- GitLab Geo database replication
Note: This is the documentation for installations from source. For installations using the Omnibus GitLab packages, follow the database replication for Omnibus GitLab guide.
- Install GitLab Enterprise Edition on the server that will serve as the secondary Geo node. Do not login or set up anything else in the secondary node for the moment.
- Setup the database replication (
primary (read-write) <-> secondary (read-only)topology).
- Configure GitLab to set the primary and secondary nodes.
- Follow the after setup steps.
This document describes the minimal steps you have to take in order to replicate your GitLab database into another server. You may have to change some values according to your database setup, how big it is, etc.
You are encouraged to first read through all the steps before executing them in your testing/production environment.
The GitLab primary node where the write operations happen will connect to
primary database server, and the secondary ones which are read-only will
secondary database servers (which are read-only too).
Note: In many databases documentation you will see
primarybeing references as
The following guide assumes that:
- You are using PostgreSQL 9.6 or later which includes the
pg_basebackuptool. If you are using Omnibus it includes the required PostgreSQL version for Geo.
- You have a primary server already set up (the GitLab server you are replicating from), and you have a new secondary server set up on the same OS and PostgreSQL version.
- The IP of the primary server for our examples will be
220.127.116.11, whereas the secondary's IP will be
SSH into your database primary server and login as root:
Create a replication user named
sudo -u postgres psql -c "CREATE USER gitlab_replicator REPLICATION ENCRYPTED PASSWORD 'thepassword';"
postgresql.confto configure the primary server for streaming replication (for Debian/Ubuntu that would be
listen_address = '18.104.22.168' wal_level = hot_standby max_wal_senders = 5 min_wal_size = 80MB max_wal_size = 1GB wal_keep_segments = 10 hot_standby = on
See the Omnibus notes above for more details of
You may also want to edit the
max_wal_sendersto match your database replication requirements. Consult the PostgreSQL - Replication documentation for more information.
Set the access control on the primary to allow TCP connections using the server's public IP and set the connection from the secondary to require a password. Edit
pg_hba.conf(for Debian/Ubuntu that would be
host all all 127.0.0.1/32 trust host all all 22.214.171.124/32 trust host replication gitlab_replicator 126.96.36.199/32 md5
188.8.131.52is the public IP address of the primary server, and
184.108.40.206the public IP address of the secondary one. If you want to add another secondary, add one more row like the replication one and change the IP address:
host all all 127.0.0.1/32 trust host all all 220.127.116.11/32 trust host replication gitlab_replicator 18.104.22.168/32 md5 host replication gitlab_replicator 22.214.171.124/32 md5
Restart PostgreSQL for the changes to take effect.
Now that the PostgreSQL server is set up to accept remote connections, run
netstat -plntto make sure that PostgreSQL is listening to the server's public IP.
SSH into your database secondary server and login as root:
Test that the remote connection to the primary server works:
sudo -u postgres psql -h 126.96.36.199 -U gitlab_replicator -d gitlabhq_production -W
When prompted enter the password you set in the first step for the
gitlab_replicatoruser. If all worked correctly, you should see the database prompt.
Exit the PostgreSQL console:
postgresql.confto configure the secondary for streaming replication (for Debian/Ubuntu that would be
wal_level = hot_standby max_wal_senders = 5 checkpoint_segments = 10 wal_keep_segments = 10 hot_standby = on
Restart PostgreSQL for the changes to take effect.
Continue to initiate the replication process.
Below we provide a script that connects to the primary server, replicates the database and creates the needed files for replication.
The directories used are the defaults for Debian/Ubuntu. If you have changed any defaults, configure it as you see fit replacing the directories and paths.
Warning: Make sure to run this on the secondary server as it removes all PostgreSQL's data before running
SSH into your GitLab secondary server and login as root:
Save the snippet below in a file, let's say
#!/bin/bash PORT="5432" USER="gitlab_replicator" echo --------------------------------------------------------------- echo WARNING: Make sure this scirpt is run from the secondary server echo --------------------------------------------------------------- echo echo Enter the IP of the primary PostgreSQL server read HOST echo Enter the password for $USER@$HOST read -s PASSWORD echo Stopping PostgreSQL and all GitLab services gitlab-ctl stop echo Backing up postgresql.conf sudo -u gitlab-psql mv /var/opt/gitlab/postgresql/data/postgresql.conf /var/opt/gitlab/postgresql/ echo Cleaning up old cluster directory sudo -u gitlab-psql rm -rf /var/opt/gitlab/postgresql/data rm -f /tmp/postgresql.trigger echo Starting base backup as the replicator user echo Enter the password for $USER@$HOST sudo -u gitlab-psql /opt/gitlab/embedded/bin/pg_basebackup -h $HOST -D /var/opt/gitlab/postgresql/data -U gitlab_replicator -v -x -P echo Writing recovery.conf file sudo -u gitlab-psql bash -c "cat > /var/opt/gitlab/postgresql/data/recovery.conf <<- _EOF1_ standby_mode = 'on' primary_conninfo = 'host=$HOST port=$PORT user=$USER password=$PASSWORD' trigger_file = '/tmp/postgresql.trigger' _EOF1_ " echo Restoring postgresql.conf sudo -u gitlab-psql mv /var/opt/gitlab/postgresql/postgresql.conf /var/opt/gitlab/postgresql/data/ echo Starting PostgreSQL and all GitLab services gitlab-ctl start
Run it with:
When prompted, enter the password you set up for the
gitlab_replicatoruser in the first step.
The replication process is now over.
Now that the database replication is done, the next step is to configure GitLab.
We don't support MySQL replication for GitLab Geo.
Read the troubleshooting document.