2019-05-30 02:23:46 -04:00
---
2020-05-29 14:08:26 -04:00
stage: Verify
group: Runner
2020-11-26 01:09:20 -05:00
info: To determine the technical writer assigned to the Stage/Group associated with this page, see https://about.gitlab.com/handbook/engineering/ux/technical-writing/#assignments
2019-05-30 02:23:46 -04:00
type: reference
---
2020-09-02 20:10:28 -04:00
# Configuring runners in GitLab
2015-08-25 21:42:46 -04:00
2020-09-02 20:10:28 -04:00
In GitLab CI/CD, runners run the code defined in [`.gitlab-ci.yml` ](../yaml/README.md ).
A runner is a lightweight, highly-scalable agent that picks up a CI job through
2020-06-10 23:08:30 -04:00
the coordinator API of GitLab CI/CD, runs the job, and sends the result back to the GitLab instance.
2015-08-25 21:42:46 -04:00
2020-06-10 23:08:30 -04:00
Runners are created by an administrator and are visible in the GitLab UI.
Runners can be specific to certain projects or available to all projects.
2017-06-06 12:56:30 -04:00
2020-10-20 23:08:45 -04:00
This documentation is focused on using runners in GitLab.
If you need to install and configure GitLab Runner, see
[the GitLab Runner documentation ](https://docs.gitlab.com/runner/ ).
2020-09-02 20:10:28 -04:00
## Types of runners
2016-06-07 10:48:16 -04:00
2020-10-15 11:08:45 -04:00
In the GitLab UI there are three types of runners, based on who you want to have access:
2017-06-06 12:56:30 -04:00
2020-10-15 11:08:45 -04:00
- [Shared runners ](#shared-runners ) are available to all groups and projects in a GitLab instance.
- [Group runners ](#group-runners ) are available to all projects and subgroups in a group.
- [Specific runners ](#specific-runners ) are associated with specific projects.
Typically, specific runners are used for one project at a time.
2017-09-05 09:25:33 -04:00
2020-09-02 20:10:28 -04:00
### Shared runners
2017-08-23 12:07:35 -04:00
2020-09-02 20:10:28 -04:00
*Shared runners* are available to every project in a GitLab instance.
2017-08-23 12:07:35 -04:00
2020-09-02 20:10:28 -04:00
Use shared runners when you have multiple jobs with similar requirements. Rather than
having multiple runners idling for many projects, you can have a few runners that handle
2020-06-10 23:08:30 -04:00
multiple projects.
2017-08-23 12:07:35 -04:00
2020-06-30 20:09:02 -04:00
If you are using a self-managed instance of GitLab:
2017-08-23 12:07:35 -04:00
2021-02-04 04:09:30 -05:00
- Your administrator can install and register shared runners by
going to your project's **Settings > CI / CD** , expanding the **Runners** section,
and clicking **Show runner installation instructions** .
These instructions are also available [in the documentation ](https://docs.gitlab.com/runner/install/index.html ).
2020-09-02 20:10:28 -04:00
- The administrator can also configure a maximum number of shared runner [pipeline minutes for
2020-09-07 11:09:04 -04:00
each group](../../user/admin_area/settings/continuous_integration.md#shared-runners-pipeline-minutes-quota).
2020-06-30 20:09:02 -04:00
If you are using GitLab.com:
2020-09-02 20:10:28 -04:00
- You can select from a list of [shared runners that GitLab maintains ](../../user/gitlab_com/index.md#shared-runners ).
2020-09-15 02:09:32 -04:00
- The shared runners consume the [pipelines minutes ](../../subscriptions/gitlab_com/index.md#ci-pipeline-minutes )
2020-06-30 20:09:02 -04:00
included with your account.
2017-08-25 04:48:33 -04:00
2020-09-02 20:10:28 -04:00
#### How shared runners pick jobs
2018-01-18 11:16:23 -05:00
2020-09-02 20:10:28 -04:00
Shared runners process jobs by using a fair usage queue. This queue prevents
2020-06-10 23:08:30 -04:00
projects from creating hundreds of jobs and using all available
2020-09-02 20:10:28 -04:00
shared runner resources.
2018-01-18 11:16:23 -05:00
2020-06-10 23:08:30 -04:00
The fair usage queue algorithm assigns jobs based on the projects that have the
2020-09-02 20:10:28 -04:00
fewest number of jobs already running on shared runners.
2015-08-25 21:42:46 -04:00
2017-06-06 12:56:30 -04:00
**Example 1**
2015-08-25 21:42:46 -04:00
2020-06-10 23:08:30 -04:00
If these jobs are in the queue:
2015-08-25 21:42:46 -04:00
2017-06-15 15:53:44 -04:00
- Job 1 for Project 1
- Job 2 for Project 1
- Job 3 for Project 1
- Job 4 for Project 2
- Job 5 for Project 2
- Job 6 for Project 3
2017-06-06 12:56:30 -04:00
2020-06-10 23:08:30 -04:00
The fair usage algorithm assigns jobs in this order:
2017-06-06 12:56:30 -04:00
2020-06-10 23:08:30 -04:00
1. Job 1 is chosen first, because it has the lowest job number from projects with no running jobs (that is, all projects).
1. Job 4 is next, because 4 is now the lowest job number from projects with no running jobs (Project 1 has a job running).
1. Job 6 is next, because 6 is now the lowest job number from projects with no running jobs (Projects 1 and 2 have jobs running).
1. Job 2 is next, because, of projects with the lowest number of jobs running (each has 1), it is the lowest job number.
2020-02-27 04:09:01 -05:00
1. Job 5 is next, because Project 1 now has 2 jobs running and Job 5 is the lowest remaining job number between Projects 2 and 3.
2020-06-10 23:08:30 -04:00
1. Finally is Job 3... because it's the only job left.
2017-06-06 12:56:30 -04:00
---
**Example 2**
2020-06-10 23:08:30 -04:00
If these jobs are in the queue:
2017-06-06 12:56:30 -04:00
2020-09-02 23:08:12 -04:00
- Job 1 for Project 1
- Job 2 for Project 1
- Job 3 for Project 1
- Job 4 for Project 2
- Job 5 for Project 2
- Job 6 for Project 3
2017-06-06 12:56:30 -04:00
2020-06-10 23:08:30 -04:00
The fair usage algorithm assigns jobs in this order:
2017-06-06 12:56:30 -04:00
2020-06-10 23:08:30 -04:00
1. Job 1 is chosen first, because it has the lowest job number from projects with no running jobs (that is, all projects).
2020-09-02 23:08:12 -04:00
1. We finish Job 1.
2020-06-10 23:08:30 -04:00
1. Job 2 is next, because, having finished Job 1, all projects have 0 jobs running again, and 2 is the lowest available job number.
2020-09-02 23:08:12 -04:00
1. Job 4 is next, because with Project 1 running a Job, 4 is the lowest number from projects running no jobs (Projects 2 and 3).
1. We finish Job 4.
2020-06-10 23:08:30 -04:00
1. Job 5 is next, because having finished Job 4, Project 2 has no jobs running again.
1. Job 6 is next, because Project 3 is the only project left with no running jobs.
1. Lastly we choose Job 3... because, again, it's the only job left.
2017-06-06 12:56:30 -04:00
2020-09-02 20:10:28 -04:00
#### Enable shared runners
2015-08-25 21:42:46 -04:00
2020-09-02 20:10:28 -04:00
On GitLab.com, [shared runners ](#shared-runners ) are enabled in all projects by
2020-06-30 20:09:02 -04:00
default.
2015-08-25 21:42:46 -04:00
2020-07-08 20:09:11 -04:00
On self-managed instances of GitLab, an administrator must [install ](https://docs.gitlab.com/runner/install/index.html )
and [register ](https://docs.gitlab.com/runner/register/index.html ) them.
2020-09-02 20:10:28 -04:00
You can also enable shared runners for individual projects.
