GitLab Helm chart deployment options

Tier: Free, Premium, Ultimate Offering: Self-managed

This page lists commonly used values of the GitLab chart. For a complete list of the available options, refer to the documentation for each subchart.

You can pass values to the helm install command by using a YAML file and the --values <values file> flag or by using multiple --set flags. It is recommended to use a values file that contains only the overrides needed for your release.

The source of the default values.yaml file can be found here. These contents change over releases, but you can use Helm itself to retrieve these on a per-version basis:

helm inspect values gitlab/gitlab

Basic configuration

Parameter Description Default
gitlab.migrations.initialRootPassword.key Key pointing to the root account password in the migrations secret password
gitlab.migrations.initialRootPassword.secret Global name of the secret containing the root account password {Release.Name}-gitlab-initial-root-password
global.gitlab.license.key Key pointing to the Enterprise license in the license secret license
global.gitlab.license.secret Global name of the secret containing the Enterprise license none
global.application.create Create an Application resource for GitLab false
global.edition The edition of GitLab to install. Enterprise Edition (ee) or Community Edition (ce) ee
global.gitaly.enabled Gitaly enable flag true
global.hosts.domain Domain name that will be used for all publicly exposed services Required
global.hosts.externalIP Static IP to assign to NGINX Ingress Controller Required
global.hosts.ssh Domain name that will be used for Git SSH access gitlab.{global.hosts.domain}
global.imagePullPolicy DEPRECATED: Use global.image.pullPolicy instead IfNotPresent
global.image.pullPolicy Set default imagePullPolicy for all charts none (default behavior is IfNotPresent)
global.image.pullSecrets Set default imagePullSecrets for all charts (use a list of name and value pairs) none
global.minio.enabled MinIO enable flag true
global.psql.host Global hostname of an external psql, overrides subcharts’ psql configuration Uses in-cluster non-production PostgreSQL
global.psql.password.key Key pointing to the psql password in the psql secret Uses in-cluster non-production PostgreSQL
global.psql.password.secret Global name of the secret containing the psql password Uses in-cluster non-production PostgreSQL
global.registry.bucket registry bucket name registry
global.service.annotations Annotations to add to every Service {}
global.raills.sessionStore.sessionCookieTokenPrefix Prefix for the generated session cookies ””
global.deployment.annotations Annotations to add to every Deployment {}
global.time_zone Global time zone UTC

TLS configuration

Parameter Description Default
certmanager-issuer.email Email for Let’s Encrypt account false
gitlab.webservice.ingress.tls.secretName Existing Secret containing TLS certificate and key for GitLab none
gitlab.webservice.ingress.tls.smartcardSecretName Existing Secret containing TLS certificate and key for the GitLab smartcard auth domain none
global.hosts.https Serve over https true
global.ingress.configureCertmanager Configure cert-manager to get certificates from Let’s Encrypt true
global.ingress.tls.secretName Existing Secret containing wildcard TLS certificate and key none
minio.ingress.tls.secretName Existing Secret containing TLS certificate and key for MinIO none
registry.ingress.tls.secretName Existing Secret containing TLS certificate and key for registry none

