Playbooks to a new Lilik
You can not select more than 25 topics Topics must start with a letter or number, can include dashes ('-') and can be up to 35 characters long.

2371 lines
100 KiB

style and variables refactoring - Coherent quotation style Single quotes for text variable (even if implicit), no quotes for variable and conditional statements, if not required. - Some useful tags added: * ssh_certs renewal of server SSH certificates and configuration of authorized CA. * tls_pub renewal of public TLS certificates (let's encrypt) and certbot configuration. * tls_int renewal of internal TLS certificates (service authorizations) and configuration of authorized internal CA. *(ToDo: deployment of Certificate Revokation Lists)* * lxc deployment of new containers (deployment of configuration file excluded, for instance change in ip address are always applied and trigger a container restart even if you skip this tag. * packages installation and upgrade of software packages (apt, opkg or tarballs) * service_password create new random password for services-only password, for routine rotation. Not meant to be skipped (some roles need to know the service password, so they do a rotation). - prepare_host - ssh_server - lxc_guest - ldap - gitlab - x509_subject_prefix - x509_ldap_suffix *Replaces:* x509_suffix in ldap.yaml - letsencrypt_email Used in roles/certbot and roles/gitlab - root_ca_cert *Replaces:* ssl_ca_cert and files/lilik_x1.crt New defaults: - ldap_domain | default: `${domain}` - server_fqdn | default: `${hostname}.dmz.${domain}` *Replaces:* fqdn_domain Removed: - fqdn_dmain - x509_suffix *Replaced by:* x509_ldap_suffix in common New defaults: - server_fqdn | default: `${hostname}.${domain}` *Replaces*: fqdn - ldap_domain | default: `${domain}` - ldap_server | default: `ldap1.dmz.${domain}` - ldap_basedn | default: `dn(${ldap_domain})` - enable_https | default: `true` New defaults: - server_fqdn | default: `${hostname}.${domain}`
5 years ago
style and variables refactoring - Coherent quotation style Single quotes for text variable (even if implicit), no quotes for variable and conditional statements, if not required. - Some useful tags added: * ssh_certs renewal of server SSH certificates and configuration of authorized CA. * tls_pub renewal of public TLS certificates (let's encrypt) and certbot configuration. * tls_int renewal of internal TLS certificates (service authorizations) and configuration of authorized internal CA. *(ToDo: deployment of Certificate Revokation Lists)* * lxc deployment of new containers (deployment of configuration file excluded, for instance change in ip address are always applied and trigger a container restart even if you skip this tag. * packages installation and upgrade of software packages (apt, opkg or tarballs) * service_password create new random password for services-only password, for routine rotation. Not meant to be skipped (some roles need to know the service password, so they do a rotation). - prepare_host - ssh_server - lxc_guest - ldap - gitlab - x509_subject_prefix - x509_ldap_suffix *Replaces:* x509_suffix in ldap.yaml - letsencrypt_email Used in roles/certbot and roles/gitlab - root_ca_cert *Replaces:* ssl_ca_cert and files/lilik_x1.crt New defaults: - ldap_domain | default: `${domain}` - server_fqdn | default: `${hostname}.dmz.${domain}` *Replaces:* fqdn_domain Removed: - fqdn_dmain - x509_suffix *Replaced by:* x509_ldap_suffix in common New defaults: - server_fqdn | default: `${hostname}.${domain}` *Replaces*: fqdn - ldap_domain | default: `${domain}` - ldap_server | default: `ldap1.dmz.${domain}` - ldap_basedn | default: `dn(${ldap_domain})` - enable_https | default: `true` New defaults: - server_fqdn | default: `${hostname}.${domain}`
5 years ago
style and variables refactoring - Coherent quotation style Single quotes for text variable (even if implicit), no quotes for variable and conditional statements, if not required. - Some useful tags added: * ssh_certs renewal of server SSH certificates and configuration of authorized CA. * tls_pub renewal of public TLS certificates (let's encrypt) and certbot configuration. * tls_int renewal of internal TLS certificates (service authorizations) and configuration of authorized internal CA. *(ToDo: deployment of Certificate Revokation Lists)* * lxc deployment of new containers (deployment of configuration file excluded, for instance change in ip address are always applied and trigger a container restart even if you skip this tag. * packages installation and upgrade of software packages (apt, opkg or tarballs) * service_password create new random password for services-only password, for routine rotation. Not meant to be skipped (some roles need to know the service password, so they do a rotation). - prepare_host - ssh_server - lxc_guest - ldap - gitlab - x509_subject_prefix - x509_ldap_suffix *Replaces:* x509_suffix in ldap.yaml - letsencrypt_email Used in roles/certbot and roles/gitlab - root_ca_cert *Replaces:* ssl_ca_cert and files/lilik_x1.crt New defaults: - ldap_domain | default: `${domain}` - server_fqdn | default: `${hostname}.dmz.${domain}` *Replaces:* fqdn_domain Removed: - fqdn_dmain - x509_suffix *Replaced by:* x509_ldap_suffix in common New defaults: - server_fqdn | default: `${hostname}.${domain}` *Replaces*: fqdn - ldap_domain | default: `${domain}` - ldap_server | default: `ldap1.dmz.${domain}` - ldap_basedn | default: `dn(${ldap_domain})` - enable_https | default: `true` New defaults: - server_fqdn | default: `${hostname}.${domain}`
5 years ago
style and variables refactoring - Coherent quotation style Single quotes for text variable (even if implicit), no quotes for variable and conditional statements, if not required. - Some useful tags added: * ssh_certs renewal of server SSH certificates and configuration of authorized CA. * tls_pub renewal of public TLS certificates (let's encrypt) and certbot configuration. * tls_int renewal of internal TLS certificates (service authorizations) and configuration of authorized internal CA. *(ToDo: deployment of Certificate Revokation Lists)* * lxc deployment of new containers (deployment of configuration file excluded, for instance change in ip address are always applied and trigger a container restart even if you skip this tag. * packages installation and upgrade of software packages (apt, opkg or tarballs) * service_password create new random password for services-only password, for routine rotation. Not meant to be skipped (some roles need to know the service password, so they do a rotation). - prepare_host - ssh_server - lxc_guest - ldap - gitlab - x509_subject_prefix - x509_ldap_suffix *Replaces:* x509_suffix in ldap.yaml - letsencrypt_email Used in roles/certbot and roles/gitlab - root_ca_cert *Replaces:* ssl_ca_cert and files/lilik_x1.crt New defaults: - ldap_domain | default: `${domain}` - server_fqdn | default: `${hostname}.dmz.${domain}` *Replaces:* fqdn_domain Removed: - fqdn_dmain - x509_suffix *Replaced by:* x509_ldap_suffix in common New defaults: - server_fqdn | default: `${hostname}.${domain}` *Replaces*: fqdn - ldap_domain | default: `${domain}` - ldap_server | default: `ldap1.dmz.${domain}` - ldap_basedn | default: `dn(${ldap_domain})` - enable_https | default: `true` New defaults: - server_fqdn | default: `${hostname}.${domain}`
5 years ago
style and variables refactoring - Coherent quotation style Single quotes for text variable (even if implicit), no quotes for variable and conditional statements, if not required. - Some useful tags added: * ssh_certs renewal of server SSH certificates and configuration of authorized CA. * tls_pub renewal of public TLS certificates (let's encrypt) and certbot configuration. * tls_int renewal of internal TLS certificates (service authorizations) and configuration of authorized internal CA. *(ToDo: deployment of Certificate Revokation Lists)* * lxc deployment of new containers (deployment of configuration file excluded, for instance change in ip address are always applied and trigger a container restart even if you skip this tag. * packages installation and upgrade of software packages (apt, opkg or tarballs) * service_password create new random password for services-only password, for routine rotation. Not meant to be skipped (some roles need to know the service password, so they do a rotation). - prepare_host - ssh_server - lxc_guest - ldap - gitlab - x509_subject_prefix - x509_ldap_suffix *Replaces:* x509_suffix in ldap.yaml - letsencrypt_email Used in roles/certbot and roles/gitlab - root_ca_cert *Replaces:* ssl_ca_cert and files/lilik_x1.crt New defaults: - ldap_domain | default: `${domain}` - server_fqdn | default: `${hostname}.dmz.${domain}` *Replaces:* fqdn_domain Removed: - fqdn_dmain - x509_suffix *Replaced by:* x509_ldap_suffix in common New defaults: - server_fqdn | default: `${hostname}.${domain}` *Replaces*: fqdn - ldap_domain | default: `${domain}` - ldap_server | default: `ldap1.dmz.${domain}` - ldap_basedn | default: `dn(${ldap_domain})` - enable_https | default: `true` New defaults: - server_fqdn | default: `${hostname}.${domain}`
5 years ago
style and variables refactoring - Coherent quotation style Single quotes for text variable (even if implicit), no quotes for variable and conditional statements, if not required. - Some useful tags added: * ssh_certs renewal of server SSH certificates and configuration of authorized CA. * tls_pub renewal of public TLS certificates (let's encrypt) and certbot configuration. * tls_int renewal of internal TLS certificates (service authorizations) and configuration of authorized internal CA. *(ToDo: deployment of Certificate Revokation Lists)* * lxc deployment of new containers (deployment of configuration file excluded, for instance change in ip address are always applied and trigger a container restart even if you skip this tag. * packages installation and upgrade of software packages (apt, opkg or tarballs) * service_password create new random password for services-only password, for routine rotation. Not meant to be skipped (some roles need to know the service password, so they do a rotation). - prepare_host - ssh_server - lxc_guest - ldap - gitlab - x509_subject_prefix - x509_ldap_suffix *Replaces:* x509_suffix in ldap.yaml - letsencrypt_email Used in roles/certbot and roles/gitlab - root_ca_cert *Replaces:* ssl_ca_cert and files/lilik_x1.crt New defaults: - ldap_domain | default: `${domain}` - server_fqdn | default: `${hostname}.dmz.${domain}` *Replaces:* fqdn_domain Removed: - fqdn_dmain - x509_suffix *Replaced by:* x509_ldap_suffix in common New defaults: - server_fqdn | default: `${hostname}.${domain}` *Replaces*: fqdn - ldap_domain | default: `${domain}` - ldap_server | default: `ldap1.dmz.${domain}` - ldap_basedn | default: `dn(${ldap_domain})` - enable_https | default: `true` New defaults: - server_fqdn | default: `${hostname}.${domain}`
5 years ago
  1. ## GitLab configuration settings
  2. ##! This file is generated during initial installation and **is not** modified
  3. ##! during upgrades.
  4. ##! Check out the latest version of this file to know about the different
  5. ##! settings that can be configured by this file, which may be found at:
  6. ##! https://gitlab.com/gitlab-org/omnibus-gitlab/raw/master/files/gitlab-config-template/gitlab.rb.template
  7. ##! You can run `gitlab-ctl diff-config` to compare the contents of the current gitlab.rb with
  8. ##! the gitlab.rb.template from the currently running version.
  9. ##! You can run `gitlab-ctl show-config` to display the configuration that will be generated by
  10. ##! running `gitlab-ctl reconfigure`
  11. ##! In general, the values specified here should reflect what the default value of the attribute will be.
  12. ##! There are instances where this behavior is not possible or desired. For example, when providing passwords,
  13. ##! or connecting to third party services.
  14. ##! In those instances, we endeavour to provide an example configuration.
  15. ## GitLab URL
  16. ##! URL on which GitLab will be reachable.
  17. ##! For more details on configuring external_url see:
  18. ##! https://docs.gitlab.com/omnibus/settings/configuration.html#configuring-the-external-url-for-gitlab
  19. ##!
  20. ##! Note: During installation/upgrades, the value of the environment variable
  21. ##! EXTERNAL_URL will be used to populate/replace this value.
  22. ##! On AWS EC2 instances, we also attempt to fetch the public hostname/IP
  23. ##! address from AWS. For more details, see:
  24. ##! https://docs.aws.amazon.com/AWSEC2/latest/UserGuide/instancedata-data-retrieval.html
  25. {% if enable_https %}
  26. external_url 'https://{{ server_fqdn }}'
  27. {% else %}
  28. external_url 'http://{{ server_fqdn }}'
  29. {% endif %}
  30. ## Roles for multi-instance GitLab
  31. ##! The default is to have no roles enabled, which results in GitLab running as an all-in-one instance.
  32. ##! Options:
  33. ##! redis_sentinel_role redis_master_role redis_slave_role geo_primary_role geo_secondary_role
  34. ##! For more details on each role, see:
  35. ##! https://docs.gitlab.com/omnibus/roles/README.html#roles
  36. ##!
  37. # roles ['redis_sentinel_role', 'redis_master_role']
  38. ## Legend
  39. ##! The following notations at the beginning of each line may be used to
  40. ##! differentiate between components of this file and to easily select them using
  41. ##! a regex.
  42. ##! ## Titles, subtitles etc
  43. ##! ##! More information - Description, Docs, Links, Issues etc.
  44. ##! Configuration settings have a single # followed by a single space at the
  45. ##! beginning; Remove them to enable the setting.
  46. ##! **Configuration settings below are optional.**
  47. ################################################################################
  48. ################################################################################
  49. ## Configuration Settings for GitLab CE and EE ##
  50. ################################################################################
  51. ################################################################################
  52. ################################################################################
  53. ## gitlab.yml configuration
  54. ##! Docs: https://gitlab.com/gitlab-org/omnibus-gitlab/blob/master/doc/settings/gitlab.yml.md
  55. ################################################################################
  56. # gitlab_rails['gitlab_ssh_host'] = 'ssh.host_example.com'
  57. # gitlab_rails['gitlab_ssh_user'] = ''
  58. # gitlab_rails['time_zone'] = 'UTC'
  59. ### Request duration
  60. ###! Tells the rails application how long it has to complete a request
  61. ###! This value needs to be lower than the worker timeout set in unicorn/puma.
  62. ###! By default, we'll allow 95% of the the worker timeout
  63. # gitlab_rails['max_request_duration_seconds'] = 57
  64. ### Email Settings
  65. # gitlab_rails['gitlab_email_enabled'] = true
  66. # gitlab_rails['gitlab_email_from'] = 'example@example.com'
  67. # gitlab_rails['gitlab_email_display_name'] = 'Example'
  68. # gitlab_rails['gitlab_email_reply_to'] = 'noreply@example.com'
  69. # gitlab_rails['gitlab_email_subject_suffix'] = ''
  70. # gitlab_rails['gitlab_email_smime_enabled'] = false
  71. # gitlab_rails['gitlab_email_smime_key_file'] = '/etc/gitlab/ssl/gitlab_smime.key'
  72. # gitlab_rails['gitlab_email_smime_cert_file'] = '/etc/gitlab/ssl/gitlab_smime.crt'
  73. ### GitLab user privileges
  74. # gitlab_rails['gitlab_default_can_create_group'] = true
  75. # gitlab_rails['gitlab_username_changing_enabled'] = true
  76. ### Default Theme
  77. # gitlab_rails['gitlab_default_theme'] = 2
  78. ### Default project feature settings
  79. # gitlab_rails['gitlab_default_projects_features_issues'] = true
  80. # gitlab_rails['gitlab_default_projects_features_merge_requests'] = true
  81. # gitlab_rails['gitlab_default_projects_features_wiki'] = true
  82. # gitlab_rails['gitlab_default_projects_features_snippets'] = true
  83. # gitlab_rails['gitlab_default_projects_features_builds'] = true
  84. # gitlab_rails['gitlab_default_projects_features_container_registry'] = true
  85. ### Automatic issue closing
  86. ###! See https://docs.gitlab.com/ee/customization/issue_closing.html for more
  87. ###! information about this pattern.
  88. # gitlab_rails['gitlab_issue_closing_pattern'] = "\b((?:[Cc]los(?:e[sd]?|ing)|\b[Ff]ix(?:e[sd]|ing)?|\b[Rr]esolv(?:e[sd]?|ing)|\b[Ii]mplement(?:s|ed|ing)?)(:?) +(?:(?:issues? +)?%{issue_ref}(?:(?:, *| +and +)?)|([A-Z][A-Z0-9_]+-\d+))+)"
  89. ### Download location
  90. ###! When a user clicks e.g. 'Download zip' on a project, a temporary zip file
  91. ###! is created in the following directory.
  92. ###! Should not be the same path, or a sub directory of any of the `git_data_dirs`
  93. # gitlab_rails['gitlab_repository_downloads_path'] = 'tmp/repositories'
  94. ### Gravatar Settings
  95. # gitlab_rails['gravatar_plain_url'] = 'http://www.gravatar.com/avatar/%{hash}?s=%{size}&d=identicon'
  96. # gitlab_rails['gravatar_ssl_url'] = 'https://secure.gravatar.com/avatar/%{hash}?s=%{size}&d=identicon'
  97. ### Auxiliary jobs
  98. ###! Periodically executed jobs, to self-heal Gitlab, do external
  99. ###! synchronizations, etc.
