Scale and Deployments
GitLab chart improvements
The GitLab Operator is now available for production use for cloud-native hybrid installations. See the installation documentation before adopting the GitLab Operator.
Support for a fallback to BusyBox images when you specify custom BusyBox values (global.busybox) is removed. Support for BusyBox-based init containers was deprecated in GitLab 16.2 (Helm chart 7.2) in favor of a common GitLab-based init image.
Support for gitlab.kas.privateApi.tls.enabled and gitlab.kas.privateApi.tls.secretName is also removed. You must use global.kas.tls.enabled and global.kas.tls.secretName instead.
The deprecated queue selector and negate options are removed from the Sidekiq chart.
Available in: Free, Premium, Ultimate
Linux package improvements
CentOS Linux 7 will reach
end of life on June 30, 2024. This makes GitLab 17.6 the last GitLab version in which we can provide packages for CentOS 7.
Available in: Free, Premium, Ultimate
Two database mode is available in Beta
Currently, most self-managed customers only utilize a single database.
In order to ensure that the setup between GitLab.com and self-managed is the same, we ask self-managed customers to migrate and run two databases by default.
In 16.0, two database connections became the default for self-managed installations.
In 17.0, we release two database mode as a limited Beta, with the goal to make running decomposed generally available by 19.0.
Migration to two databases remains optional in 17.0, but needs to be performed before upgrading to 19.0.
The migration requires downtime.
Self-managed customers can use a tool that executes this migration with some downtime.
We introduced a new gitlab-ctl command that allows you to upgrade your single-database GitLab instances to a decomposed setup.
This setup contains commands that will work with our Linux package.
The actual migration (copying the database) is part of a rake task in the GitLab project.
Available in: Free, Premium, Ultimate
Private shared group members are listed on Members tab for all members
Previously, when a public group or project invited a private group, the private group was listed only in the Groups tab of the Members page, and private members were not visible to members of the public group. To enable better collaboration between members of these groups, we are now also listing all invited group members in the Members tab, including members from private invited groups. The source of membership will be masked from members that do not have access to the private group. However, the source of membership will be visible to users who have at least the Maintainer role in the project or Owner role in the group, so that they can manage members in their project or group. If the current user viewing the Members tab is unauthenticated or not a member of the group or project, they will not see the private group members. We hope this change will make it easier for group and project members to understand at a glance who has access to a group or project.
Available in: Free, Premium, Ultimate
Offerings: GitLab.com
Members page displays members from invited groups
Previously, members of groups that were invited to a group or project were visible only in the Groups tab of the Members page. This meant users had to check both the Groups and Members tabs to understand who has access to a certain group or project. Now, shared members are listed also in the Members tab, giving a complete overview of all the members that are part of a group or project at a glance.
Available in: Free, Premium, Ultimate
Offerings: GitLab.com
Import from Bitbucket Cloud by using REST API
In this milestone, we added the ability to import Bitbucket Cloud projects by using the REST API.
This can be a better solution for importing a lot of projects than importing by using the UI.
Available in: Free, Premium, Ultimate
Offerings: GitLab.com
Re-import a chosen project relation by using the API
When importing projects from export files with many items of the same type (for example, merge requests or pipelines), sometimes some of those items weren’t imported.
In this release, we added an API endpoint that re-imports a named relation, skipping items that have already been imported. The API requires both:
- A project export archive.
- A type (issues, merge requests, pipelines, or milestones).
Available in: Free, Premium, Ultimate
Offerings: GitLab.com
View issues from multiple Jira projects in GitLab
For larger repositories, you can now view issues from multiple Jira projects in GitLab when you set up the Jira issue integration. With this release, you can:
- Enter up to 100 Jira project keys separated by commas.
- Leave Jira project keys blank to include all available keys.
When you view Jira issues in GitLab, you can filter the issues by project.
To create Jira issues for vulnerabilities in GitLab Ultimate, you can specify only one Jira project.
Available in: Premium, Ultimate
Offerings: GitLab.com
Enable viewing Jira issues in GitLab with the REST API
Available in: Premium, Ultimate
Offerings: GitLab.com
Multiple external participants for Service Desk
Sometimes there is more than one person involved in resolving a support ticket or
the requester wants to keep colleagues up-to date on the state of the ticket.
