4.8 KiB
stage | group | info | type |
---|---|---|---|
Enablement | Geo | To determine the technical writer assigned to the Stage/Group associated with this page, see https://about.gitlab.com/handbook/engineering/ux/technical-writing/#assignments | howto |
Location-aware Git remote URL with AWS Route53 (PREMIUM SELF)
NOTE: Since GitLab 14.6, GitLab Geo supports a location-aware URL including web UI and API traffic. This configuration is recommended over the location-aware Git remote URL described in this document.
You can provide GitLab users with a single remote URL that automatically uses the Geo site closest to them. This means users don't need to update their Git configuration to take advantage of closer Geo sites as they move.
This is possible because, Git push requests can be automatically redirected (HTTP) or proxied (SSH) from secondary sites to the primary site.
Though these instructions use AWS Route53, other services such as Cloudflare could be used as well.
Prerequisites
In this example, we have already set up:
primary.example.com
as a Geo primary site.secondary.example.com
as a Geo secondary site.
We will create a git.example.com
subdomain that will automatically direct
requests:
- From Europe to the secondary site.
- From all other locations to the primary site.
In any case, you require:
- A working GitLab primary site that is accessible at its own address.
- A working GitLab secondary site.
- A Route53 Hosted Zone managing your domain.
If you haven't yet set up a Geo primary site and secondary site, see the Geo setup instructions.
Create a traffic policy
In a Route53 Hosted Zone, traffic policies can be used to set up a variety of routing configurations.
-
Go to the Route53 dashboard and select Traffic policies.
-
Click the Create traffic policy button.
-
Fill in the Policy Name field with
Single Git Host
and click Next. -
Leave DNS type as
A: IP Address in IPv4 format
. -
Click Connect to... and select Geolocation rule.
-
For the first Location, leave it as
Default
. -
Click Connect to... and select New endpoint.
-
Choose Type
value
and fill it in with<your **primary** IP address>
. -
For the second Location, choose
Europe
. -
Click Connect to... and select New endpoint.
-
Choose Type
value
and fill it in with<your **secondary** IP address>
. -
Click Create traffic policy.
-
Fill in Policy record DNS name with
git
. -
Click Create policy records.
You have successfully set up a single host, for example, git.example.com
which
distributes traffic to your Geo sites by geolocation!
Configure Git clone URLs to use the special Git URL
When a user clones a repository for the first time, they typically copy the Git remote URL from the project page. By default, these SSH and HTTP URLs are based on the external URL of the current host. For example:
git@secondary.example.com:group1/project1.git
https://secondary.example.com/group1/project1.git
You can customize the:
- SSH remote URL to use the location-aware
git.example.com
. To do so, change the SSH remote URL's host by settinggitlab_rails['gitlab_ssh_host']
ingitlab.rb
of web nodes. - HTTP remote URL as shown in Custom Git clone URL for HTTP(S).
Example Git request handling behavior
After following the configuration steps above, handling for Git requests is now location aware. For requests:
- Outside Europe, all requests are directed to the primary site.
- Within Europe, over:
- HTTP:
git clone http://git.example.com/foo/bar.git
is directed to the secondary site.git push
is initially directed to the secondary, which automatically redirects toprimary.example.com
.
- SSH:
git clone git@git.example.com:foo/bar.git
is directed to the secondary.git push
is initially directed to the secondary, which automatically proxies the request toprimary.example.com
.
- HTTP: