Sourcegraph stores bare Git repositories (without a working tree), which is a complete mirror of the repository on your code host.
If you are keen for more details on what bare Git repositories are, check out this discussion on StackOverflow.
The directories should contain just a few files and directories, namely: HEAD, config, description, hooks, info, objects, packed-refs, refs
For Subversion and other non-Git code hosts, the recommended way to make these accessible in
Sourcegraph is through src-expose
.
Alternatively, you can use git-svn
or
svg2git
to convert Subversion repositories to
Git repositories. Unlike src-expose
, this will preserve commit history, but is generally much
slower.
If you are using an external authentication provider and the provider experiences an outage, users
will be unable to sign into Sourcegraph. A site administrator can configure an alternate sign-in
method by modifying the auth.providers
field in site configuration. However, the site
administrator may themselves be unable to sign in. If this is the case, then a site administrator
can update the configuration if they have direct docker exec
or kubectl exec
access to the
Sourcegraph instance. Follow the instructions to update the site config if the web UI is
inaccessible.
Sometimes URLs in Sourcegraph may change. For example, if a code host configuration is
updated to use a different repositoryPathPattern
, this will change the repository URLs on
Sourcegraph. Users may wish to preserve links to the old URLs, and this requires adding redirects.
We recommend configuring redirects in a reverse proxy. If you are running Sourcegraph as a single Docker image, you can deploy a reverse proxy such as Caddy or NGINX in front of it. Refer to the Caddy or NGINX documentation for URL rewrites.
If you are running Sourcegraph as a Kubernetes cluster, you have two additional options:
- If you are using NGINX
ingress
(
kubectl get ingress | grep sourcegraph-frontend
), modifysourcegraph-frontend.Ingress.yaml
by adding a rewrite rule. - If you are using the NGINX
service,
modify
nginx.ConfigMap.yaml
.
We leave the choice of which external HTTP check monitor up to our users. What we provide out-of-the-box is extensive metrics monitoring through Prometheus and Grafana, with builtin alert thresholds and dashboards, and Kubernetes/Docker HTTP health checks which verify that the server is running. Sourcegraph's frontend has a default health check at https://$SOURCEGRAPH_BASE_URL/healthz. Some users choose to set up their own external HTTP health checker which tests if the homepage loads, a repository page loads, and if a search GraphQL request returns successfully.
Please visit our Observability Docs for more in-depth information about observability in Sourcegraph.
Sourcegraph comes with built-in monitoring in the form of Grafana, connected to Prometheus for metrics and alerting.
Generally, Grafana should be the first stop you make when experiencing a system performance issue. From there you can look for system alerts or metrics that would provide you with more insights on what’s causing the performance issue. You can learn more about accessing Grafana here.
Please refer to the Dashboards guide for more on how to use our Grafana dashboards.
Please refer to Understanding alerts for examples and suggested actions for alerts.
All resource dashboards contain a section called Provisioning indicators
that provide information about the current resource usage of containers. These can be used to determine if a scale-up is needed (example panel).
More information on each available panel in the dashboards is available in the Dashboards reference.
See Alert solutions to learn about each alert and their possible solutions.
All resources dashboards contain a section called Container monitoring
that indicate thresholds at which alerts will fire for each resource (example alert).
More information on each available panel in the dashboards is available in the Dashboards reference.
You should make the decision based on the metrics from the relevant Grafana dashboard linked in each alert.
We recommend paying closer attention to critical alerts.
Please refer to our guide on setting up alerting.
Creating a custom alert is not recommended and currently not supported by Sourcegraph. However, please provide feedback on the monitoring dashboards and alerts if you find anything could be improved via our issue tracker.
More advanced users can also refer to our FAQ item about custom consumption of Sourcegraph metrics.
Sourcegraph provides high-level alerting metrics which you can integrate into your own monitoring system - see the alerting custom consumption guide for more details.
While it is technically possible to consume all of Sourcegraph's metrics in an external system, our recommendation is to utilize the builtin monitoring tools and configure Sourcegraph to send alerts to your own PagerDuty, Slack, email, etc.. Metrics and thresholds can change with each release, therefore manually defining the alerts required to monitor Sourcegraph's health is not recommended. Sourcegraph automatically updates the dashboards and alerts on each release to ensure the displayed information is up-to-date.
Other monitoring systems that support Prometheus scraping (for example, Datadog and New Relic) or Prometheus federation can be configured to federate Sourcegraph's high-level alerting metrics. For information on how to configure those systems, please check your provider's documentation.
I am getting "Error: Cluster information not available" in the Instrumentation page, what should I do?
This error is expected if your instance was not deployed with Kubernetes. The Instrumentation page is currently only available for Kubernetes instances.
Please refer to our dedicated troubleshooting page.