8.5 KiB
Review Apps
Review Apps are automatically deployed by each pipeline, both in CE and EE.
How does it work?
CD/CD architecture diagram
Show mermaid source
graph TD B1 -.->|2. once gitlab:assets:compile is done,
triggers a CNG-mirror pipeline and wait for it to be done| A2 C1 -.->|2. once review-build-cng is done,
Helm deploys the Review App using the Cloud
Native images built by the CNG-mirror pipeline| A3subgraph gitlab-ce/ee
test
stage A1gitlab:assets:compile B1review-build-cng -->|1. wait for| A1 C1review-deploy -->|1. wait for| B1 D1[review-qa-smoke] -->|1. wait for| C1 D1[review-qa-smoke] -.->|2. once review-deploy is done| E1>gitlab-qa runs the smoke
suite against the Review App] endsubgraph CNG-mirror pipeline A2>Cloud Native images are built]; end
subgraph GCP
gitlab-review-apps
project A3>"Cloud Native images are deployed to thereview-apps-ce
orreview-apps-ee
Kubernetes (GKE) cluster"]; end
Detailed explanation
- On every pipeline during the
test
stage, thereview-build-cng
andreview-deploy
jobs are automatically started.- The
review-deploy
job waits for thereview-build-cng
job to finish. - The
review-build-cng
job waits for thegitlab:assets:compile
job to finish since theCNG-mirror
pipeline triggered in the following step depends on it.
- The
- Once the
gitlab:assets:compile
job is done,review-build-cng
triggers a pipeline in theCNG-mirror
project.- The
CNG-mirror
pipeline creates the Docker images of each component (e.g.gitlab-rails-ee
,gitlab-shell
,gitaly
etc.) based on the commit from the GitLab pipeline and store them in its registry. - We use the
CNG-mirror
project so that theCNG
, (Cloud Native GitLab), project's registry is not overloaded with a lot of transient Docker images.
- The
- Once the
review-build-cng
job is done, thereview-deploy
job deploys the Review App using the official GitLab Helm chart to thereview-apps-ce
/review-apps-ee
Kubernetes cluster on GCP.- The actual scripts used to deploy the Review App can be found at
scripts/review_apps/review-apps.sh
. - These scripts are basically
our official Auto DevOps scripts where the
default CNG images are overridden with the images built and stored in the
CNG-mirror
project's registry. - Since we're using the official GitLab Helm chart, this means you get a dedicated environment for your branch that's very close to what it would look in production.
- The actual scripts used to deploy the Review App can be found at
- Once the
review-deploy
job succeeds, you should be able to use your Review App thanks to the direct link to it from the MR widget. The default username isroot
and its password can be found in the 1Password secure note named gitlab-{ce,ee} Review App's root password.
Additional notes:
- The Kubernetes cluster is connected to the
gitlab-{ce,ee}
projects using GitLab's Kubernetes integration. This basically allows to have a link to the Review App directly from the merge request widget. - If the Review App deployment fails, you can simply retry it (there's no need
to run the
review-stop
job first). - The manual
review-stop
in thetest
stage can be used to stop a Review App manually, and is also started by GitLab once a branch is deleted. - Review Apps are cleaned up regularly using a pipeline schedule that runs
the
schedule:review-cleanup
job.
QA runs
On every pipeline during the test
stage, the
review-qa-smoke
job is automatically started: it runs the smoke QA suite.
You can also manually start the review-qa-all
: it runs the full QA suite.
Note that both jobs first wait for the review-deploy
job to be finished.
How to?
Find my Review App slug?
- Open the
review-deploy
job. - Look for
Checking for previous deployment of review-*
. - For instance for
Checking for previous deployment of review-qa-raise-e-12chm0
, your Review App slug would bereview-qa-raise-e-12chm0
in this case.
Run a Rails console?
- Filter Workloads by your Review App slug
, e.g.
review-29951-issu-id2qax
. - Find and open the
task-runner
Deployment, e.g.review-29951-issu-id2qax-task-runner
. - Click on the Pod in the "Managed pods" section, e.g.
review-29951-issu-id2qax-task-runner-d5455cc8-2lsvz
. - Click on the
KUBECTL
dropdown, thenExec
->task-runner
. - Replace
-c task-runner -- ls
with-- /srv/gitlab/bin/rails c
from the default command or
- Run
kubectl exec --namespace review-apps-ce -it review-29951-issu-id2qax-task-runner-d5455cc8-2lsvz -- /srv/gitlab/bin/rails c
and - Replace
review-apps-ce
withreview-apps-ee
if the Review App is running EE, and - Replace
review-29951-issu-id2qax-task-runner-d5455cc8-2lsvz
with your Pod's name.
Dig into a Pod's logs?
- Filter Workloads by your Review App slug
, e.g.
review-1979-1-mul-dnvlhv
. - Find and open the
migrations
Deployment, e.g.review-1979-1-mul-dnvlhv-migrations.1
. - Click on the Pod in the "Managed pods" section, e.g.
review-1979-1-mul-dnvlhv-migrations.1-nqwtx
. - Click on the
Container logs
link.
Frequently Asked Questions
Isn't it too much to trigger CNG image builds on every test run? This creates thousands of unused Docker images.
We have to start somewhere and improve later. Also, we're using the CNG-mirror project to store these Docker images so that we can just wipe out the registry at some point, and use a new fresh, empty one.
How big are the Kubernetes clusters (review-apps-ce
and review-apps-ee
)?
The clusters are currently set up with a single pool of preemptible nodes, with a minimum of 1 node and a maximum of 100 nodes.
What are the machine running on the cluster?
We're currently using
n1-standard-4
(4 vCPUs, 15 GB memory) machines.
How do we secure this from abuse? Apps are open to the world so we need to find a way to limit it to only us.
This isn't enabled for forks.