2020-05-24 23:13:21 +05:30
---
stage: Monitor
2021-04-29 21:17:54 +05:30
group: Monitor
2021-02-22 17:27:13 +05:30
info: To determine the technical writer assigned to the Stage/Group associated with this page, see https://about.gitlab.com/handbook/engineering/ux/technical-writing/#assignments
2020-05-24 23:13:21 +05:30
---
2021-03-11 19:13:27 +05:30
# Monitoring GitLab with Prometheus **(FREE SELF)**
[Prometheus ](https://prometheus.io ) is a powerful time-series monitoring service, providing a flexible
platform for monitoring GitLab and other software products.
2021-10-27 15:23:28 +05:30
2021-03-11 19:13:27 +05:30
GitLab provides out-of-the-box monitoring with Prometheus, providing easy
access to high quality time-series monitoring of GitLab services.
2017-08-17 22:00:37 +05:30
2021-10-27 15:23:28 +05:30
Prometheus and the various exporters listed in this page are bundled in the
Omnibus GitLab package. Check each exporter's documentation for the timeline
they got added. For installations from source you must install them
yourself. Over subsequent releases additional GitLab metrics are captured.
Prometheus services are on by default.
Prometheus and its exporters don't authenticate users, and are available to anyone who can access
them.
2017-08-17 22:00:37 +05:30
## Overview
Prometheus works by periodically connecting to data sources and collecting their
2020-04-08 14:13:33 +05:30
performance metrics through the [various exporters ](#bundled-software-metrics ). To view
2017-08-17 22:00:37 +05:30
and work with the monitoring data, you can either
2021-01-29 00:20:46 +05:30
[connect directly to Prometheus ](#viewing-performance-metrics ) or use a
2019-12-21 20:55:43 +05:30
dashboard tool like [Grafana ](https://grafana.com ).
2017-08-17 22:00:37 +05:30
## Configuring Prometheus
2021-01-03 14:25:43 +05:30
For installations from source, you must install and configure it yourself.
2017-08-17 22:00:37 +05:30
2021-10-27 15:23:28 +05:30
Prometheus and its exporters are on by default.
2021-02-22 17:27:13 +05:30
Prometheus runs as the `gitlab-prometheus` user and listen on
2020-04-08 14:13:33 +05:30
`http://localhost:9090` . By default, Prometheus is only accessible from the GitLab server itself.
2021-02-22 17:27:13 +05:30
Each exporter is automatically set up as a
2017-08-17 22:00:37 +05:30
monitoring target for Prometheus, unless individually disabled.
To disable Prometheus and all of its exporters, as well as any added in the future:
1. Edit `/etc/gitlab/gitlab.rb`
1. Add or find and uncomment the following line, making sure it's set to `false` :
2019-09-30 21:07:59 +05:30
```ruby
prometheus_monitoring['enable'] = false
```
2017-08-17 22:00:37 +05:30
2020-04-22 19:07:51 +05:30
1. Save the file and [reconfigure GitLab ](../../restart_gitlab.md#omnibus-gitlab-reconfigure ) for the changes to
2019-02-15 15:39:39 +05:30
take effect.
2017-08-17 22:00:37 +05:30
2019-02-15 15:39:39 +05:30
### Changing the port and address Prometheus listens on
2017-08-17 22:00:37 +05:30
2021-02-22 17:27:13 +05:30
WARNING:
2021-11-11 11:23:49 +05:30
Although possible, it's not recommended to change the port Prometheus listens
2020-04-08 14:13:33 +05:30
on, as this might affect or conflict with other services running on the GitLab
2017-08-17 22:00:37 +05:30
server. Proceed at your own risk.
2021-01-03 14:25:43 +05:30
To access Prometheus from outside the GitLab server, set an FQDN or IP in
`prometheus['listen_address']` . To change the address/port that Prometheus
listens on:
2017-08-17 22:00:37 +05:30
1. Edit `/etc/gitlab/gitlab.rb`
1. Add or find and uncomment the following line:
2019-09-30 21:07:59 +05:30
```ruby
prometheus['listen_address'] = 'localhost:9090'
```
2017-08-17 22:00:37 +05:30
2020-04-08 14:13:33 +05:30
Replace `localhost:9090` with the address or port you want Prometheus to
2019-09-30 21:07:59 +05:30
listen on. If you would like to allow access to Prometheus to hosts other
than `localhost` , leave out the host, or use `0.0.0.0` to allow public access:
2018-05-09 12:01:36 +05:30
2019-09-30 21:07:59 +05:30
```ruby
prometheus['listen_address'] = ':9090'
# or
prometheus['listen_address'] = '0.0.0.0:9090'
```
2017-08-17 22:00:37 +05:30
2020-04-22 19:07:51 +05:30
1. Save the file and [reconfigure GitLab ](../../restart_gitlab.md#omnibus-gitlab-reconfigure ) for the changes to
2017-08-17 22:00:37 +05:30
take effect
2020-06-23 00:09:42 +05:30
### Adding custom scrape configurations
2019-12-26 22:10:19 +05:30
2020-05-24 23:13:21 +05:30
You can configure additional scrape targets for the Omnibus GitLab-bundled
2019-12-26 22:10:19 +05:30
Prometheus by editing `prometheus['scrape_configs']` in `/etc/gitlab/gitlab.rb`
using the [Prometheus scrape target configuration ](https://prometheus.io/docs/prometheus/latest/configuration/configuration/#%3Cscrape_config%3E )
syntax.
Here is an example configuration to scrape `http://1.1.1.1:8060/probe?param_a=test¶m_b=additional_test` :
```ruby
prometheus['scrape_configs'] = [
{
'job_name': 'custom-scrape',
'metrics_path': '/probe',
'params' => {
'param_a' => ['test'],
'param_b' => ['additional_test']
},
'static_configs' => [
'targets' => ['1.1.1.1:8060'],
],
},
]
```
2020-10-24 23:57:45 +05:30
### Standalone Prometheus using Omnibus GitLab
The Omnibus GitLab package can be used to configure a standalone Monitoring node running Prometheus and [Grafana ](../performance/grafana_configuration.md ).
The steps below are the minimum necessary to configure a Monitoring node running Prometheus and Grafana with Omnibus GitLab:
1. SSH into the Monitoring node.
1. [Install ](https://about.gitlab.com/install/ ) the Omnibus GitLab
package you want using **steps 1 and 2** from the GitLab downloads page, but
do not follow the remaining steps.
1. Make sure to collect the IP addresses or DNS records of the Consul server nodes, for the next step.
1. Edit `/etc/gitlab/gitlab.rb` and add the contents:
```ruby
2021-09-04 01:27:46 +05:30
roles ['monitoring_role']
2020-10-24 23:57:45 +05:30
external_url 'http://gitlab.example.com'
2021-09-04 01:27:46 +05:30
# Prometheus
2020-10-24 23:57:45 +05:30
prometheus['listen_address'] = '0.0.0.0:9090'
prometheus['monitor_kubernetes'] = false
2021-09-04 01:27:46 +05:30
# Grafana
2020-10-24 23:57:45 +05:30
grafana['enable'] = true
grafana['admin_password'] = 'toomanysecrets'
2021-09-04 01:27:46 +05:30
grafana['disable_login_form'] = false
2020-10-24 23:57:45 +05:30
# Enable service discovery for Prometheus
consul['enable'] = true
consul['monitoring_service_discovery'] = true
2021-09-04 01:27:46 +05:30
consul['configuration'] = {
retry_join: %w(10.0.0.1 10.0.0.2 10.0.0.3), # The addresses can be IPs or FQDNs
2020-10-24 23:57:45 +05:30
}
2021-09-04 01:27:46 +05:30
# Nginx - For Grafana access
2020-10-24 23:57:45 +05:30
nginx['enable'] = true
```
1. Run `sudo gitlab-ctl reconfigure` to compile the configuration.
The next step is to tell all the other nodes where the monitoring node is:
1. Edit `/etc/gitlab/gitlab.rb` , and add, or find and uncomment the following line:
```ruby
gitlab_rails['prometheus_address'] = '10.0.0.1:9090'
```
Where `10.0.0.1:9090` is the IP address and port of the Prometheus node.
1. Save the file and [reconfigure GitLab ](../../restart_gitlab.md#omnibus-gitlab-reconfigure ) for the changes to
take effect.
2021-01-03 14:25:43 +05:30
After monitoring using Service Discovery is enabled with `consul['monitoring_service_discovery'] = true` ,
2020-10-24 23:57:45 +05:30
ensure that `prometheus['scrape_configs']` is not set in `/etc/gitlab/gitlab.rb` . Setting both
2021-02-22 17:27:13 +05:30
`consul['monitoring_service_discovery'] = true` and `prometheus['scrape_configs']` in `/etc/gitlab/gitlab.rb` results in errors.
