130 lines
4.9 KiB
Ruby
130 lines
4.9 KiB
Ruby
# frozen_string_literal: true
|
|
module SidekiqLogArguments
|
|
def self.enabled?
|
|
Gitlab::Utils.to_boolean(ENV['SIDEKIQ_LOG_ARGUMENTS'], default: true)
|
|
end
|
|
end
|
|
|
|
def enable_reliable_fetch?
|
|
return true unless Feature::FlipperFeature.table_exists?
|
|
|
|
Feature.enabled?(:gitlab_sidekiq_reliable_fetcher, type: :ops)
|
|
end
|
|
|
|
def enable_semi_reliable_fetch_mode?
|
|
return true unless Feature::FlipperFeature.table_exists?
|
|
|
|
Feature.enabled?(:gitlab_sidekiq_enable_semi_reliable_fetcher, type: :ops)
|
|
end
|
|
|
|
# Custom Queues configuration
|
|
queues_config_hash = Gitlab::Redis::Queues.params
|
|
queues_config_hash[:namespace] = Gitlab::Redis::Queues::SIDEKIQ_NAMESPACE
|
|
|
|
enable_json_logs = Gitlab.config.sidekiq.log_format == 'json'
|
|
enable_sidekiq_memory_killer = ENV['SIDEKIQ_MEMORY_KILLER_MAX_RSS'].to_i.nonzero?
|
|
use_sidekiq_daemon_memory_killer = ENV.fetch("SIDEKIQ_DAEMON_MEMORY_KILLER", 1).to_i.nonzero?
|
|
use_sidekiq_legacy_memory_killer = !use_sidekiq_daemon_memory_killer
|
|
|
|
Sidekiq.configure_server do |config|
|
|
config.options[:strict] = false
|
|
config.options[:queues] = Gitlab::SidekiqConfig.expand_queues(config.options[:queues])
|
|
|
|
if enable_json_logs
|
|
config.log_formatter = Gitlab::SidekiqLogging::JSONFormatter.new
|
|
config.options[:job_logger] = Gitlab::SidekiqLogging::StructuredLogger
|
|
|
|
# Remove the default-provided handler. The exception is logged inside
|
|
# Gitlab::SidekiqLogging::StructuredLogger
|
|
config.error_handlers.reject! { |handler| handler.is_a?(Sidekiq::ExceptionHandler::Logger) }
|
|
end
|
|
|
|
Sidekiq.logger.info "Listening on queues #{config.options[:queues].uniq.sort}"
|
|
|
|
config.redis = queues_config_hash
|
|
|
|
config.server_middleware(&Gitlab::SidekiqMiddleware.server_configurator(
|
|
metrics: Settings.monitoring.sidekiq_exporter,
|
|
arguments_logger: SidekiqLogArguments.enabled? && !enable_json_logs,
|
|
memory_killer: enable_sidekiq_memory_killer && use_sidekiq_legacy_memory_killer
|
|
))
|
|
|
|
config.client_middleware(&Gitlab::SidekiqMiddleware.client_configurator)
|
|
|
|
config.death_handlers << Gitlab::SidekiqDeathHandler.method(:handler)
|
|
|
|
config.on :startup do
|
|
# Clear any connections that might have been obtained before starting
|
|
# Sidekiq (e.g. in an initializer).
|
|
ActiveRecord::Base.clear_all_connections! # rubocop:disable Database/MultipleDatabases
|
|
|
|
# Start monitor to track running jobs. By default, cancel job is not enabled
|
|
# To cancel job, it requires `SIDEKIQ_MONITOR_WORKER=1` to enable notification channel
|
|
Gitlab::SidekiqDaemon::Monitor.instance.start
|
|
|
|
Gitlab::SidekiqDaemon::MemoryKiller.instance.start if enable_sidekiq_memory_killer && use_sidekiq_daemon_memory_killer
|
|
|
|
first_sidekiq_worker = !ENV['SIDEKIQ_WORKER_ID'] || ENV['SIDEKIQ_WORKER_ID'] == '0'
|
|
health_checks = Settings.monitoring.sidekiq_health_checks
|
|
|
|
# Start health-check in-process server
|
|
if first_sidekiq_worker && health_checks.enabled
|
|
Gitlab::HealthChecks::Server.instance(
|
|
address: health_checks.address,
|
|
port: health_checks.port
|
|
).start
|
|
end
|
|
end
|
|
|
|
if enable_reliable_fetch?
|
|
config.options[:semi_reliable_fetch] = enable_semi_reliable_fetch_mode?
|
|
Sidekiq::ReliableFetch.setup_reliable_fetch!(config)
|
|
end
|
|
|
|
Gitlab.config.load_dynamic_cron_schedules!
|
|
|
|
# Sidekiq-cron: load recurring jobs from gitlab.yml
|
|
# UGLY Hack to get nested hash from settingslogic
|
|
cron_jobs = Gitlab::Json.parse(Gitlab.config.cron_jobs.to_json)
|
|
# UGLY hack: Settingslogic doesn't allow 'class' key
|
|
cron_jobs_required_keys = %w(job_class cron)
|
|
cron_jobs.each do |k, v|
|
|
if cron_jobs[k] && cron_jobs_required_keys.all? { |s| cron_jobs[k].key?(s) }
|
|
cron_jobs[k]['class'] = cron_jobs[k].delete('job_class')
|
|
else
|
|
cron_jobs.delete(k)
|
|
Gitlab::AppLogger.error("Invalid cron_jobs config key: '#{k}'. Check your gitlab config file.")
|
|
end
|
|
end
|
|
Sidekiq::Cron::Job.load_from_hash! cron_jobs
|
|
|
|
Gitlab::SidekiqVersioning.install!
|
|
|
|
Gitlab.ee do
|
|
Gitlab::Mirror.configure_cron_job!
|
|
|
|
Gitlab::Geo.configure_cron_jobs!
|
|
end
|
|
|
|
# Avoid autoload issue such as 'Mail::Parsers::AddressStruct'
|
|
# https://github.com/mikel/mail/issues/912#issuecomment-214850355
|
|
Mail.eager_autoload!
|
|
|
|
# Ensure the whole process group is terminated if possible
|
|
Gitlab::SidekiqSignals.install!(Sidekiq::CLI::SIGNAL_HANDLERS)
|
|
end
|
|
|
|
Sidekiq.configure_client do |config|
|
|
config.redis = queues_config_hash
|
|
# We only need to do this for other clients. If Sidekiq-server is the
|
|
# client scheduling jobs, we have access to the regular sidekiq logger that
|
|
# writes to STDOUT
|
|
Sidekiq.logger = Gitlab::SidekiqLogging::ClientLogger.build
|
|
Sidekiq.logger.formatter = Gitlab::SidekiqLogging::JSONFormatter.new if enable_json_logs
|
|
|
|
config.client_middleware(&Gitlab::SidekiqMiddleware.client_configurator)
|
|
end
|
|
|
|
Sidekiq::Scheduled::Poller.prepend Gitlab::Patch::SidekiqPoller
|
|
Sidekiq::Cron::Poller.prepend Gitlab::Patch::SidekiqPoller
|
|
Sidekiq::Cron::Poller.prepend Gitlab::Patch::SidekiqCronPoller
|