- Available reference architectures
- Before you start
- Deciding which architecture to start with
- Requirements
- Recommended cloud providers and services
- Deviating from the suggested reference architectures
- Validation and test results
- Cost calculator templates
- Maintaining a Reference Architecture environment
- Update history
Reference architectures
The GitLab Reference Architectures have been designed and tested by the GitLab Test Platform and Support teams to provide recommended scalable and elastic deployments as starting points for target loads.
Available reference architectures
The following Reference Architectures are available as recommended starting points for your environment.
The architectures are named in terms of peak load, based on user count or Requests per Second (RPS). Where the latter has been calculated based on average real data.
For details about what each Reference Architecture has been tested against, see the “Testing Methodology” section of each page.
GitLab package (Omnibus)
Below is the list of Linux package based reference architectures:
- Up to 20 RPS or 1,000 users API: 20 RPS, Web: 2 RPS, Git (Pull): 2 RPS, Git (Push): 1 RPS
- Up to 40 RPS or 2,000 users API: 40 RPS, Web: 4 RPS, Git (Pull): 4 RPS, Git (Push): 1 RPS
- Up to 60 RPS or 3,000 users API: 60 RPS, Web: 6 RPS, Git (Pull): 6 RPS, Git (Push): 1 RPS
- Up to 100 RPS or 5,000 users API: 100 RPS, Web: 10 RPS, Git (Pull): 10 RPS, Git (Push): 2 RPS
- Up to 200 RPS or 10,000 users API: 200 RPS, Web: 20 RPS, Git (Pull): 20 RPS, Git (Push): 4 RPS
- Up to 500 RPS or 25,000 users API: 500 RPS, Web: 50 RPS, Git (Pull): 50 RPS, Git (Push): 10 RPS
- Up to 1000 RPS or 50,000 users API: 1000 RPS, Web: 100 RPS, Git (Pull): 100 RPS, Git (Push): 20 RPS
Cloud native hybrid
Below is a list of Cloud Native Hybrid reference architectures, where select recommended components can be run in Kubernetes:
- Up to 40 RPS or 2,000 users API: 40 RPS, Web: 4 RPS, Git (Pull): 4 RPS, Git (Push): 1 RPS
- Up to 60 RPS or 3,000 users API: 60 RPS, Web: 6 RPS, Git (Pull): 6 RPS, Git (Push): 1 RPS
- Up to 100 RPS or 5,000 users API: 100 RPS, Web: 10 RPS, Git (Pull): 10 RPS, Git (Push): 2 RPS
- Up to 200 RPS or 10,000 users API: 200 RPS, Web: 20 RPS, Git (Pull): 20 RPS, Git (Push): 4 RPS
- Up to 500 RPS or 25,000 users API: 500 RPS, Web: 50 RPS, Git (Pull): 50 RPS, Git (Push): 10 RPS
- Up to 1000 RPS or 50,000 users API: 1000 RPS, Web: 100 RPS, Git (Pull): 100 RPS, Git (Push): 20 RPS
Before you start
The first choice to consider is whether a Self Managed approach is correct for you and your requirements.
Running any application in production is complex, and the same applies for GitLab. While we aim to make this as smooth as possible, there are still the general complexities. This depends on the design chosen, but typically you’ll need to manage all aspects such as hardware, operating systems, networking, storage, security, GitLab itself, and more. This includes both the initial setup of the environment and the longer term maintenance.
As such, it’s recommended that you have a working knowledge of running and maintaining applications in production when deciding on going down this route. If you aren’t in this position, our Professional Services team offers implementation services, but for those who want a more managed solution long term, it’s recommended to instead explore our other offerings such as GitLab SaaS or GitLab Dedicated.
If Self Managed is the approach you’re considering, it’s strongly encouraged to read through this page in full, in particular the Deciding which architecture to use, Large monorepos and Additional workloads sections.
Deciding which architecture to start with
The Reference Architectures are designed to strike a balance between three important factors–performance, resilience and costs.
While they are designed to make it easier to set up GitLab at scale, it can still be a challenge to know which one meets your requirements and where to start accordingly.
As a general guide, the more performant and/or resilient you want your environment to be, the more complex it is.
This section explains the things to consider when picking a Reference Architecture to start with.
Expected load (RPS / user count)
The first thing to check is what the expected peak load is your environment would be expected to serve.
Each architecture is described in terms of peak Requests per Second (RPS) or user count load. As detailed under the “Testing Methodology” section on each page, each architecture is tested against its listed RPS for each endpoint type (API, Web, Git), which is the typical peak load of the given user count, both manual and automated.
It’s strongly recommended finding out what peak RPS your environment will be expected to handle across endpoint types through existing metrics and to select the corresponding architecture as this is the most objective method to determine expected load.
