doc/integration/advanced_search/elasticsearch.md
{{< details >}}
{{< /details >}}
This page describes how to enable advanced search. When enabled, advanced search provides faster search response times and improved search features.
To enable advanced search, you must:
[!note] Advanced search stores all projects in the same Elasticsearch indices. However, private projects appear in search results only to users who have access.
This glossary provides definitions for terms related to Elasticsearch.
Elasticsearch and AWS OpenSearch are not included in the Linux package. You can install a search cluster yourself or use a cloud-hosted offering such as:
You should install the search cluster on a separate server. Running the search cluster on the same server as GitLab might lead to performance issues.
For a search cluster with a single node, the cluster status is always yellow because the primary shard is allocated. The cluster cannot assign replica shards to the same node as primary shards.
[!note] Before you use a new Elasticsearch cluster in production, see important Elasticsearch configuration.
{{< history >}}
{{< /history >}}
[!warning] Support for Elasticsearch 7.x was deprecated in GitLab 18.10 and is planned for removal in 19.1.
[!note] GitLab.com uses Elasticsearch 9.x in production. For self-managed instances, Elasticsearch 9.x is the recommended version for optimal performance and forward compatibility.
Advanced search works with the following versions of Elasticsearch.
| GitLab version | Elasticsearch version |
|---|---|
| GitLab 18.1 and later | Elasticsearch 7.x and later |
| GitLab 15.0 to 18.0 | Elasticsearch 7.x and 8.x |
| GitLab 14.0 to 14.10 | Elasticsearch 6.8 to 7.x |
Advanced search follows the Elasticsearch end-of-life policy.
| GitLab version | OpenSearch version |
|---|---|
| GitLab 18.1 and later | OpenSearch 1.x and later |
| GitLab 17.6.3 to 18.0 | OpenSearch 1.x and 2.x |
| GitLab 15.5.3 to 17.6.2 | OpenSearch 1.x, 2.0 to 2.17 |
| GitLab 15.0 to 15.5.2 | OpenSearch 1.x |
OpenSearch 3.x is supported starting from GitLab 18.1. See merge request 192197 for details.
If your version of Elasticsearch or OpenSearch is incompatible, to prevent data loss, indexing pauses and
a message is logged in the
elasticsearch.log file.
If you are using a compatible version and after connecting to OpenSearch, you get the message Elasticsearch version not compatible, resume indexing.
Elasticsearch and AWS OpenSearch require more resources than GitLab installation requirements.
Memory, CPU, and storage requirements depend on the amount of data you index into the cluster.
Heavily used Elasticsearch clusters might require more resources.
The estimate_cluster_size Rake task uses the total repository size
to estimate the advanced search storage requirements.
GitLab supports both HTTP and role-based authentication methods depending on your requirements and the backend service you use.
Elasticsearch can offer role-based access control to further secure a cluster. To access and perform operations in the
Elasticsearch cluster, the Username configured in the Admin area must have roles that grant the following
privileges. The Username makes requests from GitLab to the search cluster.
For more information, see Elasticsearch role based access control and Elasticsearch security privileges.
{
"cluster": ["monitor"],
"indices": [
{
"names": ["gitlab-*"],
"privileges": [
"create_index",
"delete_index",
"view_index_metadata",
"read",
"manage",
"write"
]
}
]
}
Prerequisites:
AWSServiceRoleForAmazonOpenSearchService when you create OpenSearch domains.es:ESHttp* actions.AWSServiceRoleForAmazonOpenSearchService is used by all OpenSearch domains.
In most cases, this role is created automatically when you use the AWS Management Console to create the first OpenSearch domain.
To create a service-linked role manually, see the
AWS documentation.
AWS OpenSearch Service has three main security layers:
With this security layer, you can select Public access when you create a domain so requests from any client can reach the domain endpoint. If you select VPC access, clients must connect to the VPC for requests to reach the endpoint.
For more information, see the AWS documentation.
GitLab supports the following methods of domain access control for AWS OpenSearch:
Here's an example of a resource-based (domain) access policy where es:ESHttp* actions are allowed:
{
"Version": "2012-10-17",
"Statement": [
{
"Effect": "Allow",
"Principal": "*",
"Action": [
"es:ESHttp*"
],
"Resource": "arn:aws:es:us-west-1:987654321098:domain/test-domain/*"
}
]
}
Here's an example of a resource-based (domain) access policy where es:ESHttp* actions are allowed only for a specific IAM principal:
{
"Version": "2012-10-17",
"Statement": [
{
"Effect": "Allow",
"Principal": {
"AWS": [
"arn:aws:iam::123456789012:user/test-user"
]
},
"Action": [
"es:ESHttp*"
],
"Resource": "arn:aws:es:us-west-1:987654321098:domain/test-domain/*"
}
]
}
[!note] The
aws_role_arnmust be provided if using AWSAssumeRoleacross accounts. The ARN should be the role that has permissions to access OpenSearch.
Here's an example of an identity-based access policy attached to an IAM principal where es:ESHttp* actions are allowed:
{
"Version": "2012-10-17",
"Statement": [
{
"Action": [
"es:ESHttp*",
],
"Effect": "Allow",
"Resource": "*"
}
]
}
When you enable fine-grained access control, you must set a master user in one of the following ways:
If you use an IAM principal as a master user, all requests to the cluster must be signed with AWS Signature Version 4. You can also specify an IAM ARN, which is the IAM role you assigned to your EC2 instance. For more information, see the AWS documentation.
Prerequisites:
To set an IAM ARN as a master user, you must use AWS OpenSearch Service with IAM credentials on your GitLab instance:
In the upper-right corner, select Admin.
