Gitlab Certificate Run Books
This is an overview of certificates, where they are used and how they can be replaced in their service.
Deployment and replacement strategies
Section titled “Deployment and replacement strategies”Currently we have multiple ways of deploying certificates. Please see the Management
and Details
columns to find the management process and other details to edit according to that documentation.
- Chef Vault
- Chef Server
- Chef Hybrid
- Cloudflare
- Forum
- GCP Load Balancer
- GKMS and Vault (automated using Certificates Updater)
- Status.io
- ZenDesk
General info
Section titled “General info”-
COMODO has renamed to Sectigo, those names might get used interchangeably in this document. Any Certificate that is listed as issued by COMODO will in the future be issued by Sectigo.
-
Our primary certificate source is SSLMate.
- Using the above link it is possible to retrieve the current certificate file for each CN listed there.
- Those files are permanent links to the public chain of the certificate. The key is not part of that chain.
- Some tasks require the commandline tool (available via https://sslmate.com/help/install and
brew install sslmate
).
Buy a new certificate
Section titled “Buy a new certificate”Before buying a new certificate, please check if it is possible to use an automated Let’s Encrypt certificate for your purpose!
sslmate buy '<domain>' --auto-renew --approval=dns --key-type=ecdsa
Use sslmate help buy
for additional options if needed.
But with the above example, this will purchase a certificate that expires after
1 year, will auto renew itself using DNS, and is of key type ecdsa
.
We’ve chosen to go with ecdsa
for it’s improvements:
- Smaller size
- Improved TLS handshake speed
- Stronger algorithm
We have Route53 integration with SSLMate so the DNS authorization will be done automatically.
The sslmate
client will download the key and certificate to the directory in
which the command was executed.
Make sure to add the new certificate to the list below!
Add the private key to vault:
cat $DOMAIN.key.pem | vault kv put shared/env/gprd/sslmate/$DOMAIN key.pem=-
Renew a certificate
Section titled “Renew a certificate”For older certificates we may not have renewal properly configured. Let’s change that:
sslmate edit '<domain>' --approval=dnssslmate renew '<domain>'
This will change the existing approval method to our fancy DNS integration, and then force a renew. You can then download the certificate:
sslmate download '<domain>'
Note that sslmate
may complain that you won’t have the key in your ${CWD}
.
This is fine as we should have the key on minimally on a server, but may also
exist inside of 1Password, and even better, inside a Chef vault.
Status.io-specific instructions
Section titled “Status.io-specific instructions”The SSL certificate for status.gitlab.com
is no longer managed using SSLMate, meaning there should not be any manual steps to do once renewal time comes. :party:
Instead, we use a dedicated certificate from AWS as detailed in the status.io
docs. This means Amazon Certificate Manager should handle renewals automatically ahead of the expiry date.
The Amazon certificate is provisioned through the use of a CNAME record for domain validation that must remain in our DNS zone permanently.
Should we ever decide to change back to a customer-provided certificate for whatever reason, we would likely need to contact status.io
support to request a switch back to the custom certificate setting.
See this issue for more context on why we opted for an Amazon certificate.
Re-keying a certificate
Section titled “Re-keying a certificate”If a certificate auto-renews but we have lost the private key, generate a new one (and CSR) using SSLMate’s web UI. Download the private key and upload to vault:
cat $DOMAIN.key.pem | vault kv put shared/env/gprd/sslmate/$DOMAIN key.pem=-
Verify the certificate
Section titled “Verify the certificate”Wait for Chef to converge, or force a convergence.
Use a tool such as https://www.sslshopper.com/ssl-checker.html or https://www.ssllabs.com/ssltest/index.html to verify that the certificate is live, working, and fully valid.
Monitoring
Section titled “Monitoring”We utilize Prometheus blackbox to regularly check endpoints and send us alerts when those endpoints go down as well as validate and alert us at a threshold when those certificates are going to expire.
See SSL certificate expiration rules.
Add a host to the certificate monitoring
Section titled “Add a host to the certificate monitoring”The list of hosts that will have their certificate expiry scraped by Prometheus is defined in this file. By adding a server there, you will receive alerts when there are less than 30 days remaining until certificate expiration.
Safe execution of a update involving Chef nodes
Section titled “Safe execution of a update involving Chef nodes”-
Preparation:
-
Check the state of chef-client:
Terminal window knife ssh "roles:${chef_role} AND chef_environment:${chef_env}" "systemctl status chef-client"` -
Stop Chef on the HAProxy fleet that serves the certificate in question:
Terminal window knife ssh "role:<role name>" "sudo service chef-client stop"
-
-
Do the change according to the table below
-
Slowly roll out Chef
-
Inspect changes that would be applied on one of the nodes:
Terminal window sudo chef-client --why-run -
Force a chef-run on one of the nodes for verification. You should be able to simply run
sudo chef-client
and see the updated certificate in the output. -
Use
openssl
to verify the correct certificate is in place:Terminal window openssl s_client -connect ${NODE IP ADDRESS}:443 -servername ${HOSTNAME} </dev/null 2>/dev/null | openssl x509 -noout -textCheck for dates and general information to match, such as the CN and SANs.
-
Restart Chef on the nodes from the first step.
Terminal window knife ssh "role:${chef_role} AND chef_environment:${chef_env}" "sudo service chef-client start"
-
Certificates and their use
Section titled “Certificates and their use”Certificates currently managed by the GitLab Infrastructure team
Section titled “Certificates currently managed by the GitLab Infrastructure team”Domains | Issuer | Comments | Management | Details |
---|---|---|---|---|
about-src.gitlab.com, *.about-src.gitlab.com, about.gitlab-review.app, *.about.gitlab-review.app | COMODO RSA Domain Validation Secure Server CA | about-src.gitlab.com is no longer used, but the CN of the cert / The other SANs are used for GitLab review apps for www-gitlab-com | Chef Vault | data bag: about-gitlab-com , item: _default , fields: ssl_certificate , ssl_key |
about.gitlab.com | GlobalSign CloudSSL CA - SHA256 - G3 | CDN Certificate for about.gitlab.com | Cloudflare | Auto-renewed shared certificate |
canary.gitlab.com | Sectigo RSA Domain Validation Secure Server CA | Canary direct access | GKMS | item: frontend-loadbalancer gprd , fields: gitlab-haproxy.ssl.canary_crt , gitlab-haproxy.ssl.canary_key |
ce.gitlab.com | Sectigo RSA Domain Validation Secure Server CA | Redirect to CE repo, hosted on about-src., no CDN | Chef Vault | data bag: about-gitlab-com , item: _default , fields: [ce.gitlab.com][ssl_certificate] , [ce.gitlab.com][ssl_key] |
chef.gitlab.com | COMODO RSA Domain Validation Secure Server CA | Chef server | Chef Server | - |
contributors.gitlab.com | GlobalSign CloudSSL CA - SHA256 - G3 | Redirect to gitlab.biterg.io, hosted on Cloudflare | Cloudflare | Auto-renewed shared certificate |
customers.gitlab.com | Sectigo RSA Domain Validation Secure Server CA | Customer management | Chef Vault | data bag: customers-gitlab-com , item: _default , fields: ssl_certificate , ssl_key |
dashboards.gitlab.net | Let’s Encrypt Authority X3 | Internal grafana | Automated GCP Load Balancer | project: gitlab-ops |
dev.gitlab.org | COMODO RSA Domain Validation Secure Server CA | Dev instance | Chef Vault | data bag: dev-gitlab-org , item: _default , fields: ssl.certificate , ssl.private_key |
docs.gitlab.com | Let’s Encrypt Authority X3 | - | Automated (GitLab Pages managed) | |
dr.gitlab.com | Sectigo RSA Domain Validation Secure Server CA | Disaster recovery instance | GKMS | item: frontend-loadbalancer dr , fields: gitlab-haproxy.ssl.gitlab_crt , gitlab-haproxy.ssl.gitlab_key |
ee.gitlab.com | Sectigo RSA Domain Validation Secure Server CA | Redirect to EE repo, hosted on about-src., no CDN | Chef Vault | data bag: about-gitlab-com , item: _default , fields: [ee.gitlab.com][ssl_certificate] , [ee.gitlab.com][ssl_key] |