  100. ###! Docs: https://github.com/ondrejbartas/sidekiq-cron#adding-cron-job
  101. ###! https://docs.gitlab.com/ee/ci/yaml/README.html#artifactsexpire_in
  102. # gitlab_rails['stuck_ci_jobs_worker_cron'] = "0 0 * * *"
  103. # gitlab_rails['expire_build_artifacts_worker_cron'] = "50 * * * *"
  104. # gitlab_rails['environments_auto_stop_cron_worker_cron'] = "24 * * * *"
  105. # gitlab_rails['pipeline_schedule_worker_cron'] = "19 * * * *"
  106. # gitlab_rails['ci_archive_traces_cron_worker_cron'] = "17 * * * *"
  107. # gitlab_rails['repository_check_worker_cron'] = "20 * * * *"
  108. # gitlab_rails['admin_email_worker_cron'] = "0 0 * * 0"
  109. # gitlab_rails['personal_access_tokens_expiring_worker_cron'] = "0 1 * * *"
  110. # gitlab_rails['repository_archive_cache_worker_cron'] = "0 * * * *"
  111. # gitlab_rails['pages_domain_verification_cron_worker'] = "*/15 * * * *"
  112. # gitlab_rails['pages_domain_ssl_renewal_cron_worker'] = "*/10 * * * *"
  113. # gitlab_rails['pages_domain_removal_cron_worker'] = "47 0 * * *"
  114. # gitlab_rails['schedule_migrate_external_diffs_worker_cron'] = "15 * * * *"
  115. ### Webhook Settings
  116. ###! Number of seconds to wait for HTTP response after sending webhook HTTP POST
  117. ###! request (default: 10)
  118. # gitlab_rails['webhook_timeout'] = 10
  119. ### GraphQL Settings
  120. ###! Tells the rails application how long it has to complete a GraphQL request.
  121. ###! We suggest this value to be higher than the database timeout value
  122. ###! and lower than the worker timeout set in unicorn/puma. (default: 30)
  123. # gitlab_rails['graphql_timeout'] = 30
  124. ### Trusted proxies
  125. ###! Customize if you have GitLab behind a reverse proxy which is running on a
  126. ###! different machine.
  127. ###! **Add the IP address for your reverse proxy to the list, otherwise users
  128. ###! will appear signed in from that address.**
  129. # gitlab_rails['trusted_proxies'] = []
  130. ### Content Security Policy
  131. ####! Customize if you want to enable the Content-Security-Policy header, which
  132. ####! can help thwart JavaScript cross-site scripting (XSS) attacks.
  133. ####! See: https://developer.mozilla.org/en-US/docs/Web/HTTP/CSP
  134. # gitlab_rails['content_security_policy'] = {
  135. # 'enabled' => false,
  136. # 'report_only' => false,
  137. # # Each directive is a String (e.g. "'self'").
  138. # 'directives' => {
  139. # 'base_uri' => nil,
  140. # 'child_src' => nil,
  141. # 'connect_src' => nil,
  142. # 'default_src' => nil,
  143. # 'font_src' => nil,
  144. # 'form_action' => nil,
  145. # 'frame_ancestors' => nil,
  146. # 'frame_src' => nil,
  147. # 'img_src' => nil,
  148. # 'manifest_src' => nil,
  149. # 'media_src' => nil,
  150. # 'object_src' => nil,
  151. # 'script_src' => nil,
  152. # 'style_src' => nil,
  153. # 'worker_src' => nil,
  154. # 'report_uri' => nil,
  155. # }
  156. # }
  157. ### Monitoring settings
  158. ###! IP whitelist controlling access to monitoring endpoints
  159. # gitlab_rails['monitoring_whitelist'] = ['127.0.0.0/8', '::1/128']
  160. ###! Time between sampling of unicorn socket metrics, in seconds
  161. # gitlab_rails['monitoring_unicorn_sampler_interval'] = 10
  162. ### Shutdown settings
  163. ###! Defines an interval to block healthcheck,
  164. ###! but continue accepting application requests.
  165. # gitlab_rails['shutdown_blackout_seconds'] = 10
  166. ### Reply by email
  167. ###! Allow users to comment on issues and merge requests by replying to
  168. ###! notification emails.
  169. ###! Docs: https://docs.gitlab.com/ee/administration/reply_by_email.html
  170. # gitlab_rails['incoming_email_enabled'] = true
  171. #### Incoming Email Address
  172. ####! The email address including the `%{key}` placeholder that will be replaced
  173. ####! to reference the item being replied to.
  174. ####! **The placeholder can be omitted but if present, it must appear in the
  175. ####! "user" part of the address (before the `@`).**
  176. # gitlab_rails['incoming_email_address'] = "gitlab-incoming+%{key}@gmail.com"
  177. #### Email account username
  178. ####! **With third party providers, this is usually the full email address.**
  179. ####! **With self-hosted email servers, this is usually the user part of the
  180. ####! email address.**
  181. # gitlab_rails['incoming_email_email'] = "gitlab-incoming@gmail.com"
  182. #### Email account password
  183. # gitlab_rails['incoming_email_password'] = "[REDACTED]"
  184. #### IMAP Settings
  185. # gitlab_rails['incoming_email_host'] = "imap.gmail.com"
  186. # gitlab_rails['incoming_email_port'] = 993
  187. # gitlab_rails['incoming_email_ssl'] = true
  188. # gitlab_rails['incoming_email_start_tls'] = false
  189. #### Incoming Mailbox Settings (via `mail_room`)
  190. ####! The mailbox where incoming mail will end up. Usually "inbox".
  191. # gitlab_rails['incoming_email_mailbox_name'] = "inbox"
  192. ####! The IDLE command timeout.
  193. # gitlab_rails['incoming_email_idle_timeout'] = 60
  194. ####! The file name for internal `mail_room` JSON logfile
  195. # gitlab_rails['incoming_email_log_file'] = "/var/log/gitlab/mailroom/mail_room_json.log"
  196. ####! The format of mail_room crash logs
  197. # mailroom['exit_log_format'] = "plain"
  198. ### Job Artifacts
  199. # gitlab_rails['artifacts_enabled'] = true
  200. # gitlab_rails['artifacts_path'] = "/var/opt/gitlab/gitlab-rails/shared/artifacts"
  201. ####! Job artifacts Object Store
  202. ####! Docs: https://docs.gitlab.com/ee/administration/job_artifacts.html#using-object-storage
  203. # gitlab_rails['artifacts_object_store_enabled'] = false
  204. # gitlab_rails['artifacts_object_store_direct_upload'] = false
  205. # gitlab_rails['artifacts_object_store_background_upload'] = true
  206. # gitlab_rails['artifacts_object_store_proxy_download'] = false
  207. # gitlab_rails['artifacts_object_store_remote_directory'] = "artifacts"
  208. # gitlab_rails['artifacts_object_store_connection'] = {
  209. # 'provider' => 'AWS',
  210. # 'region' => 'eu-west-1',
  211. # 'aws_access_key_id' => 'AWS_ACCESS_KEY_ID',
  212. # 'aws_secret_access_key' => 'AWS_SECRET_ACCESS_KEY',
  213. # # # The below options configure an S3 compatible host instead of AWS
  214. # # 'aws_signature_version' => 4, # For creation of signed URLs. Set to 2 if provider does not support v4.
  215. # # 'endpoint' => 'https://s3.amazonaws.com', # default: nil - Useful for S3 compliant services such as DigitalOcean Spaces
  216. # # 'host' => 's3.amazonaws.com',
  217. # # 'path_style' => false # Use 'host/bucket_name/object' instead of 'bucket_name.host/object'
  218. # }
  219. ### External merge request diffs
  220. # gitlab_rails['external_diffs_enabled'] = false
  221. # gitlab_rails['external_diffs_when'] = nil
  222. # gitlab_rails['external_diffs_storage_path'] = "/var/opt/gitlab/gitlab-rails/shared/external-diffs"
  223. # gitlab_rails['external_diffs_object_store_enabled'] = false
  224. # gitlab_rails['external_diffs_object_store_direct_upload'] = false
  225. # gitlab_rails['external_diffs_object_store_background_upload'] = false
  226. # gitlab_rails['external_diffs_object_store_proxy_download'] = false
  227. # gitlab_rails['external_diffs_object_store_remote_directory'] = "external-diffs"
  228. # gitlab_rails['external_diffs_object_store_connection'] = {
  229. # 'provider' => 'AWS',
  230. # 'region' => 'eu-west-1',
  231. # 'aws_access_key_id' => 'AWS_ACCESS_KEY_ID',
  232. # 'aws_secret_access_key' => 'AWS_SECRET_ACCESS_KEY',
  233. # # # The below options configure an S3 compatible host instead of AWS
  234. # # 'aws_signature_version' => 4, # For creation of signed URLs. Set to 2 if provider does not support v4.
  235. # # 'endpoint' => 'https://s3.amazonaws.com', # default: nil - Useful for S3 compliant services such as DigitalOcean Spaces
  236. # # 'host' => 's3.amazonaws.com',
  237. # # 'path_style' => false # Use 'host/bucket_name/object' instead of 'bucket_name.host/object'
  238. # }
  239. ### Git LFS
  240. # gitlab_rails['lfs_enabled'] = true
  241. # gitlab_rails['lfs_storage_path'] = "/var/opt/gitlab/gitlab-rails/shared/lfs-objects"
  242. # gitlab_rails['lfs_object_store_enabled'] = false
  243. # gitlab_rails['lfs_object_store_direct_upload'] = false
  244. # gitlab_rails['lfs_object_store_background_upload'] = true
  245. # gitlab_rails['lfs_object_store_proxy_download'] = false
  246. # gitlab_rails['lfs_object_store_remote_directory'] = "lfs-objects"
  247. # gitlab_rails['lfs_object_store_connection'] = {
  248. # 'provider' => 'AWS',
  249. # 'region' => 'eu-west-1',
  250. # 'aws_access_key_id' => 'AWS_ACCESS_KEY_ID',
  251. # 'aws_secret_access_key' => 'AWS_SECRET_ACCESS_KEY',
  252. # # # The below options configure an S3 compatible host instead of AWS
  253. # # 'aws_signature_version' => 4, # For creation of signed URLs. Set to 2 if provider does not support v4.
  254. # # 'endpoint' => 'https://s3.amazonaws.com', # default: nil - Useful for S3 compliant services such as DigitalOcean Spaces
  255. # # 'host' => 's3.amazonaws.com',
  256. # # 'path_style' => false # Use 'host/bucket_name/object' instead of 'bucket_name.host/object'
  257. # }
  258. ### GitLab uploads
  259. ###! Docs: https://docs.gitlab.com/ee/administration/uploads.html
  260. # gitlab_rails['uploads_storage_path'] = "/opt/gitlab/embedded/service/gitlab-rails/public"
  261. # gitlab_rails['uploads_base_dir'] = "uploads/-/system"
  262. # gitlab_rails['uploads_object_store_enabled'] = false
  263. # gitlab_rails['uploads_object_store_direct_upload'] = false
  264. # gitlab_rails['uploads_object_store_background_upload'] = true
  265. # gitlab_rails['uploads_object_store_proxy_download'] = false
  266. # gitlab_rails['uploads_object_store_remote_directory'] = "uploads"
  267. # gitlab_rails['uploads_object_store_connection'] = {
  268. # 'provider' => 'AWS',
  269. # 'region' => 'eu-west-1',
  270. # 'aws_access_key_id' => 'AWS_ACCESS_KEY_ID',
  271. # 'aws_secret_access_key' => 'AWS_SECRET_ACCESS_KEY',
  272. # # # The below options configure an S3 compatible host instead of AWS
  273. # # 'host' => 's3.amazonaws.com',
  274. # # 'aws_signature_version' => 4, # For creation of signed URLs. Set to 2 if provider does not support v4.
  275. # # 'endpoint' => 'https://s3.amazonaws.com', # default: nil - Useful for S3 compliant services such as DigitalOcean Spaces
  276. # # 'path_style' => false # Use 'host/bucket_name/object' instead of 'bucket_name.host/object'
  277. # }
  278. ### Impersonation settings
  279. # gitlab_rails['impersonation_enabled'] = true
  280. ### Usage Statistics
  281. # gitlab_rails['usage_ping_enabled'] = true
  282. ### Seat Link setting
  283. ###! Docs: https://docs.gitlab.com/ee/subscriptions/index.html#seat-link
  284. # gitlab_rails['seat_link_enabled'] = true
  285. ### GitLab Mattermost
  286. ###! These settings are void if Mattermost is installed on the same omnibus
  287. ###! install
  288. # gitlab_rails['mattermost_host'] = "https://mattermost.example.com"
  289. ### LDAP Settings
  290. ###! Docs: https://docs.gitlab.com/omnibus/settings/ldap.html
  291. ###! **Be careful not to break the indentation in the ldap_servers block. It is
  292. ###! in yaml format and the spaces must be retained. Using tabs will not work.**
  293. gitlab_rails['ldap_enabled'] = true
  294. gitlab_rails['prevent_ldap_sign_in'] = false
  295. ###! **remember to close this block with 'EOS' below**
  296. gitlab_rails['ldap_servers'] = YAML.load <<-'EOS'
  297. main: # 'main' is the GitLab 'provider ID' of this LDAP server
  298. label: 'LDAP'
  299. host: '{{ ldap_server }}'
  300. port: 389
  301. uid: 'cn'
  302. bind_dn: 'cn={{ ansible_hostname }},ou=Server,{{ ldap_basedn }}'
  303. password: '{{ new_passwd.passwd }}'
  304. encryption: 'start_tls' # "start_tls" or "simple_tls" or "plain"
  305. verify_certificates: true
  306. tls_options:
  307. ca_file: '/etc/gitlab/root_ca.crt'
  308. min_version: 772 # TLSv1.3
  309. # smartcard_auth: false
  310. # active_directory: true
  311. # allow_username_or_email_login: false
  312. # lowercase_usernames: false
  313. # block_auto_created_users: false
  314. base: 'ou=People,{{ ldap_basedn }}'
  315. user_filter: '(authorizedService=gitlab)'
  316. # ## EE only
  317. # group_base: ''
  318. # admin_group: ''
  319. # sync_ssh_keys: false
  320. #
  321. # secondary: # 'secondary' is the GitLab 'provider ID' of second LDAP server
  322. # label: 'LDAP'
  323. # host: '_your_ldap_server'
  324. # port: 389
  325. # uid: 'sAMAccountName'
  326. # bind_dn: '_the_full_dn_of_the_user_you_will_bind_with'
  327. # password: '_the_password_of_the_bind_user'
  328. # encryption: 'plain' # "start_tls" or "simple_tls" or "plain"
  329. # verify_certificates: true
  330. # smartcard_auth: false
  331. # active_directory: true
  332. # allow_username_or_email_login: false
  333. # lowercase_usernames: false
  334. # block_auto_created_users: false
  335. # base: ''
  336. # user_filter: ''
  337. # ## EE only
  338. # group_base: ''
  339. # admin_group: ''
  340. # sync_ssh_keys: false
  341. EOS
  342. ### Smartcard authentication settings
  343. ###! Docs: https://docs.gitlab.com/ee/administration/auth/smartcard.html
  344. # gitlab_rails['smartcard_enabled'] = false
  345. # gitlab_rails['smartcard_ca_file'] = "/etc/gitlab/ssl/CA.pem"
  346. # gitlab_rails['smartcard_client_certificate_required_host'] = 'smartcard.gitlab.example.com'
  347. # gitlab_rails['smartcard_client_certificate_required_port'] = 3444
  348. # gitlab_rails['smartcard_required_for_git_access'] = false
  349. # gitlab_rails['smartcard_san_extensions'] = false
  350. ### OmniAuth Settings
  351. ###! Docs: https://docs.gitlab.com/ee/integration/omniauth.html
  352. # gitlab_rails['omniauth_enabled'] = nil
  353. # gitlab_rails['omniauth_allow_single_sign_on'] = ['saml']
  354. # gitlab_rails['omniauth_sync_email_from_provider'] = 'saml'
  355. # gitlab_rails['omniauth_sync_profile_from_provider'] = ['saml']
  356. # gitlab_rails['omniauth_sync_profile_attributes'] = ['email']
  357. # gitlab_rails['omniauth_auto_sign_in_with_provider'] = 'saml'
  358. # gitlab_rails['omniauth_block_auto_created_users'] = true
  359. # gitlab_rails['omniauth_auto_link_ldap_user'] = false
  360. # gitlab_rails['omniauth_auto_link_saml_user'] = false
  361. # gitlab_rails['omniauth_external_providers'] = ['twitter', 'google_oauth2']
  362. # gitlab_rails['omniauth_allow_bypass_two_factor'] = ['google_oauth2']
  363. # gitlab_rails['omniauth_providers'] = [
  364. # {
  365. # "name" => "google_oauth2",
  366. # "app_id" => "YOUR APP ID",
  367. # "app_secret" => "YOUR APP SECRET",
  368. # "args" => { "access_type" => "offline", "approval_prompt" => "" }
  369. # }
  370. # ]
  371. ### Backup Settings
  372. ###! Docs: https://docs.gitlab.com/omnibus/settings/backups.html
  373. # gitlab_rails['manage_backup_path'] = true
  374. # gitlab_rails['backup_path'] = "/var/opt/gitlab/backups"
  375. ###! Docs: https://docs.gitlab.com/ee/raketasks/backup_restore.html#backup-archive-permissions
  376. # gitlab_rails['backup_archive_permissions'] = 0644
  377. # gitlab_rails['backup_pg_schema'] = 'public'
  378. ###! The duration in seconds to keep backups before they are allowed to be deleted
  379. # gitlab_rails['backup_keep_time'] = 604800
  380. # gitlab_rails['backup_upload_connection'] = {
  381. # 'provider' => 'AWS',
  382. # 'region' => 'eu-west-1',
  383. # 'aws_access_key_id' => 'AKIAKIAKI',
  384. # 'aws_secret_access_key' => 'secret123'
  385. # }
  386. # gitlab_rails['backup_upload_remote_directory'] = 'my.s3.bucket'
  387. # gitlab_rails['backup_multipart_chunk_size'] = 104857600
  388. ###! **Turns on AWS Server-Side Encryption with Amazon S3-Managed Keys for
  389. ###! backups**
  390. # gitlab_rails['backup_encryption'] = 'AES256'
  391. ###! The encryption key to use with AWS Server-Side Encryption.
  392. ###! Setting this value will enable Server-Side Encryption with customer provided keys;
  393. ###! otherwise S3-managed keys are used.
  394. # gitlab_rails['backup_encryption_key'] = '<base64-encoded encryption key>'
  395. ###! **Specifies Amazon S3 storage class to use for backups. Valid values
  396. ###! include 'STANDARD', 'STANDARD_IA', and 'REDUCED_REDUNDANCY'**
  397. # gitlab_rails['backup_storage_class'] = 'STANDARD'
  398. ###! Skip parts of the backup. Comma separated.
  399. ###! Docs: https://docs.gitlab.com/ee/raketasks/backup_restore.html#excluding-specific-directories-from-the-backup
  400. #gitlab_rails['env'] = {
  401. # "SKIP" => "db,uploads,repositories,builds,artifacts,lfs,registry,pages"
  402. #}
  403. ### Pseudonymizer Settings
  404. # gitlab_rails['pseudonymizer_manifest'] = 'config/pseudonymizer.yml'
  405. # gitlab_rails['pseudonymizer_upload_remote_directory'] = 'gitlab-elt'
  406. # gitlab_rails['pseudonymizer_upload_connection'] = {
  407. # 'provider' => 'AWS',
  408. # 'region' => 'eu-west-1',
  409. # 'aws_access_key_id' => 'AKIAKIAKI',
  410. # 'aws_secret_access_key' => 'secret123'
  411. # }
  412. ### For setting up different data storing directory
  413. ###! Docs: https://docs.gitlab.com/omnibus/settings/configuration.html#storing-git-data-in-an-alternative-directory
  414. ###! **If you want to use a single non-default directory to store git data use a
  415. ###! path that doesn't contain symlinks.**
  416. # git_data_dirs({
  417. # "default" => {
  418. # "path" => "/mnt/nfs-01/git-data"
  419. # }
  420. # })
  421. ### Gitaly settings
  422. # gitlab_rails['gitaly_token'] = 'secret token'
  423. ### For storing GitLab application uploads, eg. LFS objects, build artifacts
  424. ###! Docs: https://docs.gitlab.com/ee/development/shared_files.html
  425. # gitlab_rails['shared_path'] = '/var/opt/gitlab/gitlab-rails/shared'
  426. ### Wait for file system to be mounted
  427. ###! Docs: https://docs.gitlab.com/omnibus/settings/configuration.html#only-start-omnibus-gitlab-services-after-a-given-filesystem-is-mounted
  428. # high_availability['mountpoint'] = ["/var/opt/gitlab/git-data", "/var/opt/gitlab/gitlab-rails/shared"]
  429. ### GitLab Shell settings for GitLab
  430. # gitlab_rails['gitlab_shell_ssh_port'] = 22
  431. # gitlab_rails['gitlab_shell_git_timeout'] = 800
  432. ### Extra customization
  433. # gitlab_rails['extra_google_analytics_id'] = '_your_tracking_id'
  434. # gitlab_rails['extra_piwik_url'] = '_your_piwik_url'
  435. # gitlab_rails['extra_piwik_site_id'] = '_your_piwik_site_id'
  436. ##! Docs: https://docs.gitlab.com/omnibus/settings/environment-variables.html
  437. # gitlab_rails['env'] = {
  438. # 'BUNDLE_GEMFILE' => "/opt/gitlab/embedded/service/gitlab-rails/Gemfile",
  439. # 'PATH' => "/opt/gitlab/bin:/opt/gitlab/embedded/bin:/bin:/usr/bin"
  440. # }
  441. # gitlab_rails['rack_attack_git_basic_auth'] = {
  442. # 'enabled' => false,
  443. # 'ip_whitelist' => ["127.0.0.1"],
  444. # 'maxretry' => 10,
  445. # 'findtime' => 60,
  446. # 'bantime' => 3600
  447. # }
  448. # Prioritize the Admin Area protected paths throttle settings over the
  449. # deprecated Omnibus-managed protected paths throttle. This allows you to keep
  450. # gitlab_rails['rack_attack_git_basic_auth'] enabled to run the Git and
  451. # container registry failed authentication ban.
  452. # See https://gitlab.com/gitlab-org/gitlab/issues/37093
  453. # gitlab_rails['rack_attack_admin_area_protected_paths_enabled'] = true
  454. ###! **We do not recommend changing these directories.**
  455. # gitlab_rails['dir'] = "/var/opt/gitlab/gitlab-rails"
  456. # gitlab_rails['log_directory'] = "/var/log/gitlab/gitlab-rails"
  457. ### GitLab application settings
  458. # gitlab_rails['uploads_directory'] = "/var/opt/gitlab/gitlab-rails/uploads"
  459. # gitlab_rails['rate_limit_requests_per_period'] = 10
  460. # gitlab_rails['rate_limit_period'] = 60
  461. #### Change the initial default admin password and shared runner registration tokens.
  462. ####! **Only applicable on initial setup, changing these settings after database
  463. ####! is created and seeded won't yield any change.**
  464. {% if initial_root_password is defined %}
  465. gitlab_rails['initial_root_password'] = "{{ initial_root_password }}"
  466. {% else %}
  467. # gitlab_rails['initial_root_password'] = "password"
  468. {% endif %}
  469. # gitlab_rails['initial_shared_runners_registration_token'] = "token"
  470. #### Set path to an initial license to be used while bootstrapping GitLab.
  471. ####! **Only applicable on initial setup, future license updations need to be done via UI.
  472. ####! Updating the file specified in this path won't yield any change after the first reconfigure run.
  473. # gitlab_rails['initial_license_file'] = '/etc/gitlab/company.gitlab-license'
  474. #### Enable or disable automatic database migrations
  475. # gitlab_rails['auto_migrate'] = true
  476. #### This is advanced feature used by large gitlab deployments where loading
  477. #### whole RAILS env takes a lot of time.
  478. # gitlab_rails['rake_cache_clear'] = true
  479. ### GitLab database settings
  480. ###! Docs: https://docs.gitlab.com/omnibus/settings/database.html
  481. ###! **Only needed if you use an external database.**
  482. # gitlab_rails['db_adapter'] = "postgresql"
  483. # gitlab_rails['db_encoding'] = "unicode"
  484. # gitlab_rails['db_collation'] = nil
  485. # gitlab_rails['db_database'] = "gitlabhq_production"
  486. # gitlab_rails['db_pool'] = 1
  487. # gitlab_rails['db_username'] = "gitlab"
  488. # gitlab_rails['db_password'] = nil
  489. # gitlab_rails['db_host'] = nil
  490. # gitlab_rails['db_port'] = 5432
  491. # gitlab_rails['db_socket'] = nil
  492. # gitlab_rails['db_sslmode'] = nil
  493. # gitlab_rails['db_sslcompression'] = 0
  494. # gitlab_rails['db_sslrootcert'] = nil
  495. # gitlab_rails['db_sslcert'] = nil
  496. # gitlab_rails['db_sslkey'] = nil
  497. # gitlab_rails['db_prepared_statements'] = false
  498. # gitlab_rails['db_statements_limit'] = 1000
  499. ### GitLab Redis settings
  500. ###! Connect to your own Redis instance
  501. ###! Docs: https://docs.gitlab.com/omnibus/settings/redis.html
  502. #### Redis TCP connection
  503. # gitlab_rails['redis_host'] = "127.0.0.1"
  504. # gitlab_rails['redis_port'] = 6379
  505. # gitlab_rails['redis_ssl'] = false
  506. # gitlab_rails['redis_password'] = nil
  507. # gitlab_rails['redis_database'] = 0
  508. # gitlab_rails['redis_enable_client'] = true
  509. #### Redis local UNIX socket (will be disabled if TCP method is used)
  510. # gitlab_rails['redis_socket'] = "/var/opt/gitlab/redis/redis.socket"
  511. #### Sentinel support
  512. ####! To have Sentinel working, you must enable Redis TCP connection support
  513. ####! above and define a few Sentinel hosts below (to get a reliable setup
  514. ####! at least 3 hosts).
  515. ####! **You don't need to list every sentinel host, but the ones not listed will
  516. ####! not be used in a fail-over situation to query for the new master.**
  517. # gitlab_rails['redis_sentinels'] = [
  518. # {'host' => '127.0.0.1', 'port' => 26379},
  519. # ]
  520. #### Separate instances support
  521. ###! Docs: https://docs.gitlab.com/omnibus/settings/redis.html#running-with-multiple-redis-instances
  522. # gitlab_rails['redis_cache_instance'] = nil
  523. # gitlab_rails['redis_cache_sentinels'] = nil
  524. # gitlab_rails['redis_queues_instance'] = nil
  525. # gitlab_rails['redis_queues_sentinels'] = nil
  526. # gitlab_rails['redis_shared_state_instance'] = nil
  527. # gitlab_rails['redis_shared_sentinels'] = nil
  528. ### GitLab email server settings
  529. ###! Docs: https://docs.gitlab.com/omnibus/settings/smtp.html
  530. ###! **Use smtp instead of sendmail/postfix.**
  531. # gitlab_rails['smtp_enable'] = true
  532. # gitlab_rails['smtp_address'] = "smtp.server"
  533. # gitlab_rails['smtp_port'] = 465
  534. # gitlab_rails['smtp_user_name'] = "smtp user"
  535. # gitlab_rails['smtp_password'] = "smtp password"
  536. # gitlab_rails['smtp_domain'] = "example.com"
  537. # gitlab_rails['smtp_authentication'] = "login"
  538. # gitlab_rails['smtp_enable_starttls_auto'] = true
  539. # gitlab_rails['smtp_tls'] = false
  540. ###! **Can be: 'none', 'peer', 'client_once', 'fail_if_no_peer_cert'**
  541. ###! Docs: http://api.rubyonrails.org/classes/ActionMailer/Base.html
  542. # gitlab_rails['smtp_openssl_verify_mode'] = 'none'
  543. # gitlab_rails['smtp_ca_path'] = "/etc/ssl/certs"
  544. # gitlab_rails['smtp_ca_file'] = "/etc/ssl/certs/ca-certificates.crt"
  545. ################################################################################
  546. ## Container Registry settings
  547. ##! Docs: https://docs.gitlab.com/ee/administration/container_registry.html
  548. ################################################################################
  549. # registry_external_url 'https://registry.example.com'
  550. ### Settings used by GitLab application
  551. # gitlab_rails['registry_enabled'] = true
  552. # gitlab_rails['registry_host'] = "registry.gitlab.example.com"
  553. # gitlab_rails['registry_port'] = "5005"
  554. # gitlab_rails['registry_path'] = "/var/opt/gitlab/gitlab-rails/shared/registry"
  555. # Notification secret, it's used to authenticate notification requests to GitLab application
  556. # You only need to change this when you use external Registry service, otherwise
  557. # it will be taken directly from notification settings of your Registry
  558. # gitlab_rails['registry_notification_secret'] = nil
  559. ###! **Do not change the following 3 settings unless you know what you are
  560. ###! doing**
  561. # gitlab_rails['registry_api_url'] = "http://localhost:5000"
  562. # gitlab_rails['registry_key_path'] = "/var/opt/gitlab/gitlab-rails/certificate.key"
  563. # gitlab_rails['registry_issuer'] = "omnibus-gitlab-issuer"
  564. ### Settings used by Registry application
  565. # registry['enable'] = true
  566. # registry['username'] = "registry"
  567. # registry['group'] = "registry"
  568. # registry['uid'] = nil
  569. # registry['gid'] = nil
  570. # registry['dir'] = "/var/opt/gitlab/registry"
  571. # registry['registry_http_addr'] = "localhost:5000"
  572. # registry['debug_addr'] = "localhost:5001"
  573. # registry['log_directory'] = "/var/log/gitlab/registry"
  574. # registry['env_directory'] = "/opt/gitlab/etc/registry/env"
  575. # registry['env'] = {
  576. # 'SSL_CERT_DIR' => "/opt/gitlab/embedded/ssl/certs/"
  577. # }
  578. # registry['log_level'] = "info"
  579. # registry['log_formatter'] = "text"
  580. # registry['rootcertbundle'] = "/var/opt/gitlab/registry/certificate.crt"
  581. # registry['health_storagedriver_enabled'] = true
  582. # registry['storage_delete_enabled'] = true
  583. # registry['validation_enabled'] = false
  584. # registry['autoredirect'] = false
  585. # registry['compatibility_schema1_enabled'] = false
  586. ### Registry backend storage
  587. ###! Docs: https://docs.gitlab.com/ee/administration/container_registry.html#container-registry-storage-driver
  588. # registry['storage'] = {
  589. # 's3' => {
  590. # 'accesskey' => 'AKIAKIAKI',
  591. # 'secretkey' => 'secret123',
  592. # 'region' => 'us-east-1',
  593. # 'bucket' => 'gitlab-registry-bucket-AKIAKIAKI'
  594. # }
  595. # }
  596. ### Registry notifications endpoints
  597. # registry['notifications'] = [
  598. # {
  599. # 'name' => 'test_endpoint',
  600. # 'url' => 'https://gitlab.example.com/notify2',
  601. # 'timeout' => '500ms',
  602. # 'threshold' => 5,
  603. # 'backoff' => '1s',
  604. # 'headers' => {
  605. # "Authorization" => ["AUTHORIZATION_EXAMPLE_TOKEN"]
  606. # }
  607. # }
  608. # ]
  609. ### Default registry notifications
  610. # registry['default_notifications_timeout'] = "500ms"
  611. # registry['default_notifications_threshold'] = 5
  612. # registry['default_notifications_backoff'] = "1s"
  613. # registry['default_notifications_headers'] = {}
  614. ################################################################################
  615. ## Error Reporting and Logging with Sentry
  616. ################################################################################
  617. # gitlab_rails['sentry_enabled'] = false
  618. # gitlab_rails['sentry_dsn'] = 'https://<key>@sentry.io/<project>'
  619. # gitlab_rails['sentry_clientside_dsn'] = 'https://<key>@sentry.io/<project>'
  620. # gitlab_rails['sentry_environment'] = 'production'
  621. ################################################################################
  622. ## GitLab Workhorse
  623. ##! Docs: https://gitlab.com/gitlab-org/gitlab-workhorse/blob/master/README.md
  624. ################################################################################
  625. # gitlab_workhorse['enable'] = true
  626. # gitlab_workhorse['ha'] = false
  627. # gitlab_workhorse['listen_network'] = "unix"
  628. # gitlab_workhorse['listen_umask'] = 000
  629. # gitlab_workhorse['listen_addr'] = "/var/opt/gitlab/gitlab-workhorse/socket"
  630. # gitlab_workhorse['auth_backend'] = "http://localhost:8080"
  631. ##! the empty string is the default in gitlab-workhorse option parser
  632. # gitlab_workhorse['auth_socket'] = "''"
  633. ##! put an empty string on the command line
  634. # gitlab_workhorse['pprof_listen_addr'] = "''"
  635. # gitlab_workhorse['prometheus_listen_addr'] = "localhost:9229"
  636. # gitlab_workhorse['dir'] = "/var/opt/gitlab/gitlab-workhorse"
  637. # gitlab_workhorse['log_directory'] = "/var/log/gitlab/gitlab-workhorse"
  638. # gitlab_workhorse['proxy_headers_timeout'] = "1m0s"
  639. ##! limit number of concurrent API requests, defaults to 0 which is unlimited
  640. # gitlab_workhorse['api_limit'] = 0
  641. ##! limit number of API requests allowed to be queued, defaults to 0 which
  642. ##! disables queuing
  643. # gitlab_workhorse['api_queue_limit'] = 0
  644. ##! duration after which we timeout requests if they sit too long in the queue
  645. # gitlab_workhorse['api_queue_duration'] = "30s"
  646. ##! Long polling duration for job requesting for runners
  647. # gitlab_workhorse['api_ci_long_polling_duration'] = "60s"
  648. ##! Log format: default is text, can also be json or none.
  649. # gitlab_workhorse['log_format'] = "json"
  650. # gitlab_workhorse['env_directory'] = "/opt/gitlab/etc/gitlab-workhorse/env"
  651. # gitlab_workhorse['env'] = {
  652. # 'PATH' => "/opt/gitlab/bin:/opt/gitlab/embedded/bin:/bin:/usr/bin",
  653. # 'SSL_CERT_DIR' => "/opt/gitlab/embedded/ssl/certs/"
  654. # }
  655. ################################################################################
  656. ## GitLab User Settings
  657. ##! Modify default git user.
