Guest User

Untitled

a guest
Apr 28th, 2023
389
0
Never
Not a member of Pastebin yet? Sign Up, it unlocks many cool features!
text 141.92 KB | None | 0 0
  1. ## GitLab configuration settings
  2. ##! This file is generated during initial installation and **is not** modified
  3. ##! during upgrades.
  4. ##! Check out the latest version of this file to know about the different
  5. ##! settings that can be configured, when they were introduced and why:
  6. ##! https://gitlab.com/gitlab-org/omnibus-gitlab/blame/master/files/gitlab-config-template/gitlab.rb.template
  7.  
  8. ##! Locally, the complete template corresponding to the installed version can be found at:
  9. ##! /opt/gitlab/etc/gitlab.rb.template
  10.  
  11. ##! You can run `gitlab-ctl diff-config` to compare the contents of the current gitlab.rb with
  12. ##! the gitlab.rb.template from the currently running version.
  13.  
  14. ##! You can run `gitlab-ctl show-config` to display the configuration that will be generated by
  15. ##! running `gitlab-ctl reconfigure`
  16.  
  17. ##! In general, the values specified here should reflect what the default value of the attribute will be.
  18. ##! There are instances where this behavior is not possible or desired. For example, when providing passwords,
  19. ##! or connecting to third party services.
  20. ##! In those instances, we endeavour to provide an example configuration.
  21.  
  22. ## GitLab URL
  23. ##! URL on which GitLab will be reachable.
  24. ##! For more details on configuring external_url see:
  25. ##! https://docs.gitlab.com/omnibus/settings/configuration.html#configuring-the-external-url-for-gitlab
  26. ##!
  27. ##! Note: During installation/upgrades, the value of the environment variable
  28. ##! EXTERNAL_URL will be used to populate/replace this value.
  29. ##! On AWS EC2 instances, we also attempt to fetch the public hostname/IP
  30. ##! address from AWS. For more details, see:
  31. ##! https://docs.aws.amazon.com/AWSEC2/latest/UserGuide/instancedata-data-retrieval.html
  32. external_url 'http://192.9.166.217'
  33.  
  34. ## Roles for multi-instance GitLab
  35. ##! The default is to have no roles enabled, which results in GitLab running as an all-in-one instance.
  36. ##! Options:
  37. ##! redis_sentinel_role redis_master_role redis_replica_role geo_primary_role geo_secondary_role
  38. ##! postgres_role consul_role application_role monitoring_role
  39. ##! For more details on each role, see:
  40. ##! https://docs.gitlab.com/omnibus/roles/index.html#roles
  41. ##!
  42. # roles ['redis_sentinel_role', 'redis_master_role']
  43.  
  44. ## Legend
  45. ##! The following notations at the beginning of each line may be used to
  46. ##! differentiate between components of this file and to easily select them using
  47. ##! a regex.
  48. ##! ## Titles, subtitles etc
  49. ##! ##! More information - Description, Docs, Links, Issues etc.
  50. ##! Configuration settings have a single # followed by a single space at the
  51. ##! beginning; Remove them to enable the setting.
  52.  
  53. ##! **Configuration settings below are optional.**
  54.  
  55.  
  56. ################################################################################
  57. ################################################################################
  58. ## Configuration Settings for GitLab CE and EE ##
  59. ################################################################################
  60. ################################################################################
  61.  
  62. ################################################################################
  63. ## gitlab.yml configuration
  64. ##! Docs: https://gitlab.com/gitlab-org/omnibus-gitlab/blob/master/doc/settings/gitlab.yml.md
  65. ################################################################################
  66. gitlab_rails['gitlab_ssh_host'] = '192.9.166.217:22'
  67. # gitlab_rails['gitlab_ssh_user'] = ''
  68. # gitlab_rails['time_zone'] = 'UTC'
  69.  
  70. ### Rails asset / CDN host
  71. ###! Defines a url for a host/cdn to use for the Rails assets
  72. ###! Docs: https://docs.gitlab.com/omnibus/settings/configuration.html#set-a-content-delivery-network-url
  73. # gitlab_rails['cdn_host'] = 'https://mycdnsubdomain.fictional-cdn.com'
  74.  
  75. ### Request duration
  76. ###! Tells the rails application how long it has to complete a request
  77. ###! This value needs to be lower than the worker timeout set in puma.
  78. ###! By default, we'll allow 95% of the the worker timeout
  79. # gitlab_rails['max_request_duration_seconds'] = 57
  80.  
  81. ### GitLab email server settings
  82. ###! Docs: https://docs.gitlab.com/omnibus/settings/smtp.html
  83. ###! **Use smtp instead of sendmail/postfix.**
  84.  
  85. # gitlab_rails['smtp_enable'] = true
  86. # gitlab_rails['smtp_address'] = "smtp.server"
  87. # gitlab_rails['smtp_port'] = 465
  88. # gitlab_rails['smtp_user_name'] = "smtp user"
  89. # gitlab_rails['smtp_password'] = "smtp password"
  90. # gitlab_rails['smtp_domain'] = "example.com"
  91. # gitlab_rails['smtp_authentication'] = "login"
  92. # gitlab_rails['smtp_enable_starttls_auto'] = true
  93. # gitlab_rails['smtp_tls'] = false
  94. # gitlab_rails['smtp_pool'] = false
  95.  
  96. ###! **Can be: 'none', 'peer', 'client_once', 'fail_if_no_peer_cert'**
  97. ###! Docs: http://api.rubyonrails.org/classes/ActionMailer/Base.html
  98. # gitlab_rails['smtp_openssl_verify_mode'] = 'none'
  99.  
  100. # gitlab_rails['smtp_ca_path'] = "/etc/ssl/certs"
  101. # gitlab_rails['smtp_ca_file'] = "/etc/ssl/certs/ca-certificates.crt"
  102.  
  103. ### Email Settings
  104.  
  105. # gitlab_rails['gitlab_email_enabled'] = true
  106.  
  107. ##! If your SMTP server does not like the default 'From: gitlab@gitlab.example.com'
  108. ##! can change the 'From' with this setting.
  109. # gitlab_rails['gitlab_email_from'] = 'example@example.com'
  110. # gitlab_rails['gitlab_email_display_name'] = 'Example'
  111. # gitlab_rails['gitlab_email_reply_to'] = 'noreply@example.com'
  112. # gitlab_rails['gitlab_email_subject_suffix'] = ''
  113. # gitlab_rails['gitlab_email_smime_enabled'] = false
  114. # gitlab_rails['gitlab_email_smime_key_file'] = '/etc/gitlab/ssl/gitlab_smime.key'
  115. # gitlab_rails['gitlab_email_smime_cert_file'] = '/etc/gitlab/ssl/gitlab_smime.crt'
  116. # gitlab_rails['gitlab_email_smime_ca_certs_file'] = '/etc/gitlab/ssl/gitlab_smime_cas.crt'
  117.  
  118. ### GitLab user privileges
  119. # gitlab_rails['gitlab_default_can_create_group'] = true
  120. # gitlab_rails['gitlab_username_changing_enabled'] = true
  121.  
  122. ### Default Theme
  123. ### Available values:
  124. ##! `1` for Indigo
  125. ##! `2` for Dark
  126. ##! `3` for Light
  127. ##! `4` for Blue
  128. ##! `5` for Green
  129. ##! `6` for Light Indigo
  130. ##! `7` for Light Blue
  131. ##! `8` for Light Green
  132. ##! `9` for Red
  133. ##! `10` for Light Red
  134. # gitlab_rails['gitlab_default_theme'] = 2
  135.  
  136. ### Default project feature settings
  137. # gitlab_rails['gitlab_default_projects_features_issues'] = true
  138. # gitlab_rails['gitlab_default_projects_features_merge_requests'] = true
  139. # gitlab_rails['gitlab_default_projects_features_wiki'] = true
  140. # gitlab_rails['gitlab_default_projects_features_snippets'] = true
  141. # gitlab_rails['gitlab_default_projects_features_builds'] = true
  142. # gitlab_rails['gitlab_default_projects_features_container_registry'] = true
  143.  
  144. ### Automatic issue closing
  145. ###! See https://docs.gitlab.com/ee/customization/issue_closing.html for more
  146. ###! information about this pattern.
  147. # gitlab_rails['gitlab_issue_closing_pattern'] = "\b((?:[Cc]los(?:e[sd]?|ing)|\b[Ff]ix(?:e[sd]|ing)?|\b[Rr]esolv(?:e[sd]?|ing)|\b[Ii]mplement(?:s|ed|ing)?)(:?) +(?:(?:issues? +)?%{issue_ref}(?:(?:, *| +and +)?)|([A-Z][A-Z0-9_]+-\d+))+)"
  148.  
  149. ### Download location
  150. ###! When a user clicks e.g. 'Download zip' on a project, a temporary zip file
  151. ###! is created in the following directory.
  152. ###! Should not be the same path, or a sub directory of any of the `git_data_dirs`
  153. # gitlab_rails['gitlab_repository_downloads_path'] = 'tmp/repositories'
  154.  
  155. ### Gravatar Settings
  156. # gitlab_rails['gravatar_plain_url'] = 'http://www.gravatar.com/avatar/%{hash}?s=%{size}&d=identicon'
  157. # gitlab_rails['gravatar_ssl_url'] = 'https://secure.gravatar.com/avatar/%{hash}?s=%{size}&d=identicon'
  158.  
  159. ### Auxiliary jobs
  160. ###! Periodically executed jobs, to self-heal Gitlab, do external
  161. ###! synchronizations, etc.
  162. ###! Docs: https://github.com/ondrejbartas/sidekiq-cron#adding-cron-job
  163. ###! https://docs.gitlab.com/ee/ci/yaml/index.html#artifactsexpire_in
  164. # gitlab_rails['stuck_ci_jobs_worker_cron'] = "0 0 * * *"
  165. # gitlab_rails['expire_build_artifacts_worker_cron'] = "*/7 * * * *"
  166. # gitlab_rails['environments_auto_stop_cron_worker_cron'] = "24 * * * *"
  167. # gitlab_rails['pipeline_schedule_worker_cron'] = "19 * * * *"
  168. # gitlab_rails['ci_archive_traces_cron_worker_cron'] = "17 * * * *"
  169. # gitlab_rails['repository_check_worker_cron'] = "20 * * * *"
  170. # gitlab_rails['admin_email_worker_cron'] = "0 0 * * 0"
  171. # gitlab_rails['personal_access_tokens_expiring_worker_cron'] = "0 1 * * *"
  172. # gitlab_rails['personal_access_tokens_expired_notification_worker_cron'] = "0 2 * * *"
  173. # gitlab_rails['repository_archive_cache_worker_cron'] = "0 * * * *"
  174. # gitlab_rails['pages_domain_verification_cron_worker'] = "*/15 * * * *"
  175. # gitlab_rails['pages_domain_ssl_renewal_cron_worker'] = "*/10 * * * *"
  176. # gitlab_rails['pages_domain_removal_cron_worker'] = "47 0 * * *"
  177. # gitlab_rails['remove_unaccepted_member_invites_cron_worker'] = "10 15 * * *"
  178. # gitlab_rails['schedule_migrate_external_diffs_worker_cron'] = "15 * * * *"
  179. # gitlab_rails['ci_platform_metrics_update_cron_worker'] = '47 9 * * *'
  180. # gitlab_rails['analytics_usage_trends_count_job_trigger_worker_cron'] = "50 23 */1 * *"
  181. # gitlab_rails['member_invitation_reminder_emails_worker_cron'] = "0 0 * * *"
  182. # gitlab_rails['user_status_cleanup_batch_worker_cron'] = "* * * * *"
  183. # gitlab_rails['namespaces_in_product_marketing_emails_worker_cron'] = "0 9 * * *"
  184. # gitlab_rails['ssh_keys_expired_notification_worker_cron'] = "0 2 * * *"
  185. # gitlab_rails['ssh_keys_expiring_soon_notification_worker_cron'] = "0 1 * * *"
  186. # gitlab_rails['loose_foreign_keys_cleanup_worker_cron'] = "*/5 * * * *"
  187. # gitlab_rails['ci_runner_versions_reconciliation_worker_cron'] = "@daily"
  188. # gitlab_rails['ci_runners_stale_machines_cleanup_worker_cron'] = "36 4 * * *"
  189.  
  190. ### Webhook Settings
  191. ###! Number of seconds to wait for HTTP response after sending webhook HTTP POST
  192. ###! request (default: 10)
  193. # gitlab_rails['webhook_timeout'] = 10
  194.  
  195. ### GraphQL Settings
  196. ###! Tells the rails application how long it has to complete a GraphQL request.
  197. ###! We suggest this value to be higher than the database timeout value
  198. ###! and lower than the worker timeout set in puma. (default: 30)
  199. # gitlab_rails['graphql_timeout'] = 30
  200.  
  201. ### Trusted proxies
  202. ###! Customize if you have GitLab behind a reverse proxy which is running on a
  203. ###! different machine.
  204. ###! **Add the IP address for your reverse proxy to the list, otherwise users
  205. ###! will appear signed in from that address.**
  206. # gitlab_rails['trusted_proxies'] = []
  207.  
  208. ### Content Security Policy
  209. ####! Customize if you want to enable the Content-Security-Policy header, which
  210. ####! can help thwart JavaScript cross-site scripting (XSS) attacks.
  211. ####! See: https://developer.mozilla.org/en-US/docs/Web/HTTP/CSP
  212. # gitlab_rails['content_security_policy'] = {
  213. # 'enabled' => false,
  214. # 'report_only' => false,
  215. # # Each directive is a String (e.g. "'self'").
  216. # 'directives' => {
  217. # 'base_uri' => nil,
  218. # 'child_src' => nil,
  219. # 'connect_src' => nil,
  220. # 'default_src' => nil,
  221. # 'font_src' => nil,
  222. # 'form_action' => nil,
  223. # 'frame_ancestors' => nil,
  224. # 'frame_src' => nil,
  225. # 'img_src' => nil,
  226. # 'manifest_src' => nil,
  227. # 'media_src' => nil,
  228. # 'object_src' => nil,
  229. # 'script_src' => nil,
  230. # 'style_src' => nil,
  231. # 'worker_src' => nil,
  232. # 'report_uri' => nil,
  233. # }
  234. # }
  235.  
  236. ### Allowed hosts
  237. ###! Customize the `host` headers that should be catered by the Rails
  238. ###! application. By default, everything is allowed.
  239. # gitlab_rails['allowed_hosts'] = []
  240.  
  241. ### Monitoring settings
  242. ###! IP whitelist controlling access to monitoring endpoints
  243. # gitlab_rails['monitoring_whitelist'] = ['127.0.0.0/8', '::1/128']
  244.  
  245. ### Shutdown settings
  246. ###! Defines an interval to block healthcheck,
  247. ###! but continue accepting application requests.
  248. # gitlab_rails['shutdown_blackout_seconds'] = 10
  249.  
  250. ### Microsoft Graph Mailer
  251. ###! Allows delivery of emails using Microsoft Graph API with OAuth 2.0 client
  252. ###! credentials flow.
  253. ###! Docs: https://docs.gitlab.com/omnibus/settings/microsoft_graph_mailer.html
  254. # gitlab_rails['microsoft_graph_mailer_enabled'] = false
  255. # gitlab_rails['microsoft_graph_mailer_user_id'] = "YOUR-USER-ID"
  256. # gitlab_rails['microsoft_graph_mailer_tenant'] = "YOUR-TENANT-ID"
  257. # gitlab_rails['microsoft_graph_mailer_client_id'] = "YOUR-CLIENT-ID"
  258. # gitlab_rails['microsoft_graph_mailer_client_secret'] = "YOUR-CLIENT-SECRET-ID"
  259. # gitlab_rails['microsoft_graph_mailer_azure_ad_endpoint'] = "https://login.microsoftonline.com"
  260. # gitlab_rails['microsoft_graph_mailer_graph_endpoint'] = "https://graph.microsoft.com"
  261.  
  262. ### Reply by email
  263. ###! Allow users to comment on issues and merge requests by replying to
  264. ###! notification emails.
  265. ###! Docs: https://docs.gitlab.com/ee/administration/reply_by_email.html
  266. # gitlab_rails['incoming_email_enabled'] = true
  267.  
  268. #### Incoming Email Address
  269. ####! The email address including the `%{key}` placeholder that will be replaced
  270. ####! to reference the item being replied to.
  271. ####! **The placeholder can be omitted but if present, it must appear in the
  272. ####! "user" part of the address (before the `@`).**
  273. # gitlab_rails['incoming_email_address'] = "gitlab-incoming+%{key}@gmail.com"
  274.  
  275. #### Email account username
  276. ####! **With third party providers, this is usually the full email address.**
  277. ####! **With self-hosted email servers, this is usually the user part of the
  278. ####! email address.**
  279. # gitlab_rails['incoming_email_email'] = "gitlab-incoming@gmail.com"
  280.  
  281. #### Email account password
  282. # gitlab_rails['incoming_email_password'] = "[REDACTED]"
  283.  
  284. #### IMAP Settings
  285. # gitlab_rails['incoming_email_host'] = "imap.gmail.com"
  286. # gitlab_rails['incoming_email_port'] = 993
  287. # gitlab_rails['incoming_email_ssl'] = true
  288. # gitlab_rails['incoming_email_start_tls'] = false
  289.  
  290. #### Incoming Mailbox Settings (via `mail_room`)
  291. ####! The mailbox where incoming mail will end up. Usually "inbox".
  292. # gitlab_rails['incoming_email_mailbox_name'] = "inbox"
  293. ####! The IDLE command timeout.
  294. # gitlab_rails['incoming_email_idle_timeout'] = 60
  295. ####! The file name for internal `mail_room` JSON logfile
  296. # gitlab_rails['incoming_email_log_file'] = "/var/log/gitlab/mailroom/mail_room_json.log"
  297. ####! This marks incoming messages deleted after delivery.
  298. ####! If you are using Microsoft Graph API instead of IMAP, set this to false to retain
  299. ####! messages in the inbox since deleted messages are auto-expunged after some time.
  300. # gitlab_rails['incoming_email_delete_after_delivery'] = true
  301. ####! Permanently remove messages from the mailbox when they are marked as deleted after delivery
  302. ####! Only applies to IMAP. Microsoft Graph will auto-expunge any deleted messages.
  303. # gitlab_rails['incoming_email_expunge_deleted'] = false
  304.  
  305. #### Inbox options (for Microsoft Graph)
  306. # gitlab_rails['incoming_email_inbox_method'] = 'microsoft_graph'
  307. # gitlab_rails['incoming_email_inbox_options'] = {
  308. # 'tenant_id': 'YOUR-TENANT-ID',
  309. # 'client_id': 'YOUR-CLIENT-ID',
  310. # 'client_secret': 'YOUR-CLIENT-SECRET',
  311. # 'poll_interval': 60 # Optional
  312. # }
  313.  
  314. #### How incoming emails are delivered to Rails process. Accept either sidekiq
  315. #### or webhook. The default config is webhook.
  316. # gitlab_rails['incoming_email_delivery_method'] = "webhook"
  317.  
  318. #### Token to authenticate webhook requests. The token must be exactly 32 bytes,
  319. #### encoded with base64
  320. # gitlab_rails['incoming_email_auth_token'] = nil
  321.  
  322. ####! The format of mail_room crash logs
  323. # mailroom['exit_log_format'] = "plain"
  324.  
  325. ### Consolidated (simplified) object storage configuration
  326. ###! This uses a single credential for object storage with multiple buckets.
  327. ###! It also enables Workhorse to upload files directly with its own S3 client
  328. ###! instead of using pre-signed URLs.
  329. ###!
  330. ###! This configuration will only take effect if the object_store
  331. ###! sections are not defined within the types. For example, enabling
  332. ###! gitlab_rails['artifacts_object_store_enabled'] or
  333. ###! gitlab_rails['lfs_object_store_enabled'] will prevent the
  334. ###! consolidated settings from being used.
  335. ###!
  336. ###! Be sure to use different buckets for each type of object.
  337. ###! Docs: https://docs.gitlab.com/ee/administration/object_storage.html
  338. # gitlab_rails['object_store']['enabled'] = false
  339. # gitlab_rails['object_store']['connection'] = {}
  340. # gitlab_rails['object_store']['storage_options'] = {}
  341. # gitlab_rails['object_store']['proxy_download'] = false
  342. # gitlab_rails['object_store']['objects']['artifacts']['bucket'] = nil
  343. # gitlab_rails['object_store']['objects']['external_diffs']['bucket'] = nil
  344. # gitlab_rails['object_store']['objects']['lfs']['bucket'] = nil
  345. # gitlab_rails['object_store']['objects']['uploads']['bucket'] = nil
  346. # gitlab_rails['object_store']['objects']['packages']['bucket'] = nil
  347. # gitlab_rails['object_store']['objects']['dependency_proxy']['bucket'] = nil
  348. # gitlab_rails['object_store']['objects']['terraform_state']['bucket'] = nil
  349. # gitlab_rails['object_store']['objects']['ci_secure_files']['bucket'] = nil
  350. # gitlab_rails['object_store']['objects']['pages']['bucket'] = nil
  351.  
  352. ### Job Artifacts
  353. # gitlab_rails['artifacts_enabled'] = true
  354. # gitlab_rails['artifacts_path'] = "/var/opt/gitlab/gitlab-rails/shared/artifacts"
  355. ####! Job artifacts Object Store
  356. ####! Docs: https://docs.gitlab.com/ee/administration/job_artifacts.html#using-object-storage
  357. # gitlab_rails['artifacts_object_store_enabled'] = false
  358. # gitlab_rails['artifacts_object_store_proxy_download'] = false
  359. # gitlab_rails['artifacts_object_store_remote_directory'] = "artifacts"
  360. # gitlab_rails['artifacts_object_store_connection'] = {
  361. # 'provider' => 'AWS',
  362. # 'region' => 'eu-west-1',
  363. # 'aws_access_key_id' => 'AWS_ACCESS_KEY_ID',
  364. # 'aws_secret_access_key' => 'AWS_SECRET_ACCESS_KEY',
  365. # # # The below options configure an S3 compatible host instead of AWS
  366. # # 'aws_signature_version' => 4, # For creation of signed URLs. Set to 2 if provider does not support v4.
  367. # # 'endpoint' => 'https://s3.amazonaws.com', # default: nil - Useful for S3 compliant services such as DigitalOcean Spaces
  368. # # 'host' => 's3.amazonaws.com',
  369. # # 'path_style' => false # Use 'host/bucket_name/object' instead of 'bucket_name.host/object'
  370. # }
  371.  
  372. ### External merge request diffs
  373. # gitlab_rails['external_diffs_enabled'] = false
  374. # gitlab_rails['external_diffs_when'] = nil
  375. # gitlab_rails['external_diffs_storage_path'] = "/var/opt/gitlab/gitlab-rails/shared/external-diffs"
  376. # gitlab_rails['external_diffs_object_store_enabled'] = false
  377. # gitlab_rails['external_diffs_object_store_proxy_download'] = false
  378. # gitlab_rails['external_diffs_object_store_remote_directory'] = "external-diffs"
  379. # gitlab_rails['external_diffs_object_store_connection'] = {
  380. # 'provider' => 'AWS',
  381. # 'region' => 'eu-west-1',
  382. # 'aws_access_key_id' => 'AWS_ACCESS_KEY_ID',
  383. # 'aws_secret_access_key' => 'AWS_SECRET_ACCESS_KEY',
  384. # # # The below options configure an S3 compatible host instead of AWS
  385. # # 'aws_signature_version' => 4, # For creation of signed URLs. Set to 2 if provider does not support v4.
  386. # # 'endpoint' => 'https://s3.amazonaws.com', # default: nil - Useful for S3 compliant services such as DigitalOcean Spaces
  387. # # 'host' => 's3.amazonaws.com',
  388. # # 'path_style' => false # Use 'host/bucket_name/object' instead of 'bucket_name.host/object'
  389. # }
  390.  
  391. ### Git LFS
  392. # gitlab_rails['lfs_enabled'] = true
  393. # gitlab_rails['lfs_storage_path'] = "/var/opt/gitlab/gitlab-rails/shared/lfs-objects"
  394. # gitlab_rails['lfs_object_store_enabled'] = false
  395. # gitlab_rails['lfs_object_store_proxy_download'] = false
  396. # gitlab_rails['lfs_object_store_remote_directory'] = "lfs-objects"
  397. # gitlab_rails['lfs_object_store_connection'] = {
  398. # 'provider' => 'AWS',
  399. # 'region' => 'eu-west-1',
  400. # 'aws_access_key_id' => 'AWS_ACCESS_KEY_ID',
  401. # 'aws_secret_access_key' => 'AWS_SECRET_ACCESS_KEY',
  402. # # # The below options configure an S3 compatible host instead of AWS
  403. # # 'aws_signature_version' => 4, # For creation of signed URLs. Set to 2 if provider does not support v4.
  404. # # 'endpoint' => 'https://s3.amazonaws.com', # default: nil - Useful for S3 compliant services such as DigitalOcean Spaces
  405. # # 'host' => 's3.amazonaws.com',
  406. # # 'path_style' => false # Use 'host/bucket_name/object' instead of 'bucket_name.host/object'
  407. # }
  408.  
  409. ### GitLab uploads
  410. ###! Docs: https://docs.gitlab.com/ee/administration/uploads.html
  411. # gitlab_rails['uploads_directory'] = "/var/opt/gitlab/gitlab-rails/uploads"
  412. # gitlab_rails['uploads_storage_path'] = "/opt/gitlab/embedded/service/gitlab-rails/public"
  413. # gitlab_rails['uploads_base_dir'] = "uploads/-/system"
  414. # gitlab_rails['uploads_object_store_enabled'] = false
  415. # gitlab_rails['uploads_object_store_proxy_download'] = false
  416. # gitlab_rails['uploads_object_store_remote_directory'] = "uploads"
  417. # gitlab_rails['uploads_object_store_connection'] = {
  418. # 'provider' => 'AWS',
  419. # 'region' => 'eu-west-1',
  420. # 'aws_access_key_id' => 'AWS_ACCESS_KEY_ID',
  421. # 'aws_secret_access_key' => 'AWS_SECRET_ACCESS_KEY',
  422. # # # The below options configure an S3 compatible host instead of AWS
  423. # # 'host' => 's3.amazonaws.com',
  424. # # 'aws_signature_version' => 4, # For creation of signed URLs. Set to 2 if provider does not support v4.
  425. # # 'endpoint' => 'https://s3.amazonaws.com', # default: nil - Useful for S3 compliant services such as DigitalOcean Spaces
  426. # # 'path_style' => false # Use 'host/bucket_name/object' instead of 'bucket_name.host/object'
  427. # }
  428.  
  429. ### Terraform state
  430. ###! Docs: https://docs.gitlab.com/ee/administration/terraform_state
  431. # gitlab_rails['terraform_state_enabled'] = true
  432. # gitlab_rails['terraform_state_storage_path'] = "/var/opt/gitlab/gitlab-rails/shared/terraform_state"
  433. # gitlab_rails['terraform_state_object_store_enabled'] = false
  434. # gitlab_rails['terraform_state_object_store_remote_directory'] = "terraform"
  435. # gitlab_rails['terraform_state_object_store_connection'] = {
  436. # 'provider' => 'AWS',
  437. # 'region' => 'eu-west-1',
  438. # 'aws_access_key_id' => 'AWS_ACCESS_KEY_ID',
  439. # 'aws_secret_access_key' => 'AWS_SECRET_ACCESS_KEY',
  440. # # # The below options configure an S3 compatible host instead of AWS
  441. # # 'host' => 's3.amazonaws.com',
  442. # # 'aws_signature_version' => 4, # For creation of signed URLs. Set to 2 if provider does not support v4.
  443. # # 'endpoint' => 'https://s3.amazonaws.com', # default: nil - Useful for S3 compliant services such as DigitalOcean Spaces
  444. # # 'path_style' => false # Use 'host/bucket_name/object' instead of 'bucket_name.host/object'
  445. # }
  446.  
  447. ### CI Secure Files
  448. # gitlab_rails['ci_secure_files_enabled'] = false
  449. # gitlab_rails['ci_secure_files_storage_path'] = "/var/opt/gitlab/gitlab-rails/shared/ci_secure_files"
  450. # gitlab_rails['ci_secure_files_object_store_enabled'] = false
  451. # gitlab_rails['ci_secure_files_object_store_remote_directory'] = "ci-secure-files"
  452. # gitlab_rails['ci_secure_files_object_store_connection'] = {
  453. # 'provider' => 'AWS',
  454. # 'region' => 'eu-west-1',
  455. # 'aws_access_key_id' => 'AWS_ACCESS_KEY_ID',
  456. # 'aws_secret_access_key' => 'AWS_SECRET_ACCESS_KEY',
  457. # # # The below options configure an S3 compatible host instead of AWS
  458. # # 'host' => 's3.amazonaws.com',
  459. # # 'aws_signature_version' => 4, # For creation of signed URLs. Set to 2 if provider does not support v4.
  460. # # 'endpoint' => 'https://s3.amazonaws.com', # default: nil - Useful for S3 compliant services such as DigitalOcean Spaces
  461. # # 'path_style' => false # Use 'host/bucket_name/object' instead of 'bucket_name.host/object'
  462. # }
  463.  
  464. ### GitLab Pages
  465. # gitlab_rails['pages_object_store_enabled'] = false
  466. # gitlab_rails['pages_object_store_remote_directory'] = "pages"
  467. # gitlab_rails['pages_object_store_connection'] = {
  468. # 'provider' => 'AWS',
  469. # 'region' => 'eu-west-1',
  470. # 'aws_access_key_id' => 'AWS_ACCESS_KEY_ID',
  471. # 'aws_secret_access_key' => 'AWS_SECRET_ACCESS_KEY',
  472. # # # The below options configure an S3 compatible host instead of AWS
  473. # # 'host' => 's3.amazonaws.com',
  474. # # 'aws_signature_version' => 4, # For creation of signed URLs. Set to 2 if provider does not support v4.
  475. # # 'endpoint' => 'https://s3.amazonaws.com', # default: nil - Useful for S3 compliant services such as DigitalOcean Spaces
  476. # # 'path_style' => false # Use 'host/bucket_name/object' instead of 'bucket_name.host/object'
  477. # }
  478. # gitlab_rails['pages_local_store_enabled'] = true
  479. # gitlab_rails['pages_local_store_path'] = "/var/opt/gitlab/gitlab-rails/shared/pages"
  480.  
  481. ### Impersonation settings
  482. # gitlab_rails['impersonation_enabled'] = true
  483.  
  484. ### Disable jQuery and CSS animations
  485. # gitlab_rails['disable_animations'] = false
  486.  
  487. ### Application settings cache expiry in seconds. (default: 60)
  488. # gitlab_rails['application_settings_cache_seconds'] = 60
  489.  
  490. ### Usage Statistics
  491. # gitlab_rails['usage_ping_enabled'] = true
  492.  
  493. ### GitLab Mattermost
  494. ###! These settings are void if Mattermost is installed on the same omnibus
  495. ###! install
  496. # gitlab_rails['mattermost_host'] = "https://mattermost.example.com"
  497.  
  498. ### LDAP Settings
  499. ###! Docs: https://docs.gitlab.com/omnibus/settings/ldap.html
  500. ###! **Be careful not to break the indentation in the ldap_servers block. It is
  501. ###! in yaml format and the spaces must be retained. Using tabs will not work.**
  502.  
  503. # gitlab_rails['ldap_enabled'] = false
  504. # gitlab_rails['prevent_ldap_sign_in'] = false
  505.  
  506. ###! **remember to close this block with 'EOS' below**
  507. # gitlab_rails['ldap_servers'] = YAML.load <<-'EOS'
  508. # main: # 'main' is the GitLab 'provider ID' of this LDAP server
  509. # label: 'LDAP'
  510. # host: '_your_ldap_server'
  511. # port: 389
  512. # uid: 'sAMAccountName'
  513. # bind_dn: '_the_full_dn_of_the_user_you_will_bind_with'
  514. # password: '_the_password_of_the_bind_user'
  515. # encryption: 'plain' # "start_tls" or "simple_tls" or "plain"
  516. # verify_certificates: true
  517. # smartcard_auth: false
  518. # active_directory: true
  519. # allow_username_or_email_login: false
  520. # lowercase_usernames: false
  521. # block_auto_created_users: false
  522. # base: ''
  523. # user_filter: ''
  524. # ## EE only
  525. # group_base: ''
  526. # admin_group: ''
  527. # sync_ssh_keys: false
  528. #
  529. # secondary: # 'secondary' is the GitLab 'provider ID' of second LDAP server
  530. # label: 'LDAP'
  531. # host: '_your_ldap_server'
  532. # port: 389
  533. # uid: 'sAMAccountName'
  534. # bind_dn: '_the_full_dn_of_the_user_you_will_bind_with'
  535. # password: '_the_password_of_the_bind_user'
  536. # encryption: 'plain' # "start_tls" or "simple_tls" or "plain"
  537. # verify_certificates: true
  538. # smartcard_auth: false
  539. # active_directory: true
  540. # allow_username_or_email_login: false
  541. # lowercase_usernames: false
  542. # block_auto_created_users: false
  543. # base: ''
  544. # user_filter: ''
  545. # ## EE only
  546. # group_base: ''
  547. # admin_group: ''
  548. # sync_ssh_keys: false
  549. # EOS
  550.  
  551. ### Smartcard authentication settings
  552. ###! Docs: https://docs.gitlab.com/ee/administration/auth/smartcard.html
  553. # gitlab_rails['smartcard_enabled'] = false
  554. # gitlab_rails['smartcard_ca_file'] = "/etc/gitlab/ssl/CA.pem"
  555. # gitlab_rails['smartcard_client_certificate_required_host'] = 'smartcard.gitlab.example.com'
  556. # gitlab_rails['smartcard_client_certificate_required_port'] = 3444
  557. # gitlab_rails['smartcard_required_for_git_access'] = false
  558. # gitlab_rails['smartcard_san_extensions'] = false
  559.  
  560. ### OmniAuth Settings
  561. ###! Docs: https://docs.gitlab.com/ee/integration/omniauth.html
  562. # gitlab_rails['omniauth_enabled'] = nil
  563. # gitlab_rails['omniauth_allow_single_sign_on'] = ['saml']
  564. # gitlab_rails['omniauth_sync_email_from_provider'] = 'saml'
  565. # gitlab_rails['omniauth_sync_profile_from_provider'] = ['saml']
  566. # gitlab_rails['omniauth_sync_profile_attributes'] = ['email']
  567. # gitlab_rails['omniauth_auto_sign_in_with_provider'] = 'saml'
  568. # gitlab_rails['omniauth_block_auto_created_users'] = true
  569. # gitlab_rails['omniauth_auto_link_ldap_user'] = false
  570. # gitlab_rails['omniauth_auto_link_saml_user'] = false
  571. # gitlab_rails['omniauth_auto_link_user'] = ['twitter']
  572. # gitlab_rails['omniauth_external_providers'] = ['twitter', 'google_oauth2']
  573. # gitlab_rails['omniauth_allow_bypass_two_factor'] = ['google_oauth2']
  574. # gitlab_rails['omniauth_providers'] = [
  575. # {
  576. # "name" => "google_oauth2",
  577. # "app_id" => "YOUR APP ID",
  578. # "app_secret" => "YOUR APP SECRET",
  579. # "args" => { "access_type" => "offline", "approval_prompt" => "" }
  580. # }
  581. # ]
  582. # gitlab_rails['omniauth_cas3_session_duration'] = 28800
  583. # gitlab_rails['omniauth_saml_message_max_byte_size'] = 250000
  584.  
  585. ### FortiAuthenticator authentication settings
  586. # gitlab_rails['forti_authenticator_enabled'] = false
  587. # gitlab_rails['forti_authenticator_host'] = 'forti_authenticator.example.com'
  588. # gitlab_rails['forti_authenticator_port'] = 443
  589. # gitlab_rails['forti_authenticator_username'] = 'admin'
  590. # gitlab_rails['forti_authenticator_access_token'] = 's3cr3t'
  591.  
  592. ### FortiToken Cloud authentication settings
  593. # gitlab_rails['forti_token_cloud_enabled'] = false
  594. # gitlab_rails['forti_token_cloud_client_id'] = 'forti_token_cloud_client_id'
  595. # gitlab_rails['forti_token_cloud_client_secret'] = 's3cr3t'
  596.  
  597. ### Backup Settings
  598. ###! Docs: https://docs.gitlab.com/omnibus/settings/backups.html
  599.  
  600. # gitlab_rails['manage_backup_path'] = true
  601. # gitlab_rails['backup_path'] = "/var/opt/gitlab/backups"
  602. # gitlab_rails['backup_gitaly_backup_path'] = "/opt/gitlab/embedded/bin/gitaly-backup"
  603.  
  604. ###! Docs: https://docs.gitlab.com/ee/raketasks/backup_restore.html#backup-archive-permissions
  605. # gitlab_rails['backup_archive_permissions'] = 0644
  606.  
  607. # gitlab_rails['backup_pg_schema'] = 'public'
  608.  
  609. ###! The duration in seconds to keep backups before they are allowed to be deleted
  610. # gitlab_rails['backup_keep_time'] = 604800
  611.  
  612. # gitlab_rails['backup_upload_connection'] = {
  613. # 'provider' => 'AWS',
  614. # 'region' => 'eu-west-1',
  615. # 'aws_access_key_id' => 'AKIAKIAKI',
  616. # 'aws_secret_access_key' => 'secret123',
  617. # # # If IAM profile use is enabled, remove aws_access_key_id and aws_secret_access_key
  618. # 'use_iam_profile' => false
  619. # }
  620. # gitlab_rails['backup_upload_remote_directory'] = 'my.s3.bucket'
  621. # gitlab_rails['backup_multipart_chunk_size'] = 104857600
  622.  
  623. ###! **Turns on AWS Server-Side Encryption with Amazon S3-Managed Keys for
  624. ###! backups**
  625. # gitlab_rails['backup_encryption'] = 'AES256'
  626. ###! The encryption key to use with AWS Server-Side Encryption.
  627. ###! Setting this value will enable Server-Side Encryption with customer provided keys;
  628. ###! otherwise S3-managed keys are used.
  629. # gitlab_rails['backup_encryption_key'] = '<base64-encoded encryption key>'
  630.  
  631. ###! **Turns on AWS Server-Side Encryption with Amazon SSE-KMS (AWS managed but customer-master key)
  632. # gitlab_rails['backup_upload_storage_options'] = {
  633. # 'server_side_encryption' => 'aws:kms',
  634. # 'server_side_encryption_kms_key_id' => 'arn:aws:kms:YOUR-KEY-ID-HERE'
  635. # }
  636.  
  637. ###! **Specifies Amazon S3 storage class to use for backups. Valid values
  638. ###! include 'STANDARD', 'STANDARD_IA', and 'REDUCED_REDUNDANCY'**
  639. # gitlab_rails['backup_storage_class'] = 'STANDARD'
  640.  
  641. ###! Skip parts of the backup. Comma separated.
  642. ###! Docs: https://docs.gitlab.com/ee/raketasks/backup_restore.html#excluding-specific-directories-from-the-backup
  643. #gitlab_rails['env'] = {
  644. # "SKIP" => "db,uploads,repositories,builds,artifacts,lfs,registry,pages"
  645. #}
  646.  
  647. ### For setting up different data storing directory
  648. ###! Docs: https://docs.gitlab.com/omnibus/settings/configuration.html#store-git-data-in-an-alternative-directory
  649. ###! **If you want to use a single non-default directory to store git data use a
  650. ###! path that doesn't contain symlinks.**
  651. #
  652.  
  653. git_data_dirs({
  654. 'default' => { 'gitaly_address' => 'tcp://140.238.198.194:8075' }
  655. })
  656.  
  657.  
  658.  
  659.  
  660.  
  661.  
  662. ### Gitaly settings
  663. gitlab_rails['gitaly_token'] = 'gitalysecret'
  664.  
  665. ### For storing GitLab application uploads, eg. LFS objects, build artifacts
  666. ###! Docs: https://docs.gitlab.com/ee/development/shared_files.html
  667. # gitlab_rails['shared_path'] = '/var/opt/gitlab/gitlab-rails/shared'
  668.  
  669. ### For storing encrypted configuration files
  670. ###! Docs: https://docs.gitlab.com/ee/administration/encrypted_configuration.html
  671. # gitlab_rails['encrypted_settings_path'] = '/var/opt/gitlab/gitlab-rails/shared/encrypted_settings'
  672.  
  673. ### Wait for file system to be mounted
  674. ###! Docs: https://docs.gitlab.com/omnibus/settings/configuration.html#only-start-omnibus-gitlab-services-after-a-given-file-system-is-mounted
  675. # high_availability['mountpoint'] = ["/var/opt/gitlab/git-data", "/var/opt/gitlab/gitlab-rails/shared"]
  676.  
  677. ### GitLab Shell settings for GitLab
  678. # gitlab_rails['gitlab_shell_ssh_port'] = 22
  679. # gitlab_rails['gitlab_shell_git_timeout'] = 800
  680.  
  681. ### Extra customization
  682. # gitlab_rails['extra_google_analytics_id'] = '_your_tracking_id'
  683. # gitlab_rails['extra_google_tag_manager_id'] = '_your_tracking_id'
  684. # gitlab_rails['extra_one_trust_id'] = '_your_one_trust_id'
  685. # gitlab_rails['extra_google_tag_manager_nonce_id'] = '_your_google_tag_manager_id'
  686. # gitlab_rails['extra_bizible'] = false
  687. # gitlab_rails['extra_matomo_url'] = '_your_matomo_url'
  688. # gitlab_rails['extra_matomo_site_id'] = '_your_matomo_site_id'
  689. # gitlab_rails['extra_matomo_disable_cookies'] = false
  690. # gitlab_rails['extra_maximum_text_highlight_size_kilobytes'] = 512
  691.  
  692. ##! Docs: https://docs.gitlab.com/omnibus/settings/environment-variables.html
  693. # gitlab_rails['env'] = {
  694. # 'BUNDLE_GEMFILE' => "/opt/gitlab/embedded/service/gitlab-rails/Gemfile",
  695. # 'PATH' => "/opt/gitlab/bin:/opt/gitlab/embedded/bin:/bin:/usr/bin"
  696. # }
  697.  
  698. # gitlab_rails['rack_attack_git_basic_auth'] = {
  699. # 'enabled' => false,
  700. # 'ip_whitelist' => ["127.0.0.1"],
  701. # 'maxretry' => 10,
  702. # 'findtime' => 60,
  703. # 'bantime' => 3600
  704. # }
  705.  
  706. # gitlab_rails['dir'] = "/var/opt/gitlab/gitlab-rails"
  707. # gitlab_rails['log_directory'] = "/var/log/gitlab/gitlab-rails"
  708.  
  709. #### Change the initial default admin password and shared runner registration tokens.
  710. ####! **Only applicable on initial setup, changing these settings after database
  711. ####! is created and seeded won't yield any change.**
  712. # gitlab_rails['initial_root_password'] = "password"
  713. # gitlab_rails['initial_shared_runners_registration_token'] = "token"
  714.  
  715. #### Toggle if root password should be printed to STDOUT during initialization
  716. # gitlab_rails['display_initial_root_password'] = false
  717.  
  718. #### Toggle if initial root password should be written to /etc/gitlab/initial_root_password
  719. # gitlab_rails['store_initial_root_password'] = true
  720.  
  721. #### Set path to an initial license to be used while bootstrapping GitLab.
  722. ####! **Only applicable on initial setup, future license updates need to be done via UI.
  723. ####! Updating the file specified in this path won't yield any change after the first reconfigure run.
  724. # gitlab_rails['initial_license_file'] = '/etc/gitlab/company.gitlab-license'
  725.  
  726. #### Enable or disable automatic database migrations
  727. # gitlab_rails['auto_migrate'] = true
  728.  
  729. #### This is advanced feature used by large gitlab deployments where loading
  730. #### whole RAILS env takes a lot of time.
  731. # gitlab_rails['rake_cache_clear'] = true
  732.  
  733. ### GitLab database settings
  734. ###! Docs: https://docs.gitlab.com/omnibus/settings/database.html
  735. ###! **Only needed if you use an external database.**
  736. # gitlab_rails['db_adapter'] = "postgresql"
  737. # gitlab_rails['db_encoding'] = "unicode"
  738. # gitlab_rails['db_collation'] = nil
  739. # gitlab_rails['db_database'] = "gitlabhq_production"
  740. # gitlab_rails['db_username'] = "gitlab"
  741. # gitlab_rails['db_password'] = nil
  742. # gitlab_rails['db_host'] = nil
  743. # gitlab_rails['db_port'] = 5432
  744. # gitlab_rails['db_socket'] = nil
  745. # gitlab_rails['db_sslmode'] = nil
  746. # gitlab_rails['db_sslcompression'] = 0
  747. # gitlab_rails['db_sslrootcert'] = nil
  748. # gitlab_rails['db_sslcert'] = nil
  749. # gitlab_rails['db_sslkey'] = nil
  750. # gitlab_rails['db_prepared_statements'] = false
  751. # gitlab_rails['db_statements_limit'] = 1000
  752. # gitlab_rails['db_connect_timeout'] = nil
  753. # gitlab_rails['db_keepalives'] = nil
  754. # gitlab_rails['db_keepalives_idle'] = nil
  755. # gitlab_rails['db_keepalives_interval'] = nil
  756. # gitlab_rails['db_keepalives_count'] = nil
  757. # gitlab_rails['db_tcp_user_timeout'] = nil
  758. # gitlab_rails['db_application_name'] = nil
  759. # gitlab_rails['db_database_tasks'] = true
  760.  
