Templated deployments
Supports out-of-box templates for quick deployment and production-ready configurations and custom templates.
YAML deployments
Customizable YAML deployment method to fully control the configuration of the GitLab instance using Helm values.
Protected Container Repositories
Enhanced security for container images with strict access controls and granular permissions for push, pull, and management operations.
Pipeline Limits
Administrators can now control CI/CD pipeline resource usage by setting limits, a feature previously only available in Enterprise Edition.
Improved Kubernetes Integration
Enhanced Kubernetes dashboard with pod search capabilities and visibility into paused Flux reconciliations for better container orchestration.
Deployment Tracking for Releases
View all deployments related to a release directly on the release page, making it easier to track where a release has been deployed.
Role-Based Code Owners
Use roles (developers, maintainers, owners) to define Code Owners, simplifying approval management as team members change roles.
Protected Package Registry
Safeguard important dependencies with protected packages to prevent accidental modifications or deletions.
Secret Detection with Remediation Steps
Improved security with specific remediation guidance for each type of detected secret to address vulnerabilities systematically.
Webhooks for Epics
Receive real-time updates in external tools whenever changes occur in epics, enhancing workflow automation and collaboration.
For a full set of features available in GitLab v17.8 Community Edition, please refer to the GitLab v17.8 Documentation.
IPv6 Network Support
Deploy and operate GitLab instances in IPv6-only or dual-stack network environments, ensuring compatibility with modern network infrastructures.
ARM Architecture Compatibility
Full support for ARM-based infrastructure, enabling deployment on energy-efficient and cost-effective ARM processors for improved performance-to-power ratio.
Security Enhancements
Addresses critical system and application vulnerabilities with proactive patching and security hardening. Includes fixes for CVE-identified issues in core components, dependency security updates, and remediation of potential privilege escalation vectors.