2019-05-26 23:59:59 -04:00
# GitLab Managed Apps
GitLab provides **GitLab Managed Apps** , a one-click install for various applications which can
2019-08-06 07:27:50 -04:00
be added directly to your configured cluster.
These applications are needed for [Review Apps ](../../ci/review_apps/index.md )
and [deployments ](../../ci/environments.md ) when using [Auto DevOps ](../../topics/autodevops/index.md ).
2019-05-26 23:59:59 -04:00
You can install them after you
2019-10-28 23:06:28 -04:00
[create a cluster ](../project/clusters/add_remove_clusters.md ).
2019-05-26 23:59:59 -04:00
## Installing applications
Applications managed by GitLab will be installed onto the `gitlab-managed-apps` namespace.
2019-07-25 10:12:45 -04:00
2019-05-26 23:59:59 -04:00
This namespace:
- Is different from the namespace used for project deployments.
- Is created once.
- Has a non-configurable name.
2019-09-09 10:24:33 -04:00
To see a list of available applications to install. For a:
2019-05-26 23:59:59 -04:00
2019-09-09 10:24:33 -04:00
- [Project-level cluster ](../project/clusters/index.md ), navigate to your project's
**Operations > Kubernetes** .
- [Group-level cluster ](../group/clusters/index.md ), navigate to your group's **Kubernetes** page.
2019-05-26 23:59:59 -04:00
Install Helm first as it's used to install other applications.
NOTE: **Note:**
As of GitLab 11.6, Helm will be upgraded to the latest version supported
by GitLab before installing any of the applications.
The following applications can be installed:
- [Helm ](#helm )
- [Ingress ](#ingress )
- [Cert-Manager ](#cert-manager )
- [Prometheus ](#prometheus )
- [GitLab Runner ](#gitlab-runner )
- [JupyterHub ](#jupyterhub )
- [Knative ](#knative )
2019-11-15 22:06:13 -05:00
- [Crossplane ](#crossplane )
2019-05-26 23:59:59 -04:00
With the exception of Knative, the applications will be installed in a dedicated
namespace called `gitlab-managed-apps` .
NOTE: **Note:**
Some applications are installable only for a project-level cluster.
Support for installing these applications in a group-level cluster is
planned for future releases.
For updates, see [the issue tracking
2019-09-18 10:02:45 -04:00
progress](https://gitlab.com/gitlab-org/gitlab-foss/issues/51989).
2019-05-26 23:59:59 -04:00
CAUTION: **Caution:**
If you have an existing Kubernetes cluster with Helm already installed,
you should be careful as GitLab cannot detect it. In this case, installing
Helm via the applications will result in the cluster having it twice, which
can lead to confusion during deployments.
### Helm
2019-09-09 10:24:33 -04:00
> - Introduced in GitLab 10.2 for project-level clusters.
> - Introduced in GitLab 11.6 for group-level clusters.
2019-05-26 23:59:59 -04:00
2019-10-09 20:06:44 -04:00
[Helm ](https://helm.sh/docs/ ) is a package manager for Kubernetes and is
2019-05-26 23:59:59 -04:00
required to install all the other applications. It is installed in its
own pod inside the cluster which can run the `helm` CLI in a safe
environment.
2019-09-16 23:06:07 -04:00
NOTE: **Note:**
Installing Helm as a GitLab-managed App behind a proxy is not supported,
but a [workaround ](../../topics/autodevops/index.md#installing-helm-behind-a-proxy )
is available.
2019-05-26 23:59:59 -04:00
### Cert-Manager
2019-09-09 10:24:33 -04:00
> Introduced in GitLab 11.6 for project- and group-level clusters.
2019-05-26 23:59:59 -04:00
[Cert-Manager ](https://docs.cert-manager.io/en/latest/ ) is a native
Kubernetes certificate management controller that helps with issuing
certificates. Installing Cert-Manager on your cluster will issue a
certificate by [Let's Encrypt ](https://letsencrypt.org/ ) and ensure that
certificates are valid and up-to-date.
2019-10-23 20:07:18 -04:00
The chart used to install this application depends on the version of GitLab used. In:
2019-05-26 23:59:59 -04:00
2019-10-23 20:07:18 -04:00
- GitLab 12.3 and newer, the [jetstack/cert-manager ](https://github.com/jetstack/cert-manager )
chart is used with a [`values.yaml` ](https://gitlab.com/gitlab-org/gitlab/blob/master/vendor/cert_manager/values.yaml )
file.