  761.  
  762. ### GitLab Redis settings
  763. ###! Connect to your own Redis instance
  764. ###! Docs: https://docs.gitlab.com/omnibus/settings/redis.html
  765.  
  766. #### Redis TCP connection
  767. # gitlab_rails['redis_host'] = "127.0.0.1"
  768. # gitlab_rails['redis_port'] = 6379
  769. # gitlab_rails['redis_ssl'] = false
  770. # gitlab_rails['redis_password'] = nil
  771. # gitlab_rails['redis_database'] = 0
  772. # gitlab_rails['redis_enable_client'] = true
  773.  
  774. #### Redis local UNIX socket (will be disabled if TCP method is used)
  775. # gitlab_rails['redis_socket'] = "/var/opt/gitlab/redis/redis.socket"
  776.  
  777. #### Sentinel support
  778. ####! To have Sentinel working, you must enable Redis TCP connection support
  779. ####! above and define a few Sentinel hosts below (to get a reliable setup
  780. ####! at least 3 hosts).
  781. ####! **You don't need to list every sentinel host, but the ones not listed will
  782. ####! not be used in a fail-over situation to query for the new master.**
  783. # gitlab_rails['redis_sentinels'] = [
  784. # {'host' => '127.0.0.1', 'port' => 26379},
  785. # ]
  786.  
  787. #### Separate instances support
  788. ###! Docs: https://docs.gitlab.com/omnibus/settings/redis.html#running-with-multiple-redis-instances
  789. # gitlab_rails['redis_cache_instance'] = nil
  790. # gitlab_rails['redis_cache_sentinels'] = nil
  791. # gitlab_rails['redis_queues_instance'] = nil
  792. # gitlab_rails['redis_queues_sentinels'] = nil
  793. # gitlab_rails['redis_shared_state_instance'] = nil
  794. # gitlab_rails['redis_shared_state_sentinels'] = nil
  795. # gitlab_rails['redis_trace_chunks_instance'] = nil
  796. # gitlab_rails['redis_trace_chunks_sentinels'] = nil
  797. # gitlab_rails['redis_actioncable_instance'] = nil
  798. # gitlab_rails['redis_actioncable_sentinels'] = nil
  799. # gitlab_rails['redis_rate_limiting_instance'] = nil
  800. # gitlab_rails['redis_rate_limiting_sentinels'] = nil
  801. # gitlab_rails['redis_sessions_instance'] = nil
  802. # gitlab_rails['redis_sessions_sentinels'] = nil
  803. # gitlab_rails['redis_repository_cache_instance'] = nil
  804. # gitlab_rails['redis_repository_cache_sentinels'] = nil
  805. # gitlab_rails['redis_yml_override'] = nil
  806.  
  807. ################################################################################
  808. ## Container Registry settings
  809. ##! Docs: https://docs.gitlab.com/ee/administration/packages/container_registry.html
  810. ################################################################################
  811.  
  812. registry_external_url 'http://192.9.171.226:80'
  813.  
  814. ### Settings used by GitLab application
  815. # gitlab_rails['registry_enabled'] = true
  816. # gitlab_rails['registry_host'] = "registry.gitlab.example.com"
  817. # gitlab_rails['registry_port'] = "5005"
  818. # gitlab_rails['registry_path'] = "/var/opt/gitlab/gitlab-rails/shared/registry"
  819.  
  820. # Notification secret, it's used to authenticate notification requests to GitLab application
  821. # You only need to change this when you use external Registry service, otherwise
  822. # it will be taken directly from notification settings of your Registry
  823. # gitlab_rails['registry_notification_secret'] = nil
  824.  
  825. ###! **Do not change the following 3 settings unless you know what you are
  826. ###! doing**
  827. gitlab_rails['registry_api_url'] = "http://192.9.171.226:80"
  828. gitlab_rails['registry_key_path'] = "/var/opt/gitlab/gitlab-rails/certificate.key"
  829. gitlab_rails['registry_issuer'] = "omnibus-gitlab-issuer"
  830. gitlab_rails['registry_enabled']= true
  831. ### Settings used by Registry application
  832. # registry['enable'] = true
  833. # registry['username'] = "registry"
  834. # registry['group'] = "registry"
  835. # registry['uid'] = nil
  836. # registry['gid'] = nil
  837. # registry['dir'] = "/var/opt/gitlab/registry"
  838. # registry['registry_http_addr'] = "127.0.0.1:5000"
  839. # registry['debug_addr'] = "localhost:5001"
  840. # registry['log_directory'] = "/var/log/gitlab/registry"
  841. # registry['env_directory'] = "/opt/gitlab/etc/registry/env"
  842. # registry['env'] = {
  843. # 'SSL_CERT_DIR' => "/opt/gitlab/embedded/ssl/certs/"
  844. # }
  845. # registry['log_level'] = "info"
  846. # registry['log_formatter'] = "text"
  847. # registry['rootcertbundle'] = "/var/opt/gitlab/registry/certificate.crt"
  848. # registry['health_storagedriver_enabled'] = true
  849. # registry['middleware'] = nil
  850. # registry['storage_delete_enabled'] = true
  851. # registry['validation_enabled'] = false
  852. # registry['autoredirect'] = false
  853. # registry['compatibility_schema1_enabled'] = false
  854.  
  855. ### Registry backend storage
  856. ###! Docs: https://docs.gitlab.com/ee/administration/packages/container_registry.html#configure-storage-for-the-container-registry
  857. # registry['storage'] = {
  858. # 's3' => {
  859. # 'accesskey' => 's3-access-key',
  860. # 'secretkey' => 's3-secret-key-for-access-key',
  861. # 'bucket' => 'your-s3-bucket',
  862. # 'region' => 'your-s3-region',
  863. # 'regionendpoint' => 'your-s3-regionendpoint'
  864. # },
  865. # 'redirect' => {
  866. # 'disable' => false
  867. # }
  868. # }
  869.  
  870. ### Registry notifications endpoints
  871. # registry['notifications'] = [
  872. # {
  873. # 'name' => 'test_endpoint',
  874. # 'url' => 'https://gitlab.example.com/notify2',
  875. # 'timeout' => '500ms',
  876. # 'threshold' => 5,
  877. # 'backoff' => '1s',
  878. # 'headers' => {
  879. # "Authorization" => ["AUTHORIZATION_EXAMPLE_TOKEN"]
  880. # }
  881. # }
  882. # ]
  883. ### Default registry notifications
  884. # registry['default_notifications_timeout'] = "500ms"
  885. # registry['default_notifications_threshold'] = 5
  886. # registry['default_notifications_backoff'] = "1s"
  887. # registry['default_notifications_headers'] = {}
  888.  
  889. ################################################################################
  890. ## Error Reporting and Logging with Sentry
  891. ################################################################################
  892. # gitlab_rails['sentry_enabled'] = false
  893. # gitlab_rails['sentry_dsn'] = 'https://<key>@sentry.io/<project>'
  894. # gitlab_rails['sentry_clientside_dsn'] = 'https://<key>@sentry.io/<project>'
  895. # gitlab_rails['sentry_environment'] = 'production'
  896.  
  897. ################################################################################
  898. ## CI_JOB_JWT
  899. ################################################################################
  900. ##! RSA private key used to sign CI_JOB_JWT
  901. # gitlab_rails['ci_jwt_signing_key'] = nil # Will be generated if not set.
  902.  
  903. ################################################################################
  904. ## GitLab Workhorse
  905. ##! Docs: https://gitlab.com/gitlab-org/gitlab/-/blob/master/workhorse/README.md
  906. ################################################################################
  907.  
  908. # gitlab_workhorse['enable'] = true
  909. # gitlab_workhorse['ha'] = false
  910. # gitlab_workhorse['alt_document_root'] = nil
  911.  
  912. ##! Duration to wait for all requests to finish (e.g. "10s" for 10
  913. ##! seconds). By default this is disabled to preserve the existing
  914. ##! behavior of fast shutdown. This should not be set higher than 30
  915. ##! seconds, since gitlab-ctl will wait up to 30 seconds (as defined by
  916. ##! the SVWAIT variable) and report a timeout error if the process has
  917. ##! not shut down.
  918. # gitlab_workhorse['shutdown_timeout'] = nil
  919. # gitlab_workhorse['listen_network'] = "unix"
  920. # gitlab_workhorse['listen_umask'] = 000
  921. # gitlab_workhorse['listen_addr'] = "/var/opt/gitlab/gitlab-workhorse/sockets/socket"
  922. # gitlab_workhorse['auth_backend'] = "http://localhost:8080"
  923.  
  924. ##! Enable Redis keywatcher, if this setting is not present it defaults to true
  925. # gitlab_workhorse['workhorse_keywatcher'] = true
  926.  
  927. ##! the empty string is the default in gitlab-workhorse option parser
  928. # gitlab_workhorse['auth_socket'] = "''"
  929.  
  930. ##! put an empty string on the command line
  931. # gitlab_workhorse['pprof_listen_addr'] = "''"
  932.  
  933. # gitlab_workhorse['prometheus_listen_addr'] = "localhost:9229"
  934.  
  935. # gitlab_workhorse['dir'] = "/var/opt/gitlab/gitlab-workhorse"
  936. # gitlab_workhorse['log_directory'] = "/var/log/gitlab/gitlab-workhorse"
  937. # gitlab_workhorse['proxy_headers_timeout'] = "1m0s"
  938.  
  939. ##! limit number of concurrent API requests, defaults to 0 which is unlimited
  940. # gitlab_workhorse['api_limit'] = 0
  941.  
  942. ##! limit number of API requests allowed to be queued, defaults to 0 which
  943. ##! disables queuing
  944. # gitlab_workhorse['api_queue_limit'] = 0
  945.  
  946. ##! duration after which we timeout requests if they sit too long in the queue
  947. # gitlab_workhorse['api_queue_duration'] = "30s"
  948.  
  949. ##! Long polling duration for job requesting for runners
  950. # gitlab_workhorse['api_ci_long_polling_duration'] = "60s"
  951.  
  952. ##! Propagate X-Request-Id if available. Workhorse will generate a random value otherwise.
  953. # gitlab_workhorse['propagate_correlation_id'] = false
  954.  
  955. ##! A list of CIDR blocks to allow for propagation of correlation ID.
  956. ##! propagate_correlation_id should also be set to true.
  957. ##! For example: %w(127.0.0.1/32 192.168.0.1/32)
  958. # gitlab_workhorse['trusted_cidrs_for_propagation'] = nil
  959.  
  960. ##! A list of CIDR blocks that must match remote IP addresses to use
  961. ##! X-Forwarded-For HTTP header for the actual client IP. Used in
  962. ##! conjuction with propagate_correlation_id and
  963. ##! trusted_cidrs_for_propagation.
  964. ##! For example: %w(127.0.0.1/32 192.168.0.1/32)
  965. # gitlab_workhorse['trusted_cidrs_for_x_forwarded_for'] = nil
  966.  
  967. ##! Log format: default is json, can also be text or none.
  968. # gitlab_workhorse['log_format'] = "json"
  969.  
  970. # gitlab_workhorse['env_directory'] = "/opt/gitlab/etc/gitlab-workhorse/env"
  971. # gitlab_workhorse['env'] = {
  972. # 'PATH' => "/opt/gitlab/bin:/opt/gitlab/embedded/bin:/bin:/usr/bin",
  973. # 'SSL_CERT_DIR' => "/opt/gitlab/embedded/ssl/certs/"
  974. # }
  975.  
  976. ##! Resource limitations for the dynamic image scaler.
  977. ##! Exceeding these thresholds will cause Workhorse to serve images in their original size.
  978. ##!
  979. ##! Maximum number of scaler processes that are allowed to execute concurrently.
  980. ##! It is recommended for this not to exceed the number of CPUs available.
  981. # gitlab_workhorse['image_scaler_max_procs'] = 4
  982. ##!
  983. ##! Maximum file size in bytes for an image to be considered eligible for rescaling
  984. # gitlab_workhorse['image_scaler_max_filesize'] = 250000
  985.  
  986. ##! Service name used to register GitLab Workhorse as a Consul service
  987. # gitlab_workhorse['consul_service_name'] = 'workhorse'
  988. ##! Semantic metadata used when registering GitLab Workhorse as a Consul service
  989. # gitlab_workhorse['consul_service_meta'] = {}
  990.  
  991. ################################################################################
  992. ## GitLab User Settings
  993. ##! Modify default git user.
  994. ##! Docs: https://docs.gitlab.com/omnibus/settings/configuration.html#change-the-name-of-the-git-user-or-group
  995. ################################################################################
  996.  
  997. # user['username'] = "git"
  998. # user['group'] = "git"
  999. # user['uid'] = nil
  1000. # user['gid'] = nil
  1001.  
  1002. ##! The shell for the git user
  1003. # user['shell'] = "/bin/sh"
  1004.  
  1005. ##! The home directory for the git user
  1006. # user['home'] = "/var/opt/gitlab"
  1007.  
  1008. # user['git_user_name'] = "GitLab"
  1009. # user['git_user_email'] = "gitlab@#{node['fqdn']}"
  1010.  
  1011. ################################################################################
  1012. ## GitLab Puma
  1013. ##! Tweak puma settings.
  1014. ##! Docs: https://docs.gitlab.com/ee/administration/operations/puma.html
  1015. ################################################################################
  1016.  
  1017. # puma['enable'] = true
  1018. # puma['ha'] = false
  1019. # puma['worker_timeout'] = 60
  1020. # puma['worker_processes'] = 2
  1021. # puma['min_threads'] = 4
  1022. # puma['max_threads'] = 4
  1023.  
  1024. ### Advanced settings
  1025. # puma['listen'] = '127.0.0.1'
  1026. # puma['port'] = 8080
  1027. # puma['socket'] = '/var/opt/gitlab/gitlab-rails/sockets/gitlab.socket'
  1028. # puma['somaxconn'] = 1024
  1029.  
  1030. ### SSL settings
  1031. # puma['ssl_listen'] = nil
  1032. # puma['ssl_port'] = nil
  1033. # puma['ssl_certificate'] = nil
  1034. # puma['ssl_certificate_key'] = nil
  1035. # puma['ssl_client_certificate'] = nil
  1036. # puma['ssl_cipher_filter'] = nil
  1037. # puma['ssl_verify_mode'] = 'none'
  1038.  
  1039. # puma['pidfile'] = '/opt/gitlab/var/puma/puma.pid'
  1040. # puma['state_path'] = '/opt/gitlab/var/puma/puma.state'
  1041.  
  1042. ###! **We do not recommend changing this setting**
  1043. # puma['log_directory'] = "/var/log/gitlab/puma"
  1044.  
  1045. ### **Only change these settings if you understand well what they mean**
  1046. ###! Docs: https://github.com/schneems/puma_worker_killer
  1047. # puma['per_worker_max_memory_mb'] = 1024
  1048.  
  1049. # puma['exporter_enabled'] = false
  1050. # puma['exporter_address'] = "127.0.0.1"
  1051. # puma['exporter_port'] = 8083
  1052. # puma['exporter_tls_enabled'] = false
  1053. # puma['exporter_tls_cert_path'] = ""
  1054. # puma['exporter_tls_key_path'] = ""
  1055.  
  1056. # puma['prometheus_scrape_scheme'] = 'http'
  1057. # puma['prometheus_scrape_tls_server_name'] = 'localhost'
  1058. # puma['prometheus_scrape_tls_skip_verification'] = false
  1059.  
  1060. ##! Service name used to register Puma as a Consul service
  1061. # puma['consul_service_name'] = 'rails'
  1062. ##! Semantic metadata used when registering Puma as a Consul service
  1063. # puma['consul_service_meta'] = {}
  1064.  
  1065. ################################################################################
  1066. ## GitLab Sidekiq
  1067. ################################################################################
  1068.  
  1069. ##! GitLab allows one to start multiple sidekiq processes. These
  1070. ##! processes can be used to consume a dedicated set of queues. This
  1071. ##! can be used to ensure certain queues are able to handle additional workload.
  1072. ##! https://docs.gitlab.com/ee/administration/operations/extra_sidekiq_processes.html
  1073.  
  1074. # sidekiq['log_directory'] = "/var/log/gitlab/sidekiq"
  1075. # sidekiq['log_format'] = "json"
  1076. # sidekiq['shutdown_timeout'] = 4
  1077. # sidekiq['interval'] = nil
  1078. # sidekiq['max_concurrency'] = 20
  1079. # sidekiq['min_concurrency'] = nil
  1080.  
  1081. ##! GitLab allows route a job to a particular queue determined by an array of ##! routing rules.
  1082. ##! Each routing rule is a tuple of queue selector query and corresponding queue. By default,
  1083. ##! the routing rules are not configured (empty array)
  1084.  
  1085. # sidekiq['routing_rules'] = []
  1086.  
  1087. ##! Each entry in the queue_groups array denotes a group of queues that have to be processed by a
  1088. ##! Sidekiq process. Multiple queues can be processed by the same process by
  1089. ##! separating them with a comma within the group entry, a `*` will process all queues
  1090.  
  1091. # sidekiq['queue_groups'] = ['*']
  1092.  
  1093. ##! Specifies where Prometheus metrics endpoints should be made available for Sidekiq processes.
  1094. # sidekiq['metrics_enabled'] = true
  1095. # sidekiq['exporter_log_enabled'] = false
  1096. # sidekiq['exporter_tls_enabled'] = false
  1097. # sidekiq['exporter_tls_cert_path'] = ""
  1098. # sidekiq['exporter_tls_key_path'] = ""
  1099. # sidekiq['listen_address'] = "localhost"
  1100. # sidekiq['listen_port'] = 8082
  1101.  
  1102. ##! Specifies where health-check endpoints should be made available for Sidekiq processes.
  1103. ##! Defaults to the same settings as for Prometheus metrics (see above).
  1104. # sidekiq['health_checks_enabled'] = true
  1105. # sidekiq['health_checks_listen_address'] = "localhost"
  1106. # sidekiq['health_checks_listen_port'] = 8092
  1107.  
  1108. ##! Service name used to register Sidekiq as a Consul service
  1109. # sidekiq['consul_service_name'] = 'sidekiq'
  1110. ##! Semantic metadata used when registering Sidekiq as a Consul service
  1111. # sidekiq['consul_service_meta'] = {}
  1112.  
  1113. ################################################################################
  1114. ## gitlab-shell
  1115. ###
  1116. ##############################################################################
  1117.  
  1118. gitlab_shell['secret_token'] = 'shellsecret'
  1119. # gitlab_shell['audit_usernames'] = false
  1120. # gitlab_shell['log_level'] = 'INFO'
  1121. # gitlab_shell['log_format'] = 'json'
  1122. # gitlab_shell['http_settings'] = { user: 'username', password: 'password', ca_file: '/etc/ssl/cert.pem', ca_path: '/etc/pki/tls/certs'}
  1123. # gitlab_shell['log_directory'] = "/var/log/gitlab/gitlab-shell/"
  1124.  
  1125. # gitlab_shell['auth_file'] = "/var/opt/gitlab/.ssh/authorized_keys"
  1126.  
  1127. ### Migration to Go feature flags
  1128. ###! Docs: https://gitlab.com/gitlab-org/gitlab-shell#migration-to-go-feature-flags
  1129. # gitlab_shell['migration'] = { enabled: true, features: [] }
  1130.  
  1131. ### Git trace log file.
  1132. ###! If set, git commands receive GIT_TRACE* environment variables
  1133. ###! Docs: https://git-scm.com/book/es/v2/Git-Internals-Environment-Variables#Debugging
  1134. ###! An absolute path starting with / – the trace output will be appended to
  1135. ###! that file. It needs to exist so we can check permissions and avoid
  1136. ###! throwing warnings to the users.
  1137. # gitlab_shell['git_trace_log_file'] = "/var/log/gitlab/gitlab-shell/gitlab-shell-git-trace.log"
  1138.  
  1139. ##! **We do not recommend changing this directory.**
  1140. # gitlab_shell['dir'] = "/var/opt/gitlab/gitlab-shell"
  1141.  
  1142. ################################################################################
  1143. ## gitlab-sshd
  1144. ################################################################################
  1145.  
  1146. # gitlab_sshd['enable'] = false
  1147. # gitlab_sshd['generate_host_keys'] = true
  1148. # gitlab_sshd['dir'] = "/var/opt/gitlab/gitlab-sshd"
  1149.  
  1150. # gitlab-sshd outputs most logs to /var/log/gitlab/gitlab-shell/gitlab-shell.log.
  1151. # This directory only stores stdout/stderr output from the daemon.
  1152. # gitlab_sshd['log_directory'] = "/var/log/gitlab/gitlab-sshd/"
  1153.  
  1154. # gitlab_sshd['env_directory'] = '/opt/gitlab/etc/gitlab-sshd/env'
  1155. # gitlab_sshd['listen_address'] = 'localhost:2222'
  1156. # gitlab_sshd['metrics_address'] = 'localhost:9122'
  1157. # gitlab_sshd['concurrent_sessions_limit'] = 100
  1158. # gitlab_sshd['proxy_protocol'] = false
  1159. # gitlab_sshd['proxy_policy'] = 'use'
  1160. # gitlab_sshd['proxy_header_timeout'] = '500ms'
  1161. # gitlab_sshd['grace_period'] = 55
  1162. # gitlab_sshd['client_alive_interval'] = nil
  1163. # gitlab_sshd['ciphers'] = nil
  1164. # gitlab_sshd['kex_algorithms'] = nil
  1165. # gitlab_sshd['macs'] = nil
  1166. # gitlab_sshd['login_grace_time'] = 60
  1167. # gitlab_sshd['host_keys_dir'] = '/var/opt/gitlab/gitlab-sshd'
  1168. # gitlab_sshd['host_keys_glob'] = 'ssh_host_*_key'
  1169. # gitlab_sshd['host_certs_dir'] = '/var/opt/gitlab/gitlab-sshd'
  1170. # gitlab_sshd['host_certs_glob'] = 'ssh_host_*-cert.pub'
  1171.  
  1172. ################################################################
  1173. ## GitLab PostgreSQL
  1174. ################################################################
  1175.  
  1176. ###! Changing any of these settings requires a restart of postgresql.
  1177. ###! By default, reconfigure reloads postgresql if it is running. If you
  1178. ###! change any of these settings, be sure to run `gitlab-ctl restart postgresql`
  1179. ###! after reconfigure in order for the changes to take effect.
  1180. # postgresql['enable'] = true
  1181. # postgresql['listen_address'] = nil
  1182. # postgresql['port'] = 5432
  1183.  
  1184. ## Only used when Patroni is enabled. This is the port that PostgreSQL responds to other
  1185. ## cluster members. This port is used by Patroni to advertize the PostgreSQL connection
  1186. ## endpoint to the cluster. By default it is the same as postgresql['port'].