  658. ##! Docs: https://docs.gitlab.com/omnibus/settings/configuration.html#changing-the-name-of-the-git-user-group
  659. ################################################################################
  660. # user['username'] = "git"
  661. # user['group'] = "git"
  662. # user['uid'] = nil
  663. # user['gid'] = nil
  664. ##! The shell for the git user
  665. # user['shell'] = "/bin/sh"
  666. ##! The home directory for the git user
  667. # user['home'] = "/var/opt/gitlab"
  668. # user['git_user_name'] = "GitLab"
  669. # user['git_user_email'] = "gitlab@#{node['fqdn']}"
  670. ################################################################################
  671. ## GitLab Unicorn
  672. ##! Tweak unicorn settings.
  673. ##! Docs: https://docs.gitlab.com/omnibus/settings/unicorn.html
  674. ################################################################################
  675. # unicorn['enable'] = true
  676. # unicorn['worker_timeout'] = 60
  677. ###! Minimum worker_processes is 2 at this moment
  678. ###! See https://gitlab.com/gitlab-org/gitlab-foss/issues/18771
  679. # unicorn['worker_processes'] = 2
  680. ### Advanced settings
  681. # unicorn['listen'] = 'localhost'
  682. # unicorn['port'] = 8080
  683. # unicorn['socket'] = '/var/opt/gitlab/gitlab-rails/sockets/gitlab.socket'
  684. # unicorn['pidfile'] = '/opt/gitlab/var/unicorn/unicorn.pid'
  685. # unicorn['tcp_nopush'] = true
  686. # unicorn['backlog_socket'] = 1024
  687. ###! **Make sure somaxconn is equal or higher then backlog_socket**
  688. # unicorn['somaxconn'] = 1024
  689. ###! **We do not recommend changing this setting**
  690. # unicorn['log_directory'] = "/var/log/gitlab/unicorn"
  691. ### **Only change these settings if you understand well what they mean**
  692. ###! Docs: https://docs.gitlab.com/ee/administration/operations/unicorn.html#unicorn-worker-killer
  693. ###! https://github.com/kzk/unicorn-worker-killer
  694. # unicorn['worker_memory_limit_min'] = "1024 * 1 << 20"
  695. # unicorn['worker_memory_limit_max'] = "1280 * 1 << 20"
  696. # unicorn['exporter_enabled'] = false
  697. # unicorn['exporter_address'] = "127.0.0.1"
  698. # unicorn['exporter_port'] = 8083
  699. ################################################################################
  700. ## GitLab Puma
  701. ##! Tweak puma settings. You should only use Unicorn or Puma, not both.
  702. ##! Docs: https://docs.gitlab.com/omnibus/settings/puma.html
  703. ################################################################################
  704. # puma['enable'] = false
  705. # puma['ha'] = false
  706. # puma['worker_timeout'] = 60
  707. # puma['worker_processes'] = 2
  708. # puma['min_threads'] = 1
  709. # puma['max_threads'] = 16
  710. ### Advanced settings
  711. # puma['listen'] = '127.0.0.1'
  712. # puma['port'] = 8080
  713. # puma['socket'] = '/var/opt/gitlab/gitlab-rails/sockets/gitlab.socket'
  714. # puma['pidfile'] = '/opt/gitlab/var/puma/puma.pid'
  715. # puma['state_path'] = '/opt/gitlab/var/puma/puma.state'
  716. ###! **We do not recommend changing this setting**
  717. # puma['log_directory'] = "/var/log/gitlab/puma"
  718. ### **Only change these settings if you understand well what they mean**
  719. ###! Docs: https://github.com/schneems/puma_worker_killer
  720. # puma['per_worker_max_memory_mb'] = 850
  721. # puma['exporter_enabled'] = false
  722. # puma['exporter_address'] = "127.0.0.1"
  723. # puma['exporter_port'] = 8083
  724. ################################################################################
  725. ## GitLab Sidekiq
  726. ################################################################################
  727. # sidekiq['log_directory'] = "/var/log/gitlab/sidekiq"
  728. # sidekiq['log_format'] = "json"
  729. # sidekiq['shutdown_timeout'] = 4
  730. # sidekiq['concurrency'] = 25
  731. # sidekiq['metrics_enabled'] = true
  732. # sidekiq['listen_address'] = "localhost"
  733. # sidekiq['listen_port'] = 8082
  734. ################################################################################
  735. ## gitlab-shell
  736. ################################################################################
  737. # gitlab_shell['audit_usernames'] = false
  738. # gitlab_shell['log_level'] = 'INFO'
  739. # gitlab_shell['log_format'] = 'json'
  740. # gitlab_shell['http_settings'] = { user: 'username', password: 'password', ca_file: '/etc/ssl/cert.pem', ca_path: '/etc/pki/tls/certs', self_signed_cert: false}
  741. # gitlab_shell['log_directory'] = "/var/log/gitlab/gitlab-shell/"
  742. # gitlab_shell['custom_hooks_dir'] = "/opt/gitlab/embedded/service/gitlab-shell/hooks"
  743. # gitlab_shell['auth_file'] = "/var/opt/gitlab/.ssh/authorized_keys"
  744. ### Migration to Go feature flags
  745. ###! Docs: https://gitlab.com/gitlab-org/gitlab-shell#migration-to-go-feature-flags
  746. # gitlab_shell['migration'] = { enabled: true, features: [] }
  747. ### Git trace log file.
  748. ###! If set, git commands receive GIT_TRACE* environment variables
  749. ###! Docs: https://git-scm.com/book/es/v2/Git-Internals-Environment-Variables#Debugging
  750. ###! An absolute path starting with / – the trace output will be appended to
  751. ###! that file. It needs to exist so we can check permissions and avoid
  752. ###! throwing warnings to the users.
  753. # gitlab_shell['git_trace_log_file'] = "/var/log/gitlab/gitlab-shell/gitlab-shell-git-trace.log"
  754. ##! **We do not recommend changing this directory.**
  755. # gitlab_shell['dir'] = "/var/opt/gitlab/gitlab-shell"
  756. ################################################################
  757. ## GitLab PostgreSQL
  758. ################################################################
  759. ###! Changing any of these settings requires a restart of postgresql.
  760. ###! By default, reconfigure reloads postgresql if it is running. If you
  761. ###! change any of these settings, be sure to run `gitlab-ctl restart postgresql`
  762. ###! after reconfigure in order for the changes to take effect.
  763. # postgresql['enable'] = true
  764. # postgresql['listen_address'] = nil
  765. # postgresql['port'] = 5432
  766. # postgresql['data_dir'] = "/var/opt/gitlab/postgresql/data"
  767. ##! **recommend value is 1/4 of total RAM, up to 14GB.**
  768. # postgresql['shared_buffers'] = "256MB"
  769. ### Advanced settings
  770. # postgresql['ha'] = false
  771. # postgresql['dir'] = "/var/opt/gitlab/postgresql"
  772. # postgresql['log_directory'] = "/var/log/gitlab/postgresql"
  773. # postgresql['log_destination'] = nil
  774. # postgresql['logging_collector'] = nil
  775. # postgresql['log_truncate_on_rotation'] = nil
  776. # postgresql['log_rotation_age'] = nil
  777. # postgresql['log_rotation_size'] = nil
  778. # postgresql['username'] = "gitlab-psql"
  779. # postgresql['group'] = "gitlab-psql"
  780. ##! `SQL_USER_PASSWORD_HASH` can be generated using the command `gitlab-ctl pg-password-md5 gitlab`
  781. # postgresql['sql_user_password'] = 'SQL_USER_PASSWORD_HASH'
  782. # postgresql['uid'] = nil
  783. # postgresql['gid'] = nil
  784. # postgresql['shell'] = "/bin/sh"
  785. # postgresql['home'] = "/var/opt/gitlab/postgresql"
  786. # postgresql['user_path'] = "/opt/gitlab/embedded/bin:/opt/gitlab/bin:$PATH"
  787. # postgresql['sql_user'] = "gitlab"
  788. # postgresql['max_connections'] = 200
  789. # postgresql['md5_auth_cidr_addresses'] = []
  790. # postgresql['trust_auth_cidr_addresses'] = []
  791. # postgresql['wal_buffers'] = "-1"
  792. # postgresql['autovacuum_max_workers'] = "3"
  793. # postgresql['autovacuum_freeze_max_age'] = "200000000"
  794. # postgresql['log_statement'] = nil
  795. # postgresql['track_activity_query_size'] = "1024"
  796. # postgresql['shared_preload_libraries'] = nil
  797. # postgresql['dynamic_shared_memory_type'] = nil
  798. # postgresql['hot_standby'] = "off"
  799. ### SSL settings
  800. # See https://www.postgresql.org/docs/9.6/static/runtime-config-connection.html#GUC-SSL-CERT-FILE for more details
  801. # postgresql['ssl'] = 'on'
  802. # postgresql['ssl_ciphers'] = 'HIGH:MEDIUM:+3DES:!aNULL:!SSLv3:!TLSv1'
  803. # postgresql['ssl_cert_file'] = 'server.crt'
  804. # postgresql['ssl_key_file'] = 'server.key'
  805. # postgresql['ssl_ca_file'] = '/opt/gitlab/embedded/ssl/certs/cacert.pem'
  806. # postgresql['ssl_crl_file'] = nil
  807. ### Replication settings
  808. ###! Note, some replication settings do not require a full restart. They are documented below.
  809. # postgresql['wal_level'] = "hot_standby"
  810. # postgresql['max_wal_senders'] = 5
  811. # postgresql['max_replication_slots'] = 0
  812. # postgresql['max_locks_per_transaction'] = 128
  813. # Backup/Archive settings
  814. # postgresql['archive_mode'] = "off"
  815. ###! Changing any of these settings only requires a reload of postgresql. You do not need to
  816. ###! restart postgresql if you change any of these and run reconfigure.
  817. # postgresql['work_mem'] = "16MB"
  818. # postgresql['maintenance_work_mem'] = "16MB"
  819. # postgresql['checkpoint_segments'] = 10
  820. # postgresql['checkpoint_timeout'] = "5min"
  821. # postgresql['checkpoint_completion_target'] = 0.9
  822. # postgresql['effective_io_concurrency'] = 1
  823. # postgresql['checkpoint_warning'] = "30s"
  824. # postgresql['effective_cache_size'] = "1MB"
  825. # postgresql['shmmax'] = 17179869184 # or 4294967295
  826. # postgresql['shmall'] = 4194304 # or 1048575
  827. # postgresql['autovacuum'] = "on"
  828. # postgresql['log_autovacuum_min_duration'] = "-1"
  829. # postgresql['autovacuum_naptime'] = "1min"
  830. # postgresql['autovacuum_vacuum_threshold'] = "50"
  831. # postgresql['autovacuum_analyze_threshold'] = "50"
  832. # postgresql['autovacuum_vacuum_scale_factor'] = "0.02"
  833. # postgresql['autovacuum_analyze_scale_factor'] = "0.01"
  834. # postgresql['autovacuum_vacuum_cost_delay'] = "20ms"
  835. # postgresql['autovacuum_vacuum_cost_limit'] = "-1"
  836. # postgresql['statement_timeout'] = "60000"
  837. # postgresql['idle_in_transaction_session_timeout'] = "60000"
  838. # postgresql['log_line_prefix'] = "%a"
  839. # postgresql['max_worker_processes'] = 8
  840. # postgresql['max_parallel_workers_per_gather'] = 0
  841. # postgresql['log_lock_waits'] = 1
  842. # postgresql['deadlock_timeout'] = '5s'
  843. # postgresql['track_io_timing'] = 0
  844. # postgresql['default_statistics_target'] = 1000
  845. ### Available in PostgreSQL 9.6 and later
  846. # postgresql['min_wal_size'] = 80MB
  847. # postgresql['max_wal_size'] = 1GB
  848. # Backup/Archive settings
  849. # postgresql['archive_command'] = nil
  850. # postgresql['archive_timeout'] = "0"
  851. ### Replication settings
  852. # postgresql['sql_replication_user'] = "gitlab_replicator"
  853. # postgresql['sql_replication_password'] = "md5 hash of postgresql password" # You can generate with `gitlab-ctl pg-password-md5 <dbuser>`
  854. # postgresql['wal_keep_segments'] = 10
  855. # postgresql['max_standby_archive_delay'] = "30s"
  856. # postgresql['max_standby_streaming_delay'] = "30s"
  857. # postgresql['synchronous_commit'] = on
  858. # postgresql['synchronous_standby_names'] = ''
  859. # postgresql['hot_standby_feedback'] = 'off'
  860. # postgresql['random_page_cost'] = 2.0
  861. # postgresql['log_temp_files'] = -1
  862. # postgresql['log_checkpoints'] = 'off'
  863. # To add custom entries to pg_hba.conf use the following
  864. # postgresql['custom_pg_hba_entries'] = {
  865. # APPLICATION: [ # APPLICATION should identify what the settings are used for
  866. # {
  867. # type: example,
  868. # database: example,
  869. # user: example,
  870. # cidr: example,
  871. # method: example,
  872. # option: example
  873. # }
  874. # ]
  875. # }
  876. # See https://www.postgresql.org/docs/9.6/static/auth-pg-hba-conf.html for an explanation
  877. # of the values
  878. ### Version settings
  879. # Set this if you have disabled the bundled PostgreSQL but still want to use the backup rake tasks
  880. # postgresql['version'] = 10
  881. ################################################################################
  882. ## GitLab Redis
  883. ##! **Can be disabled if you are using your own Redis instance.**
  884. ##! Docs: https://docs.gitlab.com/omnibus/settings/redis.html
  885. ################################################################################
  886. # redis['enable'] = true
  887. # redis['ha'] = false
  888. # redis['hz'] = 10
  889. # redis['dir'] = "/var/opt/gitlab/redis"
  890. # redis['log_directory'] = "/var/log/gitlab/redis"
  891. # redis['username'] = "gitlab-redis"
  892. # redis['group'] = "gitlab-redis"
  893. # redis['maxclients'] = "10000"
  894. # redis['maxmemory'] = "0"
  895. # redis['maxmemory_policy'] = "noeviction"
  896. # redis['maxmemory_samples'] = "5"
  897. # redis['tcp_backlog'] = 511
  898. # redis['tcp_timeout'] = "60"
  899. # redis['tcp_keepalive'] = "300"
  900. # redis['uid'] = nil
  901. # redis['gid'] = nil
  902. ### Disable or obfuscate unnecessary redis command names
  903. ### Uncomment and edit this block to add or remove entries.
  904. ### See https://docs.gitlab.com/omnibus/settings/redis.html#renamed-commands
  905. ### for detailed usage
  906. ###
  907. # redis['rename_commands'] = {
  908. # 'KEYS': ''
  909. #}
  910. #
  911. ###! **To enable only Redis service in this machine, uncomment
  912. ###! one of the lines below (choose master or slave instance types).**
  913. ###! Docs: https://docs.gitlab.com/omnibus/settings/redis.html
  914. ###! https://docs.gitlab.com/ee/administration/high_availability/redis.html
  915. # redis_master_role['enable'] = true
  916. # redis_slave_role['enable'] = true
  917. ### Redis TCP support (will disable UNIX socket transport)
  918. # redis['bind'] = '0.0.0.0' # or specify an IP to bind to a single one
  919. # redis['port'] = 6379
  920. # redis['password'] = 'redis-password-goes-here'
  921. ### Redis Sentinel support
  922. ###! **You need a master slave Redis replication to be able to do failover**
  923. ###! **Please read the documentation before enabling it to understand the
  924. ###! caveats:**
  925. ###! Docs: https://docs.gitlab.com/ee/administration/high_availability/redis.html
  926. ### Replication support
  927. #### Slave Redis instance
  928. # redis['master'] = false # by default this is true
  929. #### Slave and Sentinel shared configuration
  930. ####! **Both need to point to the master Redis instance to get replication and
  931. ####! heartbeat monitoring**
  932. # redis['master_name'] = 'gitlab-redis'
  933. # redis['master_ip'] = nil
  934. # redis['master_port'] = 6379
  935. #### Support to run redis slaves in a Docker or NAT environment
  936. ####! Docs: https://redis.io/topics/replication#configuring-replication-in-docker-and-nat
  937. # redis['announce_ip'] = nil
  938. # redis['announce_port'] = nil
  939. ####! **Master password should have the same value defined in
  940. ####! redis['password'] to enable the instance to transition to/from
  941. ####! master/slave in a failover event.**
  942. # redis['master_password'] = 'redis-password-goes-here'
  943. ####! Increase these values when your slaves can't catch up with master
  944. # redis['client_output_buffer_limit_normal'] = '0 0 0'
  945. # redis['client_output_buffer_limit_slave'] = '256mb 64mb 60'
  946. # redis['client_output_buffer_limit_pubsub'] = '32mb 8mb 60'
  947. #####! Redis snapshotting frequency
  948. #####! Set to [] to disable
  949. #####! Set to [''] to clear previously set values
  950. # redis['save'] = [ '900 1', '300 10', '60 10000' ]
  951. ################################################################################
  952. ## GitLab Web server
  953. ##! Docs: https://docs.gitlab.com/omnibus/settings/nginx.html#using-a-non-bundled-web-server
  954. ################################################################################
  955. ##! When bundled nginx is disabled we need to add the external webserver user to
  956. ##! the GitLab webserver group.