Outgoing Email configuration

Parameter Description Default
global.email.display_name Name that appears as the sender for emails from GitLab GitLab
global.email.from Email address that appears as the sender for emails from GitLab gitlab@example.com
global.email.reply_to Reply-to email listed in emails from GitLab noreply@example.com
global.email.smime.certName Secret object key value for locating the S/MIME certificate file tls.crt
global.email.smime.enabled Add the S/MIME signatures to outgoing email false
global.email.smime.keyName Secret object key value for locating the S/MIME key file tls.key
global.email.smime.secretName Kubernetes Secret object to find the X.509 certificate (S/MIME Cert for creation ) ””
global.email.subject_suffix Suffix on the subject of all outgoing email from GitLab ””
global.smtp.address Hostname or IP of the remote mail server smtp.mailgun.org
global.smtp.authentication Type of SMTP authentication (“plain”, “login”, “cram_md5”, or “” for no authentication) plain
global.smtp.domain Optional HELO domain for SMTP ””
global.smtp.enabled Enable outgoing email false
global.smtp.openssl_verify_mode TLS verification mode (“none”, “peer”, “client_once”, or “fail_if_no_peer_cert”) peer
global.smtp.password.key Key in global.smtp.password.secret that contains the SMTP password password
global.smtp.password.secret Name of a Secret containing the SMTP password ””
global.smtp.port Port for SMTP 2525
global.smtp.starttls_auto Use STARTTLS if enabled on the mail server false
global.smtp.tls Enables SMTP/TLS (SMTPS: SMTP over direct TLS connection) none
global.smtp.user_name Username for SMTP authentication https ””
global.smtp.open_timeout Seconds to wait while attempting to open a connection. 30
global.smtp.read_timeout Seconds to wait while reading one block. 60
global.smtp.pool Enables SMTP connection pooling false

Microsoft Graph Mailer settings

Parameter Description Default
global.appConfig.microsoft_graph_mailer.enabled Enable outgoing email via Microsoft Graph API false
global.appConfig.microsoft_graph_mailer.user_id The unique identifier for the user that uses the Microsoft Graph API ””
global.appConfig.microsoft_graph_mailer.tenant The directory tenant the application plans to operate against, in GUID or domain-name format ””
global.appConfig.microsoft_graph_mailer.client_id The application ID that’s assigned to your app. You can find this information in the portal where you registered your app ””
global.appConfig.microsoft_graph_mailer.client_secret.key Key in global.appConfig.microsoft_graph_mailer.client_secret.secret that contains the client secret that you generated for your app in the app registration portal secret
global.appConfig.microsoft_graph_mailer.client_secret.secret Name of a Secret containing the client secret that you generated for your app in the app registration portal ””
global.appConfig.microsoft_graph_mailer.azure_ad_endpoint The URL of the Azure Active Directory endpoint https://login.microsoftonline.com
global.appConfig.microsoft_graph_mailer.graph_endpoint The URL of the Microsoft Graph endpoint https://graph.microsoft.com

Incoming Email configuration

Common settings

See incoming email configuration examples documentation for more information.

Parameter Description Default
global.appConfig.incomingEmail.address The email address to reference the item being replied to (example: gitlab-incoming+%{key}@gmail.com). Note that the +%{key} suffix should be included in its entirety within the email address and not replaced by another value. empty
global.appConfig.incomingEmail.enabled Enable incoming email false
global.appConfig.incomingEmail.deleteAfterDelivery Whether to mark messages as deleted. For IMAP, messages that are marked as deleted are expunged if expungedDeleted is set to true. For Microsoft Graph, set this to false to retain messages in the inbox because deleted messages are auto-expunged after some time. true
global.appConfig.incomingEmail.expungeDeleted Whether to expunge (permanently remove) messages from the mailbox when they are marked as deleted after delivery. Only relevant to IMAP because Microsoft Graph will auto-expunge deleted messages. false
global.appConfig.incomingEmail.logger.logPath Path to write JSON structured logs to; set to “” to disable this logging /dev/stdout
global.appConfig.incomingEmail.inboxMethod Read mail with IMAP (imap) or Microsoft Graph API with OAuth2 (microsoft_graph) imap
global.appConfig.incomingEmail.deliveryMethod How mailroom can send an email content to Rails app for processing. Either sidekiq or webhook webhook
gitlab.appConfig.incomingEmail.authToken.key Key to incoming email token in incoming email secret. Effective when the delivery method is webhook. authToken
gitlab.appConfig.incomingEmail.authToken.secret Incoming email authentication secret. Effective when the delivery method is webhook. {Release.Name}-incoming-email-auth-token

IMAP settings

Parameter Description Default
global.appConfig.incomingEmail.host Host for IMAP empty
global.appConfig.incomingEmail.idleTimeout The IDLE command timeout 60
global.appConfig.incomingEmail.mailbox Mailbox where incoming mail will end up. inbox
global.appConfig.incomingEmail.password.key Key in global.appConfig.incomingEmail.password.secret that contains the IMAP password password
global.appConfig.incomingEmail.password.secret Name of a Secret containing the IMAP password empty
global.appConfig.incomingEmail.port Port for IMAP 993
global.appConfig.incomingEmail.ssl Whether IMAP server uses SSL true
global.appConfig.incomingEmail.startTls Whether IMAP server uses StartTLS false
global.appConfig.incomingEmail.user Username for IMAP authentication empty

Microsoft Graph settings

Parameter Description Default
global.appConfig.incomingEmail.tenantId The tenant ID for your Microsoft Azure Active Directory empty
global.appConfig.incomingEmail.clientId The client ID for your OAuth2 app empty
global.appConfig.incomingEmail.clientSecret.key Key in appConfig.incomingEmail.clientSecret.secret that contains the OAuth2 client secret empty
global.appConfig.incomingEmail.clientSecret.secret Name of a Secret containing the OAuth2 client secret secret
global.appConfig.incomingEmail.pollInterval The interval in seconds how often to poll for new mail 60
global.appConfig.incomingEmail.azureAdEndpoint The URL of the Azure Active Directory endpoint (example: https://login.microsoftonline.com) empty
global.appConfig.incomingEmail.graphEndpoint The URL of the Microsoft Graph endpoint (example: https://graph.microsoft.com) empty

See the instructions for creating secrets.

Service Desk Email configuration

As a requirement for Service Desk, the Incoming Mail must be configured. Note that the email address for both Incoming Mail and Service Desk must use email sub-addressing. When setting the email addresses in each section the tag added to the username must be +%{key}.

Common settings

Parameter Description Default
global.appConfig.serviceDeskEmail.address The email address to reference the item being replied to (example: project_contact+%{key}@gmail.com) empty
global.appConfig.serviceDeskEmail.enabled Enable Service Desk email false
global.appConfig.serviceDeskEmail.deleteAfterDelivery Whether to mark messages as deleted. For IMAP, messages that are marked as deleted are expunged if expungedDeleted is set to true. For Microsoft Graph, set this to false to retain messages in the inbox because deleted messages are auto-expunged after some time. true
global.appConfig.serviceDeskEmail.expungeDeleted Whether to expunge (permanently remove) messages from the mailbox when they are marked as deleted after delivery. Only relevant to IMAP because Microsoft Graph auto-expunges deleted messages. false
global.appConfig.serviceDeskEmail.logger.logPath Path to write JSON structured logs to; set to “” to disable this logging /dev/stdout
global.appConfig.serviceDeskEmail.inboxMethod Read mail with IMAP (imap) or Microsoft Graph API with OAuth2 (microsoft_graph) imap
global.appConfig.serviceDeskEmail.deliveryMethod How mailroom can send an email content to Rails app for processing. Either sidekiq or webhook webhook
gitlab.appConfig.serviceDeskEmail.authToken.key Key to Service Desk email token in Service Desk email secret. Effective when the delivery method is webhook. authToken
gitlab.appConfig.serviceDeskEmail.authToken.secret service-desk email authentication secret. Effective when the delivery method is webhook. {Release.Name}-service-desk-email-auth-token

IMAP settings

Parameter Description Default
global.appConfig.serviceDeskEmail.host Host for IMAP empty
global.appConfig.serviceDeskEmail.idleTimeout The IDLE command timeout 60
global.appConfig.serviceDeskEmail.mailbox Mailbox where Service Desk mail will end up. inbox
global.appConfig.serviceDeskEmail.password.key Key in global.appConfig.serviceDeskEmail.password.secret that contains the IMAP password password
global.appConfig.serviceDeskEmail.password.secret Name of a Secret containing the IMAP password empty
global.appConfig.serviceDeskEmail.port Port for IMAP 993
global.appConfig.serviceDeskEmail.ssl Whether IMAP server uses SSL true
global.appConfig.serviceDeskEmail.startTls Whether IMAP server uses StartTLS false
global.appConfig.serviceDeskEmail.user Username for IMAP authentication empty

Microsoft Graph settings

Parameter Description Default
global.appConfig.serviceDeskEmail.tenantId The tenant ID for your Microsoft Azure Active Directory empty
global.appConfig.serviceDeskEmail.clientId The client ID for your OAuth2 app empty
global.appConfig.serviceDeskEmail.clientSecret.key Key in appConfig.serviceDeskEmail.clientSecret.secret that contains the OAuth2 client secret empty
global.appConfig.serviceDeskEmail.clientSecret.secret Name of a Secret containing the OAuth2 client secret secret
global.appConfig.serviceDeskEmail.pollInterval The interval in seconds how often to poll for new mail 60
global.appConfig.serviceDeskEmail.azureAdEndpoint The URL of the Azure Active Directory endpoint (example: https://login.microsoftonline.com) empty
global.appConfig.serviceDeskEmail.graphEndpoint The URL of the Microsoft Graph endpoint (example: https://graph.microsoft.com) empty

See the instructions for creating secrets.

Default Project Features configuration

Parameter Description Default
global.appConfig.defaultProjectsFeatures.builds Enable project builds true
global.appConfig.defaultProjectsFeatures.containerRegistry Enable container registry project features true
global.appConfig.defaultProjectsFeatures.issues Enable project issues true
global.appConfig.defaultProjectsFeatures.mergeRequests Enable project merge requests true
global.appConfig.defaultProjectsFeatures.snippets Enable project snippets true
global.appConfig.defaultProjectsFeatures.wiki Enable project wikis true

GitLab Shell

Parameter Description Default
global.shell.authToken Secret containing shared secret  
global.shell.hostKeys Secret containing SSH host keys  
global.shell.port Port number to expose on Ingress for SSH  
global.shell.tcp.proxyProtocol Enable ProxyProtocol in SSH Ingress false

RBAC Settings

Parameter Description Default
certmanager.rbac.create Create and use RBAC resources true
gitlab-runner.rbac.create Create and use RBAC resources true
nginx-ingress.rbac.create Create and use default RBAC resources false
nginx-ingress.rbac.createClusterRole Create and use Cluster role false
nginx-ingress.rbac.createRole Create and use namespaced role true
prometheus.rbac.create Create and use RBAC resources true

If you’re setting nginx-ingress.rbac.create to false to configure the RBAC rules by yourself, you might need to add specific RBAC rules depending on your chart version.

Advanced NGINX Ingress configuration

Prefix NGINX Ingress values with nginx-ingress. For example, set the controller image tag using nginx-ingress.controller.image.tag.

See nginx-ingress chart.

Advanced in-cluster Redis configuration

Parameter Description Default
redis.install Install the bitnami/redis chart true
redis.existingSecret Specify the Secret for Redis servers to use gitlab-redis-secret
redis.existingSecretKey Secret key where password is stored redis-password

Any additional configuration of the Redis service should use the configuration settings from the Redis chart.

Advanced registry configuration

Parameter Description Default
registry.authEndpoint Auth endpoint Undefined by default
registry.enabled Enable Docker registry true
registry.httpSecret Https secret  
registry.minio.bucket MinIO registry bucket name registry
registry.service.annotations Annotations to add to the Service {}
registry.securityContext.fsGroup Group ID under which the pod should be started 1000
registry.securityContext.runAsUser User ID under which the pod should be started 1000
registry.tokenIssuer JWT token issuer gitlab-issuer
registry.tokenService JWT token service container_registry
registry.profiling.stackdriver.enabled Enable continuous profiling using Stackdriver false
registry.profiling.stackdriver.credentials.secret Name of the secret containing credentials gitlab-registry-profiling-creds
registry.profiling.stackdriver.credentials.key Secret key in which the credentials are stored credentials
registry.profiling.stackdriver.service Name of the Stackdriver service to record profiles under RELEASE-registry (templated Service name)
registry.profiling.stackdriver.projectid GCP project to report profiles to GCP project where running

