Query Count Limits
Each controller, API endpoint and Sidekiq worker is allowed to execute up to 100 SQL queries. If more than 100 SQL queries are executed, this is a performance problem that should be fixed.
Solving Failing Tests
In test environments, we raise an error when this threshold is exceeded.
When a test fails because it executes more than 100 SQL queries there are two solutions to this problem:
- Reduce the number of SQL queries that are executed.
- Temporarily disable query limiting for the controller or API endpoint.
You should only resort to disabling query limits when an existing controller or endpoint is to blame as in this case reducing the number of SQL queries can take a lot of effort. Newly added controllers and endpoints are not allowed to execute more than 100 SQL queries and no exceptions are made for this rule.
Pipeline Stability
If specs start getting a query limit error in default branch pipelines, please follow the instruction to disable the query limit. Disabling the limit should always associate and prioritize an issue, so the excessive amount of queries can be investigated.
Disable query limiting
In the event that you have to disable query limits for a controller, you must first
create an issue. This issue should (preferably in the title) mention the
controller or endpoint and include the appropriate labels (database
,
performance
, and at least a team specific label such as Discussion
).
Since GitLab 17.2,
QueryLimiting.disable
must set a new threshold (not unlimited).
After the issue has been created, you can disable query limits on the code in question. For
Rails controllers it’s best to create a before_action
hook that runs as early
as possible. The called method in turn should call
Gitlab::QueryLimiting.disable!('issue URL here')
. For example:
class MyController < ApplicationController
before_action :disable_query_limiting, only: [:show]
def index
# ...
end
def show
# ...
end
def disable_query_limiting
Gitlab::QueryLimiting.disable!('https://gitlab.com/gitlab-org/...', new_threshold: 200)
end
end
By using a before_action
you don’t have to modify the controller method in
question, reducing the likelihood of merge conflicts.
For Grape API endpoints there unfortunately is not a reliable way of running a hook before a specific endpoint. This means that you have to add the allowlist call directly into the endpoint like so:
get '/projects/:id/foo' do
Gitlab::QueryLimiting.disable!('...', new_threshold: 200)
# ...
end
For Sidekiq workers, you will need to add the allowlist directly as well:
def perform(args)
Gitlab::QueryLimiting.disable!('...', new_threshold: 200)
# ...
end