  1187. # postgresql['connect_port'] = 5432
  1188.  
  1189. ##! **recommend value is 1/4 of total RAM, up to 14GB.**
  1190. # postgresql['shared_buffers'] = "256MB"
  1191.  
  1192. ### Advanced settings
  1193. # postgresql['ha'] = false
  1194. # postgresql['dir'] = "/var/opt/gitlab/postgresql"
  1195. # postgresql['log_directory'] = "/var/log/gitlab/postgresql"
  1196. # postgresql['log_destination'] = nil
  1197. # postgresql['logging_collector'] = nil
  1198. # postgresql['log_truncate_on_rotation'] = nil
  1199. # postgresql['log_rotation_age'] = nil
  1200. # postgresql['log_rotation_size'] = nil
  1201. ##! 'username' affects the system and PostgreSQL user accounts created during installation and cannot be changed
  1202. ##! on an existing installation. See https://gitlab.com/gitlab-org/omnibus-gitlab/-/issues/3606 for more details.
  1203. # postgresql['username'] = "gitlab-psql"
  1204. # postgresql['group'] = "gitlab-psql"
  1205. ##! `SQL_USER_PASSWORD_HASH` can be generated using the command `gitlab-ctl pg-password-md5 gitlab`
  1206. # postgresql['sql_user_password'] = 'SQL_USER_PASSWORD_HASH'
  1207. # postgresql['uid'] = nil
  1208. # postgresql['gid'] = nil
  1209. # postgresql['shell'] = "/bin/sh"
  1210. # postgresql['home'] = "/var/opt/gitlab/postgresql"
  1211. # postgresql['user_path'] = "/opt/gitlab/embedded/bin:/opt/gitlab/bin:$PATH"
  1212. # postgresql['sql_user'] = "gitlab"
  1213. # postgresql['max_connections'] = 400
  1214. # postgresql['md5_auth_cidr_addresses'] = []
  1215. # postgresql['trust_auth_cidr_addresses'] = []
  1216. # postgresql['wal_buffers'] = "-1"
  1217. # postgresql['autovacuum_max_workers'] = "3"
  1218. # postgresql['autovacuum_freeze_max_age'] = "200000000"
  1219. # postgresql['log_statement'] = nil
  1220. # postgresql['track_activity_query_size'] = "1024"
  1221. # postgresql['shared_preload_libraries'] = nil
  1222. # postgresql['dynamic_shared_memory_type'] = nil
  1223. # postgresql['hot_standby'] = "off"
  1224.  
  1225. ### SSL settings
  1226. # See https://www.postgresql.org/docs/12/static/runtime-config-connection.html#GUC-SSL-CERT-FILE for more details
  1227. # postgresql['ssl'] = 'on'
  1228. # postgresql['hostssl'] = false
  1229. # postgresql['ssl_ciphers'] = 'HIGH:MEDIUM:+3DES:!aNULL:!SSLv3:!TLSv1'
  1230. # postgresql['ssl_cert_file'] = 'server.crt'
  1231. # postgresql['ssl_key_file'] = 'server.key'
  1232. # postgresql['ssl_ca_file'] = '/opt/gitlab/embedded/ssl/certs/cacert.pem'
  1233. # postgresql['ssl_crl_file'] = nil
  1234. # postgresql['cert_auth_addresses'] = {
  1235. # 'ADDRESS' => {
  1236. # database: 'gitlabhq_production',
  1237. # user: 'gitlab'
  1238. # }
  1239. # }
  1240.  
  1241. ### Replication settings
  1242. ###! Note, some replication settings do not require a full restart. They are documented below.
  1243. # postgresql['wal_level'] = "hot_standby"
  1244. # postgresql['wal_log_hints'] = 'off'
  1245. # postgresql['max_wal_senders'] = 5
  1246. # postgresql['max_replication_slots'] = 0
  1247. # postgresql['max_locks_per_transaction'] = 128
  1248.  
  1249. # Backup/Archive settings
  1250. # postgresql['archive_mode'] = "off"
  1251.  
  1252. ###! Changing any of these settings only requires a reload of postgresql. You do not need to
  1253. ###! restart postgresql if you change any of these and run reconfigure.
  1254. # postgresql['work_mem'] = "16MB"
  1255. # postgresql['maintenance_work_mem'] = "16MB"
  1256. # postgresql['checkpoint_timeout'] = "5min"
  1257. # postgresql['checkpoint_completion_target'] = 0.9
  1258. # postgresql['effective_io_concurrency'] = 1
  1259. # postgresql['checkpoint_warning'] = "30s"
  1260. # postgresql['effective_cache_size'] = "1MB"
  1261. # postgresql['shmmax'] = 17179869184 # or 4294967295
  1262. # postgresql['shmall'] = 4194304 # or 1048575
  1263. # postgresql['autovacuum'] = "on"
  1264. # postgresql['log_autovacuum_min_duration'] = "-1"
  1265. # postgresql['autovacuum_naptime'] = "1min"
  1266. # postgresql['autovacuum_vacuum_threshold'] = "50"
  1267. # postgresql['autovacuum_analyze_threshold'] = "50"
  1268. # postgresql['autovacuum_vacuum_scale_factor'] = "0.02"
  1269. # postgresql['autovacuum_analyze_scale_factor'] = "0.01"
  1270. # postgresql['autovacuum_vacuum_cost_delay'] = "20ms"
  1271. # postgresql['autovacuum_vacuum_cost_limit'] = "-1"
  1272. # postgresql['statement_timeout'] = "60000"
  1273. # postgresql['idle_in_transaction_session_timeout'] = "60000"
  1274. # postgresql['log_line_prefix'] = "%a"
  1275. # postgresql['max_worker_processes'] = 8
  1276. # postgresql['max_parallel_workers_per_gather'] = 0
  1277. # postgresql['log_lock_waits'] = 1
  1278. # postgresql['deadlock_timeout'] = '5s'
  1279. # postgresql['track_io_timing'] = 0
  1280. # postgresql['default_statistics_target'] = 1000
  1281.  
  1282. ### Available in PostgreSQL 9.6 and later
  1283. # postgresql['min_wal_size'] = "80MB"
  1284. # postgresql['max_wal_size'] = "1GB"
  1285.  
  1286. # Backup/Archive settings
  1287. # postgresql['archive_command'] = nil
  1288. # postgresql['archive_timeout'] = "0"
  1289.  
  1290. ### Replication settings
  1291. # postgresql['sql_replication_user'] = "gitlab_replicator"
  1292. # postgresql['sql_replication_password'] = "md5 hash of postgresql password" # You can generate with `gitlab-ctl pg-password-md5 <dbuser>`
  1293. # postgresql['wal_keep_segments'] = 10
  1294. # postgresql['max_standby_archive_delay'] = "30s"
  1295. # postgresql['max_standby_streaming_delay'] = "30s"
  1296. # postgresql['synchronous_commit'] = on
  1297. # postgresql['synchronous_standby_names'] = ''
  1298. # postgresql['hot_standby_feedback'] = 'off'
  1299. # postgresql['random_page_cost'] = 2.0
  1300. # postgresql['log_temp_files'] = -1
  1301. # postgresql['log_checkpoints'] = 'off'
  1302. # To add custom entries to pg_hba.conf use the following
  1303. # postgresql['custom_pg_hba_entries'] = {
  1304. # APPLICATION: [ # APPLICATION should identify what the settings are used for
  1305. # {
  1306. # type: example,
  1307. # database: example,
  1308. # user: example,
  1309. # cidr: example,
  1310. # method: example,
  1311. # option: example
  1312. # }
  1313. # ]
  1314. # }
  1315. # See https://www.postgresql.org/docs/12/static/auth-pg-hba-conf.html for an explanation
  1316. # of the values
  1317.  
  1318. ### Version settings
  1319. # Set this if you have disabled the bundled PostgreSQL but still want to use the backup rake tasks
  1320. # postgresql['version'] = 10
  1321.  
  1322.  
  1323. ##! Automatically restart PostgreSQL service when version changes.
  1324. # postgresql['auto_restart_on_version_change'] = true
  1325.  
  1326. ################################################################################
  1327. ## GitLab Redis
  1328. ##! **Can be disabled if you are using your own Redis instance.**
  1329. ##! Docs: https://docs.gitlab.com/omnibus/settings/redis.html
  1330. ################################################################################
  1331.  
  1332. # redis['enable'] = true
  1333. # redis['ha'] = false
  1334. # redis['hz'] = 10
  1335. # redis['dir'] = "/var/opt/gitlab/redis"
  1336. # redis['log_directory'] = "/var/log/gitlab/redis"
  1337. # redis['username'] = "gitlab-redis"
  1338. # redis['group'] = "gitlab-redis"
  1339. # redis['maxclients'] = "10000"
  1340. # redis['maxmemory'] = "0"
  1341. # redis['maxmemory_policy'] = "noeviction"
  1342. # redis['maxmemory_samples'] = "5"
  1343. # redis['stop_writes_on_bgsave_error'] = true
  1344. # redis['tcp_backlog'] = 511
  1345. # redis['tcp_timeout'] = "60"
  1346. # redis['tcp_keepalive'] = "300"
  1347. # redis['uid'] = nil
  1348. # redis['gid'] = nil
  1349.  
  1350. ### Redis TLS settings
  1351. ###! To run Redis over TLS, specify values for the following settings
  1352. # redis['tls_port'] = nil
  1353. # redis['tls_cert_file'] = nil
  1354. # redis['tls_key_file'] = nil
  1355.  
  1356. ###! Other TLS related optional settings
  1357. # redis['tls_dh_params_file'] = nil
  1358. # redis['tls_ca_cert_dir'] = '/opt/gitlab/embedded/ssl/certs/'
  1359. # redis['tls_ca_cert_file'] = '/opt/gitlab/embedded/ssl/certs/cacert.pem'
  1360. # redis['tls_auth_clients'] = 'optional'
  1361. # redis['tls_replication'] = nil
  1362. # redis['tls_cluster'] = nil
  1363. # redis['tls_protocols'] = nil
  1364. # redis['tls_ciphers'] = nil
  1365. # redis['tls_ciphersuites'] = nil
  1366. # redis['tls_prefer_server_ciphers'] = nil
  1367. # redis['tls_session_caching'] = nil
  1368. # redis['tls_session_cache_size'] = nil
  1369. # redis['tls_session_cache_timeout'] = nil
  1370.  
  1371. ### Disable or obfuscate unnecessary redis command names
  1372. ### Uncomment and edit this block to add or remove entries.
  1373. ### See https://docs.gitlab.com/omnibus/settings/redis.html#renamed-commands
  1374. ### for detailed usage
  1375. ###
  1376. # redis['rename_commands'] = {
  1377. # 'KEYS': ''
  1378. #}
  1379. #
  1380.  
  1381. ###! **To enable only Redis service in this machine, uncomment
  1382. ###! one of the lines below (choose master or replica instance types).**
  1383. ###! Docs: https://docs.gitlab.com/omnibus/settings/redis.html
  1384. ###! https://docs.gitlab.com/ee/administration/high_availability/redis.html
  1385. # redis_master_role['enable'] = true
  1386. # redis_replica_role['enable'] = true
  1387.  
  1388. ### Redis TCP support (will disable UNIX socket transport)
  1389. # redis['bind'] = '0.0.0.0' # or specify an IP to bind to a single one
  1390. # redis['port'] = 6379
  1391. # redis['password'] = 'redis-password-goes-here'
  1392.  
  1393. ### Redis Sentinel support
  1394. ###! **You need a master replica Redis replication to be able to do failover**
  1395. ###! **Please read the documentation before enabling it to understand the
  1396. ###! caveats:**
  1397. ###! Docs: https://docs.gitlab.com/ee/administration/high_availability/redis.html
  1398.  
  1399. ### Replication support
  1400. #### Replica Redis instance
  1401. # redis['master'] = false # by default this is true
  1402.  
  1403. #### Replica and Sentinel shared configuration
  1404. ####! **Both need to point to the master Redis instance to get replication and
  1405. ####! heartbeat monitoring**
  1406. # redis['master_name'] = 'gitlab-redis'
  1407. # redis['master_ip'] = nil
  1408. # redis['master_port'] = 6379
  1409.  
  1410. #### Support to run redis replicas in a Docker or NAT environment
  1411. ####! Docs: https://redis.io/topics/replication#configuring-replication-in-docker-and-nat
  1412. # redis['announce_ip'] = nil
  1413. # redis['announce_port'] = nil
  1414. # redis['announce_ip_from_hostname'] = false
  1415.  
  1416. ####! **Master password should have the same value defined in
  1417. ####! redis['password'] to enable the instance to transition to/from
  1418. ####! master/replica in a failover event.**
  1419. # redis['master_password'] = 'redis-password-goes-here'
  1420.  
  1421. ####! Increase these values when your replicas can't catch up with master
  1422. # redis['client_output_buffer_limit_normal'] = '0 0 0'
  1423. # redis['client_output_buffer_limit_replica'] = '256mb 64mb 60'
  1424. # redis['client_output_buffer_limit_pubsub'] = '32mb 8mb 60'
  1425.  
  1426. #####! Redis snapshotting frequency
  1427. #####! Set to [] to disable
  1428. #####! Set to [''] to clear previously set values
  1429. # redis['save'] = [ '900 1', '300 10', '60 10000' ]
  1430.  
  1431. #####! Redis lazy freeing
  1432. #####! Defaults to false
  1433. # redis['lazyfree_lazy_eviction'] = true
  1434. # redis['lazyfree_lazy_expire'] = true
  1435. # redis['lazyfree_lazy_server_del'] = true
  1436. # redis['replica_lazy_flush'] = true
  1437.  
  1438. #####! Redis threaded I/O
  1439. #####! Defaults to disabled
  1440. # redis['io_threads'] = 4
  1441. # redis['io_threads_do_reads'] = true
  1442.  
  1443. ################################################################################
  1444. ## GitLab Web server
  1445. ##! Docs: https://docs.gitlab.com/omnibus/settings/nginx.html#using-a-non-bundled-web-server
  1446. ################################################################################
  1447.  
  1448. ##! When bundled nginx is disabled we need to add the external webserver user to
  1449. ##! the GitLab webserver group.
  1450. # web_server['external_users'] = []
  1451. # web_server['username'] = 'gitlab-www'
  1452. # web_server['group'] = 'gitlab-www'
  1453. # web_server['uid'] = nil
  1454. # web_server['gid'] = nil
  1455. # web_server['shell'] = '/bin/false'
  1456. # web_server['home'] = '/var/opt/gitlab/nginx'
  1457.  
  1458. ################################################################################
  1459. ## GitLab NGINX
  1460. ##! Docs: https://docs.gitlab.com/omnibus/settings/nginx.html
  1461. ################################################################################
  1462.  
  1463. #nginx['enable'] = true
  1464. # nginx['client_max_body_size'] = '250m'
  1465. # nginx['redirect_http_to_https'] = false
  1466. # nginx['redirect_http_to_https_port'] = 80
  1467.  
  1468. ##! Most root CA's are included by default
  1469. # nginx['ssl_client_certificate'] = "/etc/gitlab/ssl/ca.crt"
  1470.  
  1471. ##! enable/disable 2-way SSL client authentication
  1472. # nginx['ssl_verify_client'] = "off"
  1473.  
  1474. ##! if ssl_verify_client on, verification depth in the client certificates chain
  1475. # nginx['ssl_verify_depth'] = "1"
  1476.  
  1477. # nginx['ssl_certificate'] = "/etc/gitlab/ssl/#{node['fqdn']}.crt"
  1478. # nginx['ssl_certificate_key'] = "/etc/gitlab/ssl/#{node['fqdn']}.key"
  1479. # nginx['ssl_ciphers'] = "ECDHE-ECDSA-AES128-GCM-SHA256:ECDHE-RSA-AES128-GCM-SHA256:ECDHE-ECDSA-AES256-GCM-SHA384:ECDHE-RSA-AES256-GCM-SHA384:ECDHE-ECDSA-CHACHA20-POLY1305:ECDHE-RSA-CHACHA20-POLY1305:DHE-RSA-AES128-GCM-SHA256:DHE-RSA-AES256-GCM-SHA384"
  1480. # nginx['ssl_prefer_server_ciphers'] = "off"
  1481.  
  1482. ##! **Recommended by: https://raymii.org/s/tutorials/Strong_SSL_Security_On_nginx.html
  1483. ##! https://cipherli.st/**
  1484. # nginx['ssl_protocols'] = "TLSv1.2 TLSv1.3"
  1485.  
  1486. ##! **Recommended in: https://nginx.org/en/docs/http/ngx_http_ssl_module.html**
  1487. # nginx['ssl_session_cache'] = "shared:SSL:10m"
  1488.  
  1489. ##! **Recommended in: https://ssl-config.mozilla.org/#server=nginx&version=1.17.7&config=intermediate&openssl=1.1.1d&ocsp=false&guideline=5.6**
  1490. # nginx['ssl_session_tickets'] = "off"
  1491.  
  1492. ##! **Default according to https://nginx.org/en/docs/http/ngx_http_ssl_module.html**
  1493. # nginx['ssl_session_timeout'] = "1d"
  1494.  
  1495. # nginx['ssl_dhparam'] = nil # Path to dhparams.pem, eg. /etc/gitlab/ssl/dhparams.pem
  1496. # nginx['ssl_password_file'] = nil # Path to file with passphrases for ssl certificate secret keys
  1497. # nginx['listen_addresses'] = ['*', '[::]']
  1498.  
  1499. ##! **Defaults to forcing web browsers to always communicate using only HTTPS**
  1500. ##! Docs: https://docs.gitlab.com/omnibus/settings/nginx.html#setting-http-strict-transport-security
  1501. # nginx['hsts_max_age'] = 63072000
  1502. # nginx['hsts_include_subdomains'] = false
  1503.  
  1504. ##! Defaults to stripping path information when making cross-origin requests
  1505. # nginx['referrer_policy'] = 'strict-origin-when-cross-origin'
  1506.  
  1507. ##! **Docs: http://nginx.org/en/docs/http/ngx_http_gzip_module.html**
  1508. # nginx['gzip_enabled'] = true
  1509.  
  1510. ##! **Override only if you use a reverse proxy**
  1511. ##! Docs: https://docs.gitlab.com/omnibus/settings/nginx.html#setting-the-nginx-listen-port
  1512. # nginx['listen_port'] = nil
  1513.  
  1514. ##! **Override only if your reverse proxy internally communicates over HTTP**
  1515. ##! Docs: https://docs.gitlab.com/omnibus/settings/nginx.html#supporting-proxied-ssl
  1516. # nginx['listen_https'] = nil
  1517.  
  1518. ##! **Override only if you use a reverse proxy with proxy protocol enabled**
  1519. ##! Docs: https://docs.gitlab.com/omnibus/settings/nginx.html#configuring-proxy-protocol
  1520. # nginx['proxy_protocol'] = false
  1521.  
  1522. # nginx['custom_gitlab_server_config'] = "location ^~ /foo-namespace/bar-project/raw/ {\n deny all;\n}\n"
  1523. # nginx['custom_nginx_config'] = "include /etc/nginx/conf.d/example.conf;"
  1524. # nginx['proxy_read_timeout'] = 3600
  1525. # nginx['proxy_connect_timeout'] = 300
  1526. # nginx['proxy_set_headers'] = {
  1527. # "Host" => "$http_host_with_default",
  1528. # "X-Real-IP" => "$remote_addr",
  1529. # "X-Forwarded-For" => "$proxy_add_x_forwarded_for",
  1530. # "X-Forwarded-Proto" => "https",
  1531. # "X-Forwarded-Ssl" => "on",
  1532. # "Upgrade" => "$http_upgrade",
  1533. # "Connection" => "$connection_upgrade"
  1534. # }
  1535. # nginx['proxy_cache_path'] = 'proxy_cache keys_zone=gitlab:10m max_size=1g levels=1:2'
  1536. # nginx['proxy_cache'] = 'gitlab'
  1537. # nginx['proxy_custom_buffer_size'] = '4k'
  1538. # nginx['http2_enabled'] = true
  1539. # nginx['real_ip_trusted_addresses'] = []
  1540. # nginx['real_ip_header'] = nil
  1541. # nginx['real_ip_recursive'] = nil
  1542. # nginx['custom_error_pages'] = {
  1543. # '404' => {
  1544. # 'title' => 'Example title',
  1545. # 'header' => 'Example header',
  1546. # 'message' => 'Example message'
  1547. # }
  1548. # }
  1549.  
  1550. ### Advanced settings
  1551. # nginx['dir'] = "/var/opt/gitlab/nginx"
  1552. # nginx['log_directory'] = "/var/log/gitlab/nginx"
  1553. # nginx['error_log_level'] = "error"
  1554. # nginx['worker_processes'] = 4
  1555. # nginx['worker_connections'] = 10240
  1556. # nginx['log_format'] = '$remote_addr - $remote_user [$time_local] "$request_method $filtered_request_uri $server_protocol" $status $body_bytes_sent "$filtered_http_referer" "$http_user_agent" $gzip_ratio'
  1557. # nginx['sendfile'] = 'on'
  1558. # nginx['tcp_nopush'] = 'on'
  1559. # nginx['tcp_nodelay'] = 'on'
  1560. # nginx['hide_server_tokens'] = 'off'
  1561. # nginx['gzip_http_version'] = "1.0"
  1562. # nginx['gzip_comp_level'] = "2"
  1563. # nginx['gzip_proxied'] = "any"
  1564. # nginx['gzip_types'] = [ "text/plain", "text/css", "application/x-javascript", "text/xml", "application/xml", "application/xml+rss", "text/javascript", "application/json" ]
  1565. # nginx['keepalive_timeout'] = 65
  1566. # nginx['keepalive_time'] = '1h'
  1567. # nginx['cache_max_size'] = '5000m'
  1568. # nginx['server_names_hash_bucket_size'] = 64
  1569. ##! These paths have proxy_request_buffering disabled
  1570. # nginx['request_buffering_off_path_regex'] = "/api/v\\d/jobs/\\d+/artifacts$|/import/gitlab_project$|\\.git/git-receive-pack$|\\.git/gitlab-lfs/objects|\\.git/info/lfs/objects/batch$"
  1571.  
  1572. ### Nginx status
  1573. # nginx['status'] = {
  1574. # "enable" => true,
  1575. # "listen_addresses" => ["127.0.0.1"],
  1576. # "fqdn" => "dev.example.com",
  1577. # "port" => 9999,
  1578. # "vts_enable" => true,
  1579. # "options" => {
  1580. # "server_tokens" => "off", # Don't show the version of NGINX
  1581. # "access_log" => "off", # Disable logs for stats
  1582. # "allow" => "127.0.0.1", # Only allow access from localhost
  1583. # "deny" => "all" # Deny access to anyone else
  1584. # }
  1585. # }
  1586.  