Finding out the RPS can depend greatly on the specific environment setup and monitoring stack. Some potential options include:
- Through GitLab Prometheus with queries such as
sum(irate(gitlab_transaction_duration_seconds_count{controller!~'HealthController|MetricsController|'}[1m])) by (controller, action)
. - Through other monitoring solutions.
- Through Load Balancer statistics.
Contact our Support team for further guidance if required.
If in doubt, pick the closest user count and scale accordingly
If it’s not possible for you to find out the expected peak RPS then it’s recommended to select based on user count to start and then monitor the environment closely to confirm the RPS, whether the architecture is performing and scale accordingly as necessary.
Standalone (non-HA)
For environments serving 2,000 or fewer users, we generally recommend a standalone approach by deploying a non-highly available single or multi-node environment. With this approach, you can employ strategies such as automated backups for recovery to provide a good level of RPO / RTO while avoiding the complexities that come with HA.
With standalone setups, especially single node environments, there are various options available for installation and management including the ability to deploy directly via select cloud provider marketplaces that reduce the complexity a little further.
High Availability (HA)
High Availability ensures every component in the GitLab setup can handle failures through various mechanisms. However, to achieve this is complex, and the environments required can be sizable.
For environments serving 3,000 or more users we generally recommend that a HA strategy is used as at this level outages have a bigger impact against more users. All the architectures in this range have HA built in by design for this reason.
Do you need High Availability (HA)?
As mentioned above, achieving HA does come at a cost. The environment requirements are sizable as each component needs to be multiplied, which comes with additional actual and maintenance costs.
For a lot of our customers with fewer than 3,000 users, we’ve found a backup strategy is sufficient and even preferable. While this does have a slower recovery time, it also means you have a much smaller architecture and less maintenance costs as a result.
In general then, we’d only recommend you employ HA in the following scenarios:
- When you have 3,000 or more users.
- When GitLab being down would critically impact your workflow.
Scaled-down High Availability (HA) approaches
If you still need to have HA for a lower number of users, this can be achieved with an adjusted 3K architecture.
Zero-downtime upgrades
Zero-downtime upgrades are available for standard Reference Architecture environments with HA (Cloud Native Hybrid is not supported). This allows for an environment to stay up during an upgrade, but the process is more complex as a result and has some limitations as detailed in the documentation.
When going through this process it’s worth noting that there may still be brief moments of downtime when the HA mechanisms take effect.
In most cases the downtime required for doing an upgrade shouldn’t be substantial, so this is only recommended if it’s a key requirement for you.
Cloud Native Hybrid (Kubernetes HA)
As an additional layer of HA resilience you can deploy select components in Kubernetes, known as a Cloud Native Hybrid Reference Architecture. For stability reasons, stateful components such as Gitaly cannot be deployed in Kubernetes.
This is an alternative and more advanced setup compared to a standard Reference Architecture. Running services in Kubernetes is well known to be complex. This setup is only recommended if you have strong working knowledge and experience in Kubernetes.
GitLab Geo (Cross Regional Distribution / Disaster Recovery)
With GitLab Geo, you can achieve distributed environments in different regions with a full Disaster Recovery (DR) setup in place. GitLab Geo requires at least two separate environments:
- One primary site.
- One or more secondary sites that serve as replicas.
If the primary site becomes unavailable, you can fail over to one of the secondary sites.
This advanced and complex setup should only be undertaken if DR is a key requirement for your environment. You must also make additional decisions on how each site is configured, such as if each secondary site would be the same architecture as the primary, or if each site is configured for HA.
Large monorepos / Additional workloads
If you have any large monorepos or significant additional workloads, these can affect the performance of the environment notably and adjustments may be required depending on the context.
If either applies to you, it’s encouraged for you to reach out to your Customer Success Manager or our Support team for further guidance.
Cloud provider services
For all the previously described strategies, you can run select GitLab components on equivalent cloud provider services such as the PostgreSQL database or Redis.
For more information, see the recommended cloud providers and services.
Decision Tree
Below you can find the above guidance in the form of a decision tree. It’s recommended you read through the above guidance in full first before though.
Requirements
Before implementing a reference architecture, refer to the following requirements and guidance.
Supported CPUs
The reference architectures are built and tested across various cloud providers, primarily GCP and AWS, with CPU targets being the lowest common denominator to ensure the widest range of compatibility:
Depending on other requirements such as memory or network bandwidth and cloud provider availability, different machine types are used accordingly throughout the architectures, but it is expected that the target CPUs above should perform well.
If you want, you can select a newer machine type series and have improved performance as a result.
Additionally, ARM CPUs are supported for Linux package environments and for any Cloud Provider services where applicable.
Supported disk types
As a general guidance, most standard disk types are expected to work for GitLab, but be aware of the following specific call-outs:
- Gitaly requires at least 8,000 input/output operations per second (IOPS) for read operations, and 2,000 IOPS for write operations.
- We don’t recommend the use of any disk types that are “burstable” due to inconsistent performance.