Advanced MinIO configuration

Parameter Description Default
minio.defaultBuckets MinIO default buckets [{"name": "registry"}]
minio.image MinIO image minio/minio
minio.imagePullPolicy MinIO image pull policy  
minio.imageTag MinIO image tag RELEASE.2017-12-28T01-21-00Z
minio.minioConfig.browser MinIO browser flag on
minio.minioConfig.domain MinIO domain  
minio.minioConfig.region MinIO region us-east-1
minio.mountPath MinIO configuration file mount path /export
minio.persistence.accessMode MinIO persistence access mode ReadWriteOnce
minio.persistence.enabled MinIO enable persistence flag true
minio.persistence.matchExpressions MinIO label-expression matches to bind  
minio.persistence.matchLabels MinIO label-value matches to bind  
minio.persistence.size MinIO persistence volume size 10Gi
minio.persistence.storageClass MinIO storageClassName for provisioning  
minio.persistence.subPath MinIO persistence volume mount path  
minio.persistence.volumeName MinIO existing persistent volume name  
minio.resources.requests.cpu MinIO minimum CPU requested 250m
minio.resources.requests.memory MinIO minimum memory requested 256Mi
minio.service.annotations Annotations to add to the Service {}
minio.servicePort MinIO service port 9000
minio.serviceType MinIO service type ClusterIP

