You can use the dashboard for Kubernetes to monitor your deployed applications. Until now, pods with container errors like In GitLab 18.0, error states in the UI show a specific container's status, similar to the Improved pod status visualizations in the dashboard for Kubernetes
CrashLoopBackOff
or ImagePullBackOff
were displayed with a "Pending" or "Running" status, which makes it difficult to identify problematic deployments without using kubectl
.
kubectl
output. Now, you can quickly identify and troubleshoot failing pods without leaving the GitLab interface.
The GitLab for Slack app now supports multiple workspaces for GitLab Self-Managed and GitLab Dedicated customers. Enabling multiple workspaces allows organizations with federated Slack environments to maintain seamless GitLab integrations across all their workspaces. To enable support for multiple workspaces, configure the GitLab for Slack app as an unlisted distributed app.
Support for multiple workspaces in the GitLab for Slack app (self-managed only):
Integrations
In GitLab 18.0, when you delete a top-level group, placeholder users associated with the group are deleted as well. If placeholder users are associated with other projects, they are only removed from the top-level group.Delete groups and placeholder users:
Importers
This way, unnecessary placeholder users are removed without disrupting the history or attributions of other projects.
GitLab chart 9.0 released with breaking changes (self-managed only):
Cloud Native Installation
, Omnibus Package
Project and group delayed deletion is now available for all GitLab users, including those on our Free tier. This essential safety feature adds a grace period (7 days on GitLab.com) before deleted groups and projects are permanently removed. This feature allows recovery from accidental deletions without complex recovery operations.
By making data safety a core feature, GitLab can help better protect your work against data loss events.
Deletion protection available for all users:
Groups & Projects
Delayed project deletion is now available for projects in user namespaces (personal projects). Previously, this safeguard against accidental data loss was only available for group namespaces. When you delete a project in your user namespace, it will now enter a "pending deletion" state for the duration configured in your instance settings (7 days on GitLab.com), rather than being immediately deleted. This creates a recovery window during which you can restore the project if needed.
We hope this enhancement provides greater peace of mind when managing your personal projects in GitLab.
Delayed project deletion for user namespaces:
Groups & Projects
We've added a new Thank you @dagaranupam for adding this parameter to the Projects API.
New
active
parameter for Groups and Projects REST APIs: Groups & Projects
active
parameter to our Groups and Projects REST APIs that simplifies filtering groups based on their status. When set to true
, only non-archived groups or projects not marked for deletion are returned. When set to false
, only archived groups or projects marked for deletion are returned. If the parameter is undefined, no filtering is applied. This enhancement helps you efficiently manage your workflows by targeting specific statuses through simple API calls.
Plan
We've made significant improvements to GitLab Query Language (GLQL) views. These improvements include support for:
We welcome your feedback on this enhancement, and on GLQL views in general, in issue 509791.
GitLab Query Language views enhancements:
Wiki
, Team Planning
>=
and <=
operators for all date types
GitLab provides templates for popular static site generators. We've taken a deep dive into available templates using a scoring framework, and refined the list to include only the most popular templates.
Refining templates available for GitLab Pages streamlines the website creation process. Use templates to launch professional-looking sites with minimal technical expertise. Enhanced templates also provide modern, responsive designs, eliminating the need for custom development work.
Pages template improvements:
Pages
Create
Previously, when working on code files, you had no visibility into who else might be modifying Now you can easily identify all open merge requests that modify the file you're viewing in the A badge displays the number of open merge requests modifying the file, and hovering over itView open merge requests targeting files:
Source Code Management
the same file in other branches. This lack of awareness led to merge conflicts, duplicated work,
and inefficient collaboration.
repository. This feature helps you:
reveals a popover with the list of these merge requests.
Verify
The redesigned CI/CD analytics view transforms how your development teams analyze, monitor, and optimize pipeline performanceNew CI/CD analytics view for projects in limited availability:
Fleet Visibility
and reliability. Developers can access intuitive visualizations in the GitLab UI that reveal performance
trends and reliability metrics. Embedding these insights in your project repository eliminates context-switching
that disrupts developer flow. Teams can identify and address pipeline bottlenecks that drain productivity.
This enhancement leads to faster development cycles, improved collaboration, and data-driven confidence to optimize your
CI/CD workflows in GitLab.
We’re also releasing GitLab Runner 18.0 today! GitLab Runner is the highly-scalable build agent that runs your CI/CD jobs and sends the results back to a GitLab instance. GitLab Runner works in conjunction with GitLab CI/CD, the open-source continuous integration service included with GitLab.
The list of all changes is in the GitLab Runner CHANGELOG.
GitLab Runner 18.0:
GitLab Runner Core
What's new:
ConfigurationError
and ExitCodeInvalidConfiguration
to the GitLab Runner build error classifications
Bug Fixes:
Application security testing
You can now choose to run Application Security Testing (AST) scanners in merge request (MR) pipelines. Previously, the default behavior depended on whether you used the Stable or Latest CI/CD template edition to enable a scanner:
Now, a new option, This improvement affects all security scanning templates except for API Discovery (Security scanners now support MR pipelines:
API Security
, Container Scanning
, DAST
, Fuzz Testing
, SAST
, Secret Detection
, Software Composition Analysis
To minimize the impact to your pipelines, this is as an opt-in behavior you can control.
AST_ENABLE_MR_PIPELINES
, allows you to control whether to run jobs in MR pipelines.
The default behavior for both Stable and Latest templates remains the same. Specifically:
AST_ENABLE_MR_PIPELINES: "true"
to use MR pipelines instead when an MR is open.
AST_ENABLE_MR_PIPELINES: "false"
to use branch pipelines instead.
API-Discovery.gitlab-ci.yml
), which currently defaults to MR pipelines.
We also changed the API Discovery template to align with other Stable templates in GitLab 18.0 and use branch pipeline by default.
Software supply chain security
Administrators can now choose if the maximum length of a user session is computed from the initial sign-in or from the last activity. Users are notified that the session is ending, but cannot prevent the session from expiring or extend the session. This feature is disabled by default.
Thank you John Parent for your contribution!
Limit maximum user session length (self-managed only):
System Access
Pipeline security just got more flexible. Job tokens are ephemeral credentials that provide access to resources in pipelines. Until now, these tokens inherited full permissions from the user, often resulting in unnecessarily broad access capabilities.
With our new fine-grained permissions for job tokens beta feature, you can now precisely control which specific resources a job token can access within a project. This allows you to implement the principle of least privilege in your CI/CD workflows, granting only the minimal access necessary for each job to complete its tasks.
We're actively seeking community feedback on this feature. If you have questions, want to share your implementation experience, or would like to engage directly with our team about potential improvements, please visit our feedback issue.
Granular permissions for job tokens in beta:
Permissions
Security risk management
Previously, you had to configure the integration to create Jira issues from vulnerabilities from the Project settings page.
You can now configure this integration from the project integrations API, which allows you to automate the setup.
Configure Jira issues from vulnerabilities using the Jira integration API
Monitor
In GitLab 18.0, we are enabling event-level product usage data collection from GitLab Self-Managed and GitLab Dedicated instances. Unlike aggregated data, event-level data provides GitLab with deeper insights into usage, allowing us to improve user experience on the platform and increase feature adoption. For detailed instructions on how to adjust data sharing settings, please refer to our documentation.
Event data collection (self-managed only):
Application Instrumentation