  957. # web_server['external_users'] = []
  958. # web_server['username'] = 'gitlab-www'
  959. # web_server['group'] = 'gitlab-www'
  960. # web_server['uid'] = nil
  961. # web_server['gid'] = nil
  962. # web_server['shell'] = '/bin/false'
  963. # web_server['home'] = '/var/opt/gitlab/nginx'
  964. ################################################################################
  965. ## GitLab NGINX
  966. ##! Docs: https://docs.gitlab.com/omnibus/settings/nginx.html
  967. ################################################################################
  968. # nginx['enable'] = true
  969. # nginx['client_max_body_size'] = '250m'
  970. # nginx['redirect_http_to_https'] = false
  971. # nginx['redirect_http_to_https_port'] = 80
  972. ##! Most root CA's are included by default
  973. # nginx['ssl_client_certificate'] = "/etc/gitlab/ssl/ca.crt"
  974. ##! enable/disable 2-way SSL client authentication
  975. # nginx['ssl_verify_client'] = "off"
  976. ##! if ssl_verify_client on, verification depth in the client certificates chain
  977. # nginx['ssl_verify_depth'] = "1"
  978. # nginx['ssl_certificate'] = "/etc/gitlab/ssl/#{node['fqdn']}.crt"
  979. # nginx['ssl_certificate_key'] = "/etc/gitlab/ssl/#{node['fqdn']}.key"
  980. nginx['ssl_ciphers'] = nil
  981. nginx['ssl_prefer_server_ciphers'] = "off"
  982. ##! **Recommended by: https://raymii.org/s/tutorials/Strong_SSL_Security_On_nginx.html
  983. ##! https://cipherli.st/**
  984. nginx['ssl_protocols'] = "TLSv1.3"
  985. ##! **Recommended in: https://nginx.org/en/docs/http/ngx_http_ssl_module.html**
  986. nginx['ssl_session_cache'] = "builtin:1000 shared:MozSSL:10m"
  987. ##! **Default according to https://nginx.org/en/docs/http/ngx_http_ssl_module.html**
  988. nginx['ssl_session_timeout'] = "5m"
  989. nginx['ssl_session_tickets'] = "off"
  990. # nginx['ssl_dhparam'] = nil # Path to dhparams.pem, eg. /etc/gitlab/ssl/dhparams.pem
  991. # nginx['listen_addresses'] = ['*', '[::]']
  992. ##! **Defaults to forcing web browsers to always communicate using only HTTPS**
  993. ##! Docs: https://docs.gitlab.com/omnibus/settings/nginx.html#setting-http-strict-transport-security
  994. # nginx['hsts_max_age'] = 31536000
  995. # nginx['hsts_include_subdomains'] = false
  996. ##! Defaults to stripping path information when making cross-origin requests
  997. # nginx['referrer_policy'] = 'strict-origin-when-cross-origin'
  998. ##! **Docs: http://nginx.org/en/docs/http/ngx_http_gzip_module.html**
  999. # nginx['gzip_enabled'] = true
  1000. ##! **Override only if you use a reverse proxy**
  1001. ##! Docs: https://docs.gitlab.com/omnibus/settings/nginx.html#setting-the-nginx-listen-port
  1002. {% if enable_https %}
  1003. nginx['listen_port'] = "443 proxy_protocol"
  1004. {% else %}
  1005. # nginx['listen_port'] = nil
  1006. {% endif %}
  1007. ##! **Override only if your reverse proxy internally communicates over HTTP**
  1008. ##! Docs: https://docs.gitlab.com/omnibus/settings/nginx.html#supporting-proxied-ssl
  1009. # nginx['listen_https'] = nil
  1010. # nginx['custom_gitlab_server_config'] = "location ^~ /foo-namespace/bar-project/raw/ {\n deny all;\n}\n"
  1011. # nginx['custom_nginx_config'] = "include /etc/nginx/conf.d/example.conf;"
  1012. # nginx['proxy_read_timeout'] = 3600
  1013. # nginx['proxy_connect_timeout'] = 300
  1014. # nginx['proxy_set_headers'] = {
  1015. # "Host" => "$http_host_with_default",
  1016. # "X-Real-IP" => "$remote_addr",
  1017. # "X-Forwarded-For" => "$proxy_add_x_forwarded_for",
  1018. # "X-Forwarded-Proto" => "https",
  1019. # "X-Forwarded-Ssl" => "on",
  1020. # "Upgrade" => "$http_upgrade",
  1021. # "Connection" => "$connection_upgrade"
  1022. # }
  1023. # nginx['proxy_cache_path'] = 'proxy_cache keys_zone=gitlab:10m max_size=1g levels=1:2'
  1024. # nginx['proxy_cache'] = 'gitlab'
  1025. # nginx['http2_enabled'] = true
  1026. nginx['real_ip_trusted_addresses'] = [ '{{ hostvars | ip_from_inventory('vm_gateway') }}' ]
  1027. nginx['real_ip_header'] = "proxy_protocol"
  1028. # nginx['real_ip_recursive'] = nil
  1029. # nginx['custom_error_pages'] = {
  1030. # '404' => {
  1031. # 'title' => 'Example title',
  1032. # 'header' => 'Example header',
  1033. # 'message' => 'Example message'
  1034. # }
  1035. # }
  1036. ### Advanced settings
  1037. # nginx['dir'] = "/var/opt/gitlab/nginx"
  1038. # nginx['log_directory'] = "/var/log/gitlab/nginx"
  1039. # nginx['worker_processes'] = 4
  1040. # nginx['worker_connections'] = 10240
  1041. # nginx['log_format'] = '$remote_addr - $remote_user [$time_local] "$request" $status $body_bytes_sent "$http_referer" "$http_user_agent"'
  1042. # nginx['sendfile'] = 'on'
  1043. # nginx['tcp_nopush'] = 'on'
  1044. # nginx['tcp_nodelay'] = 'on'
  1045. # nginx['gzip'] = "on"
  1046. # nginx['gzip_http_version'] = "1.0"
  1047. # nginx['gzip_comp_level'] = "2"
  1048. # nginx['gzip_proxied'] = "any"
  1049. # nginx['gzip_types'] = [ "text/plain", "text/css", "application/x-javascript", "text/xml", "application/xml", "application/xml+rss", "text/javascript", "application/json" ]
  1050. # nginx['keepalive_timeout'] = 65
  1051. # nginx['cache_max_size'] = '5000m'
  1052. # nginx['server_names_hash_bucket_size'] = 64
  1053. ##! These paths have proxy_request_buffering disabled
  1054. # nginx['request_buffering_off_path_regex'] = "\.git/git-receive-pack$|\.git/info/refs?service=git-receive-pack$|\.git/gitlab-lfs/objects|\.git/info/lfs/objects/batch$"
  1055. ### Nginx status
  1056. # nginx['status'] = {
  1057. # "enable" => true,
  1058. # "listen_addresses" => ["127.0.0.1"],
  1059. # "fqdn" => "dev.example.com",
  1060. # "port" => 9999,
  1061. # "vts_enable" => true,
  1062. # "options" => {
  1063. # "stub_status" => "on", # Turn on stats
  1064. # "server_tokens" => "off", # Don't show the version of NGINX
  1065. # "access_log" => "off", # Disable logs for stats
  1066. # "allow" => "127.0.0.1", # Only allow access from localhost
  1067. # "deny" => "all" # Deny access to anyone else
  1068. # }
  1069. # }
  1070. ################################################################################
  1071. ## GitLab Logging
  1072. ##! Docs: https://docs.gitlab.com/omnibus/settings/logs.html
  1073. ################################################################################
  1074. # logging['svlogd_size'] = 200 * 1024 * 1024 # rotate after 200 MB of log data
  1075. # logging['svlogd_num'] = 30 # keep 30 rotated log files
  1076. # logging['svlogd_timeout'] = 24 * 60 * 60 # rotate after 24 hours
  1077. # logging['svlogd_filter'] = "gzip" # compress logs with gzip
  1078. # logging['svlogd_udp'] = nil # transmit log messages via UDP
  1079. # logging['svlogd_prefix'] = nil # custom prefix for log messages
  1080. # logging['logrotate_frequency'] = "daily" # rotate logs daily
  1081. # logging['logrotate_maxsize'] = nil # rotate logs when they grow bigger than size bytes even before the specified time interval (daily, weekly, monthly, or yearly)
  1082. # logging['logrotate_size'] = nil # do not rotate by size by default
  1083. # logging['logrotate_rotate'] = 30 # keep 30 rotated logs
  1084. # logging['logrotate_compress'] = "compress" # see 'man logrotate'
  1085. # logging['logrotate_method'] = "copytruncate" # see 'man logrotate'
  1086. # logging['logrotate_postrotate'] = nil # no postrotate command by default
  1087. # logging['logrotate_dateformat'] = nil # use date extensions for rotated files rather than numbers e.g. a value of "-%Y-%m-%d" would give rotated files like production.log-2016-03-09.gz
  1088. ### UDP log forwarding
  1089. ##! Docs: http://docs.gitlab.com/omnibus/settings/logs.html#udp-log-forwarding
  1090. ##! remote host to ship log messages to via UDP
  1091. # logging['udp_log_shipping_host'] = nil
  1092. ##! override the hostname used when logs are shipped via UDP,
  1093. ## by default the system hostname will be used.
  1094. # logging['udp_log_shipping_hostname'] = nil
  1095. ##! remote port to ship log messages to via UDP
  1096. # logging['udp_log_shipping_port'] = 514
  1097. ################################################################################
  1098. ## Logrotate
  1099. ##! Docs: https://docs.gitlab.com/omnibus/settings/logs.html#logrotate
  1100. ##! You can disable built in logrotate feature.
  1101. ################################################################################
  1102. # logrotate['enable'] = true
  1103. # logrotate['log_directory'] = "/var/log/gitlab/logrotate"
  1104. ################################################################################
  1105. ## Users and groups accounts
  1106. ##! Disable management of users and groups accounts.
  1107. ##! **Set only if creating accounts manually**
  1108. ##! Docs: https://docs.gitlab.com/omnibus/settings/configuration.html#disable-user-and-group-account-management
  1109. ################################################################################
  1110. # manage_accounts['enable'] = false
  1111. ################################################################################
  1112. ## Storage directories
  1113. ##! Disable managing storage directories
  1114. ##! Docs: https://docs.gitlab.com/omnibus/settings/configuration.html#disable-storage-directories-management
  1115. ################################################################################
  1116. ##! **Set only if the select directories are created manually**
  1117. # manage_storage_directories['enable'] = false
  1118. # manage_storage_directories['manage_etc'] = false
  1119. ################################################################################
  1120. ## Runtime directory
  1121. ##! Docs: https://docs.gitlab.com//omnibus/settings/configuration.html#configuring-runtime-directory
  1122. ################################################################################
  1123. # runtime_dir '/run'
  1124. ################################################################################
  1125. ## Git
  1126. ##! Advanced setting for configuring git system settings for omnibus-gitlab
  1127. ##! internal git
  1128. ################################################################################
  1129. ##! For multiple options under one header use array of comma separated values,
  1130. ##! eg.:
  1131. ##! { "receive" => ["fsckObjects = true"], "alias" => ["st = status", "co = checkout"] }
  1132. # omnibus_gitconfig['system'] = {
  1133. # "pack" => ["threads = 1"],
  1134. # "receive" => ["fsckObjects = true", "advertisePushOptions = true"],
  1135. # "repack" => ["writeBitmaps = true"],
  1136. # "transfer" => ["hideRefs=^refs/tmp/", "hideRefs=^refs/keep-around/", "hideRefs=^refs/remotes/"],
  1137. # }
  1138. ################################################################################
  1139. ## GitLab Pages
  1140. ##! Docs: https://docs.gitlab.com/ee/pages/administration.html
  1141. ################################################################################
  1142. ##! Define to enable GitLab Pages
  1143. # pages_external_url "http://pages.example.com/"
  1144. # gitlab_pages['enable'] = false
  1145. ##! Configure to expose GitLab Pages on external IP address, serving the HTTP
  1146. # gitlab_pages['external_http'] = []
  1147. ##! Configure to expose GitLab Pages on external IP address, serving the HTTPS
  1148. # gitlab_pages['external_https'] = []
  1149. ##! Configure to use the default list of cipher suites
  1150. # gitlab_pages['insecure_ciphers'] = false
  1151. ##! Configure to enable health check endpoint on GitLab Pages
  1152. # gitlab_pages['status_uri'] = "/@status"
  1153. ##! Tune the maximum number of concurrent connections GitLab Pages will handle.
  1154. ##! This should be in the range 1 - 10000, defaulting to 5000.
  1155. # gitlab_pages['max_connections'] = 5000
  1156. ##! Configure to use JSON structured logging in GitLab Pages
  1157. # gitlab_pages['log_format'] = "json"
  1158. ##! Configure verbose logging for GitLab Pages
  1159. # gitlab_pages['log_verbose'] = false
  1160. ##! Error Reporting and Logging with Sentry
  1161. # gitlab_pages['sentry_enabled'] = false
  1162. # gitlab_pages['sentry_dsn'] = 'https://<key>@sentry.io/<project>'
  1163. # gitlab_pages['sentry_environment'] = 'production'
  1164. ##! Listen for requests forwarded by reverse proxy
  1165. # gitlab_pages['listen_proxy'] = "localhost:8090"
  1166. ##! Configure GitLab Pages to use an HTTP Proxy
  1167. # gitlab_pages['http_proxy'] = "http://example:8080"
  1168. # gitlab_pages['redirect_http'] = true
  1169. # gitlab_pages['use_http2'] = true
  1170. # gitlab_pages['dir'] = "/var/opt/gitlab/gitlab-pages"
  1171. # gitlab_pages['log_directory'] = "/var/log/gitlab/gitlab-pages"
  1172. # gitlab_pages['artifacts_server'] = true
  1173. # gitlab_pages['artifacts_server_url'] = nil # Defaults to external_url + '/api/v4'
  1174. # gitlab_pages['artifacts_server_timeout'] = 10
  1175. ##! Environments that do not support bind-mounting should set this parameter to
  1176. ##! true. This is incompatible with the artifacts server
  1177. # gitlab_pages['inplace_chroot'] = false
  1178. ##! Prometheus metrics for Pages docs: https://gitlab.com/gitlab-org/gitlab-pages/#enable-prometheus-metrics
  1179. # gitlab_pages['metrics_address'] = ":9235"
  1180. ##! Specifies the minimum SSL/TLS version ("ssl3", "tls1.0", "tls1.1" or "tls1.2")
  1181. # gitlab_pages['tls_min_version'] = "ssl3"
  1182. ##! Specifies the maximum SSL/TLS version ("ssl3", "tls1.0", "tls1.1" or "tls1.2")
  1183. # gitlab_pages['tls_max_version'] = "tls1.2"
  1184. ##! Pages access control
  1185. # gitlab_pages['access_control'] = false
  1186. # gitlab_pages['gitlab_id'] = nil # Automatically generated if not present
  1187. # gitlab_pages['gitlab_secret'] = nil # Generated if not present
  1188. # gitlab_pages['auth_redirect_uri'] = nil # Defaults to projects subdomain of pages_external_url and + '/auth'
  1189. # gitlab_pages['gitlab_server'] = nil # Defaults to external_url
  1190. # gitlab_pages['auth_secret'] = nil # Generated if not present
  1191. ##! GitLab API HTTP client connection timeout
  1192. # gitlab_pages['gitlab_client_http_timeout'] = "10s"
  1193. ##! GitLab API JWT Token expiry time"
  1194. # gitlab_pages['gitlab_client_jwt_expiry'] = "30s"
  1195. ##! Define custom gitlab-pages HTTP headers for the whole instance
  1196. # gitlab_pages['headers'] = []
  1197. ##! Shared secret used for authentication between Pages and GitLab
  1198. # gitlab_pages['api_secret_key'] = nil # Will be generated if not set. Base64 encoded and exactly 32 bytes long.
  1199. ################################################################################
  1200. ## GitLab Pages NGINX
  1201. ################################################################################
  1202. # All the settings defined in the "GitLab Nginx" section are also available in
  1203. # this "GitLab Pages NGINX" section, using the key `pages_nginx`. However,
  1204. # those settings should be explicitly set. That is, settings given as
  1205. # `nginx['some_setting']` WILL NOT be automatically replicated as
  1206. # `pages_nginx['some_setting']` and should be set separately.
