doc/administration/dedicated/create_instance/_index.md
{{< details >}}
{{< /details >}}
Use Switchboard, the GitLab Dedicated management portal, to create your GitLab Dedicated instance.
This process involves the following steps:
To get access to Switchboard:
Provide your account team with the following:
If you want to use your own encryption keys, GitLab provides an AWS account ID for key configuration.
Check your email for an invitation with temporary Switchboard credentials.
[!note] Switchboard credentials are separate from any existing GitLab.com or GitLab Self-Managed credentials.
Sign in to Switchboard using the temporary credentials.
Update your password and set up multi-factor authentication (MFA).
To create your GitLab Dedicated instance:
Sign in to Switchboard.
On the Account details page, review and confirm your subscription settings:
These settings are predetermined by your contract and account team discussions.
On the Configuration page, complete the fields:
<tenant_name>.gitlab-dedicated.com).
Cannot be changed after provisioning, unless you configure a custom domain.On the Security page, configure encryption for your instance.
GitLab manages encryption keys automatically (recommended), or you can manage your own keys for compliance requirements.
[!warning] Customer-managed encryption keys require additional setup and ongoing management in your own AWS account. You must create and configure AWS KMS keys before provisioning your instance. Once configured, these settings cannot be changed after provisioning.
For GitLab-managed encryption (recommended):
For customer-managed encryption:
Optional. Create replica keys only if you selected a secondary region for Geo-based disaster recovery.
Collect the Amazon Resource Name (ARN) for each key or replica key. The ARN format is: arn:aws:kms:<REGION>:<ACCOUNT-ID>:key/<KEY-ID>.
For example: arn:aws:kms:us-east-1:123456789012:key/12345678-1234-1234-1234-123456789012
For each AWS region you selected (primary, secondary, backup), complete the key fields using this mapping:
For each service (Backup, EBS (disks), RDS (database), S3 (object storage), Advanced search): Either leave empty to use the default key for that region, or enter a specific KMS key ARN for that service. Service-specific keys must be from the same AWS region as the corresponding default key.
Leave fields blank for regions you don't use. For example, if you only have a primary region, leave the secondary and backup region fields empty.
Verify all ARNs are correct before proceeding.
Optional. On the Geo migration secrets page, collect and upload encrypted secrets from your GitLab Self-Managed instance:
[!note] This step is only required if you select Geo migration during account setup.
migration_secrets.json.age file.ssh_host_keys.json.age file (recommended if you plan to use a
custom domain).For detailed instructions and troubleshooting, see migrate to GitLab Dedicated with Geo.
On the Tenant summary page, review all configuration details.
[!warning] You cannot change these settings after provisioning:
- AWS KMS keys (BYOK) configuration
- AWS regions (primary, secondary, and backup regions)
- AWS availability zone IDs (primary and secondary regions)
- Repository capacity (can only increase)
- Tenant name and URL
Select Create tenant.
Your instance takes up to three hours to provision. You receive a confirmation email when setup is complete.
To access your GitLab Dedicated instance:
Sign in to Switchboard.
In the Access your GitLab Dedicated instance banner, select View credentials.
Copy the tenant URL and temporary root credentials.
[!note] You can retrieve temporary root credentials only once. Store them securely before leaving Switchboard.
Go to your tenant URL and sign in with the temporary root credentials.
In the Admin area, add the license key.
Return to Switchboard and add users as needed.
Review the release rollout schedule for upgrades and maintenance.
Plan ahead if you need any of the following features:
For all configuration options, see configure your GitLab Dedicated instance.
[!note] GitLab Dedicated instances use the same default settings as GitLab Self-Managed instances.
Starting with GitLab 18.0, GitLab Duo Core features are turned on by default for new instances. To comply with data residency requirements or AI usage policies, you can turn off GitLab Duo Core.