- Option 1: cert-manager and Let’s Encrypt
- Option 2: Use your own wildcard certificate
- Option 3: Use individual certificate per service
- Option 4: Use auto-generated self-signed wildcard certificate
TLS options
This chart is capable of doing TLS termination using the nginx Ingress controller. You have the choice of how to acquire the TLS certificates for your deployment. Extensive details can be found in global Ingress settings.
Option 1: cert-manager and Let’s Encrypt
Let’s Encrypt is a free, automated, and open Certificate Authority. Certificates can be automatically requested using various tools. This chart comes ready to integrate with a popular choice cert-manager.
If you are already using cert-manager, you can use global.ingress.annotations
to configure appropriate annotations for your cert-manager deployment.
If you don’t already have cert-manager installed in your cluster, you can install and configure it as a dependency of this chart.
Internal cert-manager and Issuer
helm repo update
helm dep update
helm install ...
--set certmanager-issuer.email=you@example.com
Installing certmanager is controlled by the certmanager.install
setting, and using it in the charts is controlled by the
global.ingress.configureCertmanager
setting. Both of these are true
by default, so only the issuer email needs to be
provided by default.
External cert-manager and internal Issuer
It is possible to make use of an external cert-manager
but provide an Issuer as a part of this chart.
helm install ...
--set certmanager.install=false \
--set certmanager-issuer.email=you@example.com \
--set global.ingress.annotations."kubernetes\.io/tls-acme"=true
External cert-manager and Issuer (external)
To make use of an external cert-manager
and Issuer
resource you must provide several items, so that self-signed certificates
are not activated.
- Annotations to activate the external
cert-manager
(see documentation for further details) - Names of TLS secrets for each service (this deactivates self-signed behaviors)
helm install ...
--set cert-manager.install=false \
--set global.ingress.configureCertmanager=false \
--set global.ingress.annotations."kubernetes\.io/tls-acme"=true \
--set gitlab.unicorn.ingress.tls.secretName=RELEASE-gitlab-tls \
--set registry.ingress.tls.secretName=RELEASE-registry-tls \
--set minio.ingress.tls.secretName=RELEASE-minio-tls
Option 2: Use your own wildcard certificate
Add your full chain certificate and key to the cluster as a Secret
, e.g.:
kubectl create secret tls <tls-secret-name> --cert=<path/to-full-chain.crt> --key=<path/to.key>
Include the option to
helm install ...
--set certmanager.install=false \
--set global.ingress.configureCertmanager=false \
--set global.ingress.tls.secretName=<tls-secret-name>
Option 3: Use individual certificate per service
Add your full chain certificates to the cluster as secrets, and then pass those secret names to each ingress.
helm install ...
--set certmanager.install=false \
--set global.ingress.configureCertmanager=false \
--set gitlab.unicorn.ingress.tls.secretName=RELEASE-gitlab-tls \
--set registry.ingress.tls.secretName=RELEASE-registry-tls \
--set minio.ingress.tls.secretName=RELEASE-minio-tls
Option 4: Use auto-generated self-signed wildcard certificate
These charts also provide the capability to provide a auto-generated self-signed wildcard certificate. This can be useful in environments where Let’s Encrypt is not an option, but security via SSL is stil desired. This functionality is provided by the shared-secrets chart.
Note: The
gitlab-runner
chart does not function properly with self-signed certificates. We recommend disabling it, as shown below.
helm install ...
--set certmanager.install=false \
--set global.ingress.configureCertmanager=false \
--set gitlab-runner.install=false
The shared-secrets
chart will then produce a CA certificate and wildcard certificate for use by all externally
accessible services. The secrets containing these will be RELEASE-wildcard-tls
and RELEASE-wildcard-tls-ca
.
The RELEASE-wildcard-tls-ca
contains the public CA certificate that can be distributed to users and systems that
will access the deployed GitLab instance.
Help and feedback
If there's something you don't like about this feature
To propose functionality that GitLab does not yet offer
To further help GitLab in shaping new features
If you didn't find what you were looking for
If you want help with something very specific to your use case, and can use some community support
POST ON GITLAB FORUM
If you have problems setting up or using this feature (depending on your GitLab subscription)
REQUEST SUPPORT
To view all GitLab tiers and features or to upgrade
If you want to try all features available in GitLab.com
If you want to try all features available in GitLab self-managed
If you spot an error or a need for improvement and would like to fix it yourself in a merge request
EDIT THIS PAGE
If you would like to suggest an improvement to this doc