Select Settings > Search.
Expand Advanced search.
In the AWS OpenSearch IAM credentials section:
Select the Use AWS OpenSearch Service with IAM credentials checkbox.
In AWS region, enter the AWS region where your OpenSearch domain
is located (for example, us-east-1).
In AWS access key and AWS secret access key, enter your access keys for authentication.
[!note] GitLab deployments that run directly on EC2 instances (not in containers) don't have to enter access keys. Your GitLab instance obtains these keys automatically from the AWS Instance Metadata Service (IMDS).
Select Save changes.
If you create a master user in the internal user database, you can use HTTP basic authentication to make requests to the cluster. For more information, see the AWS documentation.
Prerequisites:
To create a master user, you must configure the OpenSearch domain URL and the master username and password on your GitLab instance:
{{< history >}}
{{< /history >}}
Prerequisites:
HTTP 500 error.When you upgrade Elasticsearch to a new minor or major version, you do not have to change the GitLab configuration. When the Elasticsearch cluster is fully upgraded and active:
Validate cluster connectivity, index, and search operations:
sudo gitlab-rake gitlab:elastic:index_and_search_validation
Optional. Check indexing status. For correct search results, ensure indexing is complete especially if your Elasticsearch instance was offline for some time.
To index Git repository data, GitLab uses gitlab-elasticsearch-indexer.
For self-compiled installations, see install the indexer.
You first install some dependencies and then build and install the indexer itself.
This project relies on International Components for Unicode (ICU) for text encoding,
so ensure the development packages for your platform are
installed before running make.
To install on Debian or Ubuntu, run:
sudo apt install libicu-dev
To install on CentOS or RHEL, run:
sudo yum install libicu-devel
[!note] You must first install Homebrew.
To install on macOS, run:
brew install icu4c
export PKG_CONFIG_PATH="/usr/local/opt/icu4c/lib/pkgconfig:$PKG_CONFIG_PATH"
To build and install the indexer, run:
indexer_path=/home/git/gitlab-elasticsearch-indexer
# Run the installation task for gitlab-elasticsearch-indexer:
sudo -u git -H bundle exec rake gitlab:indexer:install[$indexer_path] RAILS_ENV=production
cd $indexer_path && sudo make install
The gitlab-elasticsearch-indexer is installed to /usr/local/bin.
You can change the installation path with the PREFIX environment variable.
Remember to pass the -E flag to sudo if you do so.
Example:
PREFIX=/usr sudo -E make install
After installation, be sure to enable Elasticsearch.
[!note] If you see an error such as
Permission denied - /home/git/gitlab-elasticsearch-indexer/while indexing, you may need to set theproduction -> elasticsearch -> indexer_pathsetting in yourgitlab.ymlfile to/usr/local/bin/gitlab-elasticsearch-indexer, which is where the binary is installed.
Errors from the GitLab Elasticsearch Indexer are reported in
the elasticsearch.log file and the sidekiq.log file with a json.exception.class of Gitlab::Elastic::Indexer::Error.
These errors may occur when indexing Git repository data.
Prerequisites:
To enable advanced search:
[!note] When your Elasticsearch cluster is down while Elasticsearch is enabled, you might have problems updating documents such as issues because your instance queues a job to index the change, but cannot find a valid Elasticsearch cluster.
For GitLab instances with more than 50 GB of repository data, see Index large instances efficiently.
{{< history >}}
{{< /history >}}
Prerequisites:
You can perform initial indexing or re-create an index from the user interface.
To enable advanced search and index the instance from the user interface:
Prerequisites:
To index the entire instance, use the following Rake tasks:
# WARNING: This task deletes all existing indices
# For installations that use the Linux package
sudo gitlab-rake gitlab:elastic:index
# WARNING: This task deletes all existing indices
# For self-compiled installations
bundle exec rake gitlab:elastic:index RAILS_ENV=production
To index specific data, use the following Rake tasks:
# For installations that use the Linux package
sudo gitlab-rake gitlab:elastic:index_work_items
sudo gitlab-rake gitlab:elastic:index_group_wikis
sudo gitlab-rake gitlab:elastic:index_namespaces
sudo gitlab-rake gitlab:elastic:index_projects
sudo gitlab-rake gitlab:elastic:index_snippets
sudo gitlab-rake gitlab:elastic:index_users
# For self-compiled installations
bundle exec rake gitlab:elastic:index_work_items RAILS_ENV=production
bundle exec rake gitlab:elastic:index_group_wikis RAILS_ENV=production
bundle exec rake gitlab:elastic:index_namespaces RAILS_ENV=production
bundle exec rake gitlab:elastic:index_projects RAILS_ENV=production
bundle exec rake gitlab:elastic:index_snippets RAILS_ENV=production
bundle exec rake gitlab:elastic:index_users RAILS_ENV=production
Prerequisites:
To check indexing status:
Prerequisites:
To monitor indexing progress, you can also check the status of background jobs:
Search::Elastic::CommitIndexerWorker for code and commits.ElasticWikiIndexerWorker for wiki data.Prerequisites:
To enable search with advanced search in GitLab:
Prerequisites:
To enable code search with advanced search in GitLab:
The following Elasticsearch settings are available:
| Parameter | Description |
|---|---|
| Turn on indexing for advanced search | Turns on or turns off indexing and creates an empty index if one does not already exist. You may want to turn on indexing but turn off search to give the index time to be fully completed, for example. Also, keep in mind that this option doesn't have any impact on existing data, this only enables/disables the background indexer which tracks data changes and ensures new data is indexed. |
| Pause indexing for advanced search | Pauses advanced search indexing. This is useful for cluster migration/reindexing. All changes are still tracked, but they are not committed to the index until resumed. |
| Search with advanced search | Turns on or turns off the advanced search capabilities in search and advanced vulnerability management. |
| Code search with advanced search | Turns on or turns off code search with advanced search. When this setting is turned off, all code is deleted from your Elasticsearch instance. To turn this setting back on, fully reindex your code. If exact code search is enabled, you should turn off this setting to save resources. |
| Requeue indexing workers | Turns on automatic requeuing of indexing workers. This improves non-code indexing throughput by enqueuing Sidekiq jobs until all documents are processed. Requeuing indexing workers is not recommended for smaller instances or instances with few Sidekiq processes. |
| URL | The URL of your Elasticsearch instance. Use a comma-separated list to support clustering (for example, http://host1, https://host2:9200). If your Elasticsearch instance is password-protected, use the Username and Password fields. Alternatively, use inline credentials such as http://<username>:<password>@<elastic_host>:9200/. If you use OpenSearch, only connections over ports 80 and 443 are accepted. |
| Username | The username of your Elasticsearch instance. |
| Password | The password of your Elasticsearch instance. |
| Number of Elasticsearch shards and replicas per index | Elasticsearch indices are split into multiple shards for performance reasons. In general, you should use at least five shards. Indices with tens of millions of documents should have more shards (see the guidance). Changes to this value do not take effect until you re-create the index. For more information about scalability and resilience, see the Elasticsearch documentation. Each Elasticsearch shard can have a number of replicas. These replicas are a complete copy of the shard and can provide increased query performance or resilience against hardware failure. Increasing this value increases the total disk space required by the index. You can set the number of shards and replicas for each of the indices. |
| Limit the amount of namespace and project data to index | When you enable this setting, you can specify namespaces and projects to index. All other namespaces and projects use database search instead. If you enable this setting but do not specify any namespace or project, only project records are indexed. For more information, see Limit the amount of namespace and project data to index. |
| Use AWS OpenSearch Service with IAM credentials | Sign your OpenSearch requests using AWS IAM authorization, AWS EC2 Instance Profile Credentials, or AWS ECS Tasks Credentials. Refer to Identity and Access Management in Amazon OpenSearch Service for details of AWS hosted OpenSearch domain access policy configuration. |
| AWS Region | The AWS region in which your OpenSearch Service is located. |
| AWS Access Key | The AWS access key. |
| AWS Secret Access Key | The AWS secret access key. |
| Maximum file size indexed | See the explanation in instance limits.. |
| Maximum field length | See the explanation in instance limits.. |
| Indexing timeout (minutes) | Indexing timeout in minutes per project. |
| Number of shards for non-code indexing | Number of indexing worker shards. This improves non-code indexing throughput by enqueuing more parallel Sidekiq jobs. Increasing the number of shards is not recommended for smaller instances or instances with few Sidekiq processes. Default is 2. |
| Maximum bulk request size (MiB) | Used by the GitLab Ruby and Go-based indexer processes. This setting indicates how much data must be collected (and stored in memory) in a given indexing process before submitting the payload to the Elasticsearch Bulk API. For the GitLab Go-based indexer, you should use this setting with Bulk request concurrency. Maximum bulk request size (MiB) must accommodate the resource constraints of both the Elasticsearch hosts and the hosts running the GitLab Go-based indexer from either the gitlab-rake command or the Sidekiq tasks. |
| Bulk request concurrency | The Bulk request concurrency indicates how many of the GitLab Go-based indexer processes (or threads) can run in parallel to collect data to subsequently submit to the Elasticsearch Bulk API. This increases indexing performance, but fills the Elasticsearch bulk requests queue faster. This setting should be used together with the Maximum bulk request size (MiB) setting and needs to accommodate the resource constraints of both the Elasticsearch hosts and the hosts running the GitLab Go-based indexer either from the gitlab-rake command or the Sidekiq tasks. |
| Client request timeout | Elasticsearch HTTP client request timeout value in seconds. 0 means using the system default timeout value, which depends on the libraries that GitLab application is built upon. |
| Code indexing concurrency | Maximum number of Elasticsearch code indexing background jobs allowed to run concurrently. This only applies to repository indexing operations. |
| Retry on failure | Maximum number of possible retries for Elasticsearch search requests. Introduced in GitLab 17.6. |
| Index prefix | Custom prefix for Elasticsearch index names. Defaults to gitlab. When changed, all indices will use this prefix instead of gitlab (for example, custom-production-issues instead of gitlab-production-issues). Must be 1-100 characters, contain only lowercase alphanumeric characters, hyphens, and underscores, and cannot start or end with a hyphen or underscore. Introduced in GitLab 18.2. |
[!warning] Increasing the values of Maximum bulk request size (MiB) and Bulk request concurrency can negatively impact Sidekiq performance. Return them to their default values if you see increased
scheduling_latency_sdurations in your Sidekiq logs. For more information, see issue 322147.
{{< history >}}
search_index_all_projects. Disabled by default.search_index_all_projects removed.vulnerability_es_ingestion. Disabled by default.vulnerability_es_ingestion removed.{{< /history >}}
[!flag] The availability of this feature is controlled by a feature flag. For more information, see the history.
When you select the Limit the amount of namespace and project data to index checkbox, you can specify namespaces and projects to index. If the namespace is a group, any subgroups and projects in these subgroups are also indexed.
When you enable this setting:
[!warning] If you do not specify any namespace or project after you enable this setting, only project records are indexed and no associated data can be searched.
