You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
Cleanup documentation around symbols and repo-updater (#1132)
Those two services are removed from our architecture, and workloads are
moved to worker and searcher. This PR removes (hopefully) all remaining
references to those services in our docs.
Test plan: Review.
Copy file name to clipboardExpand all lines: docs/admin/architecture.mdx
+3-3Lines changed: 3 additions & 3 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -11,11 +11,11 @@
11
11
At its core, Sourcegraph maintains a persistent cache of all repositories that are connected to it. It is persistent because this data is critical for Sourcegraph to function. Still, it is ultimately a cache because the code host is the source of truth, and our cache is eventually consistent.
12
12
13
13
-`gitserver` is the sharded service that stores repositories and makes them accessible to other Sourcegraph services
14
-
-`repo-updater` is the singleton service responsible for ensuring all repositories in gitserver are as up-to-date as possible while respecting code host rate limits. It is also responsible for syncing repository metadata from the code host that is stored in the repo table of our Postgres database
14
+
-`worker` is responsible for ensuring all repositories in gitserver are as up-to-date as possible while respecting code host rate limits. It is also responsible for syncing repository metadata from the code host that is stored in the repo table of our Postgres database
15
15
16
16
## Permission syncing
17
17
18
-
Repository permissions are mirrored from code hosts to Sourcegraph by default. This builds the foundation of Sourcegraph authorization for repositories to ensure users see consistent content on code hosts. Currently, the background permissions syncer resides in the repo-updater.
18
+
Repository permissions are mirrored from code hosts to Sourcegraph by default. This builds the foundation of Sourcegraph authorization for repositories to ensure users see consistent content on code hosts. Currently, the background permissions syncer resides in the `worker`.
19
19
20
20
<Callouttype="note">Learn more in the [Permission Syncing docs](/admin/permissions/syncing)</Callout>
21
21
@@ -94,7 +94,7 @@ You can learn more in the [Code Insights](/code_insights) docs.
- Commit search to find historical commits to search over
97
-
- Repository Syncing: The code insights backend has direct dependencies on `gitserver` and `repo-updater`
97
+
- Repository Syncing: The code insights backend has a direct dependency on `gitserver`
98
98
- Permission syncing: The code insights backend depends on synced repository permissions for access control
99
99
- Settings cascade:
100
100
- Insights and dashboard configuration are stored in user, organization, and global settings. This will change in the future and is planned to be moved to the database
Copy file name to clipboardExpand all lines: docs/admin/code_hosts/rate_limits.mdx
+1-1Lines changed: 1 addition & 1 deletion
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -52,7 +52,7 @@ Requests to the configured code host will be staggered as to not exceed `"reques
52
52
- For Sourcegraph `<=3.38`, if rate limiting is configured more than once for the same code host instance, the most restrictive limit will be used.
53
53
- For Sourcegraph >=3.39, rate limiting should be enabled and configured for each individual code host connection.
54
54
55
-
To see the status of configured internal rate limits, visit **Site admin > Instrumentation > repo-updater > Rate Limiter State**. This page lists internal rate limits by code host, for example:
55
+
To see the status of configured internal rate limits, visit **Site admin > Instrumentation > worker > Rate Limiter State**. This page lists internal rate limits by code host, for example:
Copy file name to clipboardExpand all lines: docs/admin/config/private-network.mdx
+4-5Lines changed: 4 additions & 5 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -19,7 +19,6 @@ services hosted within an organization's private network
19
19
* Connecting to external [LLM providers](../../cody/capabilities/supported-models) with Cody
20
20
-**gitserver**: Executes git commands against externally hosted [code hosts](../external_service)
21
21
-**migrator**: Connects to Postgres instances (which may be [externally hosted](../external_services/postgres)) to process database migrations
22
-
-**repo-updater**: Communicates with [code hosts](../external_service) APIs to coordinate repository synchronization
23
22
-**worker**: Sourcegraph [Worker](../workers) run various background jobs that may require establishing connections to
24
23
services hosted within an organization's private network
25
24
@@ -34,22 +33,22 @@ variables will depend on your Sourcegraph deployment method.
34
33
Add the proxy environment variables to your Sourcegraph Helm chart [override file](https://github.com/sourcegraph/deploy-sourcegraph-helm/blob/main/charts/sourcegraph/values.yaml):
If the updated Sourcegraph pods fail to pass their readiness or health checks after configuring the HTTP proxy environment variables, you may also need to add your k8s cluster pod & service CIDR ranges to the `NO_PROXY` environment variable. Example:
Copy file name to clipboardExpand all lines: docs/admin/deploy/docker-compose/configuration.mdx
+1-3Lines changed: 1 addition & 3 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -125,7 +125,7 @@ If you must use a `.netrc` file to store these credentials instead, follow the p
125
125
126
126
## Add replicas
127
127
128
-
When adding replicas for `gitserver`, `searcher`, `symbols`, `zoekt-indexserver`, or `zoekt-webserver`, you must update the corresponding environment variable on each of the frontend services in your docker-compose.override.yaml file to the number of replicas for the respective service. Sourcegraph will then automatically infer the containers' endpoints for each replica.
128
+
When adding replicas for `gitserver`, `searcher`, `zoekt-indexserver`, or `zoekt-webserver`, you must update the corresponding environment variable on each of the frontend services in your docker-compose.override.yaml file to the number of replicas for the respective service. Sourcegraph will then automatically infer the containers' endpoints for each replica.
Copy file name to clipboardExpand all lines: docs/admin/deploy/kubernetes/kustomize/migrate.mdx
+3-1Lines changed: 3 additions & 1 deletion
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -15,7 +15,7 @@ Here are the benefits of the new base cluster with the new Kustomize setup compa
15
15
- Streamlined resource allocation process:
16
16
* Allocates resources based on the size of the instance
17
17
* Optimized through load testing
18
-
* The searcher and symbols use StatefulSets and do not require ephemeral storage
18
+
* The searcher StatefulSet does not require ephemeral storage
19
19
- Utilizes the Kubernetes-native tool Kustomize:
20
20
* Built into kubectl
21
21
* No additional scripting required
@@ -192,6 +192,8 @@ If your instance was deployed using the non-privileged overlay, you can follow t
192
192
193
193
## Step 9: Build and review new manifests
194
194
195
+
> NOTE: Symbols has been removed in Sourcegraph 6.4.
196
+
195
197
`pgsql`, `codeinsights-db`, `searcher`, `symbols`, and `codeintel-db` have been changed from `Deployments` to `StatefulSets`. However, redeploying these services as StatefulSets should not affect your existing deployment as they are all configured to use the same PVCs.
0 commit comments