  1207. # Below you can find settings that are exclusive to "GitLab Pages NGINX"
  1208. # pages_nginx['enable'] = false
  1209. # gitlab_rails['pages_path'] = "/var/opt/gitlab/gitlab-rails/shared/pages"
  1210. ################################################################################
  1211. ## GitLab CI
  1212. ##! Docs: https://docs.gitlab.com/ee/ci/quick_start/README.html
  1213. ################################################################################
  1214. # gitlab_ci['gitlab_ci_all_broken_builds'] = true
  1215. # gitlab_ci['gitlab_ci_add_pusher'] = true
  1216. # gitlab_ci['builds_directory'] = '/var/opt/gitlab/gitlab-ci/builds'
  1217. ################################################################################
  1218. ## GitLab Mattermost
  1219. ##! Docs: https://docs.gitlab.com/omnibus/gitlab-mattermost
  1220. ################################################################################
  1221. # mattermost_external_url 'http://mattermost.example.com'
  1222. # mattermost['enable'] = false
  1223. # mattermost['username'] = 'mattermost'
  1224. # mattermost['group'] = 'mattermost'
  1225. # mattermost['uid'] = nil
  1226. # mattermost['gid'] = nil
  1227. # mattermost['home'] = '/var/opt/gitlab/mattermost'
  1228. # mattermost['database_name'] = 'mattermost_production'
  1229. # mattermost['env'] = {
  1230. # 'SSL_CERT_DIR' => "/opt/gitlab/embedded/ssl/certs/"
  1231. # }
  1232. # mattermost['service_address'] = "127.0.0.1"
  1233. # mattermost['service_port'] = "8065"
  1234. # mattermost['service_site_url'] = nil
  1235. # mattermost['service_allowed_untrusted_internal_connections'] = ""
  1236. # mattermost['service_enable_api_team_deletion'] = true
  1237. # mattermost['team_site_name'] = "GitLab Mattermost"
  1238. # mattermost['sql_driver_name'] = 'mysql'
  1239. # mattermost['sql_data_source'] = "mmuser:mostest@tcp(dockerhost:3306)/mattermost_test?charset=utf8mb4,utf8"
  1240. # mattermost['log_file_directory'] = '/var/log/gitlab/mattermost/'
  1241. # mattermost['gitlab_enable'] = false
  1242. # mattermost['gitlab_id'] = "12345656"
  1243. # mattermost['gitlab_secret'] = "123456789"
  1244. # mattermost['gitlab_scope'] = ""
  1245. # mattermost['gitlab_auth_endpoint'] = "http://gitlab.example.com/oauth/authorize"
  1246. # mattermost['gitlab_token_endpoint'] = "http://gitlab.example.com/oauth/token"
  1247. # mattermost['gitlab_user_api_endpoint'] = "http://gitlab.example.com/api/v4/user"
  1248. # mattermost['file_directory'] = "/var/opt/gitlab/mattermost/data"
  1249. # mattermost['plugin_directory'] = "/var/opt/gitlab/mattermost/plugins"
  1250. # mattermost['plugin_client_directory'] = "/var/opt/gitlab/mattermost/client-plugins"
  1251. ################################################################################
  1252. ## Mattermost NGINX
  1253. ################################################################################
  1254. # All the settings defined in the "GitLab Nginx" section are also available in
  1255. # this "Mattermost NGINX" section, using the key `mattermost_nginx`. However,
  1256. # those settings should be explicitly set. That is, settings given as
  1257. # `nginx['some_setting']` WILL NOT be automatically replicated as
  1258. # `mattermost_nginx['some_setting']` and should be set separately.
  1259. # Below you can find settings that are exclusive to "Mattermost NGINX"
  1260. # mattermost_nginx['enable'] = false
  1261. # mattermost_nginx['custom_gitlab_mattermost_server_config'] = "location ^~ /foo-namespace/bar-project/raw/ {\n deny all;\n}\n"
  1262. # mattermost_nginx['proxy_set_headers'] = {
  1263. # "Host" => "$http_host",
  1264. # "X-Real-IP" => "$remote_addr",
  1265. # "X-Forwarded-For" => "$proxy_add_x_forwarded_for",
  1266. # "X-Frame-Options" => "SAMEORIGIN",
  1267. # "X-Forwarded-Proto" => "https",
  1268. # "X-Forwarded-Ssl" => "on",
  1269. # "Upgrade" => "$http_upgrade",
  1270. # "Connection" => "$connection_upgrade"
  1271. # }
  1272. ################################################################################
  1273. ## Registry NGINX
  1274. ################################################################################
  1275. # All the settings defined in the "GitLab Nginx" section are also available in
  1276. # this "Registry NGINX" section, using the key `registry_nginx`. However, those
  1277. # settings should be explicitly set. That is, settings given as
  1278. # `nginx['some_setting']` WILL NOT be automatically replicated as
  1279. # `registry_nginx['some_setting']` and should be set separately.
  1280. # Below you can find settings that are exclusive to "Registry NGINX"
  1281. # registry_nginx['enable'] = false
  1282. # registry_nginx['proxy_set_headers'] = {
  1283. # "Host" => "$http_host",
  1284. # "X-Real-IP" => "$remote_addr",
  1285. # "X-Forwarded-For" => "$proxy_add_x_forwarded_for",
  1286. # "X-Forwarded-Proto" => "https",
  1287. # "X-Forwarded-Ssl" => "on"
  1288. # }
  1289. # When the registry is automatically enabled using the same domain as `external_url`,
  1290. # it listens on this port
  1291. # registry_nginx['listen_port'] = 5050
  1292. ################################################################################
  1293. ## Prometheus
  1294. ##! Docs: https://docs.gitlab.com/ee/administration/monitoring/prometheus/
  1295. ################################################################################
  1296. ###! **To enable only Monitoring service in this machine, uncomment
  1297. ###! the line below.**
  1298. ###! Docs: https://docs.gitlab.com/ee/administration/high_availability
  1299. # monitoring_role['enable'] = true
  1300. # prometheus['enable'] = true
  1301. # prometheus['monitor_kubernetes'] = true
  1302. # prometheus['username'] = 'gitlab-prometheus'
  1303. # prometheus['group'] = 'gitlab-prometheus'
  1304. # prometheus['uid'] = nil
  1305. # prometheus['gid'] = nil
  1306. # prometheus['shell'] = '/bin/sh'
  1307. # prometheus['home'] = '/var/opt/gitlab/prometheus'
  1308. # prometheus['log_directory'] = '/var/log/gitlab/prometheus'
  1309. # prometheus['rules_files'] = ['/var/opt/gitlab/prometheus/rules/*.rules']
  1310. # prometheus['scrape_interval'] = 15
  1311. # prometheus['scrape_timeout'] = 15
  1312. # prometheus['env_directory'] = '/opt/gitlab/etc/prometheus/env'
  1313. # prometheus['env'] = {
  1314. # 'SSL_CERT_DIR' => "/opt/gitlab/embedded/ssl/certs/"
  1315. # }
  1316. #
  1317. ### Custom scrape configs
  1318. #
  1319. # Prometheus can scrape additional jobs via scrape_configs. The default automatically
  1320. # includes all of the exporters supported by the omnibus config.
  1321. #
  1322. # See: https://prometheus.io/docs/operating/configuration/#<scrape_config>
  1323. #
  1324. # Example:
  1325. #
  1326. # prometheus['scrape_configs'] = [
  1327. # {
  1328. # 'job_name': 'example',
  1329. # 'static_configs' => [
  1330. # 'targets' => ['hostname:port'],
  1331. # ],
  1332. # },
  1333. # ]
  1334. #
  1335. ### Custom alertmanager config
  1336. #
  1337. # To configure external alertmanagers, create an alertmanager config.
  1338. #
  1339. # See: https://prometheus.io/docs/prometheus/latest/configuration/configuration/#alertmanager_config
  1340. #
  1341. # prometheus['alertmanagers'] = [
  1342. # {
  1343. # 'static_configs' => [
  1344. # {
  1345. # 'targets' => [
  1346. # 'hostname:port'
  1347. # ]
  1348. # }
  1349. # ]
  1350. # }
  1351. # ]
  1352. #
  1353. ### Custom Prometheus flags
  1354. #
  1355. # prometheus['flags'] = {
  1356. # 'storage.tsdb.path' => "/var/opt/gitlab/prometheus/data",
  1357. # 'storage.tsdb.retention.time' => "15d",
  1358. # 'config.file' => "/var/opt/gitlab/prometheus/prometheus.yml"
  1359. # }
  1360. ##! Advanced settings. Should be changed only if absolutely needed.
  1361. # prometheus['listen_address'] = 'localhost:9090'
  1362. ################################################################################
  1363. ## Prometheus Alertmanager
  1364. ################################################################################
  1365. # alertmanager['enable'] = true
  1366. # alertmanager['home'] = '/var/opt/gitlab/alertmanager'
  1367. # alertmanager['log_directory'] = '/var/log/gitlab/alertmanager'
  1368. # alertmanager['admin_email'] = 'admin@example.com'
  1369. # alertmanager['flags'] = {
  1370. # 'web.listen-address' => "localhost:9093"
  1371. # 'storage.path' => "/var/opt/gitlab/alertmanager/data"
  1372. # 'config.file' => "/var/opt/gitlab/alertmanager/alertmanager.yml"
  1373. # }
  1374. # alertmanager['env_directory'] = '/opt/gitlab/etc/alertmanager/env'
  1375. # alertmanager['env'] = {
  1376. # 'SSL_CERT_DIR' => "/opt/gitlab/embedded/ssl/certs/"
  1377. # }
  1378. ##! Advanced settings. Should be changed only if absolutely needed.
  1379. # alertmanager['listen_address'] = 'localhost:9093'
  1380. # alertmanager['global'] = {}
  1381. ################################################################################
  1382. ## Prometheus Node Exporter
  1383. ##! Docs: https://docs.gitlab.com/ee/administration/monitoring/prometheus/node_exporter.html
  1384. ################################################################################
  1385. # node_exporter['enable'] = true
  1386. # node_exporter['home'] = '/var/opt/gitlab/node-exporter'
  1387. # node_exporter['log_directory'] = '/var/log/gitlab/node-exporter'
  1388. # node_exporter['flags'] = {
  1389. # 'collector.textfile.directory' => "/var/opt/gitlab/node-exporter/textfile_collector"
  1390. # }
  1391. # node_exporter['env_directory'] = '/opt/gitlab/etc/node-exporter/env'
  1392. # node_exporter['env'] = {
  1393. # 'SSL_CERT_DIR' => "/opt/gitlab/embedded/ssl/certs/"
  1394. # }
  1395. ##! Advanced settings. Should be changed only if absolutely needed.
  1396. # node_exporter['listen_address'] = 'localhost:9100'
  1397. ################################################################################
  1398. ## Prometheus Redis exporter
  1399. ##! Docs: https://docs.gitlab.com/ee/administration/monitoring/prometheus/redis_exporter.html
  1400. ################################################################################
  1401. # redis_exporter['enable'] = true
  1402. # redis_exporter['log_directory'] = '/var/log/gitlab/redis-exporter'
  1403. # redis_exporter['flags'] = {
  1404. # 'redis.addr' => "unix:///var/opt/gitlab/redis/redis.socket",
  1405. # }
  1406. # redis_exporter['env_directory'] = '/opt/gitlab/etc/redis-exporter/env'
  1407. # redis_exporter['env'] = {
  1408. # 'SSL_CERT_DIR' => "/opt/gitlab/embedded/ssl/certs/"
  1409. # }
  1410. ##! Advanced settings. Should be changed only if absolutely needed.
  1411. # redis_exporter['listen_address'] = 'localhost:9121'
  1412. ################################################################################
  1413. ## Prometheus Postgres exporter
  1414. ##! Docs: https://docs.gitlab.com/ee/administration/monitoring/prometheus/postgres_exporter.html
  1415. ################################################################################
  1416. # postgres_exporter['enable'] = true
  1417. # postgres_exporter['home'] = '/var/opt/gitlab/postgres-exporter'
  1418. # postgres_exporter['log_directory'] = '/var/log/gitlab/postgres-exporter'
  1419. # postgres_exporter['flags'] = {}
  1420. # postgres_exporter['listen_address'] = 'localhost:9187'
  1421. # postgres_exporter['env_directory'] = '/opt/gitlab/etc/postgres-exporter/env'
  1422. # postgres_exporter['env'] = {
  1423. # 'SSL_CERT_DIR' => "/opt/gitlab/embedded/ssl/certs/"
  1424. # }
  1425. # postgres_exporter['sslmode'] = nil
  1426. ################################################################################
  1427. ## Prometheus PgBouncer exporter (EE only)
  1428. ##! Docs: https://docs.gitlab.com/ee/administration/monitoring/prometheus/pgbouncer_exporter.html
  1429. ################################################################################
  1430. # pgbouncer_exporter['enable'] = false
  1431. # pgbouncer_exporter['log_directory'] = "/var/log/gitlab/pgbouncer-exporter"
  1432. # pgbouncer_exporter['listen_address'] = 'localhost:9188'
  1433. # pgbouncer_exporter['env_directory'] = '/opt/gitlab/etc/pgbouncer-exporter/env'
  1434. # pgbouncer_exporter['env'] = {
  1435. # 'SSL_CERT_DIR' => "/opt/gitlab/embedded/ssl/certs/"
  1436. # }
  1437. ################################################################################
  1438. ## Prometheus Gitlab exporter
  1439. ##! Docs: https://docs.gitlab.com/ee/administration/monitoring/prometheus/gitlab_exporter.html
  1440. ################################################################################
  1441. # gitlab_exporter['enable'] = true
  1442. # gitlab_exporter['log_directory'] = "/var/log/gitlab/gitlab-exporter"
  1443. # gitlab_exporter['home'] = "/var/opt/gitlab/gitlab-exporter"
  1444. ##! Advanced settings. Should be changed only if absolutely needed.
  1445. # gitlab_exporter['listen_address'] = 'localhost'
  1446. # gitlab_exporter['listen_port'] = '9168'
  1447. ##! Manage gitlab-exporter sidekiq probes. false by default when Sentinels are
  1448. ##! found.
  1449. # gitlab_exporter['probe_sidekiq'] = true
  1450. # To completely disable prometheus, and all of it's exporters, set to false
  1451. # prometheus_monitoring['enable'] = true
  1452. ################################################################################
  1453. ## Grafana Dashboards
  1454. ##! Docs: https://docs.gitlab.com/ee/administration/monitoring/prometheus/#prometheus-as-a-grafana-data-source
  1455. ################################################################################
  1456. # grafana['enable'] = true
  1457. # grafana['log_directory'] = '/var/log/gitlab/grafana'
  1458. # grafana['home'] = '/var/opt/gitlab/grafana'
  1459. # grafana['admin_password'] = 'admin'
  1460. # grafana['allow_user_sign_up'] = false
  1461. # grafana['basic_auth_enabled'] = false
  1462. # grafana['disable_login_form'] = true
  1463. # grafana['gitlab_application_id'] = 'GITLAB_APPLICATION_ID'
  1464. # grafana['gitlab_secret'] = 'GITLAB_SECRET'
  1465. # grafana['env_directory'] = '/opt/gitlab/etc/grafana/env'
  1466. # grafana['allowed_groups'] = []
  1467. # grafana['gitlab_auth_sign_up'] = true
  1468. # grafana['env'] = {
  1469. # 'SSL_CERT_DIR' => "#{node['package']['install-dir']}/embedded/ssl/certs/"
  1470. # }
  1471. # grafana['metrics_enabled'] = false
  1472. # grafana['metrics_basic_auth_username'] = 'grafana_metrics' # default: nil
  1473. # grafana['metrics_basic_auth_password'] = 'please_set_a_unique_password' # default: nil
  1474. ### Dashboards
  1475. #
  1476. # See: http://docs.grafana.org/administration/provisioning/#dashboards
  1477. #
  1478. # NOTE: Setting this will override the default.
  1479. #
  1480. # grafana['dashboards'] = [
  1481. # {
  1482. # 'name' => 'GitLab Omnibus',
  1483. # 'orgId' => 1,
  1484. # 'folder' => 'GitLab Omnibus',
  1485. # 'type' => 'file',
  1486. # 'disableDeletion' => true,
  1487. # 'updateIntervalSeconds' => 600,
  1488. # 'options' => {
  1489. # 'path' => '/opt/gitlab/embedded/service/grafana-dashboards',
  1490. # }
  1491. # }
  1492. # ]
  1493. ### Datasources
  1494. #
  1495. # See: http://docs.grafana.org/administration/provisioning/#example-datasource-config-file
  1496. #
  1497. # NOTE: Setting this will override the default.
  1498. #
  1499. # grafana['datasources'] = [
  1500. # {
  1501. # 'name' => 'GitLab Omnibus',
  1502. # 'type' => 'prometheus',
  1503. # 'access' => 'proxy',
  1504. # 'url' => 'http://localhost:9090'
  1505. # }
  1506. # ]
  1507. ##! Advanced settings. Should be changed only if absolutely needed.
  1508. # grafana['http_addr'] = 'localhost'
  1509. # grafana['http_port'] = 3000
  1510. ################################################################################
  1511. ## Gitaly
  1512. ##! Docs:
  1513. ################################################################################
  1514. # The gitaly['enable'] option exists for the purpose of cluster
  1515. # deployments, see https://docs.gitlab.com/ee/administration/gitaly/index.html .