{{< history >}}
advanced_global_search_for_limited_indexing. Disabled by default.advanced_global_search_for_limited_indexing flag.{{< /history >}}
When you index all namespaces, you can use advanced search for global code and commit search. When you index only some namespaces:
For example, if you index two separate groups, you must run separate code searches on each group individually.
To enable global search for limited indexing:
Prerequisites:
You can improve language support for Chinese and Japanese by using the smartcn
and kuromoji analysis plugins from Elastic.
To enable custom language analyzers:
For guidance on what to install, see the following Elasticsearch language plugin options:
| Parameter | Description |
|---|---|
Enable Chinese (smartcn) custom analyzer: Indexing | Enables or disables Chinese language support using smartcn custom analyzer for newly created indices. |
Enable Chinese (smartcn) custom analyzer: Search | Enables or disables using smartcn fields for advanced search. Only enable this after installing the plugin, enabling custom analyzer indexing and recreating the index. |
Enable Japanese (kuromoji) custom analyzer: Indexing | Enables or disables Japanese language support using kuromoji custom analyzer for newly created indices. |
Enable Japanese (kuromoji) custom analyzer: Search | Enables or disables using kuromoji fields for advanced search. Only enable this after installing the plugin, enabling custom analyzer indexing and recreating the index. |
Prerequisites:
To disable advanced search in GitLab:
In the upper-right corner, select Admin.
Select Settings > Search.
Clear the Turn on indexing for advanced search and Search with advanced search checkboxes.
Select Save changes.
Optional. For Elasticsearch instances that are still online, delete existing indices:
# For installations that use the Linux package
sudo gitlab-rake gitlab:elastic:delete_index
# For self-compiled installations
bundle exec rake gitlab:elastic:delete_index RAILS_ENV=production
Prerequisites:
To disable search with advanced search in GitLab:
Prerequisites:
To disable code search with advanced search in GitLab:
Prerequisites:
To pause indexing:
Prerequisites:
To resume indexing:
The idea behind this reindexing method is to use the
Elasticsearch reindex API
and Elasticsearch index alias feature to perform the operation. An index alias connects to a
primary index that GitLab uses for reads and writes. When the reindexing process starts,
writes to the primary index are temporarily paused. Then, another index is created and the
Reindex API is invoked to migrate the index data to the new index. After the reindexing job
is complete, the index alias switches to the new index, which becomes the new primary index.
Finally, writes resume and typical operation continues.
You can use zero-downtime reindexing to configure index settings or mappings that cannot be changed without creating a new index and copying existing data. You should not use zero-downtime reindexing to fix missing data. Zero-downtime reindexing does not add data to the search cluster if the data is not already indexed. You must complete all advanced search migrations before you start reindexing.
Prerequisites:
To trigger reindexing:
Reindexing can be a lengthy process depending on the size of your Elasticsearch cluster.
After this process is completed, the original index is scheduled to be deleted after 14 days. You can cancel this action by pressing the Cancel button on the same page you triggered the reindexing process.
While the reindexing is running, you can follow its progress under that same section.
Prerequisites:
To trigger zero-downtime reindexing:
In the upper-right corner, select Admin.
Select Settings > Search.
Expand Advanced search zero-downtime reindexing. The following settings are available:
The slice multiplier calculates the number of slices during reindexing.
GitLab uses manual slicing to control the reindex efficiently and safely, which enables users to retry only failed slices.
The multiplier defaults to 2 and applies to the number of shards per index.
For example, if this value is 2 and your index has 20 shards, then the
reindex task is split into 40 slices.
The maximum running slices parameter defaults to 60 and corresponds to the
maximum number of slices allowed to run concurrently during Elasticsearch
reindexing.
Setting this value too high can have adverse performance impacts as your cluster may become heavily saturated with searches and writes. Setting this value too low may lead the reindexing process to take a very long time to complete.
The best value for this depends on your cluster size, whether you're willing to accept some degraded search performance during reindexing, and how important it is for the reindex to finish quickly and resume indexing.
Prerequisites:
To abandon an unfinished reindexing job and resume indexing:
Mark the most recent reindexing job as failed:
# For installations that use the Linux package
sudo gitlab-rake gitlab:elastic:mark_reindex_failed
# For self-compiled installations
bundle exec rake gitlab:elastic:mark_reindex_failed RAILS_ENV=production
In the upper-right corner, select Admin.
Select Settings > Search.
Expand Advanced search.
Clear the Pause indexing for advanced search checkbox.
{{< history >}}
search_index_integrity. Disabled by default.search_index_integrity removed.{{< /history >}}
Index integrity detects and fixes missing repository data. This feature is automatically used when code searches scoped to a group or project return no results.
Reindex migrations run in the background, which means you do not have to reindex the instance manually.
In GitLab 18.0 and later,
you can use the elastic_migration_worker_enabled application setting
to enable or disable the migration worker.
By default, the migration worker is enabled.
{{< history >}}
{{< /history >}}
Every migration has a corresponding dictionary file in the ee/elastic/docs/ folder with the following information:
name:
version:
description:
group:
milestone:
introduced_by_url:
obsolete:
marked_obsolete_by_url:
marked_obsolete_in_milestone:
You can use this information, for example, to identify when a migration was introduced or was marked as obsolete.
To check for pending advanced search migrations, run this command:
curl "$CLUSTER_URL/gitlab-production-migrations/_search?size=100&q=*" | jq .
This should return something similar to:
{
"took": 14,
"timed_out": false,
"_shards": {
"total": 1,
"successful": 1,
"skipped": 0,
"failed": 0
},
"hits": {
"total": {
"value": 1,
"relation": "eq"
},
"max_score": 1,
"hits": [
{
"_index": "gitlab-production-migrations",
"_type": "_doc",
"_id": "20230209195404",
"_score": 1,
"_source": {
"completed": true
}
}
]
}
}
To debug issues with the migrations, check the elasticsearch.log file.