- GitLab 12.2 and older, the [stable/cert-manager ](https://github.com/helm/charts/tree/master/stable/cert-manager )
chart was used.
If you have installed Cert-Manager prior to GitLab 12.3, Let's Encrypt will
[block requests from older versions of Cert-Manager ](https://community.letsencrypt.org/t/blocking-old-cert-manager-versions/98753 ).
To resolve this:
1. Uninstall Cert-Manager (consider [backing up any additional configuration ](https://docs.cert-manager.io/en/latest/tasks/backup-restore-crds.html )).
1. Install Cert-Manager again.
2019-10-14 02:06:06 -04:00
2019-05-26 23:59:59 -04:00
### GitLab Runner
2019-09-09 10:24:33 -04:00
> - Introduced in GitLab 10.6 for project-level clusters.
> - Introduced in GitLab 11.10 for group-level clusters.
2019-05-26 23:59:59 -04:00
[GitLab Runner ](https://docs.gitlab.com/runner/ ) is the open source
project that is used to run your jobs and send the results back to
GitLab. It is used in conjunction with [GitLab
CI/CD](../../ci/README.md), the open-source continuous integration
2019-10-31 11:06:41 -04:00
service included with GitLab that coordinates the jobs.
If the project is on GitLab.com, shared Runners are available
(the first 2000 minutes are free, you can
[buy more later ](../../subscriptions/index.md#extra-shared-runners-pipeline-minutes ))
and you do not have to deploy one if they are enough for your needs. If a
project-specific Runner is desired, or there are no shared Runners, it is easy
to deploy one.
Note that the deployed Runner will be set as **privileged** , which means it will essentially
have root access to the underlying machine. This is required to build Docker images,
so it is the default. Make sure you read the
[security implications ](../project/clusters/index.md#security-implications )
before deploying one.
2019-05-26 23:59:59 -04:00
NOTE: **Note:**
2019-10-02 08:06:04 -04:00
The [`runner/gitlab-runner` ](https://gitlab.com/gitlab-org/charts/gitlab-runner )
2019-05-26 23:59:59 -04:00
chart is used to install this application with a
2019-09-18 14:06:14 -04:00
[`values.yaml` ](https://gitlab.com/gitlab-org/gitlab/blob/master/vendor/runner/values.yaml )
2019-10-10 02:06:13 -04:00
file. Customizing installation by modifying this file is not supported.
2019-05-26 23:59:59 -04:00
### Ingress
2019-09-09 10:24:33 -04:00
> - Introduced in GitLab 10.2 for project-level clusters.
> - Introduced in GitLab 11.6 for group-level clusters.
2019-05-26 23:59:59 -04:00
[Ingress ](https://kubernetes.github.io/ingress-nginx/ ) can provide load
balancing, SSL termination, and name-based virtual hosting. It acts as a
web proxy for your applications and is useful if you want to use [Auto
2019-07-03 03:12:04 -04:00
DevOps](../../topics/autodevops/index.md) or deploy your own web apps.
2019-05-26 23:59:59 -04:00
2019-10-31 11:06:41 -04:00
NOTE: **Note:**
With the following procedure, a load balancer must be installed in your cluster
to obtain the endpoint. You can use either
Ingress, or Knative's own load balancer ([Istio](https://istio.io)) if using Knative.
In order to publish your web application, you first need to find the endpoint which will be either an IP
address or a hostname associated with your load balancer.
To install it, click on the **Install** button for Ingress. GitLab will attempt
to determine the external endpoint and it should be available within a few minutes.
#### Determining the external endpoint automatically
> [Introduced](https://gitlab.com/gitlab-org/gitlab-foss/merge_requests/17052) in GitLab 10.6.
After you install Ingress, the external endpoint should be available within a few minutes.
TIP: **Tip:**
This endpoint can be used for the
[Auto DevOps base domain ](../../topics/autodevops/index.md#auto-devops-base-domain )
using the `KUBE_INGRESS_BASE_DOMAIN` environment variable.
If the endpoint doesn't appear and your cluster runs on Google Kubernetes Engine:
1. Check your [Kubernetes cluster on Google Kubernetes Engine ](https://console.cloud.google.com/kubernetes ) to ensure there are no errors on its nodes.
1. Ensure you have enough [Quotas ](https://console.cloud.google.com/iam-admin/quotas ) on Google Kubernetes Engine. For more information, see [Resource Quotas ](https://cloud.google.com/compute/quotas ).
