2018-02-261-1/+1
|
* Use a dedicated queue for each workerDouwe Maan2017-12-121-16/+2
|
* Add ApplicationWorker and make every worker include itDouwe Maan2017-12-051-4/+4
|
* Support multiple Redis instances based on queue typePaul Charlton2017-07-111-5/+5
|
* Update sidekiq redis error rescue to include addrnotavailcatch-redis-address-errorDJ Mountney2017-06-271-1/+1
|
* Added Gitlab::Database.configYorick Peterse2017-03-171-1/+1
| | | | | | | | This returns the ActiveRecord configuration for the current environment. While CE doesn't use this very often, EE will use it in a few places for the database load balancing code. I'm adding this to CE so we don't end up with merge conflicts in this file.
* Clear AR connections before starting SidekiqYorick Peterse2017-03-081-0/+6
| | | | | | | This should ensure that connections obtained before starting Sidekiq are not leaked, leading to connection timeouts. Fixes gitlab-com/infrastructure#1139
* Don't use backup AR connections for Sidekiqremove-sidekiq-backup-ar-threadsYorick Peterse2017-02-061-3/+1
| | | | | | | | | | | | | | | Adding two extra connections does nothing other than increasing the number of idle database connections. Given Sidekiq uses N threads it can never use more than N AR connections at a time, thus we don't need more. The initializer mentioned the Sidekiq upgrade guide stating this was required. This is false, the Sidekiq upgrade guide states this is necessary for Redis and not ActiveRecord. On GitLab.com this resulted in a reduction of about 80-100 PostgreSQL connections. Fixes #27713
* Fix race conditions for AuthorizedProjectsWorkerrefresh-authorizations-fork-joinYorick Peterse2017-01-251-0/+9
| | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | There were two cases that could be problematic: 1. Because sometimes AuthorizedProjectsWorker would be scheduled in a transaction it was possible for a job to run/complete before a COMMIT; resulting in it either producing an error, or producing no new data. 2. When scheduling jobs the code would not wait until completion. This could lead to a user creating a project and then immediately trying to push to it. Usually this will work fine, but given enough load it might take a few seconds before a user has access. The first one is problematic, the second one is mostly just annoying (but annoying enough to warrant a solution). This commit changes two things to deal with this: 1. Sidekiq scheduling now takes places after a COMMIT, this is ensured by scheduling using Rails' after_commit hook instead of doing so in an arbitrary method. 2. When scheduling jobs the calling thread now waits for all jobs to complete. Solution 2 requires tracking of job completions. Sidekiq provides a way to find a job by its ID, but this involves scanning over the entire queue; something that is very in-efficient for large queues. As such a more efficient solution is necessary. There are two main Gems that can do this in a more efficient manner: * sidekiq-status * sidekiq_status No, this is not a joke. Both Gems do a similar thing (but slightly different), and the only difference in their name is a dash vs an underscore. Both Gems however provide far more than just checking if a job has been completed, and both have their problems. sidekiq-status does not appear to be actively maintained, with the last release being in 2015. It also has some issues during testing as API calls are not stubbed in any way. sidekiq_status on the other hand does not appear to be very popular, and introduces a similar amount of code. Because of this I opted to write a simple home grown solution. After all, all we need is storing a job ID somewhere so we can efficiently look it up; we don't need extra web UIs (as provided by sidekiq-status) or complex APIs to update progress, etc. This is where Gitlab::SidekiqStatus comes in handy. This namespace contains some code used for tracking, removing, and looking up job IDs; all without having to scan over an entire queue. Data is removed explicitly, but also expires automatically just in case. Using this API we can now schedule jobs in a fork-join like manner: we schedule the jobs in Sidekiq, process them in parallel, then wait for completion. By using Sidekiq we can leverage all the benefits such as being able to scale across multiple cores and hosts, retrying failed jobs, etc. The one downside is that we need to make sure we can deal with unexpected increases in job processing timings. To deal with this the class Gitlab::JobWaiter (used for waiting for jobs to complete) will only wait a number of seconds (30 by default). Once this timeout is reached it will simply return. For GitLab.com almost all AuthorizedProjectWorker jobs complete in seconds, only very rarely do we spike to job timings of around a minute. These in turn seem to be the result of external factors (e.g. deploys), in which case a user is most likely not able to use the system anyway. In short, this new solution should ensure that jobs are processed properly and that in almost all cases a user has access to their resources whenever they need to have access.