Now you can have a maximum of 10 external participants without a GitLab account on a
Service Desk ticket and regular issues.
External participants receive Service Desk notification emails for each public comment
on the ticket, and their replies will appear as comments in the GitLab UI.
Simply use the quick actions /add_email
and remove_email
to add or remove external participants with a few keystrokes.
You can also configure GitLab to
add all email addresses from the Cc header
of the initial email to the Service Desk ticket.
You can tailor all Service Desk email templates to your liking,
using markdown, HTML, and dynamic placeholders.
An unsubscribe link placeholder
is available to make it easy for external participants to opt out of a conversation.
Available in: Free, Premium, Ultimate
Offerings: GitLab.com
Indicate that items were imported using direct transfer
You can migrate GitLab groups and projects between GitLab instances by using direct transfer.
Until now, imported items were not easily identifiable. With this release, we’ve added visual indicators to items imported with direct transfer, where the creator is identified as a specific user:
- Notes (system notes and user comments)
- Issues
- Merge requests
- Epics
- Designs
- Snippets
- User profile activity
Available in: Free, Premium, Ultimate
Unified DevOps and Security
1Password secrets integration in GitLab Duo Plugin for JetBrains IDEs
You can now integrate 1Password secrets management with the GitLab Duo plugin for JetBrains.
Developers can replace their personal access tokens in their JetBrains IDE settings with 1Password secrets references. This simplifies managing secrets, and enables seamless secrets rotation without manual token updates.
Available in: Premium, Ultimate
Offerings: GitLab.com
Access GitLab Duo Chat faster with customizable shortcuts
Opening Duo Chat directly from your editor in JetBrains is now even easier.
Use the default Alt+D keyboard shortcut (or set your own) to open Duo Chat quickly and type your question. Use the same keyboard shortcut to close the window.
Available in: Premium, Ultimate
Offerings: GitLab.com
Following the release of group comment templates in GitLab 16.11, we’re bringing these to projects in GitLab 17.0.
Across an organization, it can be helpful to have the same templated response in issues, epics, and merge requests. These responses might include standard questions that need to be answered, responses to common problems, or good structure for merge request review comments. Project-level comment templates give you an additional way to scope the availability of templates, bringing organizations more control and flexibility in sharing these across users.
To create a comment template, go to any comment box on GitLab and select Insert comment template > Manage project comment templates. After you create a comment template, it’s available for all project members. Select the Insert comment template icon while making a comment, and your saved response will be applied.
We’re really excited about this iteration of comment templates and if you have any feedback, please leave it in issue 451520.
Available in: Premium, Ultimate
Offerings: GitLab.com
Commit signing for GitLab UI commits
Previously, web commits and automated commits made by GitLab could not be signed. Now you can configure your self-managed instance with a signing key, a committer name, and email address to sign web and automated commits.
Available in: Free, Premium, Ultimate
Increase Kubernetes agent authorization limit
With the GitLab agent for Kubernetes, you can share a single agent connection with a group. We aim to support a single agent across a large multi-tenant cluster. However, you might have faced a limitation on the number of connection sharing. Until now, an agent could be shared with only 100 projects and groups using CI/CD, and 100 projects and groups using the user_access keyword. In GitLab 17.0, the number of projects and groups you can share with is raised to 500.
If you need to run multiple agents in a cluster, we would like to hear your feedback in issue 454110.
Available in: Free, Premium, Ultimate
Offerings: GitLab.com
Support for GitLab agent for Kubernetes in FIPS mode
From GitLab 17.0, you can install GitLab in FIPS mode with the agent for Kubernetes components enabled. Now, FIPS-compliant users can benefit from all the
Kubernetes integrations with GitLab.
Available in: Free, Premium, Ultimate
Track fast-forward merge requests in deployments
In past releases, merge requests were tracked in a deployment only if the project’s merge method was Merge commit or Merge commit with semi-linear history. From GitLab 17.0, merge requests are tracked in deployments, including in projects with the merge method Fast-forward merge.