1. Check [Google Cloud's Status ](https://status.cloud.google.com/ ) to ensure they are not having any disruptions.
Once installed, you may see a `?` for "Ingress IP Address" depending on the
cloud provider. For EKS specifically, this is because the ELB is created
with a DNS name, not an IP address. If GitLab is still unable to
determine the endpoint of your Ingress or Knative application, you can
[determine it manually ](#determining-the-external-endpoint-manually ).
2019-05-26 23:59:59 -04:00
NOTE: **Note:**
2019-10-02 08:06:04 -04:00
The [`stable/nginx-ingress` ](https://github.com/helm/charts/tree/master/stable/nginx-ingress )
2019-05-26 23:59:59 -04:00
chart is used to install this application with a
2019-09-18 14:06:14 -04:00
[`values.yaml` ](https://gitlab.com/gitlab-org/gitlab/blob/master/vendor/ingress/values.yaml )
2019-05-26 23:59:59 -04:00
file.
2019-10-31 11:06:41 -04:00
#### Determining the external endpoint manually
If the cluster is on GKE, click the **Google Kubernetes Engine** link in the
**Advanced settings**, or go directly to the
[Google Kubernetes Engine dashboard ](https://console.cloud.google.com/kubernetes/ )
and select the proper project and cluster. Then click **Connect** and execute
the `gcloud` command in a local terminal or using the **Cloud Shell** .
If the cluster is not on GKE, follow the specific instructions for your
Kubernetes provider to configure `kubectl` with the right credentials.
The output of the following examples will show the external endpoint of your
cluster. This information can then be used to set up DNS entries and forwarding
rules that allow external access to your deployed applications.
If you installed Ingress via the **Applications** , run the following command:
```bash
kubectl get service --namespace=gitlab-managed-apps ingress-nginx-ingress-controller -o jsonpath='{.status.loadBalancer.ingress[0].ip}'
```
Some Kubernetes clusters return a hostname instead, like [Amazon EKS ](https://aws.amazon.com/eks/ ). For these platforms, run:
```bash
kubectl get service --namespace=gitlab-managed-apps ingress-nginx-ingress-controller -o jsonpath='{.status.loadBalancer.ingress[0].hostname}'
```
For Istio/Knative, the command will be different:
```bash
kubectl get svc --namespace=istio-system knative-ingressgateway -o jsonpath='{.status.loadBalancer.ingress[0].ip} '
```
Otherwise, you can list the IP addresses of all load balancers:
```bash
kubectl get svc --all-namespaces -o jsonpath='{range.items[?(@.status.loadBalancer.ingress)]}{.status.loadBalancer.ingress[*].ip} '
```
NOTE: **Note:**
If EKS is used, an [Elastic Load Balancer ](https://docs.aws.amazon.com/elasticloadbalancing/ )
will also be created, which will incur additional AWS costs.
NOTE: **Note:**
You may see a trailing `%` on some Kubernetes versions, **do not include it** .
The Ingress is now available at this address and will route incoming requests to
the proper service based on the DNS name in the request. To support this, a
wildcard DNS CNAME record should be created for the desired domain name. For example,
`*.myekscluster.com` would point to the Ingress hostname obtained earlier.
#### Using a static IP
By default, an ephemeral external IP address is associated to the cluster's load
balancer. If you associate the ephemeral IP with your DNS and the IP changes,
your apps will not be able to be reached, and you'd have to change the DNS
record again. In order to avoid that, you should change it into a static
reserved IP.
Read how to [promote an ephemeral external IP address in GKE ](https://cloud.google.com/compute/docs/ip-addresses/reserve-static-external-ip-address#promote_ephemeral_ip ).
#### Pointing your DNS at the external endpoint
Once you've set up the external endpoint, you should associate it with a [wildcard DNS
record](https://en.wikipedia.org/wiki/Wildcard_DNS_record) such as `*.example.com.`
in order to be able to reach your apps. If your external endpoint is an IP address,
use an A record. If your external endpoint is a hostname, use a CNAME record.
2019-10-14 14:06:24 -04:00
#### Web Application Firewall (ModSecurity)
2019-09-18 10:02:45 -04:00
> [Introduced](https://gitlab.com/gitlab-org/gitlab-foss/issues/65192) in GitLab 12.3 (enabled using `ingress_modsecurity` [feature flag](../../development/feature_flags/development.md#enabling-a-feature-flag-in-development)).