Outside the above standard, disk types are expected to work for GitLab and the choice of each depends on your specific requirements around areas, such as durability or costs.
Supported infrastructure
As a general guidance, GitLab should run on most infrastructure such as reputable Cloud Providers (AWS, GCP, Azure) and their services, or self-managed (ESXi) that meet both:
- The specifications detailed in each reference architecture.
- Any requirements in this section.
However, this does not constitute a guarantee for every potential permutation.
See Recommended cloud providers and services for more information.
Large Monorepos
The reference architectures were tested with repositories of varying sizes that follow best practices.
However, large monorepos (several gigabytes or more) can significantly impact the performance of Git and in turn the environment itself. Their presence, and how they are used, can put a significant strain on the entire system from Gitaly through to the underlying infrastructure.
As such, large monorepos come with notable cost. If you have such a repository we strongly recommend the following guidance is followed to ensure the best chance of good performance and to keep costs in check:
- Optimize the large monorepo. Using features such as LFS to not store binaries, and other approaches for reducing repository size, can dramatically improve performance and reduce costs.
- Depending on the monorepo, increased environment specifications may be required to compensate. Gitaly in particular will likely require additional resources along with Praefect, GitLab Rails, and Load Balancers. This depends notably on the monorepo itself and the usage against it.
- When the monorepo is significantly large (20 gigabytes or more) further additional strategies maybe required such as even further increased specifications or in some cases a separate Gitaly backend for the monorepo alone.
- Network and disk bandwidth is another potential consideration with large monorepos. In very heavy cases, it’s possible to see bandwidth saturation if there’s a high amount of concurrent clones (such as with CI). It’s strongly recommended reducing full clones wherever possible in this scenario. Otherwise, additional environment specifications may be required to increase bandwidth, but this differs between cloud providers.
Additional workloads
These reference architectures have been designed and tested for standard GitLab setups based on real data.
However, additional workloads can multiply the impact of operations by triggering follow-up actions. You may need to adjust the suggested specifications to compensate if you use, for example:
- Security software on the nodes.
- Hundreds of concurrent CI jobs for large repositories.
- Custom scripts that run at high frequency.
- Integrations in many large projects.
- Server hooks.
- System hooks.
As a general rule, you should have robust monitoring in place to measure the impact of any additional workloads to inform any changes needed to be made. It’s also strongly encouraged for you to reach out to your Customer Success Manager or our Support team for further guidance.
Load Balancers
The Reference Architectures make use of up to two Load Balancers depending on the class:
- External Load Balancer - Serves traffic to any external facing components, primarily Rails.
- Internal Load Balancer - Serves traffic to select internal components that have been deployed in an HA fashion such as Praefect or PgBouncer.
The specifics on which load balancer to use, or its exact configuration is beyond the scope of GitLab documentation. The most common options are to set up load balancers on machine nodes or to use a service such as one offered by Cloud Providers. If deploying a Cloud Native Hybrid environment the Charts can handle the set-up of the External Load Balancer via Kubernetes Ingress.
For each Reference Architecture class a base machine size has given to help get you started if you elect to deploy directly on machines, but these may need to be adjusted accordingly depending on the load balancer used and amount of workload. Of note machines can have varying network bandwidth that should also be taken into consideration.
Note the following sections of additional guidance for Load Balancers.
Balancing algorithm
We recommend that a least-connection-based load balancing algorithm or equivalent is used wherever possible to ensure equal spread of calls to the nodes and good performance.
We don’t recommend the use of round-robin algorithms as they are known to not spread connections equally in practice.
Network Bandwidth
The total network bandwidth available to a load balancer when deployed on a machine can vary notably across Cloud Providers. In particular some Cloud Providers, like AWS, may operate on a burst system with credits to determine the bandwidth at any time.
The network bandwidth your environment’s load balancers will require is dependent on numerous factors such as data shape and workload. The recommended base sizes for each Reference Architecture class have been selected based on real data but in some scenarios, such as consistent clones of large monorepos, the sizes may need to be adjusted accordingly.
No swap
Swap is not recommended in the reference architectures. It’s a failsafe that impacts performance greatly. The reference architectures are designed to have enough memory in most cases to avoid needing swap.
Praefect PostgreSQL
Praefect requires its own database server and that to achieve full High Availability, a third-party PostgreSQL database solution is required.
