Gitaly reference

Gitaly is configured via a TOML configuration file. Unlike self-compiled installations, in Linux package installations you would not edit this file directly. For Linux package installations, the default file location is /var/opt/gitlab/gitaly/config.toml.

The configuration file is passed as an argument to the gitaly executable, which is usually done by either your Linux package installation or your init script.

An example configuration file can be found in the Gitaly project.

Format

At the top level, config.toml defines the items described on the table below.

NameTypeRequiredDescription
socket_pathstringyes (if listen_addr is not set)A path which Gitaly should open a Unix socket.
listen_addrstringyes (if socket_path is not set)TCP address for Gitaly to listen on.
tls_listen_addrstringnoTCP over TLS address for Gitaly to listen on.
bin_dirstringyesDirectory containing Gitaly executables.
prometheus_listen_addrstringnoTCP listen address for Prometheus metrics. If not set, no Prometheus listener is started.

For example:

socket_path = "/home/git/gitlab/tmp/sockets/private/gitaly.socket"
listen_addr = "localhost:9999"
tls_listen_addr = "localhost:8888"
bin_dir = "/home/git/gitaly"
prometheus_listen_addr = "localhost:9236"

Authentication

Gitaly can be configured to reject requests that do not contain a specific bearer token in their headers, which is a security measure to be used when serving requests over TCP:

[auth]
# A non-empty token enables authentication.
token = "the secret token"

Authentication is disabled when the token setting in config.toml is absent or an empty string.

It is possible to temporarily disable authentication with the transitioning setting. This allows you to monitor if all clients are authenticating correctly without causing a service outage for clients that are still to be configured correctly:

[auth]
token = "the secret token"
transitioning = true
caution
Remember to disable transitioning when you are done changing your token settings.

All authentication attempts are counted in Prometheus under the gitaly_authentications_total metric.

TLS

Gitaly supports TLS encryption. You need to bring your own certificates as this isn’t provided automatically.

NameTypeRequiredDescription
certificate_pathstringnoPath to the certificate.
key_pathstringnoPath to the key.
tls_listen_addr = "localhost:8888"

[tls]
certificate_path = '/home/git/cert.cert'
key_path = '/home/git/key.pem'

Read more about TLS in Gitaly.

Storage

GitLab repositories are grouped into directories known as storages, such as /home/git/repositories. They contain bare repositories managed by GitLab with names, such as default.

These names and paths are also defined in the gitlab.yml configuration file of GitLab. When you run Gitaly on the same machine as GitLab (the default and recommended configuration) storage paths defined in the Gitaly config.toml must match those in gitlab.yml.

NameTypeRequiredDescription
storagearrayyesAn array of storage shards.
pathstringyesThe path to the storage shard.
namestringyesThe name of the storage shard.

For example:

[[storage]]
path = "/path/to/storage/repositories"
name = "my_shard"

[[storage]]
path = "/path/to/other/repositories"
name = "other_storage"

Git

The following values can be set in the [git] section of the configuration file.

NameTypeRequiredDescription
bin_pathstringnoPath to Git binary. If not set, is resolved using PATH.
catfile_cache_sizeintegernoMaximum number of cached cat-file processes. Default is 100.
signing_keystringnoPath to GPG signing key. If not set, Gitaly doesn’t sign commits made using the UI. Introduced in GitLab 15.4.

cat-file cache

A lot of Gitaly RPCs need to look up Git objects from repositories. Most of the time we use git cat-file --batch processes for that. For better performance, Gitaly can re-use these git cat-file processes across RPC calls. Previously used processes are kept around in a “Git cat-file cache”. To control how much system resources this uses, we have a maximum number of cat-file processes that can go into the cache.

The default limit is 100 cat-files, which constitute a pair of git cat-file --batch and git cat-file --batch-check processes. If you are seeing errors complaining about “too many open files”, or an inability to create new processes, you may want to lower this limit.

Ideally, the number should be large enough to handle standard traffic. If you raise the limit, you should measure the cache hit ratio before and after. If the hit ratio does not improve, the higher limit is probably not making a meaningful difference. Here is an example Prometheus query to see the hit rate:

sum(rate(gitaly_catfile_cache_total{type="hit"}[5m])) / sum(rate(gitaly_catfile_cache_total{type=~"(hit)|(miss)"}[5m]))

Custom Hooks

Method of configuring custom hooks directory documented here is preferred from GitLab 16.4. [gitlab-shell] dir configuration is no longer required.

Gitaly supports custom Git hooks that are used to perform tasks based on changes performed in any repository. The custom hooks directory is configured in the [hooks] section:

NameTypeRequiredDescription
custom_hooks_dirstringnoThe directory where custom Git hooks are installed.

Example:

[hooks]
custom_hooks_dir = "/home/git/custom-hooks"

If left unset, no custom hooks are used.

GitLab

Method of configuring custom hooks directory documented here is preferred from GitLab 16.4. [gitlab-shell] dir configuration is no longer required.

Gitaly must connect to the GitLab application to perform access checks when a user performs a change. The parameters to connect to GitLab must be configured in the [gitlab] section.

NameTypeRequiredDescription
urlstringyesThe URL of the GitLab server.
secretstringnoThe secret token used to authenticate with GitLab.
secret_filestringnoThe path of the file containing the secret token used to authenticate with GitLab.

Only one of secret or secret_file can be configured.

Prometheus

You can optionally configure Gitaly to record histogram latencies on GRPC method calls in Prometheus.

NameTypeRequiredDescription
grpc_latency_bucketsarraynoPrometheus stores each observation in a bucket, which means you’d get an approximation of latency. Optimizing the buckets gives more control over the accuracy of the approximation.

Example:

prometheus_listen_addr = "localhost:9236"

[prometheus]
grpc_latency_buckets = [0.001, 0.005, 0.025, 0.1, 0.5, 1.0, 10.0, 30.0, 60.0, 300.0, 1500.0]

Logging

The following values configure logging in Gitaly under the [logging] section.

NameTypeRequiredDescription
formatstringnoLog format: text or json. Default: text.
levelstringnoLog level: debug, info, warn, error, fatal, or panic. Default: info.
sentry_dsnstringnoSentry DSN (Data Source Name) for exception monitoring.
sentry_environmentstringno Sentry Environment for exception monitoring.

While the main Gitaly application logs go to stdout, there are some extra log files that go to a configured directory, like the GitLab Shell logs. GitLab Shell does not support panic or trace level logs:

  • panic falls back to error.
  • trace falls back to debug.
  • Any other invalid log levels default to info.

Example:

[logging]
level = "warn"
dir = "/home/gitaly/logs"
format = "json"
sentry_dsn = "https://<key>:<secret>@sentry.io/<project>"
ruby_sentry_dsn = "https://<key>:<secret>@sentry.io/<project>"

Concurrency

You can adjust the concurrency of each RPC endpoint.

NameTypeRequiredDescription
concurrencyarrayyesAn array of RPC endpoints.
rpcstringnoThe name of the RPC endpoint (/gitaly.RepositoryService/GarbageCollect).
max_per_repointegernoConcurrency per RPC per repository.

Example:

[[concurrency]]
rpc = "/gitaly.RepositoryService/GarbageCollect"
max_per_repo = 1