Adding kubernetes cluster to our private gitlab server

Hello, we have a private gitlab server and I am trying to connect a DO kubernetes cluster to our CI/CD. On the setup page, I have the following fields:

Kubernetes cluster name API URL CA Certificate Token Project namespace (optional, unique)

From the config file generated from the DO kubernetes page, I have the cluster name and CA Certificate. What is the API URL and Token that I must use here?

Thanks, David

Submit an answer

This textbox defaults to using Markdown to format your answer.

You can type !ref in this text area to quickly search our full set of tutorials, documentation & marketplace offerings and insert the link!

Sign In or Sign Up to Answer

These answers are provided by our Community. If you find them useful, show some love by clicking the heart. If you run into issues leave a comment, or add your own answer to help others.

Want to learn more? Join the DigitalOcean Community!

Join our DigitalOcean community of over a million developers for free! Get help and share knowledge in Q&A, subscribe to topics of interest, and get courses and tools that will help you grow as a developer and scale your project or business.

I figured out how add a DigitalOcean Cluster to GitLab. The steps I took (set up your kubectl to use your DigitalOcean Cluster first):

create a new namespace kubectl create namespace gitlabkubesandbox switch to that new namespace kubectl config set-context $(kubectl config current-context) --namespace=gitlabkubesandbox create a service account kubectl create -f - <<EOF apiVersion: v1 kind: ServiceAccount metadata: name: gitlab EOF make the new service account cluster admin kubectl create clusterrolebinding gitlab-cluster-admin-binding --clusterrole=cluster-admin --serviceaccount=gitlabkubesandbox:gitlab describe the new service account kubectl describe serviceAccounts gitlab get the secret kubectl describe secret [secret name found in the response form above] copy the token start the dashboard kubectl proxy open the dashboard in your browser http://localhost:8001/api/v1/namespaces/kube-system/services/https:kubernetes-dashboard:/proxy/ switch to the namespace “gitlabkubesandbox” go to secrets => the secret from above

Values for GitLab: Kubernetes cluster name: whatever API URL: cluster server from the kubeconfig.yml CA Certificate: ca.crt from the Dashboard Token: token from the Dashboard Project namespace: gitlabkubesandbox Check RBAC-enabled when adding the Cluster to GitLab.


For installing Helm, described rights was not enough for me. I have to do this:

kubectl create clusterrolebinding permissive-binding --clusterrole=cluster-admin --user=admin --user=kubelet --group=system:serviceaccounts

If you are getting a Kubernetes Error 401 it means your Token is incorrect as it was in my case. Here I was using a token from an API tab in the Dashboard BUT should really create the Token by command line like recommended. After generating a user and a token using kubectl commands and changing the Token the installation of Helm worked perfectly. Hope it helps!