We hope to offer a built-in solution for these restrictions in the future. In the meantime, a non-HA PostgreSQL server can be set up using the Linux package as the specifications reflect. Refer to the following issues for more information:
Recommended cloud providers and services
Through testing and real life usage, the Reference Architectures are recommended on the following cloud providers:
Reference Architecture | GCP | AWS | Azure | Bare Metal |
---|---|---|---|---|
Linux package | 🟢 | 🟢 | 🟢1 | 🟢 |
Cloud Native Hybrid | 🟢 | 🟢 |
Additionally, the following cloud provider services are recommended for use as part of the Reference Architectures:
Cloud Service | GCP | AWS | Azure | Bare Metal |
---|---|---|---|---|
Object Storage | 🟢 Cloud Storage | 🟢 S3 | 🟢 Azure Blob Storage | 🟢 MinIO |
Database | 🟢 Cloud SQL1 | 🟢 RDS | 🟢 Azure Database for PostgreSQL Flexible Server | |
Redis | 🟢 Memorystore | 🟢 ElastiCache | 🟢 Azure Cache for Redis (Premium) |
- The Enterprise Plus edition for GCP Cloud SQL is generally recommended for optimal performance. This recommendation is especially so for larger environments (500 RPS / 25k users or higher). Max connections may need to be adjusted higher than the service’s defaults depending on workload.
- It’s strongly recommended deploying the Premium tier of Azure Cache for Redis to ensure good performance.
Recommendation notes for the database services
When selecting to use an external database service, it should run a standard, performant, and supported version.
If you choose to use a third party external service:
- The HA Linux package PostgreSQL setup encompasses PostgreSQL, PgBouncer and Consul. All of these components would no longer be required when using a third party external service.
- The number of nodes required to achieve HA may differ depending on the service compared to the Linux package and doesn’t need to match accordingly.
- It’s recommended in general to enable Read Replicas for Database Load Balancing if possible, matching the node counts for the standard Linux package deployment. This recommendation is especially so for larger environments (over 200 RPS / 10k users).
- Ensure that if a pooler is offered as part of the service that it can handle the total load without bottlenecking. For example, Azure Database for PostgreSQL Flexible Server can optionally deploy a PgBouncer pooler in front of the Database, but PgBouncer is single threaded, so this in turn may cause bottlenecking. However, if using Database Load Balancing, this could be enabled on each node in distributed fashion to compensate.
- If GitLab Geo is to be used the service will need to support Cross Region replication.
Unsupported database services
Several database cloud provider services are known not to support the above or have been found to have other issues and aren’t recommended:
- Amazon Aurora is incompatible and not supported. See 14.4.0 for more details.
- Azure Database for PostgreSQL Single Server is not supported as the service is now deprecated and runs on an unsupported version of PostgreSQL. It was also found to have notable performance and stability issues.
-
Google AlloyDB and Amazon RDS Multi-AZ DB cluster have not been tested and are not recommended. Both solutions are specifically not expected to work with GitLab Geo.
- Amazon RDS Multi-AZ DB instance is a separate product and is supported.
Recommendation notes for the Redis services
When selecting to use an external Redis service, it should run a standard, performant, and supported version. This specifically must not be run in Cluster mode as this is unsupported by GitLab.
Redis is primarily single threaded. For environments targeting up to 200 RPS / 10,000 users or higher, separate out the instances as specified into Cache and Persistent data to achieve optimum performance at this scale.
Recommendation notes for Object Storage
GitLab has been tested against various Object Storage providers that are expected to work.
As a general guidance, it’s recommended to use a reputable solution that has full S3 compatibility.
Deviating from the suggested reference architectures
As a general guideline, the further away you move from the reference architectures, the harder it is to get support for it. With any deviation, you’re introducing a layer of complexity that adds challenges to finding out where potential issues might lie.
The reference architectures use the official Linux packages or Helm Charts to install and configure the various components. The components are installed on separate machines (virtualized or bare metal), with machine hardware requirements listed in the “Configuration” column and equivalent VM standard sizes listed in GCP/AWS/Azure columns of each available reference architecture.
Running components on Docker (including Docker Compose) with the same specs should be fine, as Docker is well known in terms of support.
However, it is still an additional layer and may still add some support complexities, such as not being able to run strace
easily in containers.
Unsupported designs
While we endeavour to try and have a good range of support for GitLab environment designs, there are certain approaches we know definitively not to work, and as a result are not supported. Those approaches are detailed in the following sections.
Stateful components in Kubernetes
Running stateful components in Kubernetes, such as Gitaly Cluster, is not supported.
Gitaly Cluster is only supported on conventional virtual machines. Kubernetes enforces strict memory restrictions, but Git memory usage is unpredictable, which can cause sporadic OOM termination of Gitaly pods, leading to significant disruptions and potential data loss. For this reason and others, Gitaly is not tested or supported in Kubernetes. For more information, see epic 6127.
This also applies to other third-party stateful components such as Postgres and Redis, but you can explore other third-party solutions for those components if desired such as supported Cloud Provider services unless called out specifically as unsupported.
Autoscaling of stateful nodes
As a general guidance, only stateless components of GitLab can be run in Autoscaling groups, namely GitLab Rails and Sidekiq. Other components that have state, such as Gitaly, are not supported in this fashion (for more information, see issue 2997).