2019-10-14 14:06:24 -04:00
Out of the box, GitLab provides you real-time security monitoring with
2019-09-18 10:02:45 -04:00
[`modsecurity` ](https://kubernetes.github.io/ingress-nginx/user-guide/nginx-configuration/annotations/#modsecurity )
2019-10-14 14:06:24 -04:00
Modsecurity is a toolkit for real-time web application monitoring, logging,
and access control. With GitLab's offering, the [OWASP's Core Rule Set ](https://www.modsecurity.org/CRS/Documentation/ ), which provides generic attack detection capabilities,
is automatically applied.
2019-09-18 10:02:45 -04:00
This feature:
- Runs in "Detection-only mode" unless configured otherwise.
2019-10-02 08:06:04 -04:00
- Is viewable by checking your Ingress controller's `modsec` log for rule violations.
2019-09-18 10:02:45 -04:00
For example:
```sh
2019-11-13 10:07:29 -05:00
kubectl -n gitlab-managed-apps exec -it $(kubectl get pods -n gitlab-managed-apps | grep 'ingress-controller' | awk '{print $1}') -- tail -f /var/log/modsec/audit.log
2019-09-18 10:02:45 -04:00
```
There is a small performance overhead by enabling `modsecurity` . However, if this is
considered significant for your application, you can toggle the feature flag back to
false by running the following command within the Rails console:
```ruby
Feature.disable(:ingress_modsecurity)
```
Once disabled, you must [uninstall ](#uninstalling-applications ) and reinstall your Ingress
application for the changes to take effect.
2019-05-26 23:59:59 -04:00
### JupyterHub
2019-09-09 10:24:33 -04:00
> - Introduced in GitLab 11.0 for project-level clusters.
2019-10-03 05:07:16 -04:00
> - Introduced in GitLab 12.3 for group and instance-level clusters.
2019-05-26 23:59:59 -04:00
[JupyterHub ](https://jupyterhub.readthedocs.io/en/stable/ ) is a
multi-user service for managing notebooks across a team. [Jupyter
Notebooks](https://jupyter-notebook.readthedocs.io/en/latest/) provide a
web-based interactive programming environment used for data analysis,
visualization, and machine learning.
Authentication will be enabled only for [project
2019-09-05 16:41:55 -04:00
members](../project/members/index.md) for project-level clusters and group
members for group-level clusters with [Developer or
higher](../permissions.md) access to the associated project or group.
2019-05-26 23:59:59 -04:00
We use a [custom Jupyter
image](https://gitlab.com/gitlab-org/jupyterhub-user-image/blob/master/Dockerfile)
that installs additional useful packages on top of the base Jupyter. You
2019-10-09 20:06:44 -04:00
will also see ready-to-use DevOps Runbooks built with Nurtch's [Rubix library ](https://github.com/Nurtch/rubix ).
2019-05-26 23:59:59 -04:00
More information on
2019-06-05 22:55:28 -04:00
creating executable runbooks can be found in [our Runbooks
documentation](../project/clusters/runbooks/index.md#executable-runbooks). Note that
2019-05-26 23:59:59 -04:00
Ingress must be installed and have an IP address assigned before
JupyterHub can be installed.
NOTE: **Note:**
2019-10-02 08:06:04 -04:00
The [`jupyter/jupyterhub` ](https://jupyterhub.github.io/helm-chart/ )
2019-05-26 23:59:59 -04:00
chart is used to install this application with a
2019-09-18 14:06:14 -04:00
[`values.yaml` ](https://gitlab.com/gitlab-org/gitlab/blob/master/vendor/jupyter/values.yaml )
2019-05-26 23:59:59 -04:00
file.
2019-06-05 22:55:28 -04:00
#### Jupyter Git Integration
2019-09-18 10:02:45 -04:00
> [Introduced](https://gitlab.com/gitlab-org/gitlab-foss/merge_requests/28783) in GitLab 12.0 for project-level clusters.
2019-10-03 05:07:16 -04:00
> [Introduced](https://gitlab.com/gitlab-org/gitlab-foss/merge_requests/32512) in GitLab 12.3 for group and instance-level clusters.
2019-06-05 22:55:28 -04:00
When installing JupyterHub onto your Kubernetes cluster, [JupyterLab's Git extension ](https://github.com/jupyterlab/jupyterlab-git )
is automatically provisioned and configured using the authenticated user's:
2019-08-06 07:27:50 -04:00
- Name.
- Email.
- Newly created access token.
2019-06-05 22:55:28 -04:00
JupyterLab's Git extension enables full version control of your notebooks as well as issuance of Git commands within Jupyter.
Git commands can be issued via the **Git** tab on the left panel or via Jupyter's command line prompt.