Some migrations are built with a retry limit. If the migration cannot finish within the retry limit, it is halted and a notification is displayed in the advanced search integration settings.
It is recommended to check the elasticsearch.log file to
debug why the migration was halted and make any changes before retrying the migration.
When you believe you've fixed the cause of the failure:
If you cannot get the migration to succeed, you may consider the last resort to recreate the index from scratch. This may allow you to skip over the problem because a newly created index skips all migrations as the index is recreated with the correct up-to-date schema.
Before upgrading to a major GitLab version, you must complete all migrations that exist up until the latest minor version before that major version. You must also resolve and retry any halted migrations before proceeding with a major version upgrade. For more information, see Migrations for upgrades.
Migrations that have been removed are marked as obsolete. If you upgrade GitLab before all pending advanced search migrations are completed, any pending migrations that have been removed in the new version cannot be executed or retried. In this case, you must re-create your index from scratch.
Skippable migrations are only executed when a condition is met. For example, if a migration depends on a specific version of Elasticsearch, it could be skipped until that version is reached.
If a skippable migration is not executed by the time the migration is marked as obsolete, to apply the change you must re-create the index.
Rake tasks are available to:
The following are some available Rake tasks:
| Task | Description |
|---|---|
sudo gitlab-rake gitlab:elastic:info | Outputs debugging information for the advanced search integration. |
sudo gitlab-rake gitlab:elastic:index | In GitLab 17.0 and earlier, turns on indexing for advanced search and runs gitlab:elastic:recreate_index, gitlab:elastic:clear_index_status, gitlab:elastic:index_group_entities, gitlab:elastic:index_projects, gitlab:elastic:index_snippets, and gitlab:elastic:index_users. |
In GitLab 17.1 and later, queues a Sidekiq job in the background. First, the job turns on indexing for advanced search and pauses indexing to ensure all indices are created. Then, the job re-creates all indices, clears indexing status, and queues additional Sidekiq jobs to index project and group data, snippets, and users. Finally, indexing for advanced search is resumed to complete. Introduced in GitLab 17.1 with a flag named elastic_index_use_trigger_indexing. Enabled by default. Generally available in GitLab 17.3. Feature flag elastic_index_use_trigger_indexing removed. | |
sudo gitlab-rake gitlab:elastic:pause_indexing | Pauses indexing for advanced search. Changes are still tracked. Useful for cluster/index migrations. |
sudo gitlab-rake gitlab:elastic:resume_indexing | Resumes indexing for advanced search. |
sudo gitlab-rake gitlab:elastic:index_and_search_validation | Validates cluster connectivity, index, and search operations for all indices. Introduced in GitLab 18.3. |
sudo gitlab-rake gitlab:elastic:index_projects | Iterates over all projects, and queues Sidekiq jobs to index them in the background. It can only be used after the index is created. |
sudo gitlab-rake gitlab:elastic:index_group_entities | Invokes gitlab:elastic:index_work_items and gitlab:elastic:index_group_wikis. |
sudo gitlab-rake gitlab:elastic:index_work_items | Indexes all work items from the groups where Elasticsearch is enabled. |
sudo gitlab-rake gitlab:elastic:index_namespaces | Indexes all root namespaces. |
sudo gitlab-rake gitlab:elastic:index_group_wikis | Indexes all wikis from the groups where Elasticsearch is enabled. |
sudo gitlab-rake gitlab:elastic:index_snippets | Performs an Elasticsearch import that indexes the snippets data. |
sudo gitlab-rake gitlab:elastic:index_users | Imports all users into Elasticsearch. |
sudo gitlab-rake gitlab:elastic:index_vulnerabilities | Indexes all vulnerabilities. |
sudo gitlab-rake gitlab:elastic:index_projects_status | Determines the overall indexing status of all project repository data (code, commits, and wikis). The status is calculated by dividing the number of indexed projects by the total number of projects and multiplying by 100. This task does not include non-repository data such as issues, merge requests, or milestones. |
sudo gitlab-rake gitlab:elastic:index_groups_status | Determines the overall indexing status of all group repository data (group wikis). The status is calculated by dividing the number of indexed groups by the total number of groups and multiplying by 100. This task does not include non-repository data such as epics, merge requests, or milestones. |
sudo gitlab-rake gitlab:elastic:clear_index_status | Deletes all instances of IndexStatus for all projects. This command results in a complete wipe of the index, and it should be used with caution. |
sudo gitlab-rake gitlab:elastic:create_empty_index | Generates empty indices (the default index and a separate issues index) and assigns an alias for each on the Elasticsearch side only if it doesn't already exist. |
sudo gitlab-rake gitlab:elastic:delete_index | Removes the GitLab indices and aliases (if they exist) on the Elasticsearch instance. |
sudo gitlab-rake gitlab:elastic:recreate_index | Wrapper task for gitlab:elastic:delete_index and gitlab:elastic:create_empty_index. Does not queue any indexing jobs. |
sudo gitlab-rake gitlab:elastic:projects_not_indexed | Displays which projects do not have repository data indexed. This task does not include non-repository data such as issues, merge requests, or milestones. |
sudo gitlab-rake gitlab:elastic:groups_not_indexed | Displays which groups do not have repository data indexed. This task does not include non-repository data such as issues, merge requests, or milestones. |
sudo gitlab-rake gitlab:elastic:reindex_cluster | Schedules a zero-downtime cluster reindexing task. |
sudo gitlab-rake gitlab:elastic:mark_reindex_failed | Mark the most recent reindex job as failed. |
sudo gitlab-rake gitlab:elastic:list_pending_migrations | List pending migrations. Pending migrations include those that have not yet started, have started but not finished, and those that are halted. |
sudo gitlab-rake gitlab:elastic:estimate_cluster_size | Get an estimate of code and wiki index sizes and total cluster size based on the total repository size. |
sudo gitlab-rake gitlab:elastic:estimate_shard_sizes | Get an estimate of shard sizes for each index based on approximate database counts. This estimate does not include repository data (code, commits, and wikis). Introduced in GitLab 16.11. |
sudo gitlab-rake gitlab:elastic:enable_search_with_elasticsearch | Enables advanced search with Elasticsearch. |
sudo gitlab-rake gitlab:elastic:disable_search_with_elasticsearch | Disables advanced search with Elasticsearch. |
In addition to the Rake tasks, there are some environment variables that can be used to modify the process:
| Environment Variable | Data Type | What it does |
|---|---|---|
ID_TO | Integer | Tells the indexer to only index projects less than or equal to the value. |
ID_FROM | Integer | Tells the indexer to only index projects greater than or equal to the value. |
Using the ID_FROM and ID_TO environment variables, you can index a limited number of projects. This can be useful for staging indexing.