2020-10-24 23:57:45 +05:30
2019-02-15 15:39:39 +05:30
### Using an external Prometheus server
2021-02-22 17:27:13 +05:30
WARNING:
2020-04-08 14:13:33 +05:30
Prometheus and most exporters don't support authentication. We don't recommend exposing them outside the local network.
2019-02-15 15:39:39 +05:30
2020-05-24 23:13:21 +05:30
A few configuration changes are required to allow GitLab to be monitored by an external Prometheus server. External servers are recommended for [GitLab deployments with multiple nodes ](../../reference_architectures/index.md ).
2019-02-15 15:39:39 +05:30
To use an external Prometheus server:
1. Edit `/etc/gitlab/gitlab.rb` .
1. Disable the bundled Prometheus:
2019-09-30 21:07:59 +05:30
```ruby
prometheus['enable'] = false
```
2019-02-15 15:39:39 +05:30
1. Set each bundled service's [exporter ](#bundled-software-metrics ) to listen on a network address, for example:
2019-09-30 21:07:59 +05:30
```ruby
2020-10-24 23:57:45 +05:30
node_exporter['listen_address'] = '0.0.0.0:9100'
gitlab_workhorse['prometheus_listen_addr'] = "0.0.0.0:9229"
# Rails nodes
2019-12-04 20:38:33 +05:30
gitlab_exporter['listen_address'] = '0.0.0.0'
gitlab_exporter['listen_port'] = '9168'
2020-10-24 23:57:45 +05:30
# Sidekiq nodes
sidekiq['listen_address'] = '0.0.0.0'
# Redis nodes
2019-09-30 21:07:59 +05:30
redis_exporter['listen_address'] = '0.0.0.0:9121'
2020-10-24 23:57:45 +05:30
# PostgreSQL nodes
2019-09-30 21:07:59 +05:30
postgres_exporter['listen_address'] = '0.0.0.0:9187'
2020-10-24 23:57:45 +05:30
# Gitaly nodes
2019-09-30 21:07:59 +05:30
gitaly['prometheus_listen_addr'] = "0.0.0.0:9236"
```
2019-02-15 15:39:39 +05:30
1. Install and set up a dedicated Prometheus instance, if necessary, using the [official installation instructions ](https://prometheus.io/docs/prometheus/latest/installation/ ).
2020-03-13 15:44:24 +05:30
1. Add the Prometheus server IP address to the [monitoring IP whitelist ](../ip_whitelist.md ). For example:
2019-02-15 15:39:39 +05:30
2020-04-08 14:13:33 +05:30
```ruby
gitlab_rails['monitoring_whitelist'] = ['127.0.0.0/8', '192.168.0.1']
```
2019-02-15 15:39:39 +05:30
2021-09-04 01:27:46 +05:30
1. On **all** GitLab Rails(Puma, Sidekiq) servers, set the Prometheus server IP address and listen port. For example:
2020-07-28 23:09:34 +05:30
```ruby
gitlab_rails['prometheus_address'] = '192.168.0.1:9090'
```
2021-02-22 17:27:13 +05:30
1. To scrape NGINX metrics, you must also configure NGINX to allow the Prometheus server
2019-07-31 22:56:46 +05:30
IP. For example:
2019-09-30 21:07:59 +05:30
```ruby
nginx['status']['options'] = {
"server_tokens" => "off",
"access_log" => "off",
"allow" => "192.168.0.1",
"deny" => "all",
}
```
2019-07-31 22:56:46 +05:30
2020-04-22 19:07:51 +05:30
1. [Reconfigure GitLab ](../../restart_gitlab.md#omnibus-gitlab-reconfigure ) to apply the changes.
2019-02-15 15:39:39 +05:30
1. Edit the Prometheus server's configuration file.
1. Add each node's exporters to the Prometheus server's
[scrape target configuration ](https://prometheus.io/docs/prometheus/latest/configuration/configuration/#%3Cscrape_config%3E ).