NOTE: **Note:**
JupyterLab's Git extension stores the user token in the JupyterHub DB in encrypted format
and in the single user Jupyter instance as plain text. This is because [Git requires storing
credentials as plain text](https://git-scm.com/docs/git-credential-store). Potentially, if
a nefarious user finds a way to read from the file system in the single user Jupyter instance
they could retrieve the token.
![Jupyter's Git Extension ](img/jupyter-git-extension.gif )
You can clone repositories from the files tab in Jupyter:
![Jupyter clone repository ](img/jupyter-gitclone.png )
2019-05-26 23:59:59 -04:00
### Knative
2019-09-09 10:24:33 -04:00
> - Introduced in GitLab 11.5 for project-level clusters.
> - Introduced in GitLab 12.3 for group- and instance-level clusters.
2019-05-26 23:59:59 -04:00
2019-10-09 20:06:44 -04:00
[Knative ](https://cloud.google.com/knative/ ) provides a platform to
2019-05-26 23:59:59 -04:00
create, deploy, and manage serverless workloads from a Kubernetes
cluster. It is used in conjunction with, and includes
[Istio ](https://istio.io ) to provide an external IP address for all
programs hosted by Knative.
You will be prompted to enter a wildcard
domain where your applications will be exposed. Configure your DNS
server to use the external IP address for that domain. For any
application created and installed, they will be accessible as
`<program_name>.<kubernetes_namespace>.<domain_name>` . This will require
2019-10-02 08:06:04 -04:00
your Kubernetes cluster to have [RBAC
2019-10-28 23:06:28 -04:00
enabled](../project/clusters/add_remove_clusters.md#rbac-cluster-resources).
2019-05-26 23:59:59 -04:00
NOTE: **Note:**
2019-10-02 08:06:04 -04:00
The [`knative/knative` ](https://storage.googleapis.com/triggermesh-charts )
2019-05-26 23:59:59 -04:00
chart is used to install this application.
### Prometheus
2019-09-09 10:24:33 -04:00
> - Introduced in GitLab 10.4 for project-level clusters.
> - Introduced in GitLab 11.11 for group-level clusters.
2019-05-26 23:59:59 -04:00
[Prometheus ](https://prometheus.io/docs/introduction/overview/ ) is an
open-source monitoring and alerting system useful to supervise your
deployed applications.
2019-10-31 11:06:41 -04:00
GitLab is able to monitor applications automatically, using the
[Prometheus integration ](../project/integrations/prometheus.md ). Kubernetes container CPU and
memory metrics are automatically collected, and response metrics are retrieved
from NGINX Ingress as well.
To enable monitoring, simply install Prometheus into the cluster with the
**Install** button.
2019-05-26 23:59:59 -04:00
NOTE: **Note:**
2019-10-02 08:06:04 -04:00
The [`stable/prometheus` ](https://github.com/helm/charts/tree/master/stable/prometheus )
2019-05-26 23:59:59 -04:00
chart is used to install this application with a
2019-09-18 14:06:14 -04:00
[`values.yaml` ](https://gitlab.com/gitlab-org/gitlab/blob/master/vendor/prometheus/values.yaml )
2019-05-26 23:59:59 -04:00
file.
2019-11-15 22:06:13 -05:00
### Crossplane
> - [Introduced](https://gitlab.com/gitlab-org/gitlab/issues/34702) in GitLab 12.5 for project-level clusters.
[Crossplane ](https://crossplane.io/docs ) is a multi-cloud control plane useful for
managing applications and infrastructure across multiple clouds. It extends the
Kubernetes API using:
- Custom resources.
- Controllers that watch those custom resources.
Crossplane allows provisioning and lifecycle management of infrastructure components
across cloud providers in a uniform manner by abstracting cloud provider-specific
configurations.
The Crossplane GitLab-managed application:
- Installs Crossplane with a provider of choice on a Kubernetes cluster attached to the
project repository.
- Can then be used to provision infrastructure or managed applications such as
PostgreSQL (for example, CloudSQL from GCP or RDS from AWS) and other services
required by the application via the Auto DevOps pipeline.
For information on configuring Crossplane installed on the cluster, see
[Crossplane configuration ](crossplane.md ).
NOTE: **Note:**
[`alpha/crossplane` ](https://charts.crossplane.io/alpha/ ) chart v0.4.1 is used to
install Crossplane using the
[`values.yaml` ](https://github.com/crossplaneio/crossplane/blob/master/cluster/charts/crossplane/values.yaml.tmpl )
file.