Advanced GitLab configuration

Parameter Description Default
gitlab-runner.checkInterval polling interval 30s
gitlab-runner.concurrent number of concurrent jobs 20
gitlab-runner.imagePullPolicy image pull policy IfNotPresent
gitlab-runner.image runner image gitlab/gitlab-runner:alpine-v10.5.0
gitlab-runner.gitlabUrl URL that the Runner uses to register to GitLab Server GitLab external URL
gitlab-runner.install install the gitlab-runner chart true
gitlab-runner.rbac.clusterWideAccess deploy containers of jobs cluster-wide false
gitlab-runner.rbac.create whether to create RBAC service account true
gitlab-runner.rbac.serviceAccountName name of the RBAC service account to create default
gitlab-runner.resources.limits.cpu runner resources  
gitlab-runner.resources.limits.memory runner resources  
gitlab-runner.resources.requests.cpu runner resources  
gitlab-runner.resources.requests.memory runner resources  
gitlab-runner.runners.privileged run in privileged mode, needed for dind false
gitlab-runner.runners.cache.secretName secret to get accesskey and secretkey from gitlab-minio
gitlab-runner.runners.config Runner configuration as string See Chart documentation
gitlab-runner.unregisterRunners Unregisters all runners in the local config.toml when the chart is installed. If the token is prefixed with glrt-, the runner manager is deleted, not the runner. The runner manager is identified by the runner and the machine that contains the config.toml. If the runner was registered with a registration token, the runner is deleted. true
gitlab.geo-logcursor.securityContext.fsGroup Group ID under which the pod should be started 1000
gitlab.geo-logcursor.securityContext.runAsUser User ID under which the pod should be started 1000
gitlab.gitaly.authToken.key Key to Gitaly token in the secret token
gitlab.gitaly.authToken.secret Gitaly secret name {.Release.Name}-gitaly-secret
gitlab.gitaly.image.pullPolicy Gitaly image pull policy  
gitlab.gitaly.image.repository Gitaly image repository registry.gitlab.com/gitlab-org/build/cng/gitaly
gitlab.gitaly.image.tag Gitaly image tag master
gitlab.gitaly.persistence.accessMode Gitaly persistence access mode ReadWriteOnce
gitlab.gitaly.persistence.enabled Gitaly enable persistence flag true
gitlab.gitaly.persistence.matchExpressions Label-expression matches to bind  
gitlab.gitaly.persistence.matchLabels Label-value matches to bind  
gitlab.gitaly.persistence.size Gitaly persistence volume size 50Gi
gitlab.gitaly.persistence.storageClass storageClassName for provisioning  
gitlab.gitaly.persistence.subPath Gitaly persistence volume mount path  
gitlab.gitaly.persistence.volumeName Existing persistent volume name  
gitlab.gitaly.securityContext.fsGroup Group ID under which the pod should be started 1000
gitlab.gitaly.securityContext.runAsUser User ID under which the pod should be started 1000
gitlab.gitaly.service.annotations Annotations to add to the Service {}
gitlab.gitaly.service.externalPort Gitaly service exposed port 8075
gitlab.gitaly.service.internalPort Gitaly internal port 8075
gitlab.gitaly.service.name Gitaly service name gitaly
gitlab.gitaly.service.type Gitaly service type ClusterIP
gitlab.gitaly.serviceName Gitaly service name gitaly
gitlab.gitaly.shell.authToken.key Shell key secret
gitlab.gitaly.shell.authToken.secret Shell secret {Release.Name}-gitlab-shell-secret
gitlab.gitlab-exporter.securityContext.fsGroup Group ID under which the pod should be started 1000
gitlab.gitlab-exporter.securityContext.runAsUser User ID under which the pod should be started 1000
gitlab.gitlab-shell.authToken.key Shell auth secret key secret
gitlab.gitlab-shell.authToken.secret Shell auth secret {Release.Name}-gitlab-shell-secret
gitlab.gitlab-shell.enabled Shell enable flag true
gitlab.gitlab-shell.image.pullPolicy Shell image pull policy  
gitlab.gitlab-shell.image.repository Shell image repository registry.gitlab.com/gitlab-org/build/cng/gitlab-shell
gitlab.gitlab-shell.image.tag Shell image tag master
gitlab.gitlab-shell.replicaCount Shell replicas 1
gitlab.gitlab-shell.securityContext.fsGroup Group ID under which the pod should be started 1000
gitlab.gitlab-shell.securityContext.runAsUser User ID under which the pod should be started 1000
gitlab.gitlab-shell.service.annotations Annotations to add to the Service {}
gitlab.gitlab-shell.service.internalPort Shell internal port 2222
gitlab.gitlab-shell.service.name Shell service name gitlab-shell
gitlab.gitlab-shell.service.type Shell service type ClusterIP
gitlab.gitlab-shell.webservice.serviceName Webservice service name inherited from global.webservice.serviceName
gitlab.mailroom.securityContext.fsGroup Group ID under which the pod should be started 1000