For example, a sample snippet using `static_configs` :
2019-09-30 21:07:59 +05:30
```yaml
scrape_configs:
2020-07-28 23:09:34 +05:30
- job_name: nginx
static_configs:
- targets:
- 1.1.1.1:8060
- job_name: redis
static_configs:
- targets:
- 1.1.1.1:9121
- job_name: postgres
static_configs:
- targets:
- 1.1.1.1:9187
- job_name: node
static_configs:
- targets:
- 1.1.1.1:9100
- job_name: gitlab-workhorse
static_configs:
- targets:
- 1.1.1.1:9229
- job_name: gitlab-rails
metrics_path: "/-/metrics"
2022-01-26 12:08:38 +05:30
scheme: https
2020-07-28 23:09:34 +05:30
static_configs:
- targets:
2022-01-26 12:08:38 +05:30
- 1.1.1.1
2020-07-28 23:09:34 +05:30
- job_name: gitlab-sidekiq
static_configs:
- targets:
- 1.1.1.1:8082
- job_name: gitlab_exporter_database
metrics_path: "/database"
static_configs:
- targets:
- 1.1.1.1:9168
- job_name: gitlab_exporter_sidekiq
metrics_path: "/sidekiq"
static_configs:
- targets:
- 1.1.1.1:9168
- job_name: gitlab_exporter_process
metrics_path: "/process"
static_configs:
- targets:
- 1.1.1.1:9168
- job_name: gitaly
static_configs:
- targets:
- 1.1.1.1:9236
2019-09-30 21:07:59 +05:30
```
2022-01-26 12:08:38 +05:30
WARNING:
The `gitlab-rails` job in the snippet assumes that GitLab is reachable through HTTPS. If your
deployment doesn't use HTTPS, the job configuration is adapted to use the `http` scheme and port
80.
2019-09-30 21:07:59 +05:30
1. Reload the Prometheus server.
2019-02-15 15:39:39 +05:30
2017-08-17 22:00:37 +05:30
## Viewing performance metrics
You can visit `http://localhost:9090` for the dashboard that Prometheus offers by default.
If SSL has been enabled on your GitLab instance, you may not be able to access
2021-10-27 15:23:28 +05:30
Prometheus on the same browser as GitLab if using the same FQDN due to [HSTS ](https://en.wikipedia.org/wiki/HTTP_Strict_Transport_Security ).
[A test project exists ](https://gitlab.com/gitlab-org/multi-user-prometheus ) to provide access via GitLab, but in the interim there are
2018-11-08 19:23:39 +05:30
some workarounds: using a separate FQDN, using server IP, using a separate browser for Prometheus, resetting HSTS, or
2020-04-22 19:07:51 +05:30
having [NGINX proxy it ](https://docs.gitlab.com/omnibus/settings/nginx.html#inserting-custom-nginx-settings-into-the-gitlab-server-block ).
2017-08-17 22:00:37 +05:30
The performance data collected by Prometheus can be viewed directly in the
2020-04-08 14:13:33 +05:30
Prometheus console, or through a compatible dashboard tool.
2019-12-21 20:55:43 +05:30
The Prometheus interface provides a [flexible query language ](https://prometheus.io/docs/prometheus/latest/querying/basics/ )
2020-04-08 14:13:33 +05:30
to work with the collected data where you can visualize the output.
2017-08-17 22:00:37 +05:30
For a more fully featured dashboard, Grafana can be used and has
2020-04-22 19:07:51 +05:30
[official support for Prometheus ](https://prometheus.io/docs/visualization/grafana/ ).
2017-08-17 22:00:37 +05:30
Sample Prometheus queries:
2018-11-20 20:47:30 +05:30
- **% Memory available:** `((node_memory_MemAvailable_bytes / node_memory_MemTotal_bytes) or ((node_memory_MemFree_bytes + node_memory_Buffers_bytes + node_memory_Cached_bytes) / node_memory_MemTotal_bytes)) * 100`
- **% CPU utilization:** `1 - avg without (mode,cpu) (rate(node_cpu_seconds_total{mode="idle"}[5m]))`
- **Data transmitted:** `rate(node_network_transmit_bytes_total{device!="lo"}[5m])`
- **Data received:** `rate(node_network_receive_bytes_total{device!="lo"}[5m])`
2017-08-17 22:00:37 +05:30
2019-02-15 15:39:39 +05:30
## Prometheus as a Grafana data source
2017-08-17 22:00:37 +05:30
2020-04-08 14:13:33 +05:30
Grafana allows you to import Prometheus performance metrics as a data source,
and render the metrics as graphs and dashboards, which is helpful with visualization.
2017-08-17 22:00:37 +05:30
2019-02-15 15:39:39 +05:30
To add a Prometheus dashboard for a single server GitLab setup:
2017-08-17 22:00:37 +05:30
2019-02-15 15:39:39 +05:30
1. Create a new data source in Grafana.
2020-04-08 14:13:33 +05:30
1. Name your data source (such as GitLab).
2020-03-13 15:44:24 +05:30
1. Select `Prometheus` in the type dropdown box.
2020-04-08 14:13:33 +05:30
1. Add your Prometheus listen address as the URL, and set access to `Browser` .
2019-02-15 15:39:39 +05:30
1. Set the HTTP method to `GET` .
2020-04-08 14:13:33 +05:30
1. Save and test your configuration to verify that it works.
2017-08-17 22:00:37 +05:30
2019-02-15 15:39:39 +05:30
## GitLab metrics
2017-09-10 17:25:29 +05:30
2020-04-08 14:13:33 +05:30
GitLab monitors its own internal service metrics, and makes them available at the `/-/metrics` endpoint. Unlike other exporters, this endpoint requires authentication as it's available on the same URL and port as user traffic.
