Skip to content

Restrict agent management on the group and project level

Everyone can contribute. Help move this issue forward while earning points, leveling up and collecting rewards.

Problem to solve

Currently, we have Allow agent CI access sharing across top-level groups with the ci_access variable, and Allow granting agent user access across top-level groups

Both work to restrict access to working K8 agents to specific users and groups.

What we do not currently have is a way to prevent users from adding their own/new K8 clusters at the lower levels.

There is a customer need to limit these features from a security standpoint.

As an admin, we do not want any users to be able to add agents or k8s clusters for CICD purposes. We would like them to be forced to use the cluster we provide.

See internal ZD ticket

Further details

To achieve this, now. Admins would need to not allow Maintainers or above in groups or projects. Only Maintainer and above can manage agents in the group/project.

452B09D3-017B-44DE-B677-13497F1E630A

We do not have anything in custom roles that could limit this either.

Proposal

We should give administrators more power to enforce K8 in Gitlab by allowing them to restrict adding of K8 clusters at the lower project/group level. Rather than limiting them to a specific role, this would be better suited as a backend setting

Edited by 🤖 GitLab Bot 🤖