gitlab.mailroom.securityContext.runAsUser User ID under which the pod should be started 1000
gitlab.migrations.bootsnap.enabled Migrations Bootsnap enable flag true
gitlab.migrations.enabled Migrations enable flag true
gitlab.migrations.image.pullPolicy Migrations pull policy  
gitlab.migrations.image.repository Migrations image repository registry.gitlab.com/gitlab-org/build/cng/gitlab-toolbox-ee
gitlab.migrations.image.tag Migrations image tag master
gitlab.migrations.psql.password.key key to psql password in psql secret psql-password
gitlab.migrations.psql.password.secret psql secret gitlab-postgres
gitlab.migrations.psql.port Set PostgreSQL server port. Takes precedence over global.psql.port  
gitlab.migrations.securityContext.fsGroup Group ID under which the pod should be started 1000
gitlab.migrations.securityContext.runAsUser User ID under which the pod should be started 1000
gitlab.sidekiq.concurrency Sidekiq default concurrency 20
gitlab.sidekiq.enabled Sidekiq enabled flag true
gitlab.sidekiq.gitaly.authToken.key key to Gitaly token in Gitaly secret token
gitlab.sidekiq.gitaly.authToken.secret Gitaly secret {.Release.Name}-gitaly-secret
gitlab.sidekiq.gitaly.serviceName Gitaly service name gitaly
gitlab.sidekiq.image.pullPolicy Sidekiq image pull policy  
gitlab.sidekiq.image.repository Sidekiq image repository registry.gitlab.com/gitlab-org/build/cng/gitlab-sidekiq-ee
gitlab.sidekiq.image.tag Sidekiq image tag master
gitlab.sidekiq.psql.password.key key to psql password in psql secret psql-password
gitlab.sidekiq.psql.password.secret psql password secret gitlab-postgres
gitlab.sidekiq.psql.port Set PostgreSQL server port. Takes precedence over global.psql.port  
gitlab.sidekiq.replicas Sidekiq replicas 1
gitlab.sidekiq.resources.requests.cpu Sidekiq minimum needed CPU 100m
gitlab.sidekiq.resources.requests.memory Sidekiq minimum needed memory 600M
gitlab.sidekiq.securityContext.fsGroup Group ID under which the pod should be started 1000
gitlab.sidekiq.securityContext.runAsUser User ID under which the pod should be started 1000
gitlab.sidekiq.timeout Sidekiq job timeout 5
gitlab.toolbox.annotations Annotations to add to the toolbox {}
gitlab.toolbox.backups.cron.enabled Backup CronJob enabled flag false
gitlab.toolbox.backups.cron.extraArgs String of arguments to pass to the backup utility  
gitlab.toolbox.backups.cron.persistence.accessMode Backup cron persistence access mode ReadWriteOnce
gitlab.toolbox.backups.cron.persistence.enabled Backup cron enable persistence flag false
gitlab.toolbox.backups.cron.persistence.matchExpressions Label-expression matches to bind  
gitlab.toolbox.backups.cron.persistence.matchLabels Label-value matches to bind  
gitlab.toolbox.backups.cron.persistence.size Backup cron persistence volume size 10Gi
gitlab.toolbox.backups.cron.persistence.storageClass storageClassName for provisioning  
gitlab.toolbox.backups.cron.persistence.subPath Backup cron persistence volume mount path  
gitlab.toolbox.backups.cron.persistence.volumeName Existing persistent volume name  
gitlab.toolbox.backups.cron.resources.requests.cpu Backup cron minimum needed CPU 50m
gitlab.toolbox.backups.cron.resources.requests.memory Backup cron minimum needed memory 350M
gitlab.toolbox.backups.cron.schedule Cron style schedule string 0 1 * * *
gitlab.toolbox.backups.objectStorage.backend Object storage provider to use (s3, gcs, or azure) s3
gitlab.toolbox.backups.objectStorage.config.gcpProject GCP Project to use when backend is gcs ””
gitlab.toolbox.backups.objectStorage.config.key key containing credentials in secret ””
gitlab.toolbox.backups.objectStorage.config.secret Object storage credentials secret ””
gitlab.toolbox.backups.objectStorage.config Authentication information for object storage {}
gitlab.toolbox.bootsnap.enabled Enable Bootsnap cache in Toolbox true
gitlab.toolbox.enabled Toolbox enabled flag true
gitlab.toolbox.image.pullPolicy Toolbox image pull policy IfNotPresent
gitlab.toolbox.image.repository Toolbox image repository registry.gitlab.com/gitlab-org/build/cng/gitlab-toolbox-ee
gitlab.toolbox.image.tag Toolbox image tag master
gitlab.toolbox.init.image.repository Toolbox init image repository  
gitlab.toolbox.init.image.tag Toolbox init image tag  
gitlab.toolbox.init.resources.requests.cpu Toolbox init minimum needed CPU 50m
gitlab.toolbox.persistence.accessMode Toolbox persistence access mode ReadWriteOnce
gitlab.toolbox.persistence.enabled Toolbox enable persistence flag false
gitlab.toolbox.persistence.matchExpressions Label-expression matches to bind  
gitlab.toolbox.persistence.matchLabels Label-value matches to bind  
gitlab.toolbox.persistence.size Toolbox persistence volume size 10Gi