2019-05-26 23:59:59 -04:00
## Upgrading applications
2019-09-18 10:02:45 -04:00
> [Introduced](https://gitlab.com/gitlab-org/gitlab-foss/merge_requests/24789) in GitLab 11.8.
2019-05-26 23:59:59 -04:00
The applications below can be upgraded.
| Application | GitLab version |
| ----------- | -------------- |
| Runner | 11.8+ |
To upgrade an application:
1. For a:
2019-08-06 07:27:50 -04:00
- [Project-level cluster ](../project/clusters/index.md ),
navigate to your project's **Operations > Kubernetes** .
- [Group-level cluster ](../group/clusters/index.md ),
navigate to your group's **Kubernetes** page.
2019-05-26 23:59:59 -04:00
1. Select your cluster.
1. If an upgrade is available, the **Upgrade** button is displayed. Click the button to upgrade.
NOTE: **Note:**
Upgrades will reset values back to the values built into the `runner`
chart plus the values set by
2019-09-18 14:06:14 -04:00
[`values.yaml` ](https://gitlab.com/gitlab-org/gitlab/blob/master/vendor/runner/values.yaml )
2019-05-26 23:59:59 -04:00
## Uninstalling applications
2019-09-18 10:02:45 -04:00
> [Introduced](https://gitlab.com/gitlab-org/gitlab-foss/issues/60665) in GitLab 11.11.
2019-05-26 23:59:59 -04:00
The applications below can be uninstalled.
| Application | GitLab version | Notes |
| ----------- | -------------- | ----- |
2019-10-23 20:07:18 -04:00
| Cert-Manager | 12.2+ | The associated private key will be deleted and cannot be restored. Deployed applications will continue to use HTTPS, but certificates will not be renewed. Before uninstalling, you may wish to [back up your configuration ](https://docs.cert-manager.io/en/latest/tasks/backup-restore-crds.html ) or [revoke your certificates ](https://letsencrypt.org/docs/revoking/ ). |
2019-07-16 12:11:10 -04:00
| GitLab Runner | 12.2+ | Any running pipelines will be canceled. |
2019-09-24 23:06:21 -04:00
| Helm | 12.2+ | The associated Tiller pod, the `gitlab-managed-apps` namespace, and all of its resources will be deleted and cannot be restored. |
2019-07-02 08:59:59 -04:00
| Ingress | 12.1+ | The associated load balancer and IP will be deleted and cannot be restored. Furthermore, it can only be uninstalled if JupyterHub is not installed. |
2019-07-01 11:57:24 -04:00
| JupyterHub | 12.1+ | All data not committed to GitLab will be deleted and cannot be restored. |
2019-07-31 07:58:38 -04:00
| Knative | 12.1+ | The associated IP will be deleted and cannot be restored. |
2019-05-26 23:59:59 -04:00
| Prometheus | 11.11+ | All data will be deleted and cannot be restored. |
2019-11-15 22:06:13 -05:00
| Crossplane | 12.5+ | All data will be deleted and cannot be restored. |
2019-05-26 23:59:59 -04:00
To uninstall an application:
1. For a:
2019-08-06 07:27:50 -04:00
- [Project-level cluster ](../project/clusters/index.md ),
navigate to your project's **Operations > Kubernetes** .
- [Group-level cluster ](../group/clusters/index.md ),
navigate to your group's **Kubernetes** page.
2019-05-26 23:59:59 -04:00
1. Select your cluster.
1. Click the **Uninstall** button for the application.
Support for uninstalling all applications is planned for progressive rollout.
To follow progress, see [the relevant
epic](https://gitlab.com/groups/gitlab-org/-/epics/1201).
## Troubleshooting applications
Applications can fail with the following error:
```text
Error: remote error: tls: bad certificate
```
To avoid installation errors:
- Before starting the installation of applications, make sure that time is synchronized
2019-07-16 13:56:05 -04:00
between your GitLab server and your Kubernetes cluster.
2019-05-26 23:59:59 -04:00
- Ensure certificates are not out of sync. When installing applications, GitLab expects a new cluster with no previous installation of Helm.
You can confirm that the certificates match via `kubectl` :
```sh
kubectl get configmaps/values-content-configuration-ingress -n gitlab-managed-apps -o \
"jsonpath={.data['cert\.pem']}" | base64 -d > a.pem
kubectl get secrets/tiller-secret -n gitlab-managed-apps -o "jsonpath={.data['ca\.crt']}" | base64 -d > b.pem
diff a.pem b.pem
```