This also applies to other third-party stateful components such as Postgres and Redis, but you can explore other third-party solutions for those components if desired such as supported Cloud Provider services unless called out specifically as unsupported.
However, Cloud Native Hybrid setups are generally preferred over ASGs as certain components such as like database migrations and Mailroom can only be run on one node, which is handled better in Kubernetes.
Spreading one environment over multiple data centers
Deploying one GitLab environment over multiple data centers is not supported due to potential split brain edge cases if a data center were to go down. For example, several components of the GitLab setup, namely Consul, Redis Sentinel and Praefect require an odd number quorum to function correctly and splitting over multiple data centers can impact this notably.
For deploying GitLab over multiple data centers or regions we offer GitLab Geo as a comprehensive solution.
Validation and test results
The Test Platform team does regular smoke and performance tests for the reference architectures to ensure they remain compliant.
Why we perform the tests
The Quality Department has a focus on measuring and improving the performance of GitLab, and creating and validating reference architectures that self-managed customers can rely on as performant configurations.
For more information, see our handbook page.
How we perform the tests
Testing occurs against all reference architectures and cloud providers in an automated and ad-hoc fashion. This is done by two tools:
- The GitLab Environment Toolkit Terraform and Ansible scripts for building the environments.
- The GitLab Performance Tool for performance testing.
Network latency on the test environments between components on all Cloud Providers were measured at <5 ms. This is shared as an observation and not as an implicit recommendation.
We aim to have a “test smart” approach where architectures tested have a good range that can also apply to others. Testing focuses on a 10k Linux package installation on GCP as the testing has shown this is a good bellwether for the other architectures and cloud providers and Cloud Native Hybrids.
The Standard Reference Architectures are designed to be platform-agnostic, with everything being run on VMs through the Linux package. While testing occurs primarily on GCP, ad-hoc testing has shown that they perform similarly on hardware with equivalent specs on other Cloud Providers or if run on premises (bare-metal).
Testing on these reference architectures is performed with the GitLab Performance Tool at specific coded workloads, and the throughputs used for testing are calculated based on sample customer data. Select the reference architecture that matches your scale.
Each endpoint type is tested with the following number of requests per second (RPS) per 1,000 users:
- API: 20 RPS
- Web: 2 RPS
- Git (Pull): 2 RPS
- Git (Push): 0.4 RPS (rounded to the nearest integer)
The above RPS targets were selected based on real customer data of total environmental loads corresponding to the user count, including CI and other workloads.
How to interpret the results
Testing is done publicly, and all results are shared.
The following table details the testing done against the reference architectures along with the frequency and results. Additional testing is continuously evaluated, and the table is updated accordingly.
Reference Architecture | GCP (* also proxy for Bare-Metal) | AWS | Azure | |||
---|---|---|---|---|---|---|
Linux package | Cloud Native Hybrid | Linux package | Cloud Native Hybrid | Linux package | ||
1k | Weekly | |||||
2k | Weekly | Planned | ||||
3k | Weekly | Weekly | ||||
5k | Weekly | |||||
10k | Daily | Weekly | Weekly | Weekly | ||
25k | Weekly | |||||
50k | Weekly |
Cost calculator templates
As a starting point, the following table lists initial compute calculator cost templates for the different reference architectures across GCP, AWS, and Azure by using each cloud provider’s official calculator.
However, be aware of the following caveats:
- These are only rough estimate compute templates for the Linux package architectures.
- They do not take into account dynamic elements such as disk, network or object storage - Which can notably impact costs.
- Due to the nature of Cloud Native Hybrid, it’s not possible to give a static cost calculation for that deployment.
- Committed use discounts are applied if they are defaulted as such for the cloud provider calculator in question.
- Bare-metal costs are also not included here as it varies widely depending on each configuration.
To get an accurate estimate of costs for your specific environment you must take the closest template and adjust it accordingly to match the specs and your expected usage.
Reference Architecture | GCP | AWS | Azure |
---|---|---|---|
Linux package | Linux package | Linux package | |
1k | Calculated cost | Calculated cost | Calculated cost |
2k | Calculated cost | Calculated cost | Calculated cost |
3k | Calculated cost | Calculated cost | Calculated cost |
5k | Calculated cost | Calculated cost | Calculated cost |
10k | Calculated cost | Calculated cost | Calculated cost |
25k | Calculated cost | Calculated cost | Calculate cost |
50k | Calculated cost | Calculated cost | Calculated cost |
Maintaining a Reference Architecture environment
Maintaining a Reference Architecture environment is generally the same as any other GitLab environment is generally covered in other sections of this documentation.
In this section you’ll find links to documentation for relevant areas and any specific Reference Architecture notes.
Scaling an environment
The Reference Architectures have been designed as a starting point and are elastic and scalable throughout. It’s more likely than not that you may want to adjust the environment for your specific needs after deployment for reasons such as additional performance capacity or reduced costs. This is expected and, as such, scaling can be done iteratively or wholesale to the next size of architecture depending on if metrics suggest a component is being exhausted.