forum.gitlab.com | Let’s Encrypt Authority X3 | Hosted by discourse.com | Forum | |
gitlab.com | Cloudflare Inc ECC CA-3, COMODO RSA Domain Validation Secure Server CA | Duh | Automated Cloudflare and GKMS | item: frontend-loadbalancer gprd , fields: gitlab-haproxy.ssl.gitlab_crt , gitlab-haproxy.ssl.gitlab_key |
gitlab.org | GlobalSign CloudSSL CA - SHA256 - G3 | Redirect to about.gitlab.com, hosted on Cloudflare | Cloudflare | Auto-renewed shared certificate |
hub.gitlab.com | Sectigo RSA Domain Validation Secure Server CA | Redirects to https://lab.github.com/ (https://gitlab.com/gitlab-com/gl-infra/reliability/-/issues/6667), hosted on about-src, no CDN | Chef Vault | data bag: about-gitlab-com , item: _default , fields: [hub.gitlab.com][ssl_certificate] , [hub.gitlab.com][ssl_key] |
jobs.gitlab.com | Sectigo RSA Domain Validation Secure Server CA | Redirects to https://about.gitlab.com/jobs/, Hosted on Cloudflare | Cloudflare | Auto-renewed shared certificate |
license.gitlab.com | Sectigo RSA Domain Validation Secure Server CA | Chef Vault | data bag: license-gitlab-com , item: _default , fields: [gitlab-packagecloud][ssl_certificate] , [gitlab-packagecloud][ssl_key] | |
log.gprd.gitlab.net | Let’s Encrypt Authority X3 | Automated GCP Load Balancer | project: gitlab-ops ops-proxy | |
next.gitlab.com | Let’s Encrypt Authority X3 | - | Automated (GitLab Pages managed) | |
nonprod-log.gitlab.net, www.nonprod-log.gitlab.net, log.gstg.gitlab.net, log.dr.gitlab.net, log.pre.gitlab.net, log.ops.gitlab.net | Let’s Encrypt Authority X3 | Non prod logs | Automated GCP Load Balancer | project: gitlab-ops ops-nonprod-proxy |
ops.gitlab.net | Cloudflare Inc ECC CA-3 | Ops instance | Cloudflare | item: gitlab-omnibus-secrets ops , fields: omnibus-gitlab.ssl.certificate , omnibus-gitlab.ssl.private_key |
packages.gitlab.com | COMODO RSA Domain Validation Secure Server CA | PackageCloud instance | Chef Vault | data bag: packages-gitlab.com , item: _default , fields: ssl.certificate , ssl.private_key |
pre.gitlab.com | COMODO RSA Domain Validation Secure Server CA | Prerelease instance | GKMS | item: frontend-loadbalancer pre , fields: gitlab-haproxy.ssl.gitlab_crt , gitlab-haproxy.ssl.gitlab_key |
prod.pages-check.gitlab.net | COMODO RSA Domain Validation Secure Server CA | GitLab pages check | Automated (GitLab Pages managed) | |
prometheus-01.us-east1-c.gce.gitlab-runners.gitlab.net | COMODO RSA Domain Validation Secure Server CA | Chef Vault | data bag: gitlab-runners-prometheus-gce-us-east1-c , item: ci-prd , fields: gitlab-oauth2-proxy.nginx.ssl_certificate , gitlab-oauth2-proxy.nginx.ssl_key | |
prometheus-01.us-east1-d.gce.gitlab-runners.gitlab.net | COMODO RSA Domain Validation Secure Server CA | Chef Vault | data bag: gitlab-runners-prometheus-gce-us-east1-d , item: ci-prd , fields: gitlab-oauth2-proxy.nginx.ssl_certificate , gitlab-oauth2-proxy.nginx.ssl_key | |
prometheus.gitlab.com | Sectigo RSA Domain Validation Secure Server CA | Chef Vault | data bag: gitlab-oauth2-proxy-prometheus , item: prd , fields: ssl_certificate , ssl_key | |
registry.gitlab.com | Sectigo RSA Domain Validation Secure Server CA | GKMS | item: frontend-loadbalancer gprd , fields: gitlab-haproxy.ssl.registry_crt , gitlab-haproxy.ssl.registry_key | |
registry.ops.gitlab.net | Sectigo RSA Domain Validation Secure Server CA | GKMS | item: gitlab-omnibus-secrets ops , fields: omnibus-gitlab.ssl.registry_certificate , omnibus-gitlab.ssl.registry_private_key | |