2017-09-10 17:25:29 +05:30
2021-02-22 17:27:13 +05:30
Read more about the [GitLab Metrics ](gitlab_metrics.md ).
2017-09-10 17:25:29 +05:30
2019-02-15 15:39:39 +05:30
## Bundled software metrics
2017-08-17 22:00:37 +05:30
2019-02-15 15:39:39 +05:30
Many of the GitLab dependencies bundled in Omnibus GitLab are preconfigured to
export Prometheus metrics.
2017-08-17 22:00:37 +05:30
### Node exporter
2020-04-08 14:13:33 +05:30
The node exporter allows you to measure various machine resources, such as
memory, disk, and CPU utilization.
2017-08-17 22:00:37 +05:30
2020-04-22 19:07:51 +05:30
[Read more about the node exporter ](node_exporter.md ).
2017-08-17 22:00:37 +05:30
2021-12-11 22:18:48 +05:30
### Puma exporter
The Puma exporter allows you to measure various Puma metrics.
[Read more about the Puma exporter ](puma_exporter.md ).
2017-08-17 22:00:37 +05:30
### Redis exporter
The Redis exporter allows you to measure various Redis metrics.
2020-04-22 19:07:51 +05:30
[Read more about the Redis exporter ](redis_exporter.md ).
2017-08-17 22:00:37 +05:30
2020-04-22 19:07:51 +05:30
### PostgreSQL exporter
2017-08-17 22:00:37 +05:30
2020-04-22 19:07:51 +05:30
The PostgreSQL exporter allows you to measure various PostgreSQL metrics.
2017-08-17 22:00:37 +05:30
2020-04-22 19:07:51 +05:30
[Read more about the PostgreSQL exporter ](postgres_exporter.md ).
2017-08-17 22:00:37 +05:30
2019-07-31 22:56:46 +05:30
### PgBouncer exporter
The PgBouncer exporter allows you to measure various PgBouncer metrics.
2020-04-22 19:07:51 +05:30
[Read more about the PgBouncer exporter ](pgbouncer_exporter.md ).
2019-07-31 22:56:46 +05:30
2020-01-01 13:55:28 +05:30
### Registry exporter
The Registry exporter allows you to measure various Registry metrics.
2020-04-22 19:07:51 +05:30
[Read more about the Registry exporter ](registry_exporter.md ).
2020-01-01 13:55:28 +05:30
2019-12-04 20:38:33 +05:30
### GitLab exporter
2017-08-17 22:00:37 +05:30
2019-12-04 20:38:33 +05:30
The GitLab exporter allows you to measure various GitLab metrics, pulled from Redis and the database.
2017-08-17 22:00:37 +05:30
2020-04-22 19:07:51 +05:30
[Read more about the GitLab exporter ](gitlab_exporter.md ).
2017-08-17 22:00:37 +05:30
2019-02-15 15:39:39 +05:30
## Configuring Prometheus to monitor Kubernetes
2021-02-22 17:27:13 +05:30
If your GitLab server is running within Kubernetes, Prometheus collects metrics from the Nodes and [annotated Pods ](https://prometheus.io/docs/prometheus/latest/configuration/configuration/#kubernetes_sd_config ) in the cluster, including performance data on each container. This is particularly helpful if your CI/CD environments run in the same cluster, as you can use the [Prometheus project integration ](../../../user/project/integrations/prometheus.md ) to monitor them.
2019-02-15 15:39:39 +05:30
To disable the monitoring of Kubernetes:
1. Edit `/etc/gitlab/gitlab.rb` .
2020-04-08 14:13:33 +05:30
1. Add (or find and uncomment) the following line and set it to `false` :
2019-02-15 15:39:39 +05:30
2019-09-30 21:07:59 +05:30
```ruby
prometheus['monitor_kubernetes'] = false
```
2019-02-15 15:39:39 +05:30
2020-04-22 19:07:51 +05:30
1. Save the file and [reconfigure GitLab ](../../restart_gitlab.md#omnibus-gitlab-reconfigure ) for the changes to
2019-02-15 15:39:39 +05:30
take effect.