Available in: Free, Premium, Ultimate
Offerings: GitLab.com
Identify sessions initiated by Admin Mode
As an instance administrator, when you use multiple browsers or different computers, it is difficult to know which sessions are in Admin Mode and which aren’t. Now, administrators can go to User Settings > Active Sessions to identify which sessions use Admin Mode.
Thank you Roger Meier for your contribution!
Available in: Free, Premium, Ultimate
Customize avatars for users
You can now use the API to upload a custom avatar for any user type, including bot users. This can be especially helpful for visually distinguishing bot users, such as group and project access tokens or service accounts, from human users in the UI.
Thank you
Phawin for your contribution!
Available in: Free, Silver, Gold
Offerings: GitLab.com
Edit a custom role and its permissions
Previously, you could not edit an existing custom role and its permissions. Now, you can edit a custom role and its permissions without having to re-create the role to make a change.
Available in: Ultimate
Offerings: GitLab.com
New permissions for custom roles
There are new permissions available you can use to create custom roles:
With the release of these custom permissions, you can reduce the number of Owners needed in a group by creating a custom role with these Owner-equivalent permissions. Custom roles allow you to define granular roles that give a user only the permissions they need to do their jobs, and reduce unnecessary privilege escalation.
Available in: Ultimate
Offerings: GitLab.com
Manage custom roles at self-managed instance level
Before this release, on self-managed GitLab, custom roles had to be created at the group level. This meant administrators could not centrally manage custom roles for the instance, which resulted in duplicate roles across the instance. Now custom roles are managed at the self-managed instance level. Only administrators can create custom roles, but both administrators and group Owners can assign these custom roles.
For more information on migrating existing custom roles, API endpoints, and workflows, see epic 11851.
This update does not impact custom role workflows on GitLab.com.
Available in: Ultimate
UX improvements to custom roles
A series of improvements have been made to the user experience for custom roles, specifically:
Available in: Ultimate
Offerings: GitLab.com
Improved branch protection settings for administrators and for groups
Previously, setting up default branch protection options did not allow for the same level of configuration that the settings for protected branches did.
In this release, we have updated the default branch protection settings to provide the same experience that you have with protected branches.
This allows more flexibility in protecting your default branch and simplifies the process to match what already exists in the protected branch settings.
Available in: Free, Premium, Ultimate
Offerings: GitLab.com
The security policy bot posts a comment on merge requests when they violate a policy to help users understand when policies are enforced on their project, when evaluation is completed, and if there are any violations blocking an MR, with guidance to resolve them. These comments are now optional and can be enabled or disabled within each policy. This gives organizations the flexibility and control to determine how they want to communicate about these policies to their users.
Available in: Ultimate
Offerings: GitLab.com
Updated filtering on the Vulnerability Report
The old implementation of the Vulnerability Report filters wasn’t scalable.
We were limited by horizontal space on the page. You can now use the filtered
search component to filter the Vulnerability Report by any combination of
status, severity, tool, or activity. This change allows us to add new filters,
like this proposed
filter by identifier.
Available in: Ultimate
Offerings: GitLab.com
Toggle merge request approval policies to fail open or fail closed
Compliance operates on a sliding scale for many organizations as they strike a balance between meeting requirements and ensuring developer velocity is not impacted. Merge request approval policies help to operationalize security and compliance in the heart of the DevSecOps workflow - the merge request. We’re introducing a new fail open option for merge request approval policies to offer flexibility to teams who want to ease the transition to policy enforcement as they roll out controls in their organization.
When a merge request approval policy is configured to fail open, MRs will now only be blocked if a policy rule is violated and if that project has the security analyzer properly configured. If an analyzer is not enabled for a project or if the analyzer does not successfully produce results, the policy will no longer consider this a violation for the given rule and analyzer. This approach allows for progressive rollout of policies as teams work to ensure proper scan execution and enforcement.
Available in: Ultimate
Offerings: GitLab.com
Automatic deletion of unverified secondary email addresses
If you add a secondary email address to your user profile and do not verify it, that email address is now automatically deleted after three days. Previously, these email addresses were in a reserved state and could not be released without manual intervention. This automatic deletion reduces administrator overhead and prevents users from reserving email addresses that they do not have ownership of.