registry.pre.gitlab.com | Sectigo RSA Domain Validation Secure Server CA | GKMS | item: frontend-loadbalancer pre , fields: gitlab-haproxy.ssl.registry_crt , gitlab-haproxy.ssl.registry_key | |
registry.staging.gitlab.com | COMODO RSA Domain Validation Secure Server CA | GKMS | item: frontend-loadbalancer gstg , fields: gitlab-haproxy.ssl.registry_crt , gitlab-haproxy.ssl.registry_key | |
sentry.gitlab.net | COMODO RSA Domain Validation Secure Server CA | Chef hybrid | cert role: ops-infra-sentry cert field: default_attributes.gitlab-sentry.ssl_certificate , key data bag: gitlab-sentry , key items: _default and prd , key fields: gitlab-sentry.ssl_key | |
snowplow.trx.gitlab.net | Sectigo RSA Domain Validation Secure Server CA | Automated AWS (not terraform managed) | ||
staging.gitlab.com, auth.staging.gitlab.com, geo.staging.gitlab.com, gstg.gitlab.com | Cloudflare Inc ECC CA-3, COMODO RSA Domain Validation Secure Server CA | Staging instance | Automated Cloudflare and GKMS | item: frontend-loadbalancer gstg , fields: gitlab-haproxy.ssl.gitlab_crt , gitlab-haproxy.ssl.gitlab_key |
staging.pages-check.gitlab.net | COMODO RSA Domain Validation Secure Server CA | GitLab pages check | automated (GitLab Pages managed) | |
status.gitlab.com | Sectigo RSA Domain Validation Secure Server CA | status.io | Status.io | |
support.gitlab.com | Let’s Encrypt Authority X3 | General zendesk | ZenDesk | |
user-content.staging.gitlab-static.net | Sectigo ECC Domain Validation Secure Server CA | GCP Load Balancer | project: gitlab-production | |
version.gitlab.com | Sectigo RSA Domain Validation Secure Server CA | Chef Vault | data bag: version-gitlab-com , item: _default , fields: ssl_certificate , ssl_key | |
*.ci-gateway.int.gstg.gitlab.net | Sectigo RSA Domain Validation Secure Server CA | GKMS | GKMS item: frontend-loadbalancer gstg , fields: gitlab-haproxy.ssl.ci_gateway_crt , gitlab-haproxy.ssl.ci_gateway_key ; project: gitlab-staging-1 | |
*.gitlab.io | C=BE, O=GlobalSign nv-sa, CN=AlphaSSL CA - SHA256 - G2 | GitLab Pages from SSLMate | HCVault | Path: /v1/k8s/data/env/gprd/ns/gitlab/pages/tls |
*.gprd.gitlab.net | Sectigo RSA Domain Validation Secure Server CA | GCP Load Balancer & GKMS | GKMS item: frontend-loadbalancer gprd , fields: gitlab-haproxy.ssl.internal_crt , gitlab-haproxy.ssl.internal_key ; project: gitlab-production | |
*.gstg.gitlab.com | Sectigo RSA Domain Validation Secure Server CA | GCP Load Balancer | project: gitlab-staging | |
*.staging.gitlab.io | Sectigo RSA Domain Validation Secure Server CA | GSTG GitLab Pages from SSLMate | HCVault | Path: /v1/k8s/data/env/gstg/ns/gitlab/pages/tls |
*.gstg.gitlab.net | Let’s Encrypt Authority X3 | Automated GCP Load Balancer | GCP project: gitlab-staging | |
*.ops.gitlab.net | Let’s Encrypt Authority X3 | Automated GCP Load Balancer | project: gitlab-ops | |
*.ops.gitlab.net | CloudFlare Inc ECC CA-2 | Automated Cloudflare | ||
*.pre.gitlab.net | Let’s Encrypt Authority X3 | Automated GCP Load Balancer | project: gitlab-pre | |
*.pre.gitlab.io | Sectigo RSA Domain Validation Secure Server CA | PRE GitLab Pages from SSLMate | HCVault | Path: /v1/k8s/data/env/pre/ns/gitlab/pages/tls |
*.qa-tunnel.gitlab.info | Sectigo RSA Domain Validation Secure Server CA | QA Tunnel | Chef Vault | data bag: gitlab-qa-tunnel , item: ci-prd , fields: "gitlab-qa-tunnel".ssl_certificate , "gitlab-qa-tunnel".ssl_key |
*.staging.gitlab.net | CloudFlare Inc ECC CA-2 | Automated Cloudflare |
Certificates managed by other GitLab teams
Section titled “Certificates managed by other GitLab teams”Domains | Issuer | Comments | Management | Owner |
---|---|---|---|---|
