--- type: reference --- # Group-level Kubernetes clusters > [Introduced](https://gitlab.com/gitlab-org/gitlab-ce/issues/34758) in GitLab 11.6. > Group Cluster integration is currently in [Beta](https://about.gitlab.com/handbook/product/#alpha-beta-ga). ## Overview Similar to [project-level](../../project/clusters/index.md) and [instance-level](../../instance/clusters/index.md) Kubernetes clusters, group-level Kubernetes clusters allow you to connect a Kubernetes cluster to your group, enabling you to use the same cluster across multiple projects. ## Installing applications GitLab can install and manage some applications in your group-level cluster. For more information on installing, upgrading, uninstalling, and troubleshooting applications for your group cluster, see [Gitlab Managed Apps](../../clusters/applications.md). ## RBAC compatibility For each project under a group with a Kubernetes cluster, GitLab will create a restricted service account with [`edit` privileges](https://kubernetes.io/docs/reference/access-authn-authz/rbac/#user-facing-roles) in the project namespace. NOTE: **Note:** RBAC support was introduced in [GitLab 11.4](https://gitlab.com/gitlab-org/gitlab-ce/issues/29398), and Project namespace restriction was introduced in [GitLab 11.5](https://gitlab.com/gitlab-org/gitlab-ce/issues/51716). ## Cluster precedence GitLab will use the project's cluster before using any cluster belonging to the group containing the project if the project's cluster is available and not disabled. In the case of sub-groups, GitLab will use the cluster of the closest ancestor group to the project, provided the cluster is not disabled. ## Multiple Kubernetes clusters **[PREMIUM]** With GitLab Premium, you can associate more than one Kubernetes clusters to your group. That way you can have different clusters for different environments, like dev, staging, production, etc. Add another cluster similar to the first one and make sure to [set an environment scope](#environment-scopes-premium) that will differentiate the new cluster from the rest. ## Gitlab-managed clusters > [Introduced](https://gitlab.com/gitlab-org/gitlab-ce/merge_requests/22011) in GitLab 11.5. > Became [optional](https://gitlab.com/gitlab-org/gitlab-ce/merge_requests/26565) in GitLab 11.11. NOTE: **Note:** Only available when creating clusters. Existing clusters not managed by GitLab cannot become GitLab-managed later. You can choose to allow GitLab to manage your cluster for you. If your cluster is managed by GitLab, resources for your projects will be automatically created. See the [Access controls](../../project/clusters/index.md#access-controls) section for details on which resources will be created. If you choose to manage your own cluster, project-specific resources will not be created automatically. If you are using [Auto DevOps](../../../topics/autodevops/index.md), you will need to explicitly provide the `KUBE_NAMESPACE` [deployment variable](../../project/clusters/index.md#deployment-variables) that will be used by your deployment jobs. NOTE: **Note:** If you [install applications](#installing-applications) on your cluster, GitLab will create the resources required to run these even if you have chosen to manage your own cluster. ## Base domain > [Introduced](https://gitlab.com/gitlab-org/gitlab-ce/merge_requests/24580) in GitLab 11.8. Domains at the cluster level permit support for multiple domains per [multiple Kubernetes clusters](#multiple-kubernetes-clusters-premium). When specifying a domain, this will be automatically set as an environment variable (`KUBE_INGRESS_BASE_DOMAIN`) during the [Auto DevOps](../../../topics/autodevops/index.md) stages. The domain should have a wildcard DNS configured to the Ingress IP address. ## Environment scopes **[PREMIUM]** When adding more than one Kubernetes cluster to your project, you need to differentiate them with an environment scope. The environment scope associates clusters with [environments](../../../ci/environments.md) similar to how the [environment-specific variables](../../../ci/variables/README.md#limiting-environment-scopes-of-environment-variables-premium) work. While evaluating which environment matches the environment scope of a cluster, [cluster precedence](#cluster-precedence) will take effect. The cluster at the project level will take precedence, followed by the closest ancestor group, followed by that groups' parent and so on. For example, let's say we have the following Kubernetes clusters: | Cluster | Environment scope | Where | | ---------- | ------------------- | ----------| | Project | `*` | Project | | Staging | `staging/*` | Project | | Production | `production/*` | Project | | Test | `test` | Group | | Development| `*` | Group | And the following environments are set in [`.gitlab-ci.yml`](../../../ci/yaml/README.md): ```yaml stages: - test - deploy test: stage: test script: sh test deploy to staging: stage: deploy script: make deploy environment: name: staging/$CI_COMMIT_REF_NAME url: https://staging.example.com/ deploy to production: stage: deploy script: make deploy environment: name: production/$CI_COMMIT_REF_NAME url: https://example.com/ ``` The result will then be: - The Project cluster will be used for the `test` job. - The Staging cluster will be used for the `deploy to staging` job. - The Production cluster will be used for the `deploy to production` job. ## Unavailable features The following features are not currently available for group-level clusters: 1. Terminals (see [related issue](https://gitlab.com/gitlab-org/gitlab-ce/issues/55487)). 1. Pod logs (see [related issue](https://gitlab.com/gitlab-org/gitlab-ce/issues/55488)). 1. Deployment boards (see [related issue](https://gitlab.com/gitlab-org/gitlab-ce/issues/55489)).