Commit e63a8da4 authored by Marcel Amirault's avatar Marcel Amirault

Merge branch 'DmitrijsF-master-patch-28423' into 'master'

Update zero_downtime.md to fix Vale issues

See merge request gitlab-org/gitlab!75837
parents 20e834aa 9b55eb07
...@@ -29,9 +29,9 @@ If you meet all the requirements above, follow these instructions in order. Ther ...@@ -29,9 +29,9 @@ If you meet all the requirements above, follow these instructions in order. Ther
| [Geo](#geo-deployment) | GitLab EE with Geo enabled | | [Geo](#geo-deployment) | GitLab EE with Geo enabled |
| [Multi-node / HA with Geo](#multi-node--ha-deployment-with-geo) | GitLab CE/EE on multiple nodes | | [Multi-node / HA with Geo](#multi-node--ha-deployment-with-geo) | GitLab CE/EE on multiple nodes |
Each type of deployment will require that you hot reload the `puma` and `sidekiq` processes on all nodes running these Each type of deployment requires that you hot reload the `puma` and `sidekiq` processes on all nodes running these
services after you've upgraded. The reason for this is that those processes each load the GitLab Rails application which reads and loads services after you've upgraded. The reason for this is that those processes each load the GitLab Rails application which reads and loads
the database schema into memory when starting up. Each of these processes will need to be reloaded (or restarted in the case of `sidekiq`) the database schema into memory when starting up. Each of these processes needs to be reloaded (or restarted in the case of `sidekiq`)
to re-read any database changes that have been made by post-deployment migrations. to re-read any database changes that have been made by post-deployment migrations.
Most of the time you can safely upgrade from a patch release to the next minor Most of the time you can safely upgrade from a patch release to the next minor
...@@ -176,14 +176,14 @@ Upgrades on web (Puma) nodes must be done in a rolling manner, one after ...@@ -176,14 +176,14 @@ Upgrades on web (Puma) nodes must be done in a rolling manner, one after
another, ensuring at least one node is always up to serve traffic. This is another, ensuring at least one node is always up to serve traffic. This is
required to ensure zero-downtime. required to ensure zero-downtime.
Puma will enter a blackout period as part of the upgrade, during which they Puma enters a blackout period as part of the upgrade, during which nodes
continue to accept connections but will mark their respective health check continue to accept connections but mark their respective health check
endpoints to be unhealthy. On seeing this, the load balancer should disconnect endpoints to be unhealthy. On seeing this, the load balancer should disconnect
them gracefully. them gracefully.
Puma will restart only after completing all the currently processing requests. Puma restarts only after completing all the currently processing requests.
This ensures data and service integrity. Once they have restarted, the health This ensures data and service integrity. Once they have restarted, the health
check end points will be marked healthy. check end points are marked healthy.
The nodes must be updated in the following order to update an HA instance using The nodes must be updated in the following order to update an HA instance using
load balancer to latest GitLab version. load balancer to latest GitLab version.
...@@ -254,7 +254,7 @@ the application. ...@@ -254,7 +254,7 @@ the application.
Before you update the main application you need to update Praefect. Before you update the main application you need to update Praefect.
Out of your Praefect nodes, pick one to be your Praefect deploy node. Out of your Praefect nodes, pick one to be your Praefect deploy node.
This is where you will install the new Omnibus package first and run This is where you install the new Omnibus package first and run
database migrations. database migrations.
**Praefect deploy node** **Praefect deploy node**
...@@ -360,7 +360,7 @@ node throughout the process. ...@@ -360,7 +360,7 @@ node throughout the process.
- If you're using PgBouncer: - If you're using PgBouncer:
You'll need to bypass PgBouncer and connect directly to the database master You need to bypass PgBouncer and connect directly to the database master
before running migrations. before running migrations.
Rails uses an advisory lock when attempting to run a migration to prevent Rails uses an advisory lock when attempting to run a migration to prevent
...@@ -457,7 +457,7 @@ following command to get address of current Redis primary ...@@ -457,7 +457,7 @@ following command to get address of current Redis primary
``` ```
- If your application node is running a version older than GitLab 12.7.0, you - If your application node is running a version older than GitLab 12.7.0, you
will have to run the underlying `redis-cli` command (which `get-redis-master` have to run the underlying `redis-cli` command (which `get-redis-master`
command uses) to fetch information about the primary. command uses) to fetch information about the primary.
1. Get the address of one of the sentinel nodes specified as 1. Get the address of one of the sentinel nodes specified as
...@@ -653,7 +653,7 @@ setting `gitlab_rails['auto_migrate'] = false` in ...@@ -653,7 +653,7 @@ setting `gitlab_rails['auto_migrate'] = false` in
This section describes the steps required to upgrade a multi-node / HA This section describes the steps required to upgrade a multi-node / HA
deployment with Geo. Some steps must be performed on a particular node. This deployment with Geo. Some steps must be performed on a particular node. This
node will be known as the “deploy node” and is noted through the following node is known as the “deploy node” and is noted through the following
instructions. instructions.
Updates must be performed in the following order: Updates must be performed in the following order:
...@@ -737,7 +737,7 @@ sudo touch /etc/gitlab/skip-auto-reconfigure ...@@ -737,7 +737,7 @@ sudo touch /etc/gitlab/skip-auto-reconfigure
1. If you're using PgBouncer: 1. If you're using PgBouncer:
You'll need to bypass PgBouncer and connect directly to the database master You need to bypass PgBouncer and connect directly to the database master
before running migrations. before running migrations.
Rails uses an advisory lock when attempting to run a migration to prevent Rails uses an advisory lock when attempting to run a migration to prevent
......
Markdown is supported
0%
or
You are about to add 0 people to the discussion. Proceed with caution.
Finish editing this message first!
Please register or to comment