root@git:~# sudo gitlab-rake gitlab:elastic:index_projects ID_FROM=1 ID_TO=100
Because ID_FROM and ID_TO use the or equal to comparison, you can use them to index only one project
by setting both to the same project ID:
root@git:~# sudo gitlab-rake gitlab:elastic:index_projects ID_FROM=5 ID_TO=5
Indexing project repositories...I, [2019-03-04T21:27:03.083410 #3384] INFO -- : Indexing GitLab User / test (ID=33)...
I, [2019-03-04T21:27:05.215266 #3384] INFO -- : Indexing GitLab User / test (ID=33) is done!
When performing a search, the GitLab index uses the following scopes:
| Scope Name | What it searches |
|---|---|
commits | Commit data |
projects | Project data (default) |
blobs | Code |
work_items | Work item data |
merge_requests | Merge request data |
milestones | Milestone data |
notes | Note data |
snippets | Snippet data |
wiki_blobs | Wiki contents |
users | Users |
On GitLab.com and GitLab Dedicated, vulnerability records are always indexed for all projects and namespaces to support features outside of search. Indexing vulnerability records on GitLab Self-Managed is proposed in issue 525484.
For basic guidance on choosing a cluster configuration, see also Elastic Cloud Calculator.
Heap size should be set to no more than 50% of your physical RAM. Additionally, it shouldn't be set to more than the threshold for zero-based compressed oops. The exact threshold varies, but 26 GB is safe on most systems, but can also be as large as 30 GB on some systems. See Heap size settings and Setting JVM options for more details.refresh_interval is a per index setting. You may want to adjust that from default 1s to a bigger value if you don't need data in real-time. This changes how soon you see fresh results. If that's important for you, you should leave it as close as possible to the default value.indices.memory.index_buffer_size to 30% or 40% if you have a lot of heavy indexing operations.{{< history >}}
gitlab:elastic:estimate_shard_sizes introduced in GitLab 16.11.gitlab:elastic:estimate_shard_sizes changed in GitLab 18.3 to include sizing for indices that contain repository data.{{< /history >}}
For single-node clusters, set the number of Elasticsearch shards per index to the number of CPU cores on the Elasticsearch data nodes.
For multi-node clusters, run the Rake task gitlab:elastic:estimate_shard_sizes
to determine the number of shards for each index.
The task returns recommendations for shard and replica sizes and
approximate document counts for indices that contain database data.
Keep the average shard size between a few GB and 30 GB. If the average shard size grows to more than 30 GB, increase the shard size for the index and trigger zero-downtime reindexing. To ensure the cluster is healthy, the number of shards per node must not exceed 20 times the configured heap size. For example, a node with a 30 GB heap must have a maximum of 600 shards.
To update the number of shards for an index, change the setting and trigger zero-downtime reindexing.
For single-node clusters, set the number of Elasticsearch replicas per index to 0.
For multi-node clusters, set the number of Elasticsearch replicas per index to 1 (each shard has one replica).
The number must not be 0 because losing one node corrupts the index.
If shard allocation awareness is enabled, the total number of copies per shard must be evenly divisible by the number of awareness attributes (typically nodes or zones). The even distribution of shard copies across all awareness attributes ensures optimal fault tolerance and load distribution.
(1 + `number_of_replicas`) / `number_of_awareness_attributes` = whole number
To update the number of replicas for an index, change the setting and trigger zero-downtime reindexing.
Prerequisites:
[!warning] Indexing a large instance generates a lot of Sidekiq jobs. Make sure to prepare for this task by having a scalable setup or by creating extra Sidekiq processes.
Both Geo primary and secondary nodes point to the same Elasticsearch cluster. However, Elasticsearch indexing workers run only on the Sidekiq nodes of the primary site.
For this reason, you must configure any extra Sidekiq processes on the primary site's Sidekiq nodes.
If enabling advanced search causes problems due to large volumes of data being indexed:
Create empty indices:
# For installations that use the Linux package
sudo gitlab-rake gitlab:elastic:create_empty_index
# For self-compiled installations
bundle exec rake gitlab:elastic:create_empty_index RAILS_ENV=production
If this is a reindex of your GitLab instance, clear the index status:
# For installations that use the Linux package
sudo gitlab-rake gitlab:elastic:clear_index_status
# For self-compiled installations
bundle exec rake gitlab:elastic:clear_index_status RAILS_ENV=production
Indexing large Git repositories can take a while. To speed up the process, you can tune for indexing speed:
You can temporarily increase refresh_interval.