workspaces.gitlab.dev | Sectigo RSA Domain Validation Secure Server CA | GitLab workspaces for internal use only | SSLMate, manually updated in GKMS | Engineering Productivity team |
Defunct certificates (dead hosts, no longer used, etc)
Section titled “Defunct certificates (dead hosts, no longer used, etc)”Domains | Issuer | Valid until | Comments |
---|---|---|---|
alerts.gitlab.com | Sectigo RSA Domain Validation Secure Server CA | 2020-06-24T23:59:59 | Active certificate, but not rolled out to the CN host. |
allremote.org | Sectigo RSA Domain Validation Secure Server CA | 2020-06-08T23:59:59 | Page 404s with HTTP, and NET::ERR_CERT_COMMON_NAME_INVALID on HTTPS. Is a gitlab.io page. |
canary.staging.gitlab.com | COMODO RSA Domain Validation Secure Server CA | 2019-09-06T23:59:59 | Connection to host times out |
canary.staging.gitlab.com | Sectigo RSA Domain Validation Secure Server CA | 2020-09-06T23:59:59 | |
convdev.io | Sectigo RSA Domain Validation Secure Server CA | 2020-05-30T23:59:59 | Current certificate, but not rolled out |
dr.gitlab.com | Sectigo RSA Domain Validation Secure Server CA | Cancelled disaster recovery instance | |
enable.gitlab.com | Let’s Encrypt Authority X3 | 2019-10-14T21:09:02 | Site is a 404 |
geo1.gitlab.com | COMODO RSA Domain Validation Secure Server CA | 2019-11-02T23:59:59 | Does not resolve |
geo2.gitlab.com | COMODO RSA Domain Validation Secure Server CA | 2019-11-15T23:59:59 | Does not resolve |
gprd.gitlab.com | COMODO RSA Domain Validation Secure Server CA | 2020-02-06T23:59:59 | Does not resolve |
gstg.gitlab.com | Sectigo RSA Domain Validation Secure Server CA | 2020-04-11T23:59:59 | Does not resolve |
log.gitlap.com | Sectigo RSA Domain Validation Secure Server CA | 2020-06-02T23:59:59 | Replaced by log.gitlab.net |
monitor.gitlab.net | Amazon Server CA 1B | No longer in use | |
monkey.gitlab.net | COMODO RSA Domain Validation Secure Server CA | 2020-02-27T23:59:59 | Does not resolve |
next.gitlab.com | Sectigo RSA Domain Validation Secure Server CA | - | Replaced with auto-renewed Let’s Encrypt certificate (GitLab pages) |
next.staging.gitlab.com | Sectigo RSA Domain Validation Secure Server CA | 2020-02-22T23:59:59 | Does not work as of now, but should be fixed to work in the future (via LE certificate) |
performance-lb.gitlab.net | Sectigo RSA Domain Validation Secure Server CA | 2020-05-17T23:59:59 | Does not resolve |
plantuml.pre.gitlab.com | Sectigo RSA Domain Validation Secure Server CA | No longer in use | |
prod-log.gitlab.net | Sectigo RSA Domain Validation Secure Server CA | 2020-08-30T23:59:59 | Initially used for the production logs cluster, we later decided to use log.gprd.gitlab.net instead |
prod.geo.gitlab.com | Sectigo RSA Domain Validation Secure Server CA | 2020-08-14T23:59:59 | Does not resolve |
prometheus-01.nyc1.do.gitlab-runners.gitlab.net | COMODO RSA Domain Validation Secure Server CA | 2019-11-06T23:59:59 | Times out |
prometheus-2.gitlab.com | Sectigo RSA Domain Validation Secure Server CA | 2020-06-25T23:59:59 | Times out |
prometheus-3.gitlab.com | Sectigo RSA Domain Validation Secure Server CA | 2020-06-25T23:59:59 | Times out |
prometheus-app-01.gitlab.net | COMODO RSA Domain Validation Secure Server CA | 2020-02-16T23:59:59 | Times out |
prometheus-app-02.gitlab.net | COMODO RSA Domain Validation Secure Server CA | 2020-02-16T23:59:59 | Times out |
redash.gitlab.com | COMODO RSA Domain Validation Secure Server CA | Hosted on version.gitlab.com. Redash is no longer chef managed. | |
registry.gke.gstg.gitlab.com | Let’s Encrypt Authority X3 | 2019-09-24T17:49:51 | Was retrieved, but is not used. Verified by jarv |