2015-08-25 21:42:46 -04:00
2020-09-02 20:10:28 -04:00
To enable shared runners:
2015-08-25 21:42:46 -04:00
2020-07-28 23:09:51 -04:00
1. Go to the project's **Settings > CI/CD** and expand the **Runners** section.
2021-01-11 19:10:42 -05:00
1. Select **Enable shared runners for this project** .
2020-07-12 20:09:24 -04:00
2020-09-02 20:10:28 -04:00
#### Disable shared runners
2020-07-12 20:09:24 -04:00
2020-10-15 11:08:45 -04:00
You can disable shared runners for individual projects or for groups.
You must have Owner permissions for the project or group.
2020-07-12 20:09:24 -04:00
2020-09-02 20:10:28 -04:00
To disable shared runners for a project:
2020-07-12 20:09:24 -04:00
2020-07-28 23:09:51 -04:00
1. Go to the project's **Settings > CI/CD** and expand the **Runners** section.
2021-01-11 19:10:42 -05:00
1. In the **Shared runners** area, select **Enable shared runners for this project** so the toggle is grayed-out.
Shared runners are automatically disabled for a project:
- If the shared runners setting for the parent group is disabled, and
- If overriding this setting is not permitted at the project level.
2020-07-12 20:09:24 -04:00
2020-10-15 11:08:45 -04:00
To disable shared runners for a group:
2020-07-12 20:09:24 -04:00
2020-07-28 23:09:51 -04:00
1. Go to the group's **Settings > CI/CD** and expand the **Runners** section.
2021-02-08 13:09:49 -05:00
1. In the **Shared runners** area, turn off the **Enable shared runners for this group** toggle.
2020-09-02 20:10:28 -04:00
1. Optionally, to allow shared runners to be enabled for individual projects or subgroups,
2020-10-15 11:08:45 -04:00
click **Allow projects and subgroups to override the group setting** .
2015-08-25 21:42:46 -04:00
2021-02-08 13:09:49 -05:00
NOTE:
To re-enable the shared runners for a group, turn on the
**Enable shared runners for this group** toggle.
Then, an owner or maintainer must explicitly change this setting
for each project subgroup or project.
2020-09-02 20:10:28 -04:00
### Group runners
2015-08-25 21:42:46 -04:00
2020-09-02 20:10:28 -04:00
Use *Group runners* when you want all projects in a group
to have access to a set of runners.
2016-05-06 06:44:20 -04:00
2020-09-02 20:10:28 -04:00
Group runners process jobs by using a first in, first out ([FIFO](https://en.wikipedia.org/wiki/FIFO_(computing_and_electronics))) queue.
2017-06-06 12:56:30 -04:00
2020-09-02 20:10:28 -04:00
#### Create a group runner
2017-06-06 12:56:30 -04:00
2020-09-02 20:10:28 -04:00
You can create a group runner for your self-managed GitLab instance or for GitLab.com.
2020-06-10 23:08:30 -04:00
You must have [Owner permissions ](../../user/permissions.md#group-members-permissions ) for the group.
2019-02-17 17:19:43 -05:00
2020-09-02 20:10:28 -04:00
To create a group runner:
2020-06-10 23:08:30 -04:00
2020-09-02 20:10:28 -04:00
1. [Install GitLab Runner ](https://docs.gitlab.com/runner/install/ ).
1. Go to the group you want to make the runner work for.
2020-07-28 23:09:51 -04:00
1. Go to **Settings > CI/CD** and expand the **Runners** section.
2020-06-10 23:08:30 -04:00
1. Note the URL and token.
2020-09-02 20:10:28 -04:00
1. [Register the runner ](https://docs.gitlab.com/runner/register/ ).
2020-06-10 23:08:30 -04:00
2020-09-02 20:10:28 -04:00
#### View and manage group runners
2020-07-12 20:09:24 -04:00
2020-07-17 14:09:20 -04:00
> [Introduced](https://gitlab.com/gitlab-org/gitlab/-/issues/37366/) in GitLab 13.2.
2020-07-12 20:09:24 -04:00
2020-09-02 20:10:28 -04:00
You can view and manage all runners for a group, its subgroups, and projects.
2020-07-12 20:09:24 -04:00
You can do this for your self-managed GitLab instance or for GitLab.com.
You must have [Owner permissions ](../../user/permissions.md#group-members-permissions ) for the group.