You can set the number of replicas to 0. This setting controls the number of copies each primary shard of an index has. Thus, having 0 replicas effectively disables the replication of shards across nodes, which should increase the indexing performance. This is an important trade-off in terms of reliability and query performance. It is important to remember to set the replicas to a considered value after the initial indexing is complete.
You can expect a 20% decrease in indexing time. After the indexing is complete, you can set refresh_interval and number_of_replicas back to their desired values.
[!note] This step is optional but may help significantly speed up large indexing operations.
curl --request PUT localhost:9200/gitlab-production/_settings --header 'Content-Type: application/json' \
--data '{
"index" : {
"refresh_interval" : "30s",
"number_of_replicas" : 0
} }'
Index projects and their associated data:
# For installations that use the Linux package
sudo gitlab-rake gitlab:elastic:index_projects
# For self-compiled installations
bundle exec rake gitlab:elastic:index_projects RAILS_ENV=production
This enqueues a Sidekiq job for each project that needs to be indexed. You can query indexing status with a Rake task:
# For installations that use the Linux package
sudo gitlab-rake gitlab:elastic:index_projects_status
# For self-compiled installations
bundle exec rake gitlab:elastic:index_projects_status RAILS_ENV=production
Indexing is 65.55% complete (6555/10000 projects). Considers only code, commits, and wikis.
If you want to limit the index to a range of projects you can provide the
ID_FROM and ID_TO parameters:
# For installations that use the Linux package
sudo gitlab-rake gitlab:elastic:index_projects ID_FROM=1001 ID_TO=2000
# For self-compiled installations
bundle exec rake gitlab:elastic:index_projects ID_FROM=1001 ID_TO=2000 RAILS_ENV=production
Where ID_FROM and ID_TO are project IDs. Both parameters are optional.
The previous example indexes all projects from ID 1001 up to (and including) ID 2000.
[!note] Sometimes the project indexing jobs queued by
gitlab:elastic:index_projectscan get interrupted. This may happen for many reasons, but it's always safe to run the indexing task again.
You can also use the gitlab:elastic:clear_index_status Rake task to force the
indexer to "forget" all progress, so it retries the indexing process from the
start.
Work items, group wikis, personal snippets, and users are not associated with a project and must be indexed separately:
# For installations that use the Linux package
sudo gitlab-rake gitlab:elastic:index_work_items
sudo gitlab-rake gitlab:elastic:index_group_wikis
sudo gitlab-rake gitlab:elastic:index_snippets
sudo gitlab-rake gitlab:elastic:index_users
# For self-compiled installations
bundle exec rake gitlab:elastic:index_work_items RAILS_ENV=production
bundle exec rake gitlab:elastic:index_group_wikis RAILS_ENV=production
bundle exec rake gitlab:elastic:index_snippets RAILS_ENV=production
bundle exec rake gitlab:elastic:index_users RAILS_ENV=production
Enable replication and refreshing again after indexing (only if you previously increased refresh_interval):
curl --request PUT localhost:9200/gitlab-production/_settings --header 'Content-Type: application/json' \
--data '{
"index" : {
"number_of_replicas" : 1,
"refresh_interval" : "1s"
} }'
A force merge should be called after enabling refreshing.
For Elasticsearch 6.x and later, ensure the index is in read-only mode before proceeding with the force merge:
curl --request PUT localhost:9200/gitlab-production/_settings --header 'Content-Type: application/json' \
--data '{
"settings": {
"index.blocks.write": true
} }'
Then, initiate the force merge:
curl --request POST 'localhost:9200/gitlab-production/_forcemerge?max_num_segments=5'
Then, change the index back to read-write mode:
curl --request PUT localhost:9200/gitlab-production/_settings --header 'Content-Type: application/json' \
--data '{
"settings": {
"index.blocks.write": false
} }'
After the indexing is complete, select the Search with advanced search checkbox.
[!warning] For most instances, you do not have to configure dedicated Sidekiq nodes or processes. The following steps use an advanced setting of Sidekiq called routing rules. Be sure to fully understand about the implication of using routing rules to avoid losing jobs entirely.
Indexing a large instance can be a lengthy and resource-intensive process that has the potential of overwhelming Sidekiq nodes and processes. This negatively affects the GitLab performance and availability.
As GitLab allows you to start multiple Sidekiq processes, you can create an additional process dedicated to indexing a set of queues (or queue group). This way, you can ensure that indexing queues always have a dedicated worker, while the rest of the queues have another dedicated worker to avoid contention.
For this purpose, use the routing rules option that allows Sidekiq to route jobs to a specific queue based on worker matching query.
[!note] Routing rules (
sidekiq['routing_rules']) must be the same across all GitLab nodes (especially GitLab Rails and Sidekiq nodes).
You can choose one of the two following options to handle this:
For the following steps, consider the entry of sidekiq['routing_rules']:
["feature_category=global_search", "global_search"] as all indexing jobs are routed to the global_search queue.["*", "default"] as all other non-indexing jobs are routed to the default queue.At least one process in sidekiq['queue_groups'] has to include the mailers queue, otherwise mailers jobs are not processed at all.
[!warning] When starting multiple processes, the number of processes cannot exceed the number of CPU cores you want to dedicate to Sidekiq. Each Sidekiq process can use only one CPU core, subject to the available workload and concurrency settings. For more details, see how to run multiple Sidekiq processes.