* Enable Style/MultilineOperationIndentation in Rubocop, fixes #25741Rydkin Maxim2016-12-161-1/+1
|
* Gracefully recover from Redis connection failures in Sidekiq initializerStan Hu2016-12-011-1/+1
| | | | | * Closes gitlab-org/gitlab-ce#25143 * Closes gitlab-org/omnibus-gitlab#1743
* Refactored initializer code to its own class and added testsPatricio Cano2016-11-101-7/+1
|
* Allow the Sidekiq queues to throttle and the factor by which to throttle ↵Patricio Cano2016-11-101-12/+4
| | | | them to be configurable
* Allow certain Sidekiq jobs to be throttledPatricio Cano2016-11-101-0/+16
|
* Set default Sidekiq retries to 3Drew Blessing2016-11-041-0/+3
| | | | | | | | | By default, Sidekiq will retry 25 times with an exponential backoff. This may result in jobs retrying for up to 21 days. Most Sidekiq failures occur when attempting to connect to external services - Project service hooks, web hooks, mailers, mirror updates, etc. We should set a default retry of 3, and if that's not sufficient individual workers can override this in the worker class.
* Initialize Sidekiq with the list of queues used by GitLabsh-init-sidekiq-queuesStan Hu2016-11-011-0/+16
| | | | | | | | | | | The Sidekiq client API adds an entry to the Sidekiq "queues" list, but mail_room and gitlab-shell use redis-rb directly to insert jobs into Redis and thus do not make an extra "sadd" call to Redis each time a job is inserted. To make it possible to monitor these queues via the API, add an initialization step to set up the list at startup. Closes gitlab-com/infrastructure#682
* Make sidekiq get config settings from Gitlab::RedisConfigGabriel Mazetto2016-08-041-8/+6
|
* Enable SIDEKIQ_REQUEST_STORE by defaultadd-sidekiq-request-storeStan Hu2016-07-251-1/+1
|
* Add support for using RequestStore within Sidekiq tasks via ↵Stan Hu2016-07-251-0/+1
| | | | | | | | | SIDEKIQ_REQUEST_STORE env variable This significantly reduces the DB churn in the PostReceive task when it performs reference extraction. See #18663
* Log cron_jobs configuration instead of raising exceptionGabriel Mazetto2016-07-201-1/+2
|
* Improve cron_jobs loading error messagesGabriel Mazetto2016-07-181-1/+8
|
* Enable Style/SpaceAfterComma Rubocop coprubocop/enable-space-after-copsGrzegorz Bizon2016-06-291-1/+1
|
* Avoid autoload issue such as 'Mail::Parsers::AddressStruct'18810-nameerror-uninitialized-constant-mail-parsers-addressstructRémy Coutable2016-06-201-0/+4
| | | | | | By eager-loading the Mail gem in the Sidekiq initializer. Signed-off-by: Rémy Coutable <remy@rymai.me>
* Redis configuration consistencyredis_config_consistencyValery Sizov2016-04-131-4/+2
|
* Add Gitlab::Redis connection poolJacob Vosmaer2016-04-041-2/+2
|
* Parse config/resque.yml in one place onlyJacob Vosmaer2016-03-091-12/+5
|
* Hotfix for sidekiq-cron being loaded from Settingslogic with defaultsGabriel Mazetto2015-12-221-1/+5
|
* Sidekiq-cron configuration moved to gitlab.ymlfeature/sidekiq-cron-configGabriel Mazetto2015-12-141-5/+2
|
* Upgraded Sidekiq to 4.xfeature/sidekiq-4Gabriel Mazetto2015-12-101-0/+8
|
* Migrate from Sidetiq to Sidekiq-cronfeature/sidekiq-cronGabriel Mazetto2015-12-041-0/+6
| | | | Updated Sidekiq to 3.5.x
* Groundwork for merging CI into CEDouwe Maan2015-08-251-0/+27