  1587. ##! Service name used to register Nginx as a Consul service
  1588. # nginx['consul_service_name'] = 'nginx'
  1589. ##! Semantic metadata used when registering NGINX as a Consul service
  1590. # nginx['consul_service_meta'] = {}
  1591.  
  1592. ################################################################################
  1593. ## GitLab Logging
  1594. ##! Docs: https://docs.gitlab.com/omnibus/settings/logs.html
  1595. ################################################################################
  1596.  
  1597. # logging['svlogd_size'] = 200 * 1024 * 1024 # rotate after 200 MB of log data
  1598. # logging['svlogd_num'] = 30 # keep 30 rotated log files
  1599. # logging['svlogd_timeout'] = 24 * 60 * 60 # rotate after 24 hours
  1600. # logging['svlogd_filter'] = "gzip" # compress logs with gzip
  1601. # logging['svlogd_udp'] = nil # transmit log messages via UDP
  1602. # logging['svlogd_prefix'] = nil # custom prefix for log messages
  1603. # logging['logrotate_frequency'] = "daily" # rotate logs daily
  1604. # logging['logrotate_maxsize'] = nil # rotate logs when they grow bigger than size bytes even before the specified time interval (daily, weekly, monthly, or yearly)
  1605. # logging['logrotate_size'] = nil # do not rotate by size by default
  1606. # logging['logrotate_rotate'] = 30 # keep 30 rotated logs
  1607. # logging['logrotate_compress'] = "compress" # see 'man logrotate'
  1608. # logging['logrotate_method'] = "copytruncate" # see 'man logrotate'
  1609. # logging['logrotate_postrotate'] = nil # no postrotate command by default
  1610. # logging['logrotate_dateformat'] = nil # use date extensions for rotated files rather than numbers e.g. a value of "-%Y-%m-%d" would give rotated files like production.log-2016-03-09.gz
  1611.  
  1612. ### UDP log forwarding
  1613. ##! Docs: http://docs.gitlab.com/omnibus/settings/logs.html#udp-log-forwarding
  1614.  
  1615. ##! remote host to ship log messages to via UDP
  1616. # logging['udp_log_shipping_host'] = nil
  1617.  
  1618. ##! override the hostname used when logs are shipped via UDP,
  1619. ## by default the system hostname will be used.
  1620. # logging['udp_log_shipping_hostname'] = nil
  1621.  
  1622. ##! remote port to ship log messages to via UDP
  1623. # logging['udp_log_shipping_port'] = 514
  1624.  
  1625. ################################################################################
  1626. ## Logrotate
  1627. ##! Docs: https://docs.gitlab.com/omnibus/settings/logs.html#logrotate
  1628. ##! You can disable built in logrotate feature.
  1629. ################################################################################
  1630. # logrotate['enable'] = true
  1631. # logrotate['log_directory'] = "/var/log/gitlab/logrotate"
  1632.  
  1633. ################################################################################
  1634. ## Users and groups accounts
  1635. ##! Disable management of users and groups accounts.
  1636. ##! **Set only if creating accounts manually**
  1637. ##! Docs: https://docs.gitlab.com/omnibus/settings/configuration.html#disable-user-and-group-account-management
  1638. ################################################################################
  1639.  
  1640. # manage_accounts['enable'] = true
  1641.  
  1642. ################################################################################
  1643. ## Storage directories
  1644. ##! Disable managing storage directories
  1645. ##! Docs: https://docs.gitlab.com/omnibus/settings/configuration.html#disable-storage-directories-management
  1646. ################################################################################
  1647.  
  1648. ##! **Set only if the select directories are created manually**
  1649. # manage_storage_directories['enable'] = false
  1650. # manage_storage_directories['manage_etc'] = false
  1651.  
  1652. ################################################################################
  1653. ## Runtime directory
  1654. ##! Docs: https://docs.gitlab.com//omnibus/settings/configuration.html#configuring-runtime-directory
  1655. ################################################################################
  1656.  
  1657. # runtime_dir '/run'
  1658.  
  1659. ################################################################################
  1660. ## Git
  1661. ##! Advanced setting for configuring git system settings for omnibus-gitlab
  1662. ##! internal git
  1663. ################################################################################
  1664.  
  1665. ##! The format of the Omnibus gitconfig is:
  1666. ##! { "section" => ["subsection = value"] }
  1667. ##! For example:
  1668. ##! { "pack" => ["threads = 1"] }
  1669. ##! For multiple options under one header use array of comma separated values,
  1670. ##! eg.:
  1671. ##! { "receive" => ["fsckObjects = true"], "alias" => ["st = status", "co = checkout"] }
  1672. # omnibus_gitconfig['system'] = {}
  1673.  
  1674. ################################################################################
  1675. ## GitLab Pages
  1676. ##! Docs: https://docs.gitlab.com/ee/administration/pages/
  1677. ################################################################################
  1678.  
  1679. ##! Define to enable GitLab Pages
  1680. # pages_external_url "http://pages.example.com/"
  1681. # gitlab_pages['enable'] = false
  1682.  
  1683. ##! Configure to expose GitLab Pages on external IP address, serving the HTTP
  1684. # gitlab_pages['external_http'] = []
  1685.  
  1686. ##! Configure to expose GitLab Pages on external IP address, serving the HTTPS
  1687. # gitlab_pages['external_https'] = []
  1688.  
  1689. ##! Configure to expose GitLab Pages on external IP address, serving the HTTPS over PROXYv2
  1690. # gitlab_pages['external_https_proxyv2'] = []
  1691.  
  1692. ##! Configure cert when using external IP address
  1693. # gitlab_pages['cert'] = "/etc/gitlab/ssl/#{Gitlab['gitlab_pages']['domain']}.crt"
  1694. # gitlab_pages['cert_key'] = "/etc/gitlab/ssl/#{Gitlab['gitlab_pages']['domain']}.key"
  1695.  
  1696. ##! Configure to use the default list of cipher suites
  1697. # gitlab_pages['insecure_ciphers'] = false
  1698.  
  1699. ##! Configure to enable health check endpoint on GitLab Pages
  1700. # gitlab_pages['status_uri'] = "/@status"
  1701.  
  1702. ##! Tune the maximum number of concurrent connections GitLab Pages will handle.
  1703. ##! Default to 0 for unlimited connections.
  1704. # gitlab_pages['max_connections'] = 0
  1705.  
  1706. ##! Configure the maximum length of URIs accepted by GitLab Pages
  1707. ##! By default is limited for security reasons. Set 0 for unlimited
  1708. # gitlab_pages['max_uri_length'] = 1024
  1709.  
  1710. ##! Setting the propagate_correlation_id to true allows installations behind a reverse proxy
  1711. ##! generate and set a correlation ID to requests sent to GitLab Pages. If a reverse proxy
  1712. ##! sets the header value X-Request-ID, the value will be propagated in the request chain.
  1713. # gitlab_pages['propagate_correlation_id'] = false
  1714.  
  1715. ##! Configure to use JSON structured logging in GitLab Pages
  1716. # gitlab_pages['log_format'] = "json"
  1717.  
  1718. ##! Configure verbose logging for GitLab Pages
  1719. # gitlab_pages['log_verbose'] = false
  1720.  
  1721. ##! Error Reporting and Logging with Sentry
  1722. # gitlab_pages['sentry_enabled'] = false
  1723. # gitlab_pages['sentry_dsn'] = 'https://<key>@sentry.io/<project>'
  1724. # gitlab_pages['sentry_environment'] = 'production'
  1725.  
  1726. ##! Listen for requests forwarded by reverse proxy
  1727. # gitlab_pages['listen_proxy'] = "localhost:8090"
  1728.  
  1729. # gitlab_pages['redirect_http'] = true
  1730. # gitlab_pages['use_http2'] = true
  1731. # gitlab_pages['dir'] = "/var/opt/gitlab/gitlab-pages"
  1732. # gitlab_pages['log_directory'] = "/var/log/gitlab/gitlab-pages"
  1733.  
  1734. # gitlab_pages['artifacts_server'] = true
  1735. # gitlab_pages['artifacts_server_url'] = nil # Defaults to external_url + '/api/v4'
  1736. # gitlab_pages['artifacts_server_timeout'] = 10
  1737.  
  1738. ##! Prometheus metrics for Pages docs: https://gitlab.com/gitlab-org/gitlab-pages/#enable-prometheus-metrics
  1739. # gitlab_pages['metrics_address'] = ":9235"
  1740.  
  1741. ##! Specifies the minimum TLS version ("tls1.2" or "tls1.3")
  1742. # gitlab_pages['tls_min_version'] = "tls1.2"
  1743.  
  1744. ##! Specifies the maximum TLS version ("tls1.2" or "tls1.3")
  1745. # gitlab_pages['tls_max_version'] = "tls1.3"
  1746.  
  1747. ##! Pages access control
  1748. # gitlab_pages['access_control'] = false
  1749. # gitlab_pages['gitlab_id'] = nil # Automatically generated if not present
  1750. # gitlab_pages['gitlab_secret'] = nil # Generated if not present
  1751. # gitlab_pages['auth_redirect_uri'] = nil # Defaults to projects subdomain of pages_external_url and + '/auth'
  1752. # gitlab_pages['gitlab_server'] = nil # Defaults to external_url
  1753. # gitlab_pages['internal_gitlab_server'] = nil # Defaults to gitlab_server, can be changed to internal load balancer
  1754. # gitlab_pages['auth_secret'] = nil # Generated if not present
  1755. # gitlab_pages['auth_scope'] = nil # Defaults to api, can be changed to read_api to increase security
  1756. # gitlab_pages['auth_cookie_session_timeout'] = "10m" # Authentication cookie session timeout (truncated to seconds). A zero value means the cookie will be deleted after the browser session ends
  1757.  
  1758. ##! GitLab Pages Server Shutdown Timeout
  1759. ##! Duration ("30s" for 30 seconds)
  1760. # gitlab_pages['server_shutdown_timeout'] = "30s"
  1761.  
  1762. ##! GitLab API HTTP client connection timeout
  1763. # gitlab_pages['gitlab_client_http_timeout'] = "10s"
  1764.  
  1765. ##! GitLab API JWT Token expiry time
  1766. # gitlab_pages['gitlab_client_jwt_expiry'] = "30s"
  1767.  
  1768. ##! Advanced settings for API-based configuration for GitLab Pages.
  1769. ##! The recommended default values are set inside GitLab Pages.
  1770. ##! Should be changed only if absolutely needed.
  1771.  
  1772. ##! The maximum time a domain's configuration is stored in the cache.
  1773. # gitlab_pages['gitlab_cache_expiry'] = "600s"
  1774. ##! The interval at which a domain's configuration is set to be due to refresh (default: 60s).
  1775. # gitlab_pages['gitlab_cache_refresh'] = "60s"
  1776. ##! The interval at which expired items are removed from the cache (default: 60s).
  1777. # gitlab_pages['gitlab_cache_cleanup'] = "60s"
  1778. ##! The maximum time to wait for a response from the GitLab API per request.
  1779. # gitlab_pages['gitlab_retrieval_timeout'] = "30s"
  1780. ##! The interval to wait before retrying to resolve a domain's configuration via the GitLab API.
  1781. # gitlab_pages['gitlab_retrieval_interval'] = "1s"
  1782. ##! The maximum number of times to retry to resolve a domain's configuration via the API
  1783. # gitlab_pages['gitlab_retrieval_retries'] = 3
  1784.  
  1785. ##! Define custom gitlab-pages HTTP headers for the whole instance
  1786. # gitlab_pages['headers'] = []
  1787.  
  1788. ##! Shared secret used for authentication between Pages and GitLab
  1789. # gitlab_pages['api_secret_key'] = nil # Will be generated if not set. Base64 encoded and exactly 32 bytes long.
  1790.  
  1791. ##! Advanced settings for serving GitLab Pages from zip archives.
  1792. ##! The recommended default values are set inside GitLab Pages.
  1793. ##! Should be changed only if absolutely needed.
  1794.  
  1795. ##! The maximum time an archive will be cached in memory.
  1796. # gitlab_pages['zip_cache_expiration'] = "60s"
  1797. ##! Zip archive cache cleaning interval.
  1798. # gitlab_pages['zip_cache_cleanup'] = "30s"
  1799. ##! The interval to refresh a cache archive if accessed before expiring.
  1800. # gitlab_pages['zip_cache_refresh'] = "30s"
  1801. ##! The maximum amount of time it takes to open a zip archive from the file system or object storage.
  1802. # gitlab_pages['zip_open_timeout'] = "30s"
  1803. ##! Zip HTTP Client timeout
  1804. # gitlab_pages['zip_http_client_timeout'] = "30m"
  1805.  
  1806. ##! ReadTimeout is the maximum duration for reading the entire request, including the body. A zero or negative value means there will be no timeout.
  1807. # gitlab_pages['server_read_timeout'] = "5s"
  1808. ##! ReadHeaderTimeout is the amount of time allowed to read request headers. A zero or negative value means there will be no timeout.
  1809. # gitlab_pages['server_read_header_timeout'] = "1s"
  1810. ##! WriteTimeout is the maximum duration before timing out writes of the response. A zero or negative value means there will be no timeout.
  1811. # gitlab_pages['server_write_timeout'] = "5m"
  1812. ##! KeepAlive specifies the keep-alive period for network connections accepted by this listener. If zero, keep-alives are enabled if supported by the protocol and operating system. If negative, keep-alives are disabled.
  1813. # gitlab_pages['server_keep_alive'] = "15s"
  1814.  
  1815. ##! Enable serving content from disk instead of Object Storage
  1816. # gitlab_pages['enable_disk'] = nil
  1817.  
  1818. ##! Rate-limiting options below work in report-only mode:
  1819. ##! they only count rejected requests, but don't reject them
  1820. ##! enable `FF_ENABLE_RATE_LIMITER=true` environment variable to
  1821. ##! reject requests.
  1822.  
  1823. ##! Rate limits as described in https://docs.gitlab.com/ee/administration/pages/#rate-limits
  1824.  
  1825. ##! Rate limit HTTP requests per second from a single IP, 0 means is disabled
  1826. # gitlab_pages['rate_limit_source_ip'] = 50.0
  1827. ##! Rate limit HTTP requests from a single IP, maximum burst allowed per second
  1828. # gitlab_pages['rate_limit_source_ip_burst'] = 600
  1829. ##! Rate limit HTTP requests per second to a single domain, 0 means is disabled
  1830. # gitlab_pages['rate_limit_domain'] = 0
  1831. ##! Rate limit HTTP requests to a single domain, maximum burst allowed per second
  1832. # gitlab_pages['rate_limit_domain_burst'] = 10000
  1833.  
  1834. ##! Rate limit new TLS connections per second from a single IP, 0 means is disabled
  1835. # gitlab_pages['rate_limit_tls_source_ip'] = 50.0
  1836. ##! Rate limit new TLS connections from a single IP, maximum burst allowed per second
  1837. # gitlab_pages['rate_limit_tls_source_ip_burst'] = 600
  1838. ##!Rate limit new TLS connections per second from to a single domain, 0 means is disabled
  1839. # gitlab_pages['rate_limit_tls_domain'] = 0
  1840. ##! Rate limit new TLS connections to a single domain, maximum burst allowed per second
  1841. # gitlab_pages['rate_limit_tls_domain_burst'] = 10000
  1842.  
  1843. ##! The maximum size of the _redirects file, in bytes
  1844. # gitlab_pages['redirects_max_config_size'] = 65536
  1845. ##! The maximum number of path segments allowed in _redirects rules URLs
  1846. # gitlab_pages['redirects_max_path_segments'] = 25
  1847. ##! The maximum number of rules allowed in _redirects
  1848. # gitlab_pages['redirects_max_rule_count'] = 1000
  1849.  
  1850. # gitlab_pages['env_directory'] = "/opt/gitlab/etc/gitlab-pages/env"
  1851. # gitlab_pages['env'] = {
  1852. # 'SSL_CERT_DIR' => "#{node['package']['install-dir']}/embedded/ssl/certs/"
  1853. # }
  1854.  
  1855. ################################################################################
  1856. ## GitLab Pages NGINX
  1857. ################################################################################
  1858.  
  1859. # All the settings defined in the "GitLab Nginx" section are also available in
  1860. # this "GitLab Pages NGINX" section, using the key `pages_nginx`. However,
  1861. # those settings should be explicitly set. That is, settings given as
  1862. # `nginx['some_setting']` WILL NOT be automatically replicated as
  1863. # `pages_nginx['some_setting']` and should be set separately.
  1864.  
  1865. # Below you can find settings that are exclusive to "GitLab Pages NGINX"
  1866. # pages_nginx['enable'] = true
  1867.  
  1868. # gitlab_rails['pages_path'] = "/var/opt/gitlab/gitlab-rails/shared/pages"
  1869.  
  1870. ################################################################################
  1871. ## GitLab CI
  1872. ##! Docs: https://docs.gitlab.com/ee/ci/quick_start/
  1873. ################################################################################
  1874.  
  1875. # gitlab_ci['gitlab_ci_all_broken_builds'] = true
  1876. # gitlab_ci['gitlab_ci_add_pusher'] = true
  1877. # gitlab_ci['builds_directory'] = '/var/opt/gitlab/gitlab-ci/builds'
  1878.  
  1879. ################################################################################
  1880. ## GitLab Kubernetes Agent Server
  1881. ##! Docs: https://gitlab.com/gitlab-org/cluster-integration/gitlab-agent/blob/master/README.md
  1882. ################################################################################
  1883.  
  1884. ##! Settings used by the GitLab application
  1885. # gitlab_rails['gitlab_kas_enabled'] = true
  1886. # gitlab_rails['gitlab_kas_external_url'] = 'ws://gitlab.example.com/-/kubernetes-agent/'
  1887. # gitlab_rails['gitlab_kas_internal_url'] = 'grpc://localhost:8153'
  1888. # gitlab_rails['gitlab_kas_external_k8s_proxy_url'] = 'https://gitlab.example.com/-/kubernetes-agent/k8s-proxy/'
  1889.  
  1890. ##! Enable GitLab KAS
  1891. # gitlab_kas['enable'] = true
  1892.  
  1893. ##! Agent configuration for GitLab KAS
  1894. # gitlab_kas['agent_configuration_poll_period'] = 20
  1895. # gitlab_kas['agent_gitops_poll_period'] = 20
  1896. # gitlab_kas['agent_gitops_project_info_cache_ttl'] = 300
  1897. # gitlab_kas['agent_gitops_project_info_cache_error_ttl'] = 60
  1898. # gitlab_kas['agent_info_cache_ttl'] = 300
  1899. # gitlab_kas['agent_info_cache_error_ttl'] = 60
  1900.  
  1901. ##! Shared secret used for authentication between KAS and GitLab
  1902. # gitlab_kas['api_secret_key'] = nil # Will be generated if not set. Base64 encoded and exactly 32 bytes long.
  1903.  
  1904. ##! Shared secret used for authentication between different KAS instances in a multi-node setup
  1905. # gitlab_kas['private_api_secret_key'] = nil # Will be generated if not set. Base64 encoded and exactly 32 bytes long.
  1906.  
  1907. ##! Listen configuration for GitLab KAS
  1908. # gitlab_kas['listen_address'] = 'localhost:8150'
  1909. # gitlab_kas['listen_network'] = 'tcp'
  1910. # gitlab_kas['listen_websocket'] = true
  1911. # gitlab_kas['certificate_file'] = "/path/to/certificate.pem"
  1912. # gitlab_kas['key_file'] = "/path/to/key.pem"
  1913. # gitlab_kas['observability_listen_network'] = 'tcp'
  1914. # gitlab_kas['observability_listen_address'] = 'localhost:8151'
  1915. # gitlab_kas['internal_api_listen_network'] = 'tcp'
  1916. # gitlab_kas['internal_api_listen_address'] = 'localhost:8153'
  1917. # gitlab_kas['internal_api_certificate_file'] = "/path/to/certificate.pem"
  1918. # gitlab_kas['internal_api_key_file'] = "/path/to/key.pem"
  1919. # gitlab_kas['kubernetes_api_listen_address'] = 'localhost:8154'
  1920. # gitlab_kas['kubernetes_api_certificate_file'] = "/path/to/certificate.pem"
  1921. # gitlab_kas['kubernetes_api_key_file'] = "/path/to/key.pem"
  1922. # gitlab_kas['private_api_listen_network'] = 'tcp'
  1923. # gitlab_kas['private_api_listen_address'] = 'localhost:8155'
  1924. # gitlab_kas['private_api_certificate_file'] = "/path/to/certificate.pem"
  1925. # gitlab_kas['private_api_key_file'] = "/path/to/key.pem"
  1926.  
  1927. ##! Metrics configuration for GitLab KAS
  1928. # gitlab_kas['metrics_usage_reporting_period'] = 60
  1929.  
  1930. ##! Log configuration for GitLab KAS
  1931. # gitlab_kas['log_level'] = 'info'
  1932.  
  1933. ##! Environment variables for GitLab KAS
  1934. # gitlab_kas['env'] = {
  1935. # 'SSL_CERT_DIR' => "/opt/gitlab/embedded/ssl/certs/",
  1936. # # In a multi-node setup, this address MUST be reachable from other KAS instances. In a single-node setup, it can be on localhost for simplicity
  1937. # 'OWN_PRIVATE_API_URL' => 'grpc://localhost:8155'
  1938. # }
  1939.  
  1940. ##! Error Reporting and Logging with Sentry
  1941. # gitlab_kas['sentry_dsn'] = 'https://<key>@sentry.io/<project>'
  1942. # gitlab_kas['sentry_environment'] = 'production'
  1943.  
  1944. ##! Directories for GitLab KAS
  1945. # gitlab_kas['dir'] = '/var/opt/gitlab/gitlab-kas'
  1946. # gitlab_kas['log_directory'] = '/var/log/gitlab/gitlab-kas'
  1947. # gitlab_kas['env_directory'] = '/opt/gitlab/etc/gitlab-kas/env'
  1948.  
  1949. ################################################################################
  1950. ## GitLab Suggested Reviewers (EE Only)
  1951. ##! Docs: https://docs.gitlab.com/ee/user/project/merge_requests/reviews/#suggested-reviewers
  1952. ################################################################################
  1953.  
  1954. ##! Shared secret used for authentication between Suggested Reviewers and GitLab
  1955. # suggested_reviewers['api_secret_key'] = nil # Will be generated if not set. Base64 encoded and exactly 32 bytes long.
  1956.  
  1957. ################################################################################
  1958. ## GitLab Mattermost
  1959. ##! Docs: https://docs.gitlab.com/omnibus/gitlab-mattermost
  1960. ################################################################################
  1961.  
  1962. # mattermost_external_url 'http://mattermost.example.com'
  1963.  