To create both an indexing and a non-indexing Sidekiq process in one node:
On your Sidekiq node, change the /etc/gitlab/gitlab.rb file to:
sidekiq['enable'] = true
sidekiq['routing_rules'] = [
["feature_category=global_search", "global_search"],
["*", "default"],
]
sidekiq['queue_groups'] = [
"global_search", # process that listens to global_search queue
"default,mailers" # process that listens to default and mailers queue
]
sidekiq['concurrency'] = 20
If you are using GitLab 16.11 and earlier, explicitly disable any queue selectors:
sidekiq['queue_selector'] = false
Save the file and reconfigure GitLab for the changes to take effect.
On all other Rails and Sidekiq nodes, ensure that sidekiq['routing_rules'] is the same as the previous configuration.
Run the Rake task to migrate existing jobs:
[!note] It is important to run the Rake task immediately after reconfiguring GitLab. After reconfiguring GitLab, existing jobs are not processed until the Rake task starts to migrate the jobs.
To handle these queue groups on two nodes:
To set up the indexing Sidekiq process, on your indexing Sidekiq node, change the /etc/gitlab/gitlab.rb file to:
sidekiq['enable'] = true
sidekiq['routing_rules'] = [
["feature_category=global_search", "global_search"],
["*", "default"],
]
sidekiq['queue_groups'] = [
"global_search", # process that listens to global_search queue
]
sidekiq['concurrency'] = 20
If you are using GitLab 16.11 and earlier, explicitly disable any queue selectors:
sidekiq['queue_selector'] = false
Save the file and reconfigure GitLab for the changes to take effect.
To set up the non-indexing Sidekiq process, on your non-indexing Sidekiq node, change the /etc/gitlab/gitlab.rb file to:
sidekiq['enable'] = true
sidekiq['routing_rules'] = [
["feature_category=global_search", "global_search"],
["*", "default"],
]
sidekiq['queue_groups'] = [
"default,mailers" # process that listens to default and mailers queue
]
sidekiq['concurrency'] = 20
If you are using GitLab 16.11 and earlier, explicitly disable any queue selectors:
sidekiq['queue_selector'] = false
On all other Rails and Sidekiq nodes, ensure that sidekiq['routing_rules'] is the same as the previous configuration.
Save the file and reconfigure GitLab for the changes to take effect.
Run the Rake task to migrate existing jobs:
sudo gitlab-rake gitlab:sidekiq:migrate_jobs:retry gitlab:sidekiq:migrate_jobs:schedule gitlab:sidekiq:migrate_jobs:queued
[!note] It is important to run the Rake task immediately after reconfiguring GitLab. After reconfiguring GitLab, existing jobs are not processed until the Rake task starts to migrate the jobs.
Whenever a change or deletion is made to an indexed GitLab object (a merge request description is changed, a file is deleted from the default branch in a repository, a project is deleted, etc), a document in the index is deleted. However, because these are "soft" deletes, the overall number of "deleted documents", and therefore wasted space, increases.
Elasticsearch does intelligent merging of segments to remove these deleted documents. However, depending on the amount and type of activity in your GitLab installation, it's possible to see as much as 50% of wasted space in the index.
You should generally let Elasticsearch merge and reclaim space automatically with the default settings. From Lucene's Handling of Deleted Documents, "Overall, besides perhaps decreasing the maximum segment size, it is best to leave Lucene defaults as-is and not fret too much about when deletes are reclaimed."
However, some larger installations may wish to tune the merge policy settings:
Consider reducing the index.merge.policy.max_merged_segment size from the default 5 GB to maybe 2 GB or 3 GB. Merging only happens when a segment has at least 50% deletions. Smaller segment sizes allows merging to happen more frequently.
curl --request PUT localhost:9200/gitlab-production/_settings ---header 'Content-Type: application/json' \
--data '{
"index" : {
"merge.policy.max_merged_segment": "2gb"
}
}'
You can also adjust index.merge.policy.reclaim_deletes_weight, which controls how aggressively deletions are targeted. But this can lead to costly merge decisions, so you should not change this unless you understand the tradeoffs.
curl --request PUT localhost:9200/gitlab-production/_settings ---header 'Content-Type: application/json' \
--data '{
"index" : {
"merge.policy.reclaim_deletes_weight": "3.0"
}
}'
Do not do a force merge to remove deleted documents. A warning in the documentation states that this can lead to very large segments that may never get reclaimed, and can also cause significant performance or availability issues.
Sometimes there may be issues with your Elasticsearch index data and as such GitLab allows you to revert to "basic search" when there are no search results and assuming that basic search is supported in that scope. This "basic search" behaves as though you don't have advanced search enabled at all for your instance and search using other data sources (such as PostgreSQL data and Git data).
Elasticsearch is a secondary data store for GitLab. All of the data stored in Elasticsearch can be derived again from other data sources, specifically PostgreSQL and Gitaly. If the Elasticsearch data store gets corrupted, you can reindex everything from scratch.
If your Elasticsearch index is too large, it might cause too much downtime to reindex everything from scratch. You cannot automatically find discrepancies and resync an Elasticsearch index, but you can inspect the logs for any missing updates. To recover data more quickly, you can replay:
elasticsearch.log
for track_items.
You must send these items again through
::Elastic::ProcessBookkeepingService.track!.elasticsearch.log
for indexing_commit_range.
You must set IndexStatus#last_commit/last_wiki_commit
to the oldest from_sha in the logs and then trigger another index of
the project with Search::Elastic::CommitIndexerWorker and ElasticWikiIndexerWorker.sidekiq.log for
ElasticDeleteProjectWorker.
You must trigger another ElasticDeleteProjectWorker.You can also take regular Elasticsearch snapshots to reduce the time it takes to recover from data loss without reindexing everything from scratch.