2020-09-02 20:10:28 -04:00
1. Go to the group where you want to view the runners.
2020-07-28 23:09:51 -04:00
1. Go to **Settings > CI/CD** and expand the **Runners** section.
2020-07-12 20:09:24 -04:00
1. The following fields are displayed.
| Attribute | Description |
| ------------ | ----------- |
| Type | One or more of the following states: shared, group, specific, locked, or paused |
2020-09-02 20:10:28 -04:00
| Runner token | Token used to identify the runner, and that the runner uses to communicate with the GitLab instance |
| Description | Description given to the runner when it was created |
2020-07-12 20:09:24 -04:00
| Version | GitLab Runner version |
2020-09-02 20:10:28 -04:00
| IP address | IP address of the host on which the runner is registered |
| Projects | The count of projects to which the runner is assigned |
| Jobs | Total of jobs run by the runner |
| Tags | Tags associated with the runner |
| Last contact | Timestamp indicating when the GitLab instance last contacted the runner |
2020-07-12 20:09:24 -04:00
2020-09-02 20:10:28 -04:00
From this page, you can edit, pause, and remove runners from the group, its subgroups, and projects.
2020-07-12 20:09:24 -04:00
2020-09-02 20:10:28 -04:00
#### Pause or remove a group runner
2020-06-10 23:08:30 -04:00
2020-09-02 20:10:28 -04:00
You can pause or remove a group runner for your self-managed GitLab instance or for GitLab.com.
2020-06-10 23:08:30 -04:00
You must have [Owner permissions ](../../user/permissions.md#group-members-permissions ) for the group.
2020-09-02 20:10:28 -04:00
1. Go to the group you want to remove or pause the runner for.
2020-07-28 23:09:51 -04:00
1. Go to **Settings > CI/CD** and expand the **Runners** section.
2020-09-02 20:10:28 -04:00
1. Click **Pause** or **Remove runner** .
- If you pause a group runner that is used by multiple projects, the runner pauses for all projects.
- From the group view, you cannot remove a runner that is assigned to more than one project.
2020-07-17 14:09:20 -04:00
You must remove it from each project first.
2020-06-10 23:08:30 -04:00
1. On the confirmation dialog, click **OK** .
2020-09-02 20:10:28 -04:00
### Specific runners
2020-06-10 23:08:30 -04:00
2020-09-02 20:10:28 -04:00
Use *Specific runners* when you want to use runners for specific projects. For example,
2020-06-10 23:08:30 -04:00
when you have:
- Jobs with specific requirements, like a deploy job that requires credentials.
2020-09-02 20:10:28 -04:00
- Projects with a lot of CI activity that can benefit from being separate from other runners.
2020-06-10 23:08:30 -04:00
2020-09-02 20:10:28 -04:00
You can set up a specific runner to be used by multiple projects. Specific runners
2020-06-10 23:08:30 -04:00
must be enabled for each project explicitly.
2020-09-02 20:10:28 -04:00
Specific runners process jobs by using a first in, first out ([FIFO](https://en.wikipedia.org/wiki/FIFO_(computing_and_electronics))) queue.
2019-02-17 17:19:43 -05:00
2020-12-04 16:09:29 -05:00
NOTE:
2020-09-02 20:10:28 -04:00
Specific runners do not get shared with forked projects automatically.
2020-06-10 23:08:30 -04:00
A fork *does* copy the CI / CD settings of the cloned repository.
2019-02-17 17:19:43 -05:00
2020-09-02 20:10:28 -04:00
#### Create a specific runner
2019-02-17 17:19:43 -05:00
2020-09-02 20:10:28 -04:00
You can create a specific runner for your self-managed GitLab instance or for GitLab.com.
2020-06-10 23:08:30 -04:00
You must have [Owner permissions ](../../user/permissions.md#project-members-permissions ) for the project.
2019-02-17 17:19:43 -05:00
2020-09-02 20:10:28 -04:00
To create a specific runner:
2019-02-17 17:19:43 -05:00
2020-09-02 20:10:28 -04:00
1. [Install runner ](https://docs.gitlab.com/runner/install/ ).