For most components vertical and horizontal scaling can be applied as usual. However, before doing so, be aware of the below caveats:
- When scaling Puma or Sidekiq vertically the amount of workers will need to be adjusted to use the additional specs. Puma will be scaled automatically on the next reconfigure but Sidekiq will need its configuration changed beforehand.
- Redis and PgBouncer are primarily single threaded. If these components are seeing CPU exhaustion they may need to be scaled out horizontally.
- Scaling certain components significantly can result in notable knock on effects that affect the performance of the environment. Refer to the dedicated section below for more guidance.
Conversely, if you have robust metrics in place that show the environment is over-provisioned, you can scale downwards similarly. You should take an iterative approach when scaling downwards, however, to ensure there are no issues.
Scaling knock on effects
In some cases scaling a component significantly may result in knock on effects for downstream components, impacting performance. The Reference Architectures were designed with balance in mind to ensure components that depend on each other are congruent in terms of specs. As such you may find when notably scaling a component that it’s increase may result in additional throughput being passed to the other components it depends on and that they, in turn, may need to be scaled as well.
The following components can impact others when they have been significantly scaled:
- Puma and Sidekiq - Notable scale ups of either Puma or Sidekiq workers will result in higher concurrent connections to the internal load balancer, PostgreSQL (via PgBouncer if present), Gitaly (via Praefect if present) and Redis respectively.
- Redis is primarily single threaded and in some cases may need to be split up into different instances (Cache / Persistent) if the increased throughput causes CPU exhaustion if a combined cluster is currently being used.
- PgBouncer is also single threaded but a scale out might result in a new pool being added that in turn might increase the total connections to Postgres. It’s strongly recommended to only do this if you have experience in managing Postgres connections and to seek assistance if in doubt.
- Gitaly Cluster / PostgreSQL - A notable scale out of additional nodes can have a detrimental effect on the HA system and performance due to increased replication calls to the primary node.
Scaling from a non-HA to an HA architecture
While in most cases vertical scaling is only required to increase an environment’s resources, if you are moving to an HA environment additional steps are required for the following components to switch over to their HA forms respectively by following the given documentation for each as follows
- Redis to multi-node Redis w/ Redis Sentinel
- Postgres to multi-node Postgres w/ Consul + PgBouncer
- Gitaly to Gitaly Cluster w/ Praefect
Upgrades
Upgrades for a Reference Architecture environment is the same as any other GitLab environment. The main Upgrade GitLab section has detailed steps on how to approach this.
Zero-downtime upgrades are also available.
Monitoring
There are numerous options available to monitor your infrastructure, and GitLab itself, and you should refer to your selected monitoring solution’s documentation for more information.
Of note, the GitLab application is bundled with Prometheus and various Prometheus compatible exporters that could be hooked into your solution.
Update history
Below is a history of notable updates for the Reference Architectures (2021-01-01 onward, ascending order), which we aim to keep updated at least once per quarter.
You can find a full history of changes on the GitLab project.
2024:
- 2024-08: Updated Expected Load section with some more examples on how to calculate RPS.
- 2024-08: Updated Redis configuration on 40 RPS / 2k User page to have correct Redis configuration.
- 2024-08: Updated Sidekiq configuration for Prometheus in Monitoring node on 2k.
- 2024-08: Added Next Steps breadcrumb section to the pages to help discoverability of additional features.
- 2024-05: Updated the 60 RPS / 3k User and 100 RPS / 5k User pages to have latest Redis guidance on co-locating Redis Sentinel with Redis itself.
-
2024-05: Renamed
Cost to run
section toCost calculator templates
to better reflect the calculators are only a starting point and need to be adjusted with specific usage to give more accurate cost estimates. - 2024-04: Updated recommended sizings for Webservice nodes for Cloud Native Hybrids on GCP. Also adjusted NGINX pod recommendation to be run on Webservice node pool as a DaemonSet.
- 2024-04: Updated 20 RPS / 1,000 User architecture specs to follow recommended memory target of 16 GB.
- 2024-04: Updated Reference Architecture titles to include RPS for further clarity and to help right sizing.
- 2024-02: Updated recommended sizings for Load Balancer nodes if deployed on VMs. Also added notes on network bandwidth considerations.
- 2024-02: Remove the Sidekiq Max Concurrency setting in examples as this is deprecated and no longer required to be set explicitly.
- 2024-02: Adjusted the Sidekiq recommendations on 2k to disable Sidekiq on Rails nodes and updated architecture diagram.
- 2024-01: Updated recommendations for Azure for all Reference Architecture sizes and latest cloud services.
2023:
- 2023-12-12: Updated notes on Load Balancers to be more reflective that any reputable offering is expected to work.
- 2023-11-03: Expanded details on what each Reference Architecture is designed for, the testing methodology used and added details on how to scale environments.