  1516. # gitaly['enable'] = true
  1517. # gitaly['dir'] = "/var/opt/gitlab/gitaly"
  1518. # gitaly['log_directory'] = "/var/log/gitlab/gitaly"
  1519. # gitaly['bin_path'] = "/opt/gitlab/embedded/bin/gitaly"
  1520. # gitaly['env_directory'] = "/opt/gitlab/etc/gitaly/env"
  1521. # gitaly['env'] = {
  1522. # 'PATH' => "/opt/gitlab/bin:/opt/gitlab/embedded/bin:/bin:/usr/bin",
  1523. # 'HOME' => '/var/opt/gitlab'
  1524. # }
  1525. ##! internal_socket_dir is the directory that will contain internal gitaly sockets,
  1526. ##! separate from socket_path which is the socket that external clients listen on
  1527. # gitaly['internal_socket_dir'] = "/var/opt/gitlab/gitaly"
  1528. # gitaly['socket_path'] = "/var/opt/gitlab/gitaly/gitaly.socket"
  1529. # gitaly['listen_addr'] = "localhost:8075"
  1530. # gitaly['tls_listen_addr'] = "localhost:9075"
  1531. # gitaly['certificate_path'] = "/var/opt/gitlab/gitaly/certificate.pem"
  1532. # gitaly['key_path'] = "/var/opt/gitlab/gitaly/key.pem"
  1533. # gitaly['prometheus_listen_addr'] = "localhost:9236"
  1534. # gitaly['logging_level'] = "warn"
  1535. # gitaly['logging_format'] = "json"
  1536. # gitaly['logging_sentry_dsn'] = "https://<key>:<secret>@sentry.io/<project>"
  1537. # gitaly['logging_ruby_sentry_dsn'] = "https://<key>:<secret>@sentry.io/<project>"
  1538. # gitaly['logging_sentry_environment'] = "production"
  1539. # gitaly['prometheus_grpc_latency_buckets'] = "[0.001, 0.005, 0.025, 0.1, 0.5, 1.0, 10.0, 30.0, 60.0, 300.0, 1500.0]"
  1540. # gitaly['auth_token'] = '<secret>'
  1541. # gitaly['auth_transitioning'] = false # When true, auth is logged to Prometheus but NOT enforced
  1542. # gitaly['graceful_restart_timeout'] = '1m' # Grace time for a gitaly process to finish ongoing requests
  1543. # gitaly['git_catfile_cache_size'] = 100 # Number of 'git cat-file' processes kept around for re-use
  1544. # gitaly['open_files_ulimit'] = 15000 # Maximum number of open files allowed for the gitaly process
  1545. # gitaly['ruby_max_rss'] = 300000000 # RSS threshold in bytes for triggering a gitaly-ruby restart
  1546. # gitaly['ruby_graceful_restart_timeout'] = '10m' # Grace time for a gitaly-ruby process to finish ongoing requests
  1547. # gitaly['ruby_restart_delay'] = '5m' # Period of sustained high RSS that needs to be observed before restarting gitaly-ruby
  1548. # gitaly['ruby_rugged_git_config_search_path'] = "/opt/gitlab/embedded/etc" # Location of system-wide gitconfig file
  1549. # gitaly['ruby_num_workers'] = 3 # Number of gitaly-ruby worker processes. Minimum 2, default 2.
  1550. # gitaly['concurrency'] = [
  1551. # {
  1552. # 'rpc' => "/gitaly.SmartHTTPService/PostReceivePack",
  1553. # 'max_per_repo' => 20
  1554. # }, {
  1555. # 'rpc' => "/gitaly.SSHService/SSHUploadPack",
  1556. # 'max_per_repo' => 5
  1557. # }
  1558. # ]
  1559. ################################################################################
  1560. ## Praefect
  1561. ##! Docs: https://gitlab.com/gitlab-org/gitaly/blob/master/doc/design_ha.md
  1562. ################################################################################
  1563. # praefect['enable'] = false
  1564. # praefect['virtual_storage_name'] = "praefect"
  1565. # praefect['failover_enabled'] = false
  1566. # praefect['auth_token'] = ""
  1567. # praefect['auth_transitioning'] = false
  1568. # praefect['listen_addr'] = "localhost:2305"
  1569. # praefect['prometheus_listen_addr'] = "localhost:9652"
  1570. # praefect['prometheus_grpc_latency_buckets'] = "[0.001, 0.005, 0.025, 0.1, 0.5, 1.0, 10.0, 30.0, 60.0, 300.0, 1500.0]"
  1571. # praefect['logging_level'] = "warn"
  1572. # praefect['logging_format'] = "json"
  1573. # praefect['virtual_storages'] = {
  1574. # 'default' => {
  1575. # 'praefect-internal-0' => {
  1576. # 'address' => 'tcp://10.23.56.78:8075',
  1577. # 'token' => 'abc123'
  1578. # },
  1579. # 'praefect-internal-1' => {
  1580. # 'address' => 'tcp://10.76.23.31:8075',
  1581. # 'token' => 'xyz456'
  1582. # }
  1583. # },
  1584. # 'alternative' => {
  1585. # 'praefect-internal-2' => {
  1586. # 'address' => 'tcp://10.34.1.16:8075',
  1587. # 'token' => 'abc321'
  1588. # },
  1589. # 'praefect-internal-3' => {
  1590. # 'address' => 'tcp://10.23.18.6:8075',
  1591. # 'token' => 'xyz890'
  1592. # }
  1593. # }
  1594. # }
  1595. # praefect['sentry_dsn'] = "https://<key>:<secret>@sentry.io/<project>"
  1596. # praefect['sentry_environment'] = "production"
  1597. # praefect['database_host'] = 'postgres.internal'
  1598. # praefect['database_port'] = 5432
  1599. # praefect['database_user'] = 'praefect'
  1600. # praefect['database_password'] = 'secret'
  1601. # praefect['database_dbname'] = 'praefect_production'
  1602. # praefect['database_sslmode'] = 'disable'
  1603. # praefect['database_sslcert'] = '/path/to/client-cert'
  1604. # praefect['database_sslkey'] = '/path/to/client-key'
  1605. # praefect['database_sslrootcert'] = '/path/to/rootcert'
  1606. ################################################################################
  1607. # Storage check
  1608. ################################################################################
  1609. # storage_check['enable'] = false
  1610. # storage_check['target'] = 'unix:///var/opt/gitlab/gitlab-rails/sockets/gitlab.socket'
  1611. # storage_check['log_directory'] = '/var/log/gitlab/storage-check'
  1612. ################################################################################
  1613. # Let's Encrypt integration
  1614. ################################################################################
  1615. {% if enable_https %}
  1616. letsencrypt['enable'] = true
  1617. letsencrypt['contact_emails'] = [ '{{ letsencrypt_email }}' ] # This should be an array of email addresses to add as contacts
  1618. letsencrypt['group'] = 'root'
  1619. letsencrypt['key_size'] = 4096
  1620. letsencrypt['owner'] = 'root'
  1621. letsencrypt['wwwroot'] = '/var/opt/gitlab/nginx/www'
  1622. # See http://docs.gitlab.com/omnibus/settings/ssl.html#automatic-renewal for more on these sesttings
  1623. letsencrypt['auto_renew'] = true
  1624. letsencrypt['auto_renew_hour'] = 0
  1625. letsencrypt['auto_renew_minute'] = 54 # Should be a number or cron expression, if specified.
  1626. letsencrypt['auto_renew_day_of_month'] = "*/4"
  1627. {% else %}
  1628. # letsencrypt['enable'] = nil
  1629. # letsencrypt['contact_emails'] = [] # This should be an array of email addresses to add as contacts
  1630. # letsencrypt['group'] = 'root'
  1631. # letsencrypt['key_size'] = 2048
  1632. # letsencrypt['owner'] = 'root'
  1633. # letsencrypt['wwwroot'] = '/var/opt/gitlab/nginx/www'
  1634. # See http://docs.gitlab.com/omnibus/settings/ssl.html#automatic-renewal for more on these sesttings
  1635. # letsencrypt['auto_renew'] = true
  1636. # letsencrypt['auto_renew_hour'] = 0
  1637. # letsencrypt['auto_renew_minute'] = nil # Should be a number or cron expression, if specified.
  1638. # letsencrypt['auto_renew_day_of_month'] = "*/4"
  1639. {% endif %}
  1640. ##! Turn off automatic init system detection. To skip init detection in
  1641. ##! non-docker containers. Recommended not to change.
  1642. # package['detect_init'] = true
  1643. ##! Specify maximum number of tasks that can be created by the systemd unit
  1644. ##! Will be populated as TasksMax value to the unit file if user is on a systemd
  1645. ##! version that supports it (>= 227). Will be a no-op if user is not on systemd.
  1646. # package['systemd_tasks_max'] = 4915
  1647. ##! Settings to configure order of GitLab's systemd unit.
  1648. ##! Note: We do not recommend changing these values unless absolutely necessary
  1649. # package['systemd_after'] = 'multi-user.target'
  1650. # package['systemd_wanted_by'] = 'multi-user.target'
  1651. ################################################################################
  1652. ################################################################################
  1653. ## Configuration Settings for GitLab EE only ##
  1654. ################################################################################
  1655. ################################################################################
  1656. ################################################################################
  1657. ## Auxiliary cron jobs applicable to GitLab EE only
  1658. ################################################################################
  1659. #
  1660. # gitlab_rails['geo_file_download_dispatch_worker_cron'] = "*/10 * * * *"
  1661. # gitlab_rails['geo_repository_sync_worker_cron'] = "*/5 * * * *"
  1662. # gitlab_rails['geo_secondary_registry_consistency_worker'] = "* * * * *"
  1663. # gitlab_rails['geo_prune_event_log_worker_cron'] = "*/5 * * * *"
  1664. # gitlab_rails['geo_repository_verification_primary_batch_worker_cron'] = "*/5 * * * *"
  1665. # gitlab_rails['geo_repository_verification_secondary_scheduler_worker_cron'] = "*/5 * * * *"
  1666. # gitlab_rails['geo_migrated_local_files_clean_up_worker_cron'] = "15 */6 * * *"
  1667. # gitlab_rails['ldap_sync_worker_cron'] = "30 1 * * *"
  1668. # gitlab_rails['ldap_group_sync_worker_cron'] = "0 * * * *"
  1669. # gitlab_rails['historical_data_worker_cron'] = "0 12 * * *"
  1670. # gitlab_rails['pseudonymizer_worker_cron'] = "0 23 * * *"
  1671. # gitlab_rails['elastic_index_bulk_cron'] = "*/1 * * * *"
  1672. ################################################################################
  1673. ## Kerberos (EE Only)
  1674. ##! Docs: https://docs.gitlab.com/ee/integration/kerberos.html#http-git-access
  1675. ################################################################################
  1676. # gitlab_rails['kerberos_enabled'] = true
  1677. # gitlab_rails['kerberos_keytab'] = /etc/http.keytab
  1678. # gitlab_rails['kerberos_service_principal_name'] = HTTP/gitlab.example.com@EXAMPLE.COM
  1679. # gitlab_rails['kerberos_use_dedicated_port'] = true
  1680. # gitlab_rails['kerberos_port'] = 8443
  1681. # gitlab_rails['kerberos_https'] = true
  1682. ################################################################################
  1683. ## Package repository (EE Only)
  1684. ##! Docs: https://docs.gitlab.com/ee/administration/maven_packages.md
  1685. ################################################################################
  1686. # gitlab_rails['packages_enabled'] = true
  1687. # gitlab_rails['packages_storage_path'] = "/var/opt/gitlab/gitlab-rails/shared/packages"
  1688. # gitlab_rails['packages_object_store_enabled'] = false
  1689. # gitlab_rails['packages_object_store_direct_upload'] = false
  1690. # gitlab_rails['packages_object_store_background_upload'] = true
  1691. # gitlab_rails['packages_object_store_proxy_download'] = false
  1692. # gitlab_rails['packages_object_store_remote_directory'] = "packages"
  1693. # gitlab_rails['packages_object_store_connection'] = {
  1694. # 'provider' => 'AWS',
  1695. # 'region' => 'eu-west-1',
  1696. # 'aws_access_key_id' => 'AWS_ACCESS_KEY_ID',
  1697. # 'aws_secret_access_key' => 'AWS_SECRET_ACCESS_KEY',
  1698. # # # The below options configure an S3 compatible host instead of AWS
  1699. # # 'host' => 's3.amazonaws.com',
  1700. # # 'aws_signature_version' => 4, # For creation of signed URLs. Set to 2 if provider does not support v4.
  1701. # # 'endpoint' => 'https://s3.amazonaws.com', # default: nil - Useful for S3 compliant services such as DigitalOcean Spaces
  1702. # # 'path_style' => false # Use 'host/bucket_name/object' instead of 'bucket_name.host/object'
  1703. # }
  1704. ################################################################################
  1705. ## Dependency proxy (EE Only)
  1706. ##! Docs: https://docs.gitlab.com/ee/administration/dependency_proxy.md
  1707. ################################################################################
  1708. # gitlab_rails['dependency_proxy_enabled'] = true
  1709. # gitlab_rails['dependency_proxy_storage_path'] = "/var/opt/gitlab/gitlab-rails/shared/dependency_proxy"
  1710. # gitlab_rails['dependency_proxy_object_store_enabled'] = false
  1711. # gitlab_rails['dependency_proxy_object_store_direct_upload'] = false
  1712. # gitlab_rails['dependency_proxy_object_store_background_upload'] = true
  1713. # gitlab_rails['dependency_proxy_object_store_proxy_download'] = false
  1714. # gitlab_rails['dependency_proxy_object_store_remote_directory'] = "dependency_proxy"
  1715. # gitlab_rails['dependency_proxy_object_store_connection'] = {
  1716. # 'provider' => 'AWS',
  1717. # 'region' => 'eu-west-1',
  1718. # 'aws_access_key_id' => 'AWS_ACCESS_KEY_ID',
  1719. # 'aws_secret_access_key' => 'AWS_SECRET_ACCESS_KEY',
  1720. # # # The below options configure an S3 compatible host instead of AWS
  1721. # # 'host' => 's3.amazonaws.com',
  1722. # # 'aws_signature_version' => 4, # For creation of signed URLs. Set to 2 if provider does not support v4.
  1723. # # 'endpoint' => 'https://s3.amazonaws.com', # default: nil - Useful for S3 compliant services such as DigitalOcean Spaces
  1724. # # 'path_style' => false # Use 'host/bucket_name/object' instead of 'bucket_name.host/object'
  1725. # }
  1726. ################################################################################
  1727. ## GitLab Sentinel (EE Only)
  1728. ##! Docs: http://docs.gitlab.com/ce/administration/high_availability/redis.html#high-availability-with-sentinel
  1729. ################################################################################
  1730. ##! **Make sure you configured all redis['master_*'] keys above before
  1731. ##! continuing.**
  1732. ##! To enable Sentinel and disable all other services in this machine,
  1733. ##! uncomment the line below (if you've enabled Redis role, it will keep it).
  1734. ##! Docs: https://docs.gitlab.com/ee/administration/high_availability/redis.html
  1735. # redis_sentinel_role['enable'] = true
  1736. # sentinel['enable'] = true
  1737. ##! Bind to all interfaces, uncomment to specify an IP and bind to a single one
  1738. # sentinel['bind'] = '0.0.0.0'
  1739. ##! Uncomment to change default port
  1740. # sentinel['port'] = 26379
  1741. #### Support to run sentinels in a Docker or NAT environment
  1742. #####! Docs: https://redis.io/topics/sentinel#sentinel-docker-nat-and-possible-issues
  1743. # In an standard case, Sentinel will run in the same network service as Redis, so the same IP will be announce for Redis and Sentinel
  1744. # Only define these values if it is needed to announce for Sentinel a differen IP service than Redis
  1745. # sentinel['announce_ip'] = nil # If not defined, its value will be taken from redis['announce_ip'] or nil if not present
  1746. # sentinel['announce_port'] = nil # If not defined, its value will be taken from sentinel['port'] or nil if redis['announce_ip'] not present
  1747. ##! Quorum must reflect the amount of voting sentinels it take to start a
  1748. ##! failover.
  1749. ##! **Value must NOT be greater then the amount of sentinels.**
  1750. ##! The quorum can be used to tune Sentinel in two ways:
  1751. ##! 1. If a the quorum is set to a value smaller than the majority of Sentinels
  1752. ##! we deploy, we are basically making Sentinel more sensible to master
  1753. ##! failures, triggering a failover as soon as even just a minority of
  1754. ##! Sentinels is no longer able to talk with the master.
  1755. ##! 2. If a quorum is set to a value greater than the majority of Sentinels, we
  1756. ##! are making Sentinel able to failover only when there are a very large
  1757. ##! number (larger than majority) of well connected Sentinels which agree
  1758. ##! about the master being down.
  1759. # sentinel['quorum'] = 1
  1760. ### Consider unresponsive server down after x amount of ms.
  1761. # sentinel['down_after_milliseconds'] = 10000
  1762. ### Specifies the failover timeout in milliseconds.
  1763. ##! It is used in many ways:
  1764. ##!
  1765. ##! - The time needed to re-start a failover after a previous failover was
  1766. ##! already tried against the same master by a given Sentinel, is two
  1767. ##! times the failover timeout.
  1768. ##!