gitlab.toolbox.persistence.storageClass storageClassName for provisioning  
gitlab.toolbox.persistence.subPath Toolbox persistence volume mount path  
gitlab.toolbox.persistence.volumeName Existing persistent volume name  
gitlab.toolbox.psql.port Set PostgreSQL server port. Takes precedence over global.psql.port  
gitlab.toolbox.resources.requests.cpu Toolbox minimum needed CPU 50m
gitlab.toolbox.resources.requests.memory Toolbox minimum needed memory 350M
gitlab.toolbox.securityContext.fsGroup Group ID under which the pod should be started 1000
gitlab.toolbox.securityContext.runAsUser User ID under which the pod should be started 1000
gitlab.webservice.enabled webservice enabled flag true
gitlab.webservice.gitaly.authToken.key Key to Gitaly token in Gitaly secret token
gitlab.webservice.gitaly.authToken.secret Gitaly secret name {.Release.Name}-gitaly-secret
gitlab.webservice.gitaly.serviceName Gitaly service name gitaly
gitlab.webservice.image.pullPolicy webservice image pull policy  
gitlab.webservice.image.repository webservice image repository registry.gitlab.com/gitlab-org/build/cng/gitlab-webservice-ee
gitlab.webservice.image.tag webservice image tag master
gitlab.webservice.psql.password.key Key to psql password in psql secret psql-password
gitlab.webservice.psql.password.secret psql secret name gitlab-postgres
gitlab.webservice.psql.port Set PostgreSQL server port. Takes precedence over global.psql.port  
global.registry.enabled Enable registry. Mirrors registry.enabled true
global.registry.api.port Registry port 5000
global.registry.api.protocol Registry protocol http
global.registry.api.serviceName Registry service name registry
global.registry.tokenIssuer Registry token issuer gitlab-issuer
gitlab.webservice.replicaCount webservice number of replicas 1
gitlab.webservice.resources.requests.cpu webservice minimum CPU 200m
gitlab.webservice.resources.requests.memory webservice minimum memory 1.4G
gitlab.webservice.securityContext.fsGroup Group ID under which the pod should be started 1000
gitlab.webservice.securityContext.runAsUser User ID under which the pod should be started 1000
gitlab.webservice.service.annotations Annotations to add to the Service {}
gitlab.webservice.http.enabled webservice HTTP enabled true
gitlab.webservice.service.externalPort webservice exposed port 8080
gitlab.webservice.service.internalPort webservice internal port 8080
gitlab.webservice.tls.enabled webservice TLS enabled false
gitlab.webservice.tls.secretName webservice secret name of TLS key {Release.Name}-webservice-tls
gitlab.webservice.service.tls.externalPort webservice TLS exposed port 8081
gitlab.webservice.service.tls.internalPort webservice TLS internal port 8081
gitlab.webservice.service.type webservice service type ClusterIP
gitlab.webservice.service.workhorseExternalPort Workhorse exposed port 8181
gitlab.webservice.service.workhorseInternalPort Workhorse internal port 8181
gitlab.webservice.shell.authToken.key Key to shell token in shell secret secret
gitlab.webservice.shell.authToken.secret Shell token secret {Release.Name}-gitlab-shell-secret
gitlab.webservice.workerProcesses webservice number of workers 2
gitlab.webservice.workerTimeout webservice worker timeout 60
gitlab.webservice.workhorse.extraArgs String of extra parameters for workhorse ””
gitlab.webservice.workhorse.image Workhorse image repository registry.gitlab.com/gitlab-org/build/cng/gitlab-workhorse-ee
gitlab.webservice.workhorse.sentryDSN DSN for Sentry instance for error reporting ””
gitlab.webservice.workhorse.tag Workhorse image tag  

External charts

GitLab makes use of several other charts. These are treated as parent-child relationships. Ensure that any properties you wish to configure are provided as chart-name.property.

Prometheus

Prefix Prometheus values with prometheus. For example, set the persistence storage value using prometheus.server.persistentVolume.size. To disable Prometheus set prometheus.install=false.

Refer to the Prometheus chart documentation for the exhaustive list of configuration options.

PostgreSQL

Prefix PostgreSQL values with postgresql. For example, set the storage class of the primary by using postgresql.primary.persistence.storageClass.

Refer to the Bitnami PostgreSQL chart documentation for the exhaustive list of configuration options.

Bringing your own images

In certain scenarios (i.e. offline environment), you may want to bring your own images rather than pulling them down from the Internet. This requires specifying your own Docker image registry/repository for each of the charts that make up the GitLab release.

Refer to the custom images documentation for more information.