registry.gke.pre.gitlab.com | Let’s Encrypt Authority X3 | 2019-08-26T16:53:33 | Same as registry.gke.gstg.gitlab.com |
registry.gke.staging.gitlab.com | Let’s Encrypt Authority X3 | 2019-09-24T18:07:16 | Same as registry.gke.gstg.gitlab.com |
runners-cache-5.gitlab.com | Sectigo RSA Domain Validation Secure Server CA | 2020-06-07T23:59:59 | Does not resolve |
sentry-infra.gitlap.com | Sectigo RSA Domain Validation Secure Server CA | 2020-05-26T23:59:59 | Connection refused |
sync.geo.gitlab.com | Sectigo RSA Domain Validation Secure Server CA | 2020-08-17T23:59:59 | Does not resolve |
*.ce.gitlab-review.app | COMODO ECC Domain Validation Secure Server CA | 2019-10-03T23:59:59 | Time out |
*.ce.gitlab-review.app | Sectigo ECC Domain Validation Secure Server CA | 2020-10-03T23:59:59 | Time out |
*.design.gitlab.com | Sectigo RSA Domain Validation Secure Server CA | 2020-04-27T23:59:59 | Site uses a LE cert generated by gl pages. Wildcard is not installed. This cert is dead |
*.dr.gitlab.net | Sectigo ECC Domain Validation Secure Server CA | 2020-01-23T23:59:59 | Does not resolve |
*.ee.gitlab-review.app | COMODO ECC Domain Validation Secure Server CA | 2019-10-03T23:59:59 | Times out |
*.eks.helm-charts.win | Sectigo RSA Domain Validation Secure Server CA | 2020-04-01T23:59:59 | Does not resolve |
*.gitlab-review.app | COMODO RSA Domain Validation Secure Server CA | 2019-09-10T23:59:59 | Does not resolve |
*.gprd.gitlab.com | COMODO RSA Domain Validation Secure Server CA | - | No longer in used (was used before gitlab.net ) |
*.helm-charts.win | COMODO RSA Domain Validation Secure Server CA | 2019-11-08T23:59:59 | Times out |
*.k8s-ft.win | COMODO RSA Domain Validation Secure Server CA | 2019-11-08T23:59:59 | Times out |
*.pre.gitlab.com | COMODO RSA Domain Validation Secure Server CA | - | Not required |
*.separate-containers.party | COMODO RSA Domain Validation Secure Server CA | 2019-11-08T23:59:59 | Does not resolve |
*.single.gitlab.com | COMODO RSA Domain Validation Secure Server CA | 2019-09-12T23:59:59 | Does not resolve |
*.single.gitlab.com | Sectigo RSA Domain Validation Secure Server CA | 2020-09-12T23:59:59 | |
*.gstg.gitlab.io | Sectigo RSA Domain Validation Secure Server CA | 2020-06-25T23:59:59 | Gitlab pages on staging, was not updated on hosts, is it still used? There IS *.staging.gitlab.io which is working |
*.testbed.gitlab.net | Let’s Encrypt Authority X3 | Automated GCP Load Balancer |
Other Certificates (unknown maintainer)
Section titled “Other Certificates (unknown maintainer)”Domains | Issuer | Valid until | Comments |
---|---|---|---|
federal-support.gitlab.com | Sectigo RSA Domain Validation Secure Server CA | 2020-05-22T23:59:59 | US Federal Zendesk instance |
federal-support.gitlab.com | Let’s Encrypt Authority X3 | 2019-09-29T18:11:39 | |
learn.gitlab.com | Sectigo RSA Domain Validation Secure Server CA | 2020-05-30T23:59:59 | Redirects to https://gitlab.lookbookhq.com/users/sign_in |
page.gitlab.com | CloudFlare, Inc. | Redirect to about. (Non infra managed as CF renews automagically) | |
saml-demo.gitlab.info | Sectigo RSA Domain Validation Securchef_hybride Server CA | 2020-05-18T23:59:59 | |
saml-demo.gitlab.info | Let’s Encrypt Authority X3 | 2019-10-23T19:46:50 | |
shop.gitlab.com | Let’s Encrypt Authority X3 | 2019-10-09T19:47:35 | Swag shop |
shop.gitlab.com | CloudFlare, Inc. | ||
translate.gitlab.com | Let’s Encrypt Authority X3 | 2019-10-04T02:12:34 | GitLab translation site |
www.meltano.com | COMODO RSA Domain Validation Secure Server CA | 2019-09-07T23:59:59 | Maybe mananaged by infra? |
*.cloud-native.win | COMODO RSA Domain Validation Secure Server CA | 2019-11-08T23:59:59 | Looks like a k8s cluster |