The hardest part of managing code reviews at scale is not the reviewing itself. It is keeping access steady when every contributor comes from a different network, device, and identity provider. Gerrit Microk8s offers a clean fix for that: local, containerized control paired with an auditable workflow. Simple in theory, safe when done right.
Gerrit handles your Git-based review life cycle. It tracks patch sets, maintains comments, and integrates with Jenkins or other CI tools. Microk8s runs lightweight Kubernetes clusters on a single node, perfect for developers who want production-grade orchestration without the overhead. Together, they form a compact ecosystem where every service can live behind fine-grained access rules.
When you place Gerrit inside a Microk8s cluster, it gains the benefits of Kubernetes without the complexity of full-scale management. Pods isolate workloads, secrets stay local, and RBAC policies define exactly who can touch which endpoint. You can bind Gerrit’s authentication with OIDC or LDAP through Ingress annotations or service accounts. The goal is consistency: the same user identity used for review also gates all cluster operations. That is how you avoid “it works on my laptop” chaos.
A common flow looks like this. Gerrit stores review metadata and pushes events to your automation pipeline. Microk8s catches those events through a service inside the cluster, runs tests, and posts results back to Gerrit. Access tokens remain short-lived, rotated via Kubernetes secrets. One identity, one line of trust. No stray SSH keys hiding in someone’s home directory.
Quick answer: How do I connect Gerrit and Microk8s?
Use Gerrit’s web container image as a Kubernetes deployment inside Microk8s, expose it through an Ingress, and link identity with your provider’s OIDC token. That ensures every review action maps to a verified user and cluster-side resource permissions follow suit.