2020-07-28 23:09:51 -04:00
1. Go to the project's **Settings > CI/CD** and expand the **Runners** section.
2020-06-10 23:08:30 -04:00
1. Note the URL and token.
2020-09-02 20:10:28 -04:00
1. [Register the runner ](https://docs.gitlab.com/runner/register/ ).
2019-02-17 17:19:43 -05:00
2020-09-02 20:10:28 -04:00
#### Enable a specific runner for a specific project
2019-02-17 17:19:43 -05:00
2020-09-02 20:10:28 -04:00
A specific runner is available in the project it was created for. An administrator can
enable a specific runner to apply to additional projects.
2019-02-17 17:19:43 -05:00
2020-06-10 23:08:30 -04:00
- You must have Owner permissions for the project.
2020-09-02 20:10:28 -04:00
- The specific runner must not be [locked ](#prevent-a-specific-runner-from-being-enabled-for-other-projects ).
2019-02-17 17:19:43 -05:00
2020-09-02 20:10:28 -04:00
To enable or disable a specific runner for a project:
2019-02-17 17:19:43 -05:00
2020-07-28 23:09:51 -04:00
1. Go to the project's **Settings > CI/CD** and expand the **Runners** section.
2020-06-10 23:08:30 -04:00
1. Click **Enable for this project** or **Disable for this project** .
2019-02-17 17:19:43 -05:00
2020-09-02 20:10:28 -04:00
#### Prevent a specific runner from being enabled for other projects
2019-02-17 17:19:43 -05:00
2020-09-02 20:10:28 -04:00
You can configure a specific runner so it is "locked" and cannot be enabled for other projects.
This setting can be enabled when you first [register a runner ](https://docs.gitlab.com/runner/register/ ),
2020-06-10 23:08:30 -04:00
but can also be changed later.
2019-02-17 17:19:43 -05:00
2020-09-02 20:10:28 -04:00
To lock or unlock a runner:
2019-02-17 17:19:43 -05:00
2020-07-28 23:09:51 -04:00
1. Go to the project's **Settings > CI/CD** and expand the **Runners** section.
2020-09-02 20:10:28 -04:00
1. Find the runner you want to lock or unlock. Make sure it's enabled.
2020-06-10 23:08:30 -04:00
1. Click the pencil button.
1. Check the **Lock to current projects** option.
1. Click **Save changes** .
2019-02-17 17:19:43 -05:00
2020-09-02 20:10:28 -04:00
## Manually clear the runner cache
2019-02-17 17:19:43 -05:00
2020-06-10 23:08:30 -04:00
Read [clearing the cache ](../caching/index.md#clearing-the-cache ).
2020-09-02 20:10:28 -04:00
## Set maximum job timeout for a runner
2016-05-06 06:44:20 -04:00
2020-09-02 20:10:28 -04:00
For each runner, you can specify a *maximum job timeout* . This timeout,
2020-06-10 23:08:30 -04:00
if smaller than the [project defined timeout ](../pipelines/settings.md#timeout ), takes precedence.
2018-02-20 23:28:08 -05:00
2020-09-02 20:10:28 -04:00
This feature can be used to prevent your shared runner from being overwhelmed
2020-06-10 23:08:30 -04:00
by a project that has jobs with a long timeout (for example, one week).
2018-02-20 23:28:08 -05:00
2020-09-02 20:10:28 -04:00
When not configured, runners do not override the project timeout.
2018-02-20 23:28:08 -05:00
2021-01-14 16:10:37 -05:00
On GitLab.com, you cannot override the job timeout for shared runners and must use the [project defined timeout ](../pipelines/settings.md#timeout ).
To set the maximum job timeout:
1. In a project, go to **Settings > CI/CD > Runners** .
2021-02-10 22:09:06 -05:00
1. Select your specific runner to edit the settings.
2021-01-14 16:10:37 -05:00
1. Enter a value under **Maximum job timeout** .
1. Select **Save changes** .
2020-06-10 23:08:30 -04:00
How this feature works:
2018-02-20 23:28:08 -05:00
**Example 1 - Runner timeout bigger than project timeout**
2020-09-02 20:10:28 -04:00