%label.append-bottom-0.js-cluster-enable-toggle-area{title: s_('ClusterIntegration|Enable or disable GitLab\'s connection to your Kubernetes cluster.'),data: {toggle: 'tooltip',container: 'body'}}
=s_("ClusterIntegration| is the default environment scope for this cluster. This means that all jobs, regardless of their environment, will use this cluster. %{environment_scope_start}More information%{environment_scope_end}").html_safe%{environment_scope_start: environment_scope_start,environment_scope_end: '</a>'.html_safe}
.form-group
...
...
@@ -29,7 +31,8 @@
=s_('ClusterIntegration|Specifying a domain will allow you to use Auto Review Apps and Auto Deploy stages for %{auto_devops_start}Auto DevOps%{auto_devops_end}. The domain should have a wildcard DNS configured matching the domain.').html_safe%{auto_devops_start: auto_devops_start,auto_devops_end: '</a>'.html_safe}
with [John Northrup](https://gitlab.com/northrup), and live questions coming
in from some of our customers.
## Maturity levels
### Level 1: Single-node Omnibus installation
This solution is appropriate for many teams that have a single server at their disposal. With automatic backup of the GitLab repositories, configuration, and the database, this can be an optimal solution if you don't have strict availability requirements.
This configuration is supported in [GitLab Starter, Premium and Ultimate](https://about.gitlab.com/pricing/).
By separating components you can see a number of advantages compared to a single-node setup. Namely, you can:
- Increase the number of users
- Enable zero-downtime upgrades
- Increase availability
Additional application nodes will handle frontend traffic, with a load balancer in front to distribute traffic across those nodes. Meanwhile, each application node connects to a shared file server and database systems on the back end. This way, if one of the application servers fails, the workflow is not interrupted.
This configuration is supported in [GitLab Starter, Premium and Ultimate](https://about.gitlab.com/pricing/).
References:
-[High Availability Reference Architectures](#reference-architectures), without HA components
### Level 3: Highly Available
By adding automatic failover for database systems, we can enable higher uptime with an additional layer of complexity.
This configuration is supported in [GitLab Premium and Ultimate](https://about.gitlab.com/pricing/).
GitLab Geo allows you to replicate your GitLab instance to other geographical locations as a read-only fully operational instance that can also be promoted in case of disaster.
This configuration is supported in [GitLab Premium and Ultimate](https://about.gitlab.com/pricing/).
-[GitLab Geo with a highly available configuration](../geo/replication/high_availability.html)
## Recommended setups based on number of users
- 1 - 1000 Users: A single-node [Omnibus](https://docs.gitlab.com/omnibus/) setup with frequent backups. Refer to the [requirements page](../../install/requirements.md) for further details of the specs you will require.
- 1000 - 10000 Users: A scaled environment based on one of our [Reference Architectures](#reference-architectures), without the HA components applied. This can be a reasonable step towards a fully HA environment.
- 2000 - 50000+ Users: A scaled HA environment based on one of our [Reference Architectures](#reference-architectures) below.
## GitLab components and configuration instructions
@@ -23,7 +23,7 @@ describe Gitlab::Auth::LDAP::DN do
let(:given){'#aa aa'}
it'raises MalformedError'do
expect{subject}.toraise_error(Gitlab::Auth::LDAP::DN::MalformedError,"Expected the end of an attribute value, but got \"a\"")
expect{subject}.toraise_error(Gitlab::Auth::Ldap::DN::MalformedError,"Expected the end of an attribute value, but got \"a\"")
end
end
...
...
@@ -31,7 +31,7 @@ describe Gitlab::Auth::LDAP::DN do
let(:given){'#aaXaaa'}
it'raises MalformedError'do
expect{subject}.toraise_error(Gitlab::Auth::LDAP::DN::MalformedError,"Expected the first character of a hex pair, but got \"X\"")
expect{subject}.toraise_error(Gitlab::Auth::Ldap::DN::MalformedError,"Expected the first character of a hex pair, but got \"X\"")
end
end
...
...
@@ -39,7 +39,7 @@ describe Gitlab::Auth::LDAP::DN do
let(:given){'#aaaYaa'}
it'raises MalformedError'do
expect{subject}.toraise_error(Gitlab::Auth::LDAP::DN::MalformedError,"Expected the second character of a hex pair, but got \"Y\"")
expect{subject}.toraise_error(Gitlab::Auth::Ldap::DN::MalformedError,"Expected the second character of a hex pair, but got \"Y\"")
end
end
...
...
@@ -47,7 +47,7 @@ describe Gitlab::Auth::LDAP::DN do
let(:given){'"Sebasti\\cX\\a1n"'}
it'raises MalformedError'do
expect{subject}.toraise_error(Gitlab::Auth::LDAP::DN::MalformedError,"Expected the second character of a hex pair inside a double quoted value, but got \"X\"")
expect{subject}.toraise_error(Gitlab::Auth::Ldap::DN::MalformedError,"Expected the second character of a hex pair inside a double quoted value, but got \"X\"")
end
end
...
...
@@ -55,7 +55,7 @@ describe Gitlab::Auth::LDAP::DN do
@@ -125,7 +125,7 @@ describe Gitlab::Auth::LDAP::DN do
let(:given){'0.9.2342.19200300.100.1.25=#aa aa'}
it'raises MalformedError'do
expect{subject}.toraise_error(Gitlab::Auth::LDAP::DN::MalformedError,"Expected the end of an attribute value, but got \"a\"")
expect{subject}.toraise_error(Gitlab::Auth::Ldap::DN::MalformedError,"Expected the end of an attribute value, but got \"a\"")
end
end
...
...
@@ -133,7 +133,7 @@ describe Gitlab::Auth::LDAP::DN do
let(:given){'0.9.2342.19200300.100.1.25=#aaXaaa'}
it'raises MalformedError'do
expect{subject}.toraise_error(Gitlab::Auth::LDAP::DN::MalformedError,"Expected the first character of a hex pair, but got \"X\"")
expect{subject}.toraise_error(Gitlab::Auth::Ldap::DN::MalformedError,"Expected the first character of a hex pair, but got \"X\"")
end
end
...
...
@@ -141,7 +141,7 @@ describe Gitlab::Auth::LDAP::DN do
let(:given){'0.9.2342.19200300.100.1.25=#aaaYaa'}
it'raises MalformedError'do
expect{subject}.toraise_error(Gitlab::Auth::LDAP::DN::MalformedError,"Expected the second character of a hex pair, but got \"Y\"")
expect{subject}.toraise_error(Gitlab::Auth::Ldap::DN::MalformedError,"Expected the second character of a hex pair, but got \"Y\"")
end
end
...
...
@@ -149,7 +149,7 @@ describe Gitlab::Auth::LDAP::DN do
let(:given){'uid="Sebasti\\cX\\a1n"'}
it'raises MalformedError'do
expect{subject}.toraise_error(Gitlab::Auth::LDAP::DN::MalformedError,"Expected the second character of a hex pair inside a double quoted value, but got \"X\"")
expect{subject}.toraise_error(Gitlab::Auth::Ldap::DN::MalformedError,"Expected the second character of a hex pair inside a double quoted value, but got \"X\"")
end
end
...
...
@@ -157,7 +157,7 @@ describe Gitlab::Auth::LDAP::DN do