  1769. ##! - The time needed for a slave replicating to a wrong master according
  1770. ##! to a Sentinel current configuration, to be forced to replicate
  1771. ##! with the right master, is exactly the failover timeout (counting since
  1772. ##! the moment a Sentinel detected the misconfiguration).
  1773. ##!
  1774. ##! - The time needed to cancel a failover that is already in progress but
  1775. ##! did not produced any configuration change (SLAVEOF NO ONE yet not
  1776. ##! acknowledged by the promoted slave).
  1777. ##!
  1778. ##! - The maximum time a failover in progress waits for all the slaves to be
  1779. ##! reconfigured as slaves of the new master. However even after this time
  1780. ##! the slaves will be reconfigured by the Sentinels anyway, but not with
  1781. ##! the exact parallel-syncs progression as specified.
  1782. # sentinel['failover_timeout'] = 60000
  1783. ################################################################################
  1784. ## GitLab Sidekiq Cluster (EE only)
  1785. ################################################################################
  1786. ##! GitLab Enterprise Edition allows one to start an extra set of Sidekiq processes
  1787. ##! besides the default one. These processes can be used to consume a dedicated set
  1788. ##! of queues. This can be used to ensure certain queues always have dedicated
  1789. ##! workers, no matter the amount of jobs that need to be processed.
  1790. # sidekiq_cluster['enable'] = false
  1791. # sidekiq_cluster['ha'] = false
  1792. # sidekiq_cluster['log_directory'] = "/var/log/gitlab/sidekiq-cluster"
  1793. # sidekiq_cluster['interval'] = 5 # The number of seconds to wait between worker checks
  1794. # sidekiq_cluster['max_concurrency'] = 50 # The maximum number of threads each Sidekiq process should run
  1795. # sidekiq_cluster['min_concurrency'] = 0 # The minimum number of threads each Sidekiq process should run
  1796. ##! Each entry in the queue_groups array denotes a group of queues that have to be processed by a
  1797. ##! Sidekiq process. Multiple queues can be processed by the same process by
  1798. ##! separating them with a comma within the group entry
  1799. # sidekiq_cluster['queue_groups'] = [
  1800. # "process_commit,post_receive",
  1801. # "gitlab_shell"
  1802. # ]
  1803. #
  1804. ##! If negate is enabled then sidekiq-cluster will process all the queues that
  1805. ##! don't match those in queue_groups.
  1806. # sidekiq_cluster['negate'] = false
  1807. ################################################################################
  1808. ## Additional Database Settings (EE only)
  1809. ##! Docs: https://docs.gitlab.com/ee/administration/database_load_balancing.html
  1810. ################################################################################
  1811. # gitlab_rails['db_load_balancing'] = { 'hosts' => ['secondary1.example.com'] }
  1812. ################################################################################
  1813. ## GitLab Geo
  1814. ##! Docs: https://docs.gitlab.com/ee/gitlab-geo
  1815. ################################################################################
  1816. # geo_primary_role['enable'] = false
  1817. # geo_secondary_role['enable'] = false
  1818. # This is an optional identifier which Geo nodes can use to identify themselves.
  1819. # For example, if external_url is the same for two secondaries, you must specify
  1820. # a unique Geo node name for those secondaries.
  1821. #
  1822. # If it is blank, it defaults to external_url.
  1823. # gitlab_rails['geo_node_name'] = nil
  1824. # gitlab_rails['geo_registry_replication_enabled'] = true
  1825. # gitlab_rails['geo_registry_replication_primary_api_url'] = 'https://example.com:5000'
  1826. ################################################################################
  1827. ## GitLab Geo Secondary (EE only)
  1828. ################################################################################
  1829. # geo_secondary['auto_migrate'] = true
  1830. # geo_secondary['db_adapter'] = "postgresql"
  1831. # geo_secondary['db_encoding'] = "unicode"
  1832. # geo_secondary['db_collation'] = nil
  1833. # geo_secondary['db_database'] = "gitlabhq_geo_production"
  1834. # geo_secondary['db_pool'] = 1
  1835. # geo_secondary['db_username'] = "gitlab_geo"
  1836. # geo_secondary['db_password'] = nil
  1837. # geo_secondary['db_host'] = "/var/opt/gitlab/geo-postgresql"
  1838. # geo_secondary['db_port'] = 5431
  1839. # geo_secondary['db_socket'] = nil
  1840. # geo_secondary['db_sslmode'] = nil
  1841. # geo_secondary['db_sslcompression'] = 0
  1842. # geo_secondary['db_sslrootcert'] = nil
  1843. # geo_secondary['db_sslca'] = nil
  1844. # geo_secondary['db_fdw'] = true
  1845. ################################################################################
  1846. ## GitLab Geo Secondary Tracking Database (EE only)
  1847. ################################################################################
  1848. # geo_postgresql['enable'] = false
  1849. # geo_postgresql['ha'] = false
  1850. # geo_postgresql['dir'] = '/var/opt/gitlab/geo-postgresql'
  1851. # geo_postgresql['data_dir'] = '/var/opt/gitlab/geo-postgresql/data'
  1852. # geo_postgresql['pgbouncer_user'] = nil
  1853. # geo_postgresql['pgbouncer_user_password'] = nil
  1854. ##! `SQL_USER_PASSWORD_HASH` can be generated using the command `gitlab-ctl pg-password-md5 gitlab`
  1855. # geo_postgresql['sql_user_password'] = 'SQL_USER_PASSWORD_HASH'
  1856. ################################################################################
  1857. ## Unleash
  1858. ##! Docs: https://docs.gitlab.com/ee/user/project/operations/feature_flags.html
  1859. ################################################################################
  1860. # gitlab_rails['feature_flags_unleash_enabled'] = false
  1861. # gitlab_rails['feature_flags_unleash_url'] = nil
  1862. # gitlab_rails['feature_flags_unleash_app_name'] = nil
  1863. # gitlab_rails['feature_flags_unleash_instance_id'] = nil
  1864. ################################################################################
  1865. # Pgbouncer (EE only)
  1866. # See [GitLab PgBouncer documentation](http://docs.gitlab.com/omnibus/settings/database.html#enabling-pgbouncer-ee-only)
  1867. # See the [PgBouncer page](https://pgbouncer.github.io/config.html) for details
  1868. ################################################################################
  1869. # pgbouncer['enable'] = false
  1870. # pgbouncer['log_directory'] = '/var/log/gitlab/pgbouncer'
  1871. # pgbouncer['data_directory'] = '/var/opt/gitlab/pgbouncer'
  1872. # pgbouncer['env_directory'] = '/opt/gitlab/etc/pgbouncer/env'
  1873. # pgbouncer['env'] = {
  1874. # 'SSL_CERT_DIR' => "/opt/gitlab/embedded/ssl/certs/"
  1875. # }
  1876. # pgbouncer['listen_addr'] = '0.0.0.0'
  1877. # pgbouncer['listen_port'] = '6432'
  1878. # pgbouncer['pool_mode'] = 'transaction'
  1879. # pgbouncer['server_reset_query'] = 'DISCARD ALL'
  1880. # pgbouncer['application_name_add_host'] = '1'
  1881. # pgbouncer['max_client_conn'] = '2048'
  1882. # pgbouncer['default_pool_size'] = '100'
  1883. # pgbouncer['min_pool_size'] = '0'
  1884. # pgbouncer['reserve_pool_size'] = '5'
  1885. # pgbouncer['reserve_pool_timeout'] = '5.0'
  1886. # pgbouncer['server_round_robin'] = '0'
  1887. # pgbouncer['log_connections'] = '0'
  1888. # pgbouncer['server_idle_timeout'] = '30'
  1889. # pgbouncer['dns_max_ttl'] = '15.0'
  1890. # pgbouncer['dns_zone_check_period'] = '0'
  1891. # pgbouncer['dns_nxdomain_ttl'] = '15.0'
  1892. # pgbouncer['admin_users'] = %w(gitlab-psql postgres pgbouncer)
  1893. # pgbouncer['stats_users'] = %w(gitlab-psql postgres pgbouncer)
  1894. # pgbouncer['ignore_startup_parameters'] = 'extra_float_digits'
  1895. # pgbouncer['databases'] = {
  1896. # DATABASE_NAME: {
  1897. # host: HOSTNAME,
  1898. # port: PORT
  1899. # user: USERNAME,
  1900. # password: PASSWORD
  1901. ###! generate this with `echo -n '$password + $username' | md5sum`
  1902. # }
  1903. # ...
  1904. # }
  1905. # pgbouncer['logfile'] = nil
  1906. # pgbouncer['unix_socket_dir'] = nil
  1907. # pgbouncer['unix_socket_mode'] = '0777'
  1908. # pgbouncer['unix_socket_group'] = nil
  1909. # pgbouncer['auth_type'] = 'md5'
  1910. # pgbouncer['auth_hba_file'] = nil
  1911. # pgbouncer['auth_query'] = 'SELECT username, password FROM public.pg_shadow_lookup($1)'
  1912. # pgbouncer['users'] = {
  1913. # {
  1914. # name: USERNAME,
  1915. # password: MD5_PASSWORD_HASH
  1916. # }
  1917. # }
  1918. # postgresql['pgbouncer_user'] = nil
  1919. # postgresql['pgbouncer_user_password'] = nil
  1920. # pgbouncer['server_reset_query_always'] = 0
  1921. # pgbouncer['server_check_query'] = 'select 1'
  1922. # pgbouncer['server_check_delay'] = 30
  1923. # pgbouncer['max_db_connections'] = nil
  1924. # pgbouncer['max_user_connections'] = nil
  1925. # pgbouncer['syslog'] = 0
  1926. # pgbouncer['syslog_facility'] = 'daemon'
  1927. # pgbouncer['syslog_ident'] = 'pgbouncer'
  1928. # pgbouncer['log_disconnections'] = 1
  1929. # pgbouncer['log_pooler_errors'] = 1
  1930. # pgbouncer['stats_period'] = 60
  1931. # pgbouncer['verbose'] = 0
  1932. # pgbouncer['server_lifetime'] = 3600
  1933. # pgbouncer['server_connect_timeout'] = 15
  1934. # pgbouncer['server_login_retry'] = 15
  1935. # pgbouncer['query_timeout'] = 0
  1936. # pgbouncer['query_wait_timeout'] = 120
  1937. # pgbouncer['client_idle_timeout'] = 0
  1938. # pgbouncer['client_login_timeout'] = 60
  1939. # pgbouncer['autodb_idle_timeout'] = 3600
  1940. # pgbouncer['suspend_timeout'] = 10
  1941. # pgbouncer['idle_transaction_timeout'] = 0
  1942. # pgbouncer['pkt_buf'] = 4096
  1943. # pgbouncer['listen_backlog'] = 128
  1944. # pgbouncer['sbuf_loopcnt'] = 5
  1945. # pgbouncer['max_packet_size'] = 2147483647
  1946. # pgbouncer['tcp_defer_accept'] = 0
  1947. # pgbouncer['tcp_socket_buffer'] = 0
  1948. # pgbouncer['tcp_keepalive'] = 1
  1949. # pgbouncer['tcp_keepcnt'] = 0
  1950. # pgbouncer['tcp_keepidle'] = 0
  1951. # pgbouncer['tcp_keepintvl'] = 0
  1952. # pgbouncer['disable_pqexec'] = 0
  1953. ## Pgbouncer client TLS options
  1954. # pgbouncer['client_tls_sslmode'] = 'disable'
  1955. # pgbouncer['client_tls_ca_file'] = nil
  1956. # pgbouncer['client_tls_key_file'] = nil
  1957. # pgbouncer['client_tls_cert_file'] = nil
  1958. # pgbouncer['client_tls_protocols'] = 'all'
  1959. # pgbouncer['client_tls_dheparams'] = 'auto'
  1960. # pgbouncer['client_tls_ecdhcurve'] = 'auto'
  1961. #
  1962. ## Pgbouncer server TLS options
  1963. # pgbouncer['server_tls_sslmode'] = 'disable'
  1964. # pgbouncer['server_tls_ca_file'] = nil
  1965. # pgbouncer['server_tls_key_file'] = nil
  1966. # pgbouncer['server_tls_cert_file'] = nil
  1967. # pgbouncer['server_tls_protocols'] = 'all'
  1968. # pgbouncer['server_tls_ciphers'] = 'fast'
  1969. ################################################################################
  1970. # Repmgr (EE only)
  1971. ################################################################################
  1972. # repmgr['enable'] = false
  1973. # repmgr['cluster'] = 'gitlab_cluster'
  1974. # repmgr['database'] = 'gitlab_repmgr'
  1975. # repmgr['host'] = nil
  1976. # repmgr['node_number'] = nil
  1977. # repmgr['port'] = 5432
  1978. # repmgr['trust_auth_cidr_addresses'] = []
  1979. # repmgr['user'] = 'gitlab_repmgr'
  1980. # repmgr['sslmode'] = 'prefer'
  1981. # repmgr['sslcompression'] = 0
  1982. # repmgr['failover'] = 'automatic'
  1983. # repmgr['log_directory'] = '/var/log/gitlab/repmgrd'
  1984. # repmgr['node_name'] = nil
  1985. # repmgr['pg_bindir'] = '/opt/gitlab/embedded/bin'
  1986. # repmgr['service_start_command'] = '/opt/gitlab/bin/gitlab-ctl start postgresql'
  1987. # repmgr['service_stop_command'] = '/opt/gitlab/bin/gitlab-ctl stop postgresql'
  1988. # repmgr['service_reload_command'] = '/opt/gitlab/bin/gitlab-ctl hup postgresql'
  1989. # repmgr['service_restart_command'] = '/opt/gitlab/bin/gitlab-ctl restart postgresql'
  1990. # repmgr['service_promote_command'] = nil
  1991. # repmgr['promote_command'] = '/opt/gitlab/embedded/bin/repmgr standby promote -f /var/opt/gitlab/postgresql/repmgr.conf'
  1992. # repmgr['follow_command'] = '/opt/gitlab/embedded/bin/repmgr standby follow -f /var/opt/gitlab/postgresql/repmgr.conf'
  1993. # repmgr['upstream_node'] = nil
  1994. # repmgr['use_replication_slots'] = false
  1995. # repmgr['loglevel'] = 'INFO'
  1996. # repmgr['logfacility'] = 'STDERR'
  1997. # repmgr['logfile'] = nil
  1998. # repmgr['event_notification_command'] = nil
  1999. # repmgr['event_notifications'] = nil
  2000. # repmgr['rsync_options'] = nil
  2001. # repmgr['ssh_options'] = nil
  2002. # repmgr['priority'] = nil
  2003. #
  2004. # HA setting to specify if a node should attempt to be master on initialization
  2005. # repmgr['master_on_initialization'] = true
  2006. # repmgr['retry_promote_interval_secs'] = 300
  2007. # repmgr['witness_repl_nodes_sync_interval_secs'] = 15
  2008. # repmgr['reconnect_attempts'] = 6
  2009. # repmgr['reconnect_interval'] = 10
  2010. # repmgr['monitor_interval_secs'] = 2
  2011. # repmgr['master_response_timeout'] = 60
  2012. # repmgr['daemon'] = true
  2013. # repmgrd['enable'] = true
  2014. ################################################################################
  2015. # Consul (EEP only)
  2016. ################################################################################
  2017. # consul['enable'] = false
  2018. # consul['dir'] = '/var/opt/gitlab/consul'
  2019. # consul['user'] = 'gitlab-consul'
  2020. # consul['group'] = 'gitlab-consul'
  2021. # consul['config_file'] = '/var/opt/gitlab/consul/config.json'
  2022. # consul['config_dir'] = '/var/opt/gitlab/consul/config.d'
  2023. # consul['data_dir'] = '/var/opt/gitlab/consul/data'
  2024. # consul['log_directory'] = '/var/log/gitlab/consul'
  2025. # consul['env_directory'] = '/opt/gitlab/etc/consul/env'
  2026. # consul['env'] = {
  2027. # 'SSL_CERT_DIR' => "/opt/gitlab/embedded/ssl/certs/"
  2028. # }
  2029. # consul['monitoring_service_discovery'] = false
  2030. # consul['node_name'] = nil
  2031. # consul['script_directory'] = '/var/opt/gitlab/consul/scripts'
  2032. # consul['configuration'] = {
  2033. # 'client_addr' => nil,
  2034. # 'datacenter' => 'gitlab_consul',
  2035. # 'enable_script_checks' => true,
  2036. # 'server' => false
  2037. # }
  2038. # consul['services'] = []
  2039. # consul['service_config'] = {
  2040. # 'postgresql' => {
  2041. # 'service' => {
  2042. # 'name' => "postgresql",
  2043. # 'address' => '',
  2044. # 'port' => 5432,
  2045. # 'checks' => [
  2046. # {
  2047. # 'script' => "/var/opt/gitlab/consul/scripts/check_postgresql",
  2048. # 'interval' => "10s"
  2049. # }
  2050. # ]
  2051. # }
  2052. # }
  2053. # }
  2054. # consul['watchers'] = {
  2055. # 'postgresql' => {
  2056. # enable: false,
  2057. # handler: 'failover_pgbouncer'
  2058. # }
  2059. # }