Preliminary version. The functionality may change, but the basic features will be preserved. Compatibility with future versions is ensured, but may require additional migration actions.
Security
How we secure communication between components?
We use TLS encryption for all internal communications between GitLab services within the Kubernetes cluster. We also ensure that any external access is also secured with HTTPS or other secure protocol.
How we secure metrics scraping?
We secure metrics scraping by using kube-rbac-proxy sidecar container alongside Kubernetes RBAC. Kube-rbac-proxy acts as an authentication and authorization layer, ensuring that only requests with valid permissions can access the metrics endpoints.
What TLS encryption is supported?
- TLS 1.2 or higher is required for all incoming and outgoing TLS connections.
- TLS certificates must have at least 112 bits of security. RSA, DSA, and DH keys shorter than 2048 bits, and ECC keys shorter than 224 bits are considered insecure and prohibited.
Update policy
- Every change of module major version can change Gitlab major version (ex. 17 -> 18)
- Every change of module minor version can change Gitlab major or patch version (ex. 17.3 -> 17.4, 17.3.0 -> 17.3.6)
- You can see the full list of correspondence between module versions and Gitlab versions in section Description
Gitaly related topics
How to refresh Gitaly replica?
Cases:
- Refill data on Gitaly node after PV recreation
- Update manually node when data is out-of-date
To refresh specific Gitaly node run:
kubectl exec -i -t -n d8-code praefect-0 -c praefect -- praefect -config /etc/gitaly/config.toml verify --virtual-storage <virtual_storage> --storage <gitaly_pod_name>
All repositories data on <gitaly_pod_name>
will be marked as unverified to prioritize reverification. Reverification
runs asynchronously in the background.
Module deletion
You can fully cleanup cluster from module in 2 steps:
- disable it following the steps as for any other module in Deckhouse Kubernetes Platform
- annotate moduleConfig with
modules.deckhouse.io/allow-disable: "true"
to bypass deckhouse-controller errors - change
enable
flag in moduleСonfig fromtrue
tofalse
- delete namespace as it may have some secrets/configmaps left:
kubectl delete ns d8-code
Please keep in mind to save
secrets/rails-secret
prior to deletion, otherwise you would we unable to fully restore from existing backups in future