Available in: Free, Premium, Ultimate
Offerings: GitLab.com
Filter package registry UI for packages with errors
You can use the GitLab package registry to publish and download packages. Sometimes, packages fail to upload due to an error. Previously, there was no way to quickly view packages that failed to upload. This made it challenging to get a holistic view of your organization’s package registry.
Now you can filter the package registry UI for packages that failed to upload. This improvement makes it easier to investigate and resolve any issues you encounter.
Available in: Free, Premium, Ultimate
We added a new metric to the Value Streams Dashboard: median time to merge. In GitLab, this metric represents the median time between when a merge request was created and when it was merged. This new metric measures DevOps health by identifying the efficiency and productivity of your merge request and code review processes.
By analyzing how this metric evolves in the context of other SDLC metrics, teams can identify low or high productivity months, understand the impact of new DevOps practices on the development speed and delivery process, reduce their overall lead time, and increase the velocity of their software delivery.
Available in: Ultimate
Offerings: GitLab.com
Design Management features extended to Product teams
GitLab is expanding collaboration by updating our permissions. Now, users with the Reporter role can access Design Management features, enabling product teams to engage more directly in the design process. This change simplifies workflows and accelerates innovation by inviting broader participation from across your organization.
Available in: Free, Premium, Ultimate
Offerings: GitLab.com
Enhanced epic deletion protection
We’ve updated what happens when you delete an epic to better safeguard your project’s structure and data. It’s all about giving you more control and peace of mind while managing your projects.
Now, when you delete a parent epic, instead of deleting all its child records automatically, we preserve them by detaching the parent relationship first. This change provides you with a safer way to manage your epics, ensuring accidental deletions don’t result in losing valuable information.
Available in: Premium, Ultimate
Offerings: GitLab.com
Sort the Roadmap by created date, last updated date, and title
We expanded the epic sorting options available in the Roadmap view, providing you more flexibility in organizing and prioritizing your projects. You can now sort epics by created date, last updated date, and title. This enhancement lays the groundwork for even more advanced sorting capabilities in the future to help you manage epics more dynamically.
Available in: Premium, Ultimate
Offerings: GitLab.com
Simplified configuration file schema for Value Streams Dashboard
You can now customize Value Streams Dashboard panels using a simplified schema-driven customizable UI framework. In the new format, the fields provide more flexibility of displaying the data and laying out the dashboard panels. With the new framework, administrators can track changes to the dashboard over time. This version history can help you revert to previous versions and compare changes between dashboard versions.
Using this customization, decision-makers can focus on the most relevant information for their business, while teams can better organize and display key DevSecOps metrics.
Available in: Ultimate
Offerings: GitLab.com
Guests in groups can link issues
We reduced the minimum role required to relate issues and tasks from Reporter to Guest, giving you more flexibility to organize work across your GitLab instance while maintaining
permissions.
Available in: Premium, Ultimate
Offerings: GitLab.com
Milestones and iterations visible on issue boards
We’ve improved issue boards to offer you clearer insights into your project’s timeline and phases. Now, with milestone and iteration details directly visible on issue cards, you can easily track progress and adjust your team’s workload on the fly. This enhancement is designed to make your planning and execution more efficient, keeping you in the loop and ahead of schedule.
Available in: Free, Premium, Ultimate
Offerings: GitLab.com
API Security Testing analyzer updates
We published the following API Security Testing analyzer updates during the 17.0 release milestone:
- System environment variables are now passed from the CI runner to the custom Python scripts used for certain advanced scenarios (like request signing). This will make implementing these scenarios easier. See issue 457795 for more details.
- API Security containers now run as a non-root user, which improves flexibility and compliance. See issue 287702 for more details.
- Support for servers that only offer TLSv1.3 ciphers, which enables more customers to adopt API Security Testing. See issue 441470 for more details.
- Upgrade to Alpine 3.19, which addresses security vulnerabilities. See issue 456572 for more details.
As previously announced, we increased the major version number of API Security Testing to version 5 in GitLab 17.0.
Available in: Ultimate
Offerings: GitLab.com
Dependency Scanning support for Android
Users of Dependency Scanning can now scan Android projects. To configure Android scanning, use the
CI/CD Catalog component. Android scanning is also supported for users of the
CI/CD template.