  1964. # mattermost['enable'] = false
  1965. # mattermost['username'] = 'mattermost'
  1966. # mattermost['group'] = 'mattermost'
  1967. # mattermost['uid'] = nil
  1968. # mattermost['gid'] = nil
  1969. # mattermost['home'] = '/var/opt/gitlab/mattermost'
  1970. # mattermost['database_name'] = 'mattermost_production'
  1971. # mattermost['env'] = {
  1972. # 'SSL_CERT_DIR' => "/opt/gitlab/embedded/ssl/certs/"
  1973. # }
  1974. # mattermost['service_address'] = "127.0.0.1"
  1975. # mattermost['service_port'] = "8065"
  1976. # mattermost['service_site_url'] = nil
  1977. # mattermost['service_allowed_untrusted_internal_connections'] = ""
  1978. # mattermost['service_enable_api_team_deletion'] = true
  1979. # mattermost['team_site_name'] = "GitLab Mattermost"
  1980. # mattermost['sql_driver_name'] = 'mysql'
  1981. # mattermost['sql_data_source'] = "mmuser:mostest@tcp(dockerhost:3306)/mattermost_test?charset=utf8mb4,utf8"
  1982. # mattermost['log_file_directory'] = '/var/log/gitlab/mattermost/'
  1983. # mattermost['gitlab_enable'] = false
  1984. # mattermost['gitlab_id'] = "12345656"
  1985. # mattermost['gitlab_secret'] = "123456789"
  1986. # mattermost['gitlab_scope'] = ""
  1987. # mattermost['gitlab_auth_endpoint'] = "http://gitlab.example.com/oauth/authorize"
  1988. # mattermost['gitlab_token_endpoint'] = "http://gitlab.example.com/oauth/token"
  1989. # mattermost['gitlab_user_api_endpoint'] = "http://gitlab.example.com/api/v4/user"
  1990. # mattermost['file_directory'] = "/var/opt/gitlab/mattermost/data"
  1991. # mattermost['plugin_directory'] = "/var/opt/gitlab/mattermost/plugins"
  1992. # mattermost['plugin_client_directory'] = "/var/opt/gitlab/mattermost/client-plugins"
  1993.  
  1994. ################################################################################
  1995. ## Mattermost NGINX
  1996. ################################################################################
  1997.  
  1998. # All the settings defined in the "GitLab Nginx" section are also available in
  1999. # this "Mattermost NGINX" section, using the key `mattermost_nginx`. However,
  2000. # those settings should be explicitly set. That is, settings given as
  2001. # `nginx['some_setting']` WILL NOT be automatically replicated as
  2002. # `mattermost_nginx['some_setting']` and should be set separately.
  2003.  
  2004. # Below you can find settings that are exclusive to "Mattermost NGINX"
  2005. # mattermost_nginx['enable'] = false
  2006.  
  2007. # mattermost_nginx['custom_gitlab_mattermost_server_config'] = "location ^~ /foo-namespace/bar-project/raw/ {\n deny all;\n}\n"
  2008. # mattermost_nginx['proxy_set_headers'] = {
  2009. # "Host" => "$http_host",
  2010. # "X-Real-IP" => "$remote_addr",
  2011. # "X-Forwarded-For" => "$proxy_add_x_forwarded_for",
  2012. # "X-Frame-Options" => "SAMEORIGIN",
  2013. # "X-Forwarded-Proto" => "https",
  2014. # "X-Forwarded-Ssl" => "on",
  2015. # "Upgrade" => "$http_upgrade",
  2016. # "Connection" => "$connection_upgrade"
  2017. # }
  2018.  
  2019.  
  2020. ################################################################################
  2021. ## Registry NGINX
  2022. ################################################################################
  2023.  
  2024. # All the settings defined in the "GitLab Nginx" section are also available in
  2025. # this "Registry NGINX" section, using the key `registry_nginx`. However, those
  2026. # settings should be explicitly set. That is, settings given as
  2027. # `nginx['some_setting']` WILL NOT be automatically replicated as
  2028. # `registry_nginx['some_setting']` and should be set separately.
  2029.  
  2030. # Below you can find settings that are exclusive to "Registry NGINX"
  2031. # registry_nginx['enable'] = false
  2032.  
  2033. # registry_nginx['proxy_set_headers'] = {
  2034. # "Host" => "$http_host",
  2035. # "X-Real-IP" => "$remote_addr",
  2036. # "X-Forwarded-For" => "$proxy_add_x_forwarded_for",
  2037. # "X-Forwarded-Proto" => "https",
  2038. # "X-Forwarded-Ssl" => "on"
  2039. # }
  2040.  
  2041. # When the registry is automatically enabled using the same domain as `external_url`,
  2042. # it listens on this port
  2043. registry_nginx['listen_port'] = 80
  2044. registry_nginx['listen_https'] = false
  2045.  
  2046.  
  2047. ################################################################################
  2048. ## Prometheus
  2049. ##! Docs: https://docs.gitlab.com/ee/administration/monitoring/prometheus/
  2050. ################################################################################
  2051.  
  2052. ###! **To enable only Monitoring service in this machine, uncomment
  2053. ###! the line below.**
  2054. ###! Docs: https://docs.gitlab.com/ee/administration/high_availability
  2055. # monitoring_role['enable'] = true
  2056.  
  2057. # prometheus['enable'] = true
  2058. # prometheus['monitor_kubernetes'] = true
  2059. # prometheus['username'] = 'gitlab-prometheus'
  2060. # prometheus['group'] = 'gitlab-prometheus'
  2061. # prometheus['uid'] = nil
  2062. # prometheus['gid'] = nil
  2063. # prometheus['shell'] = '/bin/sh'
  2064. # prometheus['home'] = '/var/opt/gitlab/prometheus'
  2065. # prometheus['log_directory'] = '/var/log/gitlab/prometheus'
  2066. # prometheus['rules_files'] = ['/var/opt/gitlab/prometheus/rules/*.rules']
  2067. # prometheus['scrape_interval'] = 15
  2068. # prometheus['scrape_timeout'] = 15
  2069. # prometheus['external_labels'] = { }
  2070. # prometheus['env_directory'] = '/opt/gitlab/etc/prometheus/env'
  2071. # prometheus['env'] = {
  2072. # 'SSL_CERT_DIR' => "/opt/gitlab/embedded/ssl/certs/"
  2073. # }
  2074. #
  2075. ### Custom scrape configs
  2076. #
  2077. # Prometheus can scrape additional jobs via scrape_configs. The default automatically
  2078. # includes all of the exporters supported by the omnibus config.
  2079. #
  2080. # See: https://prometheus.io/docs/operating/configuration/#<scrape_config>
  2081. #
  2082. # Example:
  2083. #
  2084. # prometheus['scrape_configs'] = [
  2085. # {
  2086. # 'job_name': 'example',
  2087. # 'static_configs' => [
  2088. # 'targets' => ['hostname:port'],
  2089. # ],
  2090. # },
  2091. # ]
  2092. #
  2093. ### Custom alertmanager config
  2094. #
  2095. # To configure external alertmanagers, create an alertmanager config.
  2096. #
  2097. # See: https://prometheus.io/docs/prometheus/latest/configuration/configuration/#alertmanager_config
  2098. #
  2099. # prometheus['alertmanagers'] = [
  2100. # {
  2101. # 'static_configs' => [
  2102. # {
  2103. # 'targets' => [
  2104. # 'hostname:port'
  2105. # ]
  2106. # }
  2107. # ]
  2108. # }
  2109. # ]
  2110. #
  2111. ### Custom Prometheus flags
  2112. #
  2113. # prometheus['flags'] = {
  2114. # 'storage.tsdb.path' => "/var/opt/gitlab/prometheus/data",
  2115. # 'storage.tsdb.retention.time' => "15d",
  2116. # 'config.file' => "/var/opt/gitlab/prometheus/prometheus.yml"
  2117. # }
  2118.  
  2119. ##! Advanced settings. Should be changed only if absolutely needed.
  2120. # prometheus['listen_address'] = 'localhost:9090'
  2121. #
  2122.  
  2123. ##! Service name used to register Prometheus as a Consul service
  2124. # prometheus['consul_service_name'] = 'prometheus'
  2125. ##! Semantic metadata used when registering Prometheus as a Consul service
  2126. # prometheus['consul_service_meta'] = {}
  2127.  
  2128. ################################################################################
  2129. ###! **Only needed if Prometheus and Rails are not on the same server.**
  2130. ### For example, in a multi-node architecture, Prometheus will be installed on the monitoring node, while Rails will be on the Rails node.
  2131. ### https://docs.gitlab.com/ee/administration/monitoring/prometheus/index.html#using-an-external-prometheus-server
  2132. ### This value should be the address at which Prometheus is available to a GitLab Rails(Puma, Sidekiq) node.
  2133. ################################################################################
  2134. # gitlab_rails['prometheus_address'] = 'your.prom:9090'
  2135.  
  2136. ################################################################################
  2137. ## Prometheus Alertmanager
  2138. ################################################################################
  2139.  
  2140. # alertmanager['enable'] = true
  2141. # alertmanager['home'] = '/var/opt/gitlab/alertmanager'
  2142. # alertmanager['log_directory'] = '/var/log/gitlab/alertmanager'
  2143. # alertmanager['admin_email'] = 'admin@example.com'
  2144. # alertmanager['flags'] = {
  2145. # 'web.listen-address' => "localhost:9093",
  2146. # 'storage.path' => "/var/opt/gitlab/alertmanager/data",
  2147. # 'config.file' => "/var/opt/gitlab/alertmanager/alertmanager.yml"
  2148. # }
  2149. # alertmanager['env_directory'] = '/opt/gitlab/etc/alertmanager/env'
  2150. # alertmanager['env'] = {
  2151. # 'SSL_CERT_DIR' => "/opt/gitlab/embedded/ssl/certs/"
  2152. # }
  2153.  
  2154. ##! Advanced settings. Should be changed only if absolutely needed.
  2155. # alertmanager['listen_address'] = 'localhost:9093'
  2156. # alertmanager['global'] = {}
  2157.  
  2158. ################################################################################
  2159. ## Prometheus Node Exporter
  2160. ##! Docs: https://docs.gitlab.com/ee/administration/monitoring/prometheus/node_exporter.html
  2161. ################################################################################
  2162.  
  2163. # node_exporter['enable'] = true
  2164. # node_exporter['home'] = '/var/opt/gitlab/node-exporter'
  2165. # node_exporter['log_directory'] = '/var/log/gitlab/node-exporter'
  2166. # node_exporter['flags'] = {
  2167. # 'collector.textfile.directory' => "/var/opt/gitlab/node-exporter/textfile_collector"
  2168. # }
  2169. # node_exporter['env_directory'] = '/opt/gitlab/etc/node-exporter/env'
  2170. # node_exporter['env'] = {
  2171. # 'SSL_CERT_DIR' => "/opt/gitlab/embedded/ssl/certs/"
  2172. # }
  2173.  
  2174. ##! Advanced settings. Should be changed only if absolutely needed.
  2175. # node_exporter['listen_address'] = 'localhost:9100'
  2176.  
  2177. ##! Service name used to register Node Exporter as a Consul service
  2178. # node_exporter['consul_service_name'] = 'node-exporter'
  2179. ##! Semantic metadata used when registering Node Exporter as a Consul service
  2180. # node_exporter['consul_service_meta'] = {}
  2181.  
  2182. ################################################################################
  2183. ## Prometheus Redis exporter
  2184. ##! Docs: https://docs.gitlab.com/ee/administration/monitoring/prometheus/redis_exporter.html
  2185. ################################################################################
  2186.  
  2187. # redis_exporter['enable'] = true
  2188. # redis_exporter['log_directory'] = '/var/log/gitlab/redis-exporter'
  2189. # redis_exporter['flags'] = {
  2190. # 'redis.addr' => "unix:///var/opt/gitlab/redis/redis.socket",
  2191. # }
  2192. # redis_exporter['env_directory'] = '/opt/gitlab/etc/redis-exporter/env'
  2193. # redis_exporter['env'] = {
  2194. # 'SSL_CERT_DIR' => "/opt/gitlab/embedded/ssl/certs/"
  2195. # }
  2196.  
  2197. ##! Advanced settings. Should be changed only if absolutely needed.
  2198. # redis_exporter['listen_address'] = 'localhost:9121'
  2199.  
  2200. ##! Service name used to register Redis Exporter as a Consul service
  2201. # redis_exporter['consul_service_name'] = 'redis-exporter'
  2202. ##! Semantic metadata used when registering Redis Exporter as a Consul service
  2203. # redis_exporter['consul_service_meta'] = {}
  2204.  
  2205. ################################################################################
  2206. ## Prometheus Postgres exporter
  2207. ##! Docs: https://docs.gitlab.com/ee/administration/monitoring/prometheus/postgres_exporter.html
  2208. ################################################################################
  2209.  
  2210. # postgres_exporter['enable'] = true
  2211. # postgres_exporter['home'] = '/var/opt/gitlab/postgres-exporter'
  2212. # postgres_exporter['log_directory'] = '/var/log/gitlab/postgres-exporter'
  2213. # postgres_exporter['flags'] = {}
  2214. # postgres_exporter['listen_address'] = 'localhost:9187'
  2215. # postgres_exporter['env_directory'] = '/opt/gitlab/etc/postgres-exporter/env'
  2216. # postgres_exporter['env'] = {
  2217. # 'SSL_CERT_DIR' => "/opt/gitlab/embedded/ssl/certs/"
  2218. # }
  2219. # postgres_exporter['sslmode'] = nil
  2220. # postgres_exporter['per_table_stats'] = false
  2221.  
  2222. ##! Service name used to register Postgres Exporter as a Consul service
  2223. # postgres_exporter['consul_service_name'] = 'postgres-exporter'
  2224. ##! Semantic metadata used when registering Postgres Exporter as a Consul service
  2225. # postgres_exporter['consul_service_meta'] = {}
  2226.  
  2227. ################################################################################
  2228. ## Prometheus PgBouncer exporter (EE only)
  2229. ##! Docs: https://docs.gitlab.com/ee/administration/monitoring/prometheus/pgbouncer_exporter.html
  2230. ################################################################################
  2231.  
  2232. # pgbouncer_exporter['enable'] = false
  2233. # pgbouncer_exporter['log_directory'] = "/var/log/gitlab/pgbouncer-exporter"
  2234. # pgbouncer_exporter['listen_address'] = 'localhost:9188'
  2235. # pgbouncer_exporter['env_directory'] = '/opt/gitlab/etc/pgbouncer-exporter/env'
  2236. # pgbouncer_exporter['env'] = {
  2237. # 'SSL_CERT_DIR' => "/opt/gitlab/embedded/ssl/certs/"
  2238. # }
  2239.  
  2240. ################################################################################
  2241. ## Prometheus Gitlab exporter
  2242. ##! Docs: https://docs.gitlab.com/ee/administration/monitoring/prometheus/gitlab_exporter.html
  2243. ################################################################################
  2244.  
  2245.  
  2246. # gitlab_exporter['enable'] = true
  2247. # gitlab_exporter['log_directory'] = "/var/log/gitlab/gitlab-exporter"
  2248. # gitlab_exporter['home'] = "/var/opt/gitlab/gitlab-exporter"
  2249.  
  2250. ##! Advanced settings. Should be changed only if absolutely needed.
  2251. # gitlab_exporter['server_name'] = 'webrick'
  2252. # gitlab_exporter['listen_address'] = 'localhost'
  2253. # gitlab_exporter['listen_port'] = '9168'
  2254.  
  2255. ##! TLS settings.
  2256. # gitlab_exporter['tls_enabled'] = false
  2257. # gitlab_exporter['tls_cert_path'] = '/etc/gitlab/ssl/gitlab-exporter.crt'
  2258. # gitlab_exporter['tls_key_path'] = '/etc/gitlab/ssl/gitlab-exporter.key'
  2259.  
  2260. ##! Prometheus scrape related configs
  2261. # gitlab_exporter['prometheus_scrape_scheme'] = 'http'
  2262. # gitlab_exporter['prometheus_scrape_tls_server_name'] = 'localhost'
  2263. # gitlab_exporter['prometheus_scrape_tls_skip_verification'] = false
  2264.  
  2265. ##! Manage gitlab-exporter sidekiq probes. false by default when Sentinels are
  2266. ##! found.
  2267. # gitlab_exporter['probe_sidekiq'] = true
  2268.  
  2269. ##! Manage gitlab-exporter elasticsearch probes. Add authorization header if security
  2270. ##! is enabled.
  2271. # gitlab_exporter['probe_elasticsearch'] = false
  2272. # gitlab_exporter['elasticsearch_url'] = 'http://localhost:9200'
  2273. # gitlab_exporter['elasticsearch_authorization'] = 'Basic <yourbase64encodedcredentials>'
  2274.  
  2275. ##! Service name used to register GitLab Exporter as a Consul service
  2276. # gitlab_exporter['consul_service_name'] = 'gitlab-exporter'
  2277. ##! Semantic metadata used when registering GitLab Exporter as a Consul service
  2278. # gitlab_exporter['consul_service_meta'] = {}
  2279.  
  2280. # To completely disable prometheus, and all of it's exporters, set to false
  2281. # prometheus_monitoring['enable'] = true
  2282.  
  2283. ################################################################################
  2284. ## Grafana Dashboards
  2285. ##! Docs: https://docs.gitlab.com/ee/administration/monitoring/prometheus/#prometheus-as-a-grafana-data-source
  2286. ################################################################################
  2287.  
  2288. # grafana['enable'] = false
  2289. # grafana['log_directory'] = '/var/log/gitlab/grafana'
  2290. # grafana['home'] = '/var/opt/gitlab/grafana'
  2291. # grafana['admin_password'] = 'admin'
  2292. # grafana['allow_user_sign_up'] = false
  2293. # grafana['basic_auth_enabled'] = false
  2294. # grafana['disable_login_form'] = true
  2295. # grafana['gitlab_application_id'] = 'GITLAB_APPLICATION_ID'
  2296. # grafana['gitlab_secret'] = 'GITLAB_SECRET'
  2297. # grafana['env_directory'] = '/opt/gitlab/etc/grafana/env'
  2298. # grafana['allowed_groups'] = []
  2299. # grafana['gitlab_auth_sign_up'] = true
  2300. # grafana['env'] = {
  2301. # 'SSL_CERT_DIR' => "#{node['package']['install-dir']}/embedded/ssl/certs/"
  2302. # }
  2303. # grafana['metrics_enabled'] = false
  2304. # grafana['metrics_basic_auth_username'] = 'grafana_metrics' # default: nil
  2305. # grafana['metrics_basic_auth_password'] = 'please_set_a_unique_password' # default: nil
  2306. # grafana['alerting_enabled'] = false
  2307.  
  2308. ### SMTP Configuration
  2309. #
  2310. # See: http://docs.grafana.org/administration/configuration/#smtp
  2311. #
  2312. # grafana['smtp'] = {
  2313. # 'enabled' => true,
  2314. # 'host' => 'localhost:25',
  2315. # 'user' => nil,
  2316. # 'password' => nil,
  2317. # 'cert_file' => nil,
  2318. # 'key_file' => nil,
  2319. # 'skip_verify' => false,
  2320. # 'from_address' => 'admin@grafana.localhost',
  2321. # 'from_name' => 'Grafana',
  2322. # 'ehlo_identity' => 'dashboard.example.com',
  2323. # 'startTLS_policy' => nil
  2324. # }
  2325.  
  2326. # Grafana usage reporting defaults to gitlab_rails['usage_ping_enabled']
  2327. # grafana['reporting_enabled'] = true
  2328.  
  2329. ### Dashboards
  2330. #
  2331. # See: http://docs.grafana.org/administration/provisioning/#dashboards
  2332. #
  2333. # NOTE: Setting this will override the default.
  2334. #
  2335. # grafana['dashboards'] = [
  2336. # {
  2337. # 'name' => 'GitLab Omnibus',
  2338. # 'orgId' => 1,
  2339. # 'folder' => 'GitLab Omnibus',
  2340. # 'type' => 'file',
  2341. # 'disableDeletion' => true,
  2342. # 'updateIntervalSeconds' => 600,
  2343. # 'options' => {
  2344. # 'path' => '/opt/gitlab/embedded/service/grafana-dashboards',
  2345. # }
  2346. # }
  2347. # ]
  2348.  
  2349. ### Datasources
  2350. #
  2351. # See: http://docs.grafana.org/administration/provisioning/#example-datasource-config-file
  2352. #
  2353. # NOTE: Setting this will override the default.
  2354. #
  2355. # grafana['datasources'] = [
  2356. # {
  2357. # 'name' => 'GitLab Omnibus',
  2358. # 'type' => 'prometheus',
  2359. # 'access' => 'proxy',
  2360. # 'url' => 'http://localhost:9090'
  2361. # }
  2362. # ]
  2363.  
  2364. ##! Advanced settings. Should be changed only if absolutely needed.
  2365. # grafana['http_addr'] = 'localhost'
  2366. # grafana['http_port'] = 3000
  2367.  
  2368. ################################################################################
  2369. ## Gitaly
  2370. ##! Docs:
  2371. ################################################################################
  2372.  
  2373. # The gitaly['enable'] option exists for the purpose of cluster
  2374. # deployments, see https://docs.gitlab.com/ee/administration/gitaly/index.html .
  2375. gitaly['enable'] = false
  2376. # gitaly['dir'] = "/var/opt/gitlab/gitaly"
  2377. # gitaly['log_directory'] = "/var/log/gitlab/gitaly"
  2378. # gitaly['bin_path'] = "/opt/gitlab/embedded/bin/gitaly"
  2379. # gitaly['env_directory'] = "/opt/gitlab/etc/gitaly/env"
  2380. # gitaly['env'] = {
  2381. # 'PATH' => "/opt/gitlab/bin:/opt/gitlab/embedded/bin:/bin:/usr/bin",
  2382. # 'HOME' => '/var/opt/gitlab',
  2383. # 'TZ' => ':/etc/localtime',
  2384. # 'PYTHONPATH' => "/opt/gitlab/embedded/lib/python3.9/site-packages",
  2385. # 'ICU_DATA' => "/opt/gitlab/embedded/share/icu/current",
  2386. # 'SSL_CERT_DIR' => "/opt/gitlab/embedded/ssl/certs/",
  2387. # 'WRAPPER_JSON_LOGGING' => true
  2388. # }
  2389.  