- 2023-11-03: Added expanded notes on disk types, object storage and monitoring.
- 2023-10-25: Adjusted Sidekiq configuration example to use Linux Package role.
- 2023-10-15: Adjusted the Sidekiq recommendations to include a separate node for 2k and tweaks to instance type and counts for 3k and 5k.
- 2023-10-08: Added more expanded notes throughout to warn about the use of Large Monorepos and their impacts for increased awareness.
- 2023-10-04: Updated name of Task Runner pod to its new name of Toolbox.
- 2023-10-02: Expanded guidance on using an external service for Redis further, in particular for separated Cache and Persistent services with 10k and up.
- 2023-09-21: Expanded details on the challenges of running Gitaly in Kubernetes.
- 2023-09-20: Removed references to Grafana after deprecation and removal.
- 2023-08-30: Expanded section on Geo under the Decision Tree.
- 2023-08-08: Switch config example to use the Sidekiq role for Linux package.
- 2023-08-03: Fixed an AWS Machine type typo for the 50k architecture.
- 2023-06-30: Update PostgreSQL configuration examples to remove a now unneeded setting to instead use the Linux package default.
- 2023-06-30: Add explicit example on main page that reflects Google Memorystore is recommended.
- 2023-06-11: Fix IP examples for the 3k and 5k architectures.
- 2023-05-25: Expand notes on usage of external Cloud Provider Services and the recommendation of separated Redis servers for 10k environments and up.
- 2023-05-03: Update documentation to reflect correct requirement of Redis 6 instead of 5.
- 2023-04-28: Add a note that the Azure Active Directory authentication method is not supported for use with Azure PostgreSQL Flexible service.
- 2023-03-23: Add more details about known unsupported designs.
- 2023-03-16: Update Redis configuration examples for multi-node to have correct config to ensure all components can connect.
- 2023-03-15: Update Gitaly configuration examples to the new format.
- 2023-03-14: Update cost estimates to no longer include NFS VMs.
- 2023-02-17: Update Praefect configuration examples to the new format.
- 2023-02-14: Add examples of what automations may be considered additional workloads.
- 2023-02-13: Add a new ‘Before you Start’ section that gives more context about what’s involved with running production software self-managed. Also added more details for Standalone setups and Cloud Provider services in the Decision Tree section.
- 2023-02-01: Switch to use more common “complex” terminology instead of less known “involved”.
- 2023-01-31: Expand and centralize the requirements’ section on the main page.
- 2023-01-26: Add notes on migrating Git Data from NFS, that object data is still supported on NFS and handling SSH keys correctly across multiple Rails nodes.
2022:
-
2022-12-14: Remove guidance for using NFS for Git data as support for this is now ended with
15.6
onwards. -
2022-12-12: Add note to clarify difference between Amazon RDS Multi-AZ DB cluster and instance, with the latter being supported. Also increase PostgreSQL max connections setting to new default of
500
. -
2022-12-12: Update Sidekiq max concurrency configuration to match new default of
20
. - 2022-11-16: Correct guidance for Praefect and Gitaly in reduced 3k architecture section that an odd number quorum is required.
- 2022-11-15: Add guidance on how to handle GitLab Secrets in Cloud Native Hybrids and further links to the GitLab Charts documentation.
- 2022-11-14: Fix a typo with Sidekiq configuration for the 10k architecture.
- 2022-11-09: Add guidance on large monorepos and additional workloads impact on performance. Also expanded Load Balancer guidance around SSL and a recommendation for least connection based routing methods.
- 2022-10-18: Adjust Object Storage guidance to make it clearer it’s recommended over NFS.
- 2022-10-11: Update guidance for Azure to recommend up to 2k only due to performance issues.
- 2022-09-27: Add Decision Tree section to help users better decide what architecture to use.
- 2022-09-22: Add explicit step to enable Incremental Logging when only Object Storage is being used.
- 2022-09-22: Expand guidance on recommended cloud providers and services.
-
2022-09-09: Expand Object Storage guidance and updated that NFS support for Git data ends with
15.6
. - 2022-08-24: Add a clearer note that Gitaly Cluster is not supported in Kubernetes.
- 2022-08-24: Add section on supported CPUs and types.
- 2022-08-18: Update architecture tables to be clearer for Object Storage support.
- 2022-08-17: Increase Cloud Native Hybrid pool specs for 2k architecture to ensure enough resources present for pods. Also increased Sidekiq worker count.
- 2022-08-02: Add note to use newer Gitaly check command from GitLab 15 and later.
- 2022-07-25: Move troubleshooting section to a more general location.
- 2022-07-14: Add guidance that Amazon Aurora is no longer compatible and not supported from GitLab 14.4.0 and later.
-
2022-07-07: Add call out not to remove the
default
section from Gitaly storages config as it’s required. - 2022-06-08: Move Incremental Logging guidance to separate section.
- 2022-04-29: Expand testing results’ section with new regular pipelines.
- 2022-04-26: Update Praefect configuration to reflect setting name changes.
- 2022-04-15: Add missing setting to enable Object Storage correctly.
- 2022-04-14: Expand Cloud Native Hybrid guidance with AWS machine types.
- 2022-04-08: Add cost estimates for AWS and Azure.
- 2022-04-06: Update configuration examples for most components to be correctly included for Prometheus monitoring auto discovery.
- 2022-03-30: Expand validation and testing result’s section with more clearly language and more detail.
- 2022-03-21: Add a note that additional specs may be needed for Gitaly in some scenarios.
- 2022-03-04: Add guidance for preventing the GitLab KAS service running on nodes where not required.
- 2022-03-01: Fix a typo for Praefect TLS port in configuration examples.
- 2022-02-22: Add guidance to enable the Gitaly Pack-objects cache.
- 2022-02-22: Add a general section on recommended Cloud Providers and services.
- 2022-02-14: Link to blog post about GPT testing added.
- 2022-01-26: Merge testing process and cost estimates into one section with expanded details.
- 2022-01-13: Expand guidance on recommended Kubernetes platforms.
2021:
- 2021-12-31: Fix typo for 25k Redis AWS machine size.
- 2021-12-28: Add Cloud Provider breakdowns to testing process & results section.
- 2021-12-17: Add more detail to testing process and results section.
- 2021-12-17: Add note on Database Load Balancing requirements when using a modified 3k architecture.
- 2021-12-17: Add diagram for 1k architecture (single node).
- 2021-12-15: Add sections on estimated costs (GCP), testing process and results and further Cloud Provider service details.
- 2021-12-14: Expand external database service guidance for components and what Cloud Provider services are recommended.
- 2021-11-24: Add recommendations for Database Load Balancing.
- 2021-11-04: Add more detail about testing targets used for the architectures.
- 2021-10-13: Add guidance around optionally enabling Incremental Logging via Redis.
-
2021-10-07: Update Sidekiq configuration to include required
external_url
setting. - 2021-10-02: Expand guidance around Gitaly Cluster and Gitaly Sharded.
- 2021-09-29: Add note on what Cloud Native Hybrid architecture to use with small user counts.
- 2021-09-27: Change guidance to now co-locate Redis Sentinel beside Redis on the same node.
- 2021-08-18: Add 2k Cloud Native Hybrid architecture.
- 2021-08-04: Add links to performance test results for each architecture.
- 2021-07-30: Fix the replication settings in PostgreSQL configuration examples to have correct values.
- 2021-07-22: Add 3k Cloud Native Hybrid architecture.
- 2021-07-16: Update architecture diagrams to correctly reflect no direct connection between Rails and Sidekiq.
- 2021-07-15: Update Patroni configuration to include Rest API authentication settings.
- 2021-07-15: Add 5k Cloud Native Hybrid architecture.
- 2021-07-08: Add 25k Cloud Native Hybrid architecture.
- 2021-06-29: Add 50k Cloud Native Hybrid architecture.
- 2021-06-23: Make additions to main page for Cloud Native Hybrid and reduce 3k architecture.
- 2021-06-16: Update PostgreSQL steps and configuration to use the latest roles and prep for any Geo replication.
- 2021-06-14: Update configuration examples for Monitoring node to follow latest.
- 2021-06-11: Expand notes on external services with more detail.
- 2021-06-09: Add additional guidance and expand on how to correctly manage GitLab secrets and database migrations.
- 2021-06-09: Update Praefect configuration examples to follow the new storages format.
- 2021-06-03: Removed references for the Unicorn webserver, which has been replaced by Puma.
- 2021-04-23: Update Sidekiq configuration examples to show how to correctly configure multiple workers on each node.
- 2021-04-23: Add initial guidance on how to modify the 3k Reference Architecture for lower user counts.
- 2021-04-13: Add further clarification on using external services (PostgreSQL, Redis).
- 2021-04-12: Add additional guidance on using Load Balancers and their routing methods.
- 2021-04-08: Add additional guidance on how to correctly configure only one node to do database migrations for Praefect.
- 2021-04-06: Expand 10k Cloud Native Hybrid documentation with more details and clear naming.
- 2021-03-04: Expand Gitaly Cluster documentation to all other applicable Reference Architecture sizes.
- 2021-02-19: Add additional Object Storage guidance of using separated buckets for different data types as per recommendations.
- 2021-02-12: Add documentation for setting up Object Storage with Rails and Sidekiq.
- 2021-02-12: Add documentation for setting up Gitaly Cluster for the 10k Reference Architecture.
- 2021-02-09: Add the first iteration of the 10k Cloud Native Hybrid reference architecture.
- 2021-01-07: Add documentation for using Patroni as PostgreSQL replication manager.