Available in: Ultimate
Offerings: GitLab.com
Dependency Scanning default Python image
Following the deprecation of Python 3.9 as the default Python image, Python 3.11 is now the default image.
As outlined in the deprecation notice, the target for the new default Python version was 3.10. The direct move to Python 3.11 was required to ensure FIPS compliance.
Available in: Ultimate
Offerings: GitLab.com
DAST now supports both arm64 and amd64 architectures by default
DAST 5 supports both arm64 and amd64 architectures by default. This enables customers to choose the Runner host architecture and optimize cost savings.
Available in: Ultimate
Offerings: GitLab.com
Streamlined SAST analyzer coverage for more languages
GitLab Static Application Security Testing (SAST) now scans the same languages with fewer analyzers, offering a simpler, more customizable scan experience.
In GitLab 17.0, we’ve replaced language-specific analyzers with GitLab-managed rules in the Semgrep-based analyzer for the following languages:
- Android
- C and C++
- iOS
- Kotlin
- Node.js
- PHP
- Ruby
As announced, we’ve updated the SAST CI/CD template to reflect the new scanning coverage and to remove language-specific analyzer jobs that are no longer used.
Available in: Free, Premium, Ultimate
Secret Detection now supports remote rulesets when overriding or disabling rules
We resolved a Secret Detection bug that impacted remote rulesets. It’s now possible to override or disable rules via remote rulesets. Remote rulesets offer a scalable way to configure rules in a single place, which can be applied across multiple projects.
Available in: Ultimate
Offerings: GitLab.com
Introducing advanced vulnerability tracking for Secret Detection
Secret Detection now uses an advanced vulnerability tracking algorithm to more accurately identify when the same secret has moved within a file due to refactoring or unrelated changes. A new finding is no longer created if:
- A leak moves within a file.
- A new leak of the same value appears within the same file.
Otherwise, the existing workflow (merge request widget, pipeline report, and vulnerability report) will treat the findings the same as before. By ensuring that duplicate vulnerabilities are not reported as secrets shift locations, teams are more easily able to manage leaked secrets.
Available in: Ultimate
Offerings: GitLab.com
Semantic version ranges for published CI/CD components
When using a CI/CD Catalog component, you might want to have it automatically use the latest version. For example, you don’t want to have to manually monitor all the components you use and manually switch to the next version every time there is a minor update or security patch. But using ~latest is also a bit risky because minor version updates could have undesired behavior changes, and major version updates have a higher risk of breaking changes.
With this release, you can opt to use the latest major or minor version of a CI/CD component. For example, specify 2 for the component version, and you’ll get all updates for that major version, like 2.1.1, 2.1.2, 2.2.0, but not 3.0.0. Specify 2.1 and you’ll only get patch updates for that minor version, like 2.1.1, 2.1.2, but not 2.2.0.
Available in: Free, Premium, Ultimate
Standardized CI/CD Catalog component publishing process
We have been hard at work on CI/CD components, including making the process of releasing components to the CI/CD Catalog a consistent experience. As part of that work, we’ve made releasing versions from a CI/CD job with the
release keyword and the
release-cli image the only method. All improvements to the release process will apply to this method only. To avoid breaking changes introduced by this restriction, make sure you always use the latest version of the image (
release-cli:latest) or at least a version greater than
v0.17. The
Releases option in the UI is now disabled for CI/CD component projects.
Available in: Free, Premium, Ultimate
Always run `after_script` commands for canceled jobs
The after_script CI/CD keyword is used to run additional commands after the main script section of a job. This is often used for cleaning up environments or other resources that were used by the job. However, after_script commands did not run if a job was canceled.
As of GitLab 17.0, after_script commands will always run when a job is canceled. To opt out, see the documentation.
Available in: Free, Premium, Ultimate
Offerings: GitLab.com
GitLab Runner 17.0
We’re also releasing GitLab Runner 17.0 today! GitLab Runner is the lightweight, highly-scalable agent that runs your CI/CD jobs and sends the results back to a GitLab instance. GitLab Runner works in conjunction with GitLab CI/CD, the open-source continuous integration service included with GitLab.
What’s new:
The list of all changes is in the GitLab Runner CHANGELOG.
Available in: Free, Premium, Ultimate