  2390. # gitaly['runtime_dir'] = "/var/opt/gitlab/gitaly/run"
  2391. # gitaly['socket_path'] = "/var/opt/gitlab/gitaly/gitaly.socket"
  2392. # gitaly['listen_addr'] = "localhost:8075"
  2393. # gitaly['tls_listen_addr'] = "localhost:9075"
  2394. # gitaly['certificate_path'] = "/var/opt/gitlab/gitaly/certificate.pem"
  2395. # gitaly['key_path'] = "/var/opt/gitlab/gitaly/key.pem"
  2396. # gitaly['gpg_signing_key_path'] = "/var/opt/gitlab/gitaly/signing_key.gpg"
  2397. # gitaly['prometheus_listen_addr'] = "localhost:9236"
  2398. # gitaly['logging_level'] = "warn"
  2399. # gitaly['logging_format'] = "json"
  2400. # gitaly['logging_sentry_dsn'] = "https://<key>:<secret>@sentry.io/<project>"
  2401. # gitaly['logging_ruby_sentry_dsn'] = "https://<key>:<secret>@sentry.io/<project>"
  2402. # gitaly['logging_sentry_environment'] = "production"
  2403. # gitaly['prometheus_grpc_latency_buckets'] = "[0.001, 0.005, 0.025, 0.1, 0.5, 1.0, 10.0, 30.0, 60.0, 300.0, 1500.0]"
  2404. # gitaly['auth_token'] = '<secret>'
  2405. # gitaly['auth_transitioning'] = false # When true, auth is logged to Prometheus but NOT enforced
  2406. # gitaly['graceful_restart_timeout'] = '1m' # Grace time for a gitaly process to finish ongoing requests
  2407. # gitaly['git_catfile_cache_size'] = 100 # Number of 'git cat-file' processes kept around for re-use
  2408. # gitaly['git_bin_path'] = "/opt/gitlab/embedded/bin/git" # A custom path for the 'git' executable
  2409. # gitaly['use_bundled_git'] = true # Whether to use bundled Git.
  2410. # gitaly['open_files_ulimit'] = 15000 # Maximum number of open files allowed for the gitaly process
  2411. # gitaly['ruby_max_rss'] = 300000000 # RSS threshold in bytes for triggering a gitaly-ruby restart
  2412. # gitaly['ruby_graceful_restart_timeout'] = '10m' # Grace time for a gitaly-ruby process to finish ongoing requests
  2413. # gitaly['ruby_restart_delay'] = '5m' # Period of sustained high RSS that needs to be observed before restarting gitaly-ruby
  2414. # gitaly['ruby_num_workers'] = 3 # Number of gitaly-ruby worker processes. Minimum 2, default 2.
  2415. # gitaly['concurrency'] = [
  2416. # {
  2417. # 'rpc' => "/gitaly.SmartHTTPService/PostReceivePack",
  2418. # 'max_per_repo' => 20
  2419. # }, {
  2420. # 'rpc' => "/gitaly.SSHService/SSHUploadPack",
  2421. # 'max_per_repo' => 5
  2422. # }
  2423. # ]
  2424. # gitaly['rate_limiting'] = [
  2425. # {
  2426. # 'rpc' => "/gitaly.SmartHTTPService/PostReceivePack",
  2427. # 'interval' => '1m',
  2428. # 'burst' => 10
  2429. # }, {
  2430. # 'rpc' => "/gitaly.SSHService/SSHUploadPack",
  2431. # 'interval' => '1m',
  2432. # 'burst' => 5
  2433. # }
  2434. # ]
  2435. #
  2436. ## Gitaly knows to set up the required default configuration for spawned Git
  2437. ## commands automatically. It should thus not be required to configure anything
  2438. ## here, except in very special situations where you must e.g. tweak specific
  2439. ## performance-related settings or enable debugging facilities. It is not safe in
  2440. ## general to set Git configuration that may change Git output in ways that are
  2441. ## unexpected by Gitaly.
  2442. # gitaly['gitconfig'] = [
  2443. # { 'section': 'pack', 'key': 'threads', 'value': '4' }
  2444. # { 'section': 'http', 'subsection': 'http://example.com', 'key': 'proxy', 'value': 'http://example.proxy.com' }
  2445. # ]
  2446. #
  2447. # gitaly['daily_maintenance_start_hour'] = 22
  2448. # gitaly['daily_maintenance_start_minute'] = 30
  2449. # gitaly['daily_maintenance_duration'] = '30m'
  2450. # gitaly['daily_maintenance_storages'] = ["default"]
  2451. # gitaly['daily_maintenance_disabled'] = false
  2452. # gitaly['cgroups_mountpoint'] = '/sys/fs/cgroup'
  2453. # gitaly['cgroups_hierarchy_root'] = 'gitaly'
  2454. # gitaly['cgroups_memory_bytes'] = 1048576
  2455. # gitaly['cgroups_cpu_shares'] = 512
  2456. # gitaly['cgroups_repositories_count'] = 1000
  2457. # gitaly['cgroups_repositories_memory_bytes'] = 12884901888
  2458. # gitaly['cgroups_repositories_cpu_shares'] = 128
  2459. # gitaly['pack_objects_cache_enabled'] = true
  2460. # gitaly['pack_objects_cache_dir'] = '/var/opt/gitlab/git-data/repositories/+gitaly/PackObjectsCache'
  2461. # gitaly['pack_objects_cache_max_age'] = '5m'
  2462. # gitaly['custom_hooks_dir'] = "/var/opt/gitlab/gitaly/custom_hooks"
  2463.  
  2464. ##! Service name used to register Gitaly as a Consul service
  2465. # gitaly['consul_service_name'] = 'gitaly'
  2466. ##! Semantic metadata used when registering Gitaly as a Consul service
  2467. # gitaly['consul_service_meta'] = {}
  2468.  
  2469. ################################################################################
  2470. ## Praefect
  2471. ##! Docs: https://gitlab.com/gitlab-org/gitaly/blob/master/doc/design_ha.md
  2472. ################################################################################
  2473.  
  2474. # praefect['enable'] = false
  2475. # praefect['dir'] = "/var/opt/gitlab/praefect"
  2476. # praefect['log_directory'] = "/var/log/gitlab/praefect"
  2477. # praefect['env_directory'] = "/opt/gitlab/etc/praefect/env"
  2478. # praefect['env'] = {
  2479. # 'SSL_CERT_DIR' => "/opt/gitlab/embedded/ssl/certs/",
  2480. # 'GITALY_PID_FILE' => "/var/opt/gitlab/praefect/praefect.pid",
  2481. # 'WRAPPER_JSON_LOGGING' => true
  2482. # }
  2483. # praefect['wrapper_path'] = "/opt/gitlab/embedded/bin/gitaly-wrapper"
  2484. # praefect['failover_enabled'] = true
  2485. # praefect['auth_token'] = ""
  2486. # praefect['auth_transitioning'] = false
  2487. # praefect['listen_addr'] = "localhost:2305"
  2488. # praefect['tls_listen_addr'] = "localhost:3305"
  2489. # praefect['certificate_path'] = "/var/opt/gitlab/prafect/certificate.pem"
  2490. # praefect['key_path'] = "/var/opt/gitlab/prafect/key.pem"
  2491. # praefect['prometheus_listen_addr'] = "localhost:9652"
  2492. # praefect['prometheus_grpc_latency_buckets'] = "[0.001, 0.005, 0.025, 0.1, 0.5, 1.0, 10.0, 30.0, 60.0, 300.0, 1500.0]"
  2493. # praefect['logging_level'] = "warn"
  2494. # praefect['logging_format'] = "json"
  2495. # praefect['virtual_storages'] = {
  2496. # 'default' => {
  2497. # 'default_replication_factor' => 3,
  2498. # 'nodes' => {
  2499. # 'praefect-internal-0' => {
  2500. # 'address' => 'tcp://10.23.56.78:8075',
  2501. # 'token' => 'abc123'
  2502. # },
  2503. # 'praefect-internal-1' => {
  2504. # 'address' => 'tcp://10.76.23.31:8075',
  2505. # 'token' => 'xyz456'
  2506. # }
  2507. # }
  2508. # },
  2509. # 'alternative' => {
  2510. # 'nodes' => {
  2511. # 'praefect-internal-2' => {
  2512. # 'address' => 'tcp://10.34.1.16:8075',
  2513. # 'token' => 'abc321'
  2514. # },
  2515. # 'praefect-internal-3' => {
  2516. # 'address' => 'tcp://10.23.18.6:8075',
  2517. # 'token' => 'xyz890'
  2518. # }
  2519. # }
  2520. # }
  2521. # }
  2522. # praefect['background_verification_verification_interval'] = "72h"
  2523. # praefect['background_verification_delete_invalid_records'] = false
  2524. # praefect['sentry_dsn'] = "https://<key>:<secret>@sentry.io/<project>"
  2525. # praefect['sentry_environment'] = "production"
  2526. # praefect['auto_migrate'] = true
  2527. # praefect['database_host'] = 'postgres.external'
  2528. # praefect['database_port'] = 6432
  2529. # praefect['database_user'] = 'praefect'
  2530. # praefect['database_password'] = 'secret'
  2531. # praefect['database_dbname'] = 'praefect_production'
  2532. # praefect['database_sslmode'] = 'disable'
  2533. # praefect['database_sslcert'] = '/path/to/client-cert'
  2534. # praefect['database_sslkey'] = '/path/to/client-key'
  2535. # praefect['database_sslrootcert'] = '/path/to/rootcert'
  2536. # praefect['reconciliation_scheduling_interval'] = '5m'
  2537. # praefect['reconciliation_histogram_buckets'] = '[0.001, 0.005, 0.025, 0.1, 0.5, 1.0, 10.0]'
  2538. # praefect['database_direct_host'] = 'postgres.internal'
  2539. # praefect['database_direct_port'] = 5432
  2540. # praefect['database_direct_user'] = 'praefect'
  2541. # praefect['database_direct_password'] = 'secret'
  2542. # praefect['database_direct_dbname'] = 'praefect_production_direct'
  2543. # praefect['database_direct_sslmode'] = 'disable'
  2544. # praefect['database_direct_sslcert'] = '/path/to/client-cert'
  2545. # praefect['database_direct_sslkey'] = '/path/to/client-key'
  2546. # praefect['database_direct_sslrootcert'] = '/path/to/rootcert'
  2547. # praefect['graceful_stop_timeout'] = '1m'
  2548.  
  2549. ##! Service name used to register Praefect as a Consul service
  2550. # praefect['consul_service_name'] = 'praefect'
  2551. ##! Semantic metadata used when registering Praefect as a Consul service
  2552. # praefect['consul_service_meta'] = {}
  2553.  
  2554. ################################################################################
  2555. # Storage check
  2556. ################################################################################
  2557. # storage_check['enable'] = false
  2558. # storage_check['target'] = 'unix:///var/opt/gitlab/gitlab-rails/sockets/gitlab.socket'
  2559. # storage_check['log_directory'] = '/var/log/gitlab/storage-check'
  2560.  
  2561. ################################################################################
  2562. # Let's Encrypt integration
  2563. ################################################################################
  2564. # letsencrypt['enable'] = nil
  2565. # letsencrypt['contact_emails'] = [] # This should be an array of email addresses to add as contacts
  2566. # letsencrypt['group'] = 'root'
  2567. # letsencrypt['key_size'] = 2048
  2568. # letsencrypt['owner'] = 'root'
  2569. # letsencrypt['wwwroot'] = '/var/opt/gitlab/nginx/www'
  2570. # See http://docs.gitlab.com/omnibus/settings/ssl.html#automatic-renewal for more on these sesttings
  2571. # letsencrypt['auto_renew'] = true
  2572. # letsencrypt['auto_renew_hour'] = 0
  2573. # letsencrypt['auto_renew_minute'] = nil # Should be a number or cron expression, if specified.
  2574. # letsencrypt['auto_renew_day_of_month'] = "*/4"
  2575. # letsencrypt['auto_renew_log_directory'] = '/var/log/gitlab/lets-encrypt'
  2576.  
  2577. ##! Turn off automatic init system detection. To skip init detection in
  2578. ##! non-docker containers. Recommended not to change.
  2579. # package['detect_init'] = true
  2580.  
  2581. ##! Attempt to modify kernel paramaters. To skip this in containers where the
  2582. ##! relevant file system is read-only, set the value to false.
  2583. # package['modify_kernel_parameters'] = true
  2584.  
  2585. ##! Specify maximum number of tasks that can be created by the systemd unit
  2586. ##! Will be populated as TasksMax value to the unit file if user is on a systemd
  2587. ##! version that supports it (>= 227). Will be a no-op if user is not on systemd.
  2588. # package['systemd_tasks_max'] = 4915
  2589.  
  2590. ##! Settings to configure order of GitLab's systemd unit.
  2591. ##! Note: We do not recommend changing these values unless absolutely necessary
  2592. # package['systemd_after'] = 'multi-user.target'
  2593. # package['systemd_wanted_by'] = 'multi-user.target'
  2594. ################################################################################
  2595. ################################################################################
  2596. ## Configuration Settings for GitLab EE only ##
  2597. ################################################################################
  2598. ################################################################################
  2599.  
  2600.  
  2601. ################################################################################
  2602. ## Auxiliary cron jobs applicable to GitLab EE only
  2603. ################################################################################
  2604. #
  2605. # gitlab_rails['geo_repository_sync_worker_cron'] = "*/5 * * * *"
  2606. # gitlab_rails['geo_secondary_registry_consistency_worker'] = "* * * * *"
  2607. # gitlab_rails['geo_secondary_usage_data_cron_worker'] = "0 0 * * 0"
  2608. # gitlab_rails['geo_prune_event_log_worker_cron'] = "*/5 * * * *"
  2609. # gitlab_rails['geo_repository_verification_primary_batch_worker_cron'] = "*/5 * * * *"
  2610. # gitlab_rails['geo_repository_verification_secondary_scheduler_worker_cron'] = "*/5 * * * *"
  2611. # gitlab_rails['ldap_sync_worker_cron'] = "30 1 * * *"
  2612. # gitlab_rails['ldap_group_sync_worker_cron'] = "0 * * * *"
  2613. # gitlab_rails['historical_data_worker_cron'] = "0 12 * * *"
  2614. # gitlab_rails['elastic_index_bulk_cron'] = "*/1 * * * *"
  2615. # gitlab_rails['analytics_devops_adoption_create_all_snapshots_worker_cron'] = "0 4 * * 0"
  2616. # gitlab_rails['ci_runners_stale_group_runners_prune_worker_cron'] = "30 * * * *"
  2617.  
  2618. ################################################################################
  2619. ## Kerberos (EE Only)
  2620. ##! Docs: https://docs.gitlab.com/ee/integration/kerberos.html#http-git-access
  2621. ################################################################################
  2622.  
  2623. # gitlab_rails['kerberos_enabled'] = true
  2624. # gitlab_rails['kerberos_keytab'] = /etc/http.keytab
  2625. # gitlab_rails['kerberos_service_principal_name'] = HTTP/gitlab.example.com@EXAMPLE.COM
  2626. # gitlab_rails['kerberos_simple_ldap_linking_allowed_realms'] = ['example.com','kerberos.example.com']
  2627. # gitlab_rails['kerberos_use_dedicated_port'] = true
  2628. # gitlab_rails['kerberos_port'] = 8443
  2629. # gitlab_rails['kerberos_https'] = true
  2630.  
  2631. ################################################################################
  2632. ## Package repository
  2633. ##! Docs: https://docs.gitlab.com/ee/administration/packages/
  2634. ################################################################################
  2635.  
  2636. # gitlab_rails['packages_enabled'] = true
  2637. # gitlab_rails['packages_storage_path'] = "/var/opt/gitlab/gitlab-rails/shared/packages"
  2638. # gitlab_rails['packages_object_store_enabled'] = false
  2639. # gitlab_rails['packages_object_store_proxy_download'] = false
  2640. # gitlab_rails['packages_object_store_remote_directory'] = "packages"
  2641. # gitlab_rails['packages_object_store_connection'] = {
  2642. # 'provider' => 'AWS',
  2643. # 'region' => 'eu-west-1',
  2644. # 'aws_access_key_id' => 'AWS_ACCESS_KEY_ID',
  2645. # 'aws_secret_access_key' => 'AWS_SECRET_ACCESS_KEY',
  2646. # # # The below options configure an S3 compatible host instead of AWS
  2647. # # 'host' => 's3.amazonaws.com',
  2648. # # 'aws_signature_version' => 4, # For creation of signed URLs. Set to 2 if provider does not support v4.
  2649. # # 'endpoint' => 'https://s3.amazonaws.com', # default: nil - Useful for S3 compliant services such as DigitalOcean Spaces
  2650. # # 'path_style' => false # Use 'host/bucket_name/object' instead of 'bucket_name.host/object'
  2651. # }
  2652.  
  2653. ################################################################################
  2654. ## Dependency proxy
  2655. ##! Docs: https://docs.gitlab.com/ee/administration/packages/dependency_proxy.html
  2656. ################################################################################
  2657.  
  2658. # gitlab_rails['dependency_proxy_enabled'] = true
  2659. # gitlab_rails['dependency_proxy_storage_path'] = "/var/opt/gitlab/gitlab-rails/shared/dependency_proxy"
  2660. # gitlab_rails['dependency_proxy_object_store_enabled'] = false
  2661. # gitlab_rails['dependency_proxy_object_store_proxy_download'] = false
  2662. # gitlab_rails['dependency_proxy_object_store_remote_directory'] = "dependency_proxy"
  2663. # gitlab_rails['dependency_proxy_object_store_connection'] = {
  2664. # 'provider' => 'AWS',
  2665. # 'region' => 'eu-west-1',
  2666. # 'aws_access_key_id' => 'AWS_ACCESS_KEY_ID',
  2667. # 'aws_secret_access_key' => 'AWS_SECRET_ACCESS_KEY',
  2668. # # # The below options configure an S3 compatible host instead of AWS
  2669. # # 'host' => 's3.amazonaws.com',
  2670. # # 'aws_signature_version' => 4, # For creation of signed URLs. Set to 2 if provider does not support v4.
  2671. # # 'endpoint' => 'https://s3.amazonaws.com', # default: nil - Useful for S3 compliant services such as DigitalOcean Spaces
  2672. # # 'path_style' => false # Use 'host/bucket_name/object' instead of 'bucket_name.host/object'
  2673. # }
  2674.  
  2675. ################################################################################
  2676. ## GitLab Sentinel (EE Only)
  2677. ##! Docs: http://docs.gitlab.com/ce/administration/high_availability/redis.html#high-availability-with-sentinel
  2678. ################################################################################
  2679.  
  2680. ##! **Make sure you configured all redis['master_*'] keys above before
  2681. ##! continuing.**
  2682.  
  2683. ##! To enable Sentinel and disable all other services in this machine,
  2684. ##! uncomment the line below (if you've enabled Redis role, it will keep it).
  2685. ##! Docs: https://docs.gitlab.com/ee/administration/high_availability/redis.html
  2686. # redis_sentinel_role['enable'] = true
  2687.  
  2688. # sentinel['enable'] = true
  2689.  
  2690. ##! Bind to all interfaces, uncomment to specify an IP and bind to a single one
  2691. # sentinel['bind'] = '0.0.0.0'
  2692.  
  2693. ##! Uncomment to change default port
  2694. # sentinel['port'] = 26379
  2695.  
  2696. #### Support to run sentinels in a Docker or NAT environment
  2697. #####! Docs: https://redis.io/topics/sentinel#sentinel-docker-nat-and-possible-issues
  2698. # In an standard case, Sentinel will run in the same network service as Redis, so the same IP will be announce for Redis and Sentinel
  2699. # Only define these values if it is needed to announce for Sentinel a differen IP service than Redis
  2700. # sentinel['announce_ip'] = nil # If not defined, its value will be taken from redis['announce_ip'] or nil if not present
  2701. # sentinel['announce_port'] = nil # If not defined, its value will be taken from sentinel['port'] or nil if redis['announce_ip'] not present
  2702.  
  2703. ##! Quorum must reflect the amount of voting sentinels it take to start a
  2704. ##! failover.
  2705. ##! **Value must NOT be greater then the amount of sentinels.**
  2706. ##! The quorum can be used to tune Sentinel in two ways:
  2707. ##! 1. If a the quorum is set to a value smaller than the majority of Sentinels
  2708. ##! we deploy, we are basically making Sentinel more sensible to master
  2709. ##! failures, triggering a failover as soon as even just a minority of
  2710. ##! Sentinels is no longer able to talk with the master.
  2711. ##! 2. If a quorum is set to a value greater than the majority of Sentinels, we
  2712. ##! are making Sentinel able to failover only when there are a very large
  2713. ##! number (larger than majority) of well connected Sentinels which agree
  2714. ##! about the master being down.
  2715. # sentinel['quorum'] = 1
  2716.  
  2717. ### Consider unresponsive server down after x amount of ms.
  2718. # sentinel['down_after_milliseconds'] = 10000
  2719.  
  2720. ### Specifies the failover timeout in milliseconds.
  2721. ##! It is used in many ways:
  2722. ##!
  2723. ##! - The time needed to re-start a failover after a previous failover was
  2724. ##! already tried against the same master by a given Sentinel, is two
  2725. ##! times the failover timeout.
  2726. ##!
  2727. ##! - The time needed for a replica replicating to a wrong master according
  2728. ##! to a Sentinel current configuration, to be forced to replicate
  2729. ##! with the right master, is exactly the failover timeout (counting since
  2730. ##! the moment a Sentinel detected the misconfiguration).
  2731. ##!
  2732. ##! - The time needed to cancel a failover that is already in progress but
  2733. ##! did not produced any configuration change (REPLICAOF NO ONE yet not
  2734. ##! acknowledged by the promoted replica).
  2735. ##!
  2736. ##! - The maximum time a failover in progress waits for all the replicas to be
  2737. ##! reconfigured as replicas of the new master. However even after this time
  2738. ##! the replicas will be reconfigured by the Sentinels anyway, but not with
  2739. ##! the exact parallel-syncs progression as specified.
  2740. # sentinel['failover_timeout'] = 60000
  2741.  
  2742. ### Sentinel TLS settings
  2743. ###! To run Sentinel over TLS, specify values for the following settings
  2744. # sentinel['tls_port'] = nil
  2745. # sentinel['tls_cert_file'] = nil
  2746. # sentinel['tls_key_file'] = nil
  2747.  
  2748. ###! Other TLS related optional settings
  2749. # sentinel['tls_dh_params_file'] = nil
  2750. # sentinel['tls_ca_cert_dir'] = '/opt/gitlab/embedded/ssl/certs/'
  2751. # sentinel['tls_ca_cert_file'] = '/opt/gitlab/embedded/ssl/certs/cacert.pem'
  2752. # sentinel['tls_auth_clients'] = 'optional'
  2753. # sentinel['tls_replication'] = nil
  2754. # sentinel['tls_cluster'] = nil
  2755. # sentinel['tls_protocols'] = nil
  2756. # sentinel['tls_ciphers'] = nil
  2757. # sentinel['tls_ciphersuites'] = nil
  2758. # sentinel['tls_prefer_server_ciphers'] = nil
  2759. # sentinel['tls_session_caching'] = nil
  2760. # sentinel['tls_session_cache_size'] = nil
  2761. # sentinel['tls_session_cache_timeout'] = nil
  2762.  
  2763. ### Sentinel hostname support
  2764. ###! When enabled, Redis will leverage hostname support
  2765. ###! Generally this does not need to be changed as we determine this based on
  2766. ###! the provided input from `redis['announce_ip']`
  2767. ###! * This is configured to `true` when a fully qualified hostname is provided
  2768. ###! * This is configured to `false` when an IP address is provided
  2769. # sentinel['use_hostnames'] = <calculated>
  2770.  
  2771. ################################################################################
  2772. ## Additional Database Settings (EE only)
  2773. ##! Docs: https://docs.gitlab.com/ee/administration/database_load_balancing.html
  2774. ################################################################################
  2775. # gitlab_rails['db_load_balancing'] = { 'hosts' => ['secondary1.example.com'] }
  2776.  
  2777. ################################################################################
  2778. ## GitLab Geo
  2779. ##! Docs: https://docs.gitlab.com/ee/gitlab-geo
  2780. ################################################################################
  2781. ##! Geo roles 'geo_primary_role' and 'geo_secondary_role' are set above with
  2782. ##! other roles. For more information, see: https://docs.gitlab.com/omnibus/roles/index.html#roles.
  2783.  
  2784. # This is an optional identifier which Geo nodes can use to identify themselves.
  2785. # For example, if external_url is the same for two secondaries, you must specify
  2786. # a unique Geo node name for those secondaries.
  2787. #
  2788. # If it is blank, it defaults to external_url.
  2789. # gitlab_rails['geo_node_name'] = nil
  2790.  
  2791. # gitlab_rails['geo_registry_replication_enabled'] = true
  2792. # gitlab_rails['geo_registry_replication_primary_api_url'] = 'https://example.com:5050'
  2793.  
  2794.  
  2795. ################################################################################
  2796. ## GitLab Geo Secondary (EE only)
  2797. ################################################################################
  2798. # geo_secondary['auto_migrate'] = true
  2799. # geo_secondary['db_adapter'] = "postgresql"
  2800. # geo_secondary['db_encoding'] = "unicode"
  2801. # geo_secondary['db_collation'] = nil
  2802. # geo_secondary['db_database'] = "gitlabhq_geo_production"
  2803. # geo_secondary['db_username'] = "gitlab_geo"
  2804. # geo_secondary['db_password'] = nil
  2805. # geo_secondary['db_host'] = "/var/opt/gitlab/geo-postgresql"
  2806. # geo_secondary['db_port'] = 5431
  2807. # geo_secondary['db_socket'] = nil
  2808. # geo_secondary['db_sslmode'] = nil
  2809. # geo_secondary['db_sslcompression'] = 0
  2810. # geo_secondary['db_sslrootcert'] = nil
  2811. # geo_secondary['db_sslca'] = nil
  2812. # geo_secondary['db_prepared_statements'] = false
  2813. # geo_secondary['db_database_tasks'] = true
  2814.  
  2815. ################################################################################
  2816. ## GitLab Geo Secondary Tracking Database (EE only)
  2817. ################################################################################
  2818.  
  2819. # geo_postgresql['enable'] = false
  2820. # geo_postgresql['ha'] = false
  2821. # geo_postgresql['dir'] = '/var/opt/gitlab/geo-postgresql'
  2822. # geo_postgresql['pgbouncer_user'] = nil
  2823. # geo_postgresql['pgbouncer_user_password'] = nil
  2824. ##! `SQL_USER_PASSWORD_HASH` can be generated using the command `gitlab-ctl pg-password-md5 gitlab`
  2825. # geo_postgresql['sql_user_password'] = 'SQL_USER_PASSWORD_HASH'
  2826. # geo_postgresql['log_directory'] = '/var/log/gitlab/geo-postgresql'
  2827.  
  2828. ##! Automatically restart PostgreSQL service when version changes.
  2829. # geo_postgresql['auto_restart_on_version_change'] = true
  2830.  
  2831. ################################################################################
  2832. ## GitLab Geo Log Cursor Daemon (EE only)
  2833. ################################################################################
  2834.  
  2835. # geo_logcursor['log_directory'] = '/var/log/gitlab/geo-logcursor'
  2836.  
  2837. ################################################################################
  2838. ## Unleash
  2839. ##! These settings are for GitLab internal use.
  2840. ##! They are used to control feature flags during GitLab development.
  2841. ##! Docs: https://docs.gitlab.com/ee/development/feature_flags
  2842. ################################################################################
  2843. # gitlab_rails['feature_flags_unleash_enabled'] = false
  2844. # gitlab_rails['feature_flags_unleash_url'] = nil
  2845. # gitlab_rails['feature_flags_unleash_app_name'] = nil
  2846. # gitlab_rails['feature_flags_unleash_instance_id'] = nil
  2847.  
  2848. ################################################################################
  2849. # Pgbouncer (EE only)
  2850. # See [GitLab PgBouncer documentation](http://docs.gitlab.com/omnibus/settings/database.html#enabling-pgbouncer-ee-only)
  2851. # See the [PgBouncer page](https://pgbouncer.github.io/config.html) for details
  2852. ################################################################################
  2853. # pgbouncer['enable'] = false
  2854. # pgbouncer['log_directory'] = '/var/log/gitlab/pgbouncer'
  2855. # pgbouncer['data_directory'] = '/var/opt/gitlab/pgbouncer'
  2856. # pgbouncer['env_directory'] = '/opt/gitlab/etc/pgbouncer/env'
  2857. # pgbouncer['env'] = {
  2858. # 'SSL_CERT_DIR' => "/opt/gitlab/embedded/ssl/certs/"
  2859. # }
  2860. # pgbouncer['listen_addr'] = '0.0.0.0'
  2861. # pgbouncer['listen_port'] = '6432'
  2862. # pgbouncer['pool_mode'] = 'transaction'
  2863. # pgbouncer['server_reset_query'] = 'DISCARD ALL'
  2864. # pgbouncer['application_name_add_host'] = '1'
  2865. # pgbouncer['max_client_conn'] = '2048'
  2866. # pgbouncer['default_pool_size'] = '100'
  2867. # pgbouncer['min_pool_size'] = '0'
  2868. # pgbouncer['reserve_pool_size'] = '5'
  2869. # pgbouncer['reserve_pool_timeout'] = '5.0'
  2870. # pgbouncer['server_round_robin'] = '0'
  2871. # pgbouncer['log_connections'] = '0'
  2872. # pgbouncer['server_idle_timeout'] = '30'
  2873. # pgbouncer['dns_max_ttl'] = '15.0'
  2874. # pgbouncer['dns_zone_check_period'] = '0'
  2875. # pgbouncer['dns_nxdomain_ttl'] = '15.0'
  2876. # pgbouncer['admin_users'] = %w(gitlab-psql postgres pgbouncer)
  2877. # pgbouncer['stats_users'] = %w(gitlab-psql postgres pgbouncer)
  2878. # pgbouncer['ignore_startup_parameters'] = 'extra_float_digits'
  2879. # pgbouncer['databases'] = {
  2880. # DATABASE_NAME: {
  2881. # host: HOSTNAME,
  2882. # port: PORT
  2883. # user: USERNAME,
  2884. # password: PASSWORD
  2885. ###! generate this with `echo -n '$password + $username' | md5sum`
  2886. # }
  2887. # ...
  2888. # }
  2889. # pgbouncer['logfile'] = nil
  2890. # pgbouncer['unix_socket_dir'] = nil
  2891. # pgbouncer['unix_socket_mode'] = '0777'
  2892. # pgbouncer['unix_socket_group'] = nil
  2893. # pgbouncer['auth_type'] = 'md5'
  2894. # pgbouncer['auth_hba_file'] = nil
  2895. # pgbouncer['auth_query'] = 'SELECT username, password FROM public.pg_shadow_lookup($1)'
  2896. # pgbouncer['users'] = {
  2897. # USERNAME: {
  2898. # 'password': MD5_PASSWORD_HASH,
  2899. # }
  2900. # }
  2901. # postgresql['pgbouncer_user'] = nil
  2902. # postgresql['pgbouncer_user_password'] = nil
  2903. # pgbouncer['server_reset_query_always'] = 0
  2904. # pgbouncer['server_check_query'] = 'select 1'
  2905. # pgbouncer['server_check_delay'] = 30
  2906. # pgbouncer['max_db_connections'] = nil
  2907. # pgbouncer['max_user_connections'] = nil
  2908. # pgbouncer['syslog'] = 0
  2909. # pgbouncer['syslog_facility'] = 'daemon'
  2910. # pgbouncer['syslog_ident'] = 'pgbouncer'
  2911. # pgbouncer['log_disconnections'] = 1
  2912. # pgbouncer['log_pooler_errors'] = 1
  2913. # pgbouncer['stats_period'] = 60
  2914. # pgbouncer['verbose'] = 0
  2915. # pgbouncer['server_lifetime'] = 3600
  2916. # pgbouncer['server_connect_timeout'] = 15
  2917. # pgbouncer['server_login_retry'] = 15
  2918. # pgbouncer['query_timeout'] = 0
  2919. # pgbouncer['query_wait_timeout'] = 120
  2920. # pgbouncer['client_idle_timeout'] = 0
  2921. # pgbouncer['client_login_timeout'] = 60
  2922. # pgbouncer['autodb_idle_timeout'] = 3600
  2923. # pgbouncer['suspend_timeout'] = 10
  2924. # pgbouncer['idle_transaction_timeout'] = 0
  2925. # pgbouncer['pkt_buf'] = 4096
  2926. # pgbouncer['listen_backlog'] = 128
  2927. # pgbouncer['sbuf_loopcnt'] = 5
  2928. # pgbouncer['max_packet_size'] = 2147483647
  2929. # pgbouncer['tcp_defer_accept'] = 0
  2930. # pgbouncer['tcp_socket_buffer'] = 0
  2931. # pgbouncer['tcp_keepalive'] = 1
  2932. # pgbouncer['tcp_keepcnt'] = 0
  2933. # pgbouncer['tcp_keepidle'] = 0
  2934. # pgbouncer['tcp_keepintvl'] = 0
  2935. # pgbouncer['disable_pqexec'] = 0
  2936.  
  2937. ## Pgbouncer client TLS options
  2938. # pgbouncer['client_tls_sslmode'] = 'disable'
  2939. # pgbouncer['client_tls_ca_file'] = nil
  2940. # pgbouncer['client_tls_key_file'] = nil
  2941. # pgbouncer['client_tls_cert_file'] = nil
  2942. # pgbouncer['client_tls_protocols'] = 'all'
  2943. # pgbouncer['client_tls_dheparams'] = 'auto'
  2944. # pgbouncer['client_tls_ecdhcurve'] = 'auto'
  2945. #
  2946. ## Pgbouncer server TLS options
  2947. # pgbouncer['server_tls_sslmode'] = 'disable'
  2948. # pgbouncer['server_tls_ca_file'] = nil
  2949. # pgbouncer['server_tls_key_file'] = nil
  2950. # pgbouncer['server_tls_cert_file'] = nil
  2951. # pgbouncer['server_tls_protocols'] = 'all'
  2952. # pgbouncer['server_tls_ciphers'] = 'fast'
  2953.  
  2954. ################################################################################
  2955. # Patroni (EE only)
  2956. ################################################################################
  2957. # patroni['enable'] = false
  2958.  
  2959. # patroni['dir'] = '/var/opt/gitlab/patroni'
  2960. # patroni['ctl_command'] = '/opt/gitlab/embedded/bin/patronictl'
  2961.  
  2962. ## Patroni dynamic configuration settings
  2963. # patroni['loop_wait'] = 10
  2964. # patroni['ttl'] = 30
  2965. # patroni['retry_timeout'] = 10
  2966. # patroni['maximum_lag_on_failover'] = 1_048_576
  2967. # patroni['max_timelines_history'] = 0
  2968. # patroni['master_start_timeout'] = 300
  2969. # patroni['use_pg_rewind'] = true
  2970. # patroni['remove_data_directory_on_rewind_failure'] = false
  2971. # patroni['remove_data_directory_on_diverged_timelines'] = false
  2972. # patroni['use_slots'] = true
  2973. # patroni['replication_password'] = nil
  2974. # patroni['replication_slots'] = {}
  2975. # patroni['callbacks'] = {}
  2976. # patroni['recovery_conf'] = {}
  2977. # patroni['tags'] = {}
  2978.  
  2979. ## Standby cluster replication settings
  2980. # patroni['standby_cluster']['enable'] = false
  2981. # patroni['standby_cluster']['host'] = nil
  2982. # patroni['standby_cluster']['port'] = 5432
  2983. # patroni['standby_cluster']['primary_slot_name'] = nil
  2984.  
  2985. ## Global/Universal settings
  2986. # patroni['scope'] = 'gitlab-postgresql-ha'
  2987. # patroni['name'] = nil
  2988.  
  2989. ## Log settings
  2990. # patroni['log_directory'] = '/var/log/gitlab/patroni'
  2991. # patroni['log_level'] = 'INFO'
  2992.  
  2993. ## Consul specific settings
  2994. # patroni['consul']['url'] = 'http://127.0.0.1:8500'
  2995. # patroni['consul']['service_check_interval'] = '10s'
  2996. # patroni['consul']['register_service'] = true
  2997. # patroni['consul']['checks'] = []
  2998.  
  2999. ## PostgreSQL configuration override
  3000. # patroni['postgresql']['hot_standby'] = 'on'
  3001.  
  3002. ## The following must hold the same values on all nodes.
  3003. ## Leave unassined to use PostgreSQL's default values.
  3004. # patroni['postgresql']['wal_level'] = 'replica'
  3005. # patroni['postgresql']['wal_log_hints'] = 'on'
  3006. # patroni['postgresql']['max_worker_processes'] = 8
  3007. # patroni['postgresql']['max_locks_per_transaction'] = 64
  3008. # patroni['postgresql']['max_connections'] = 400
  3009. # patroni['postgresql']['checkpoint_timeout'] = 30
  3010.  
  3011. ## The following can hold different values on all nodes.
  3012. ## Leave unassined to use PostgreSQL's default values.
  3013. # patroni['postgresql']['wal_keep_segments'] = 8
  3014. # patroni['postgresql']['max_wal_senders'] = 5
  3015. # patroni['postgresql']['max_replication_slots'] = 5
  3016.  
  3017. ## Permanent replication slots for Streaming Replication
  3018. # patroni['replication_slots'] = {
  3019. # 'geo_secondary' => { 'type' => 'physical' }
  3020. # }
  3021.  
  3022. ## The address and port that Patroni API binds to and listens on.
  3023. # patroni['listen_address'] = nil
  3024. # patroni['port'] = '8008'
  3025.  
  3026. ## The address of the Patroni node that is advertized to other cluster
  3027. ## members to communicate with its API and PostgreSQL. If it is not specified,
  3028. ## it tries to use the first available private IP and falls back to the default
  3029. ## network interface.
  3030. # patroni['connect_address'] = nil
  3031.  
  3032. ## The port that Patroni API responds to other cluster members. This port is
  3033. ## advertized and by default is the same as patroni['port'].
  3034. # patroni['connect_port'] = '8008'
  3035.  
  3036. ## Specifies the set of hosts that are allowed to call unsafe REST API endpoints.
  3037. ## Each item can be an hostname, IP address, or CIDR address.
  3038. ## All hosts are allowed if this is unset.
  3039. # patroni['allowlist'] = []
  3040. # patroni['allowlist_include_members'] = false
  3041.  
  3042. ## The username and password to use for basic auth on write commands to the
  3043. ## Patroni API. If not specified then the API does not use basic auth.
  3044. # patroni['username'] = nil
  3045. # patroni['password'] = nil
  3046.  
  3047. ## TLS configuration for Patroni API. Both certificate and key files are
  3048. ## required to enable TLS. If not specified then the API uses plain HTTP.
  3049. # patroni['tls_certificate_file'] = nil
  3050. # patroni['tls_key_file'] = nil
  3051. # patroni['tls_key_password'] = nil
  3052. # patroni['tls_ca_file'] = nil
  3053. # patroni['tls_ciphers'] = nil
  3054. # patroni['tls_client_mode'] = nil
  3055. # patroni['tls_client_certificate_file'] = nil
  3056. # patroni['tls_client_key_file'] = nil
  3057. # patroni['tls_verify'] = true
  3058.  
  3059. ################################################################################
  3060. # Consul (EEP only)
  3061. ################################################################################
  3062. # consul['enable'] = false
  3063. # consul['dir'] = '/var/opt/gitlab/consul'
  3064. # consul['username'] = 'gitlab-consul'
  3065. # consul['group'] = 'gitlab-consul'
  3066. # consul['config_file'] = '/var/opt/gitlab/consul/config.json'
  3067. # consul['config_dir'] = '/var/opt/gitlab/consul/config.d'
  3068. # consul['data_dir'] = '/var/opt/gitlab/consul/data'
  3069. # consul['log_directory'] = '/var/log/gitlab/consul'
  3070. # consul['env_directory'] = '/opt/gitlab/etc/consul/env'
  3071. # consul['env'] = {
  3072. # 'SSL_CERT_DIR' => "/opt/gitlab/embedded/ssl/certs/"
  3073. # }
  3074. # consul['monitoring_service_discovery'] = false
  3075. # consul['node_name'] = nil
  3076. # consul['script_directory'] = '/var/opt/gitlab/consul/scripts'
  3077. # consul['configuration'] = {
  3078. # 'client_addr' => nil,
  3079. # 'datacenter' => 'gitlab_consul',
  3080. # 'enable_script_checks' => true,
  3081. # 'server' => false
  3082. # }
  3083. # consul['services'] = []
  3084. # consul['service_config'] = {
  3085. # 'postgresql' => {
  3086. # 'service' => {
  3087. # 'name' => "postgresql",
  3088. # 'address' => '',
  3089. # 'port' => 5432,
  3090. # 'checks' => [
  3091. # {
  3092. # 'script' => "/var/opt/gitlab/consul/scripts/check_postgresql",
  3093. # 'interval' => "10s"
  3094. # }
  3095. # ]
  3096. # }
  3097. # }
  3098. # }
  3099. # consul['watchers'] = []
  3100. #
  3101. # consul['custom_config_dir'] = '/path/to/service/configs/directory'
  3102. #
  3103.  
  3104. #### HTTP API ports
  3105. # consul['http_port'] = nil
  3106. # consul['https_port'] = nil
  3107.  
  3108. #### Gossip encryption
  3109. # consul['encryption_key'] = nil
  3110. # consul['encryption_verify_incoming'] = nil
  3111. # consul['encryption_verify_outgoing'] = nil
  3112.  
  3113. #### TLS settings
  3114. # consul['use_tls'] = false
  3115. # consul['tls_ca_file'] = nil
  3116. # consul['tls_certificate_file'] = nil
  3117. # consul['tls_key_file'] = nil
  3118. # consul['tls_verify_client'] = nil
  3119.  
  3120. ################################################################################
  3121. # Service desk email settings
  3122. ################################################################################
  3123. ### Service desk email
  3124. ###! Allow users to create new service desk issues by sending an email to
  3125. ###! service desk address.
  3126. ###! Docs: https://docs.gitlab.com/ee/user/project/service_desk.html
  3127. # gitlab_rails['service_desk_email_enabled'] = false
  3128.  
  3129. #### Service Desk Mailbox Settings (via `mail_room`)
  3130. #### Service Desk Email Address
  3131. ####! The email address including the `%{key}` placeholder that will be replaced
  3132. ####! to reference the item being replied to.
  3133. ####! **The placeholder can be omitted but if present, it must appear in the
  3134. ####! "user" part of the address (before the `@`).**
  3135. # gitlab_rails['service_desk_email_address'] = "contact_project+%{key}@gmail.com"
  3136.  
  3137. #### Service Desk Email account username
  3138. ####! **With third party providers, this is usually the full email address.**
  3139. ####! **With self-hosted email servers, this is usually the user part of the
  3140. ####! email address.**
  3141. # gitlab_rails['service_desk_email_email'] = "contact_project@gmail.com"
  3142.  
  3143. #### Service Desk Email account password
  3144. # gitlab_rails['service_desk_email_password'] = "[REDACTED]"
  3145.  
  3146. ####! The mailbox where service desk mail will end up. Usually "inbox".
  3147. # gitlab_rails['service_desk_email_mailbox_name'] = "inbox"
  3148. ####! The IDLE command timeout.
  3149. # gitlab_rails['service_desk_email_idle_timeout'] = 60
  3150. ####! The file name for internal `mail_room` JSON logfile
  3151. # gitlab_rails['service_desk_email_log_file'] = "/var/log/gitlab/mailroom/mail_room_json.log"
  3152.  
  3153. #### Service Desk IMAP Settings
  3154. # gitlab_rails['service_desk_email_host'] = "imap.gmail.com"
  3155. # gitlab_rails['service_desk_email_port'] = 993
  3156. # gitlab_rails['service_desk_email_ssl'] = true
  3157. # gitlab_rails['service_desk_email_start_tls'] = false
  3158.  
  3159. #### Inbox options (for Microsoft Graph)
  3160. # gitlab_rails['service_desk_email_inbox_method'] = 'microsoft_graph'
  3161. # gitlab_rails['service_desk_email_inbox_options'] = {
  3162. # 'tenant_id': 'YOUR-TENANT-ID',
  3163. # 'client_id': 'YOUR-CLIENT-ID',
  3164. # 'client_secret': 'YOUR-CLIENT-SECRET',
  3165. # 'poll_interval': 60 # Optional
  3166. # }
  3167.  
  3168. #### How service desk emails are delivered to Rails process. Accept either
  3169. #### sidekiq or webhook. The default config is webhook.
  3170. # gitlab_rails['service_desk_email_delivery_method'] = "webhook"
  3171.  
  3172. #### Token to authenticate webhook requests. The token must be exactly 32 bytes,
  3173. #### encoded with base64
  3174. # gitlab_rails['service_desk_email_auth_token'] = nil
  3175.  
  3176. ################################################################################
  3177. ## Spamcheck (EE only)
  3178. #################################################################################
  3179.  
  3180. # spamcheck['enable'] = false
  3181. # spamcheck['dir'] = '/var/opt/gitlab/spamcheck'
  3182. # spamcheck['port'] = 8001
  3183. # spamcheck['external_port'] = nil
  3184. # spamcheck['monitoring_address'] = ':8003'
  3185. # spamcheck['log_level'] = 'info'
  3186. # spamcheck['log_format'] = 'json'
  3187. # spamcheck['log_output'] = 'stdout'
  3188. # spamcheck['monitor_mode'] = false
  3189. # spamcheck['allowlist'] = {}
  3190. # spamcheck['denylist'] = {}
  3191. # spamcheck['log_directory'] = "/var/log/gitlab/spamcheck"
  3192. # spamcheck['env_directory'] = "/opt/gitlab/etc/spamcheck/env"
  3193. # spamcheck['env'] = {
  3194. # 'SSL_CERT_DIR' => '/opt/gitlab/embedded/ssl/cers'
  3195. # }
  3196. # spamcheck['classifier']['log_directory'] = "/var/log/gitlab/spam-classifier"
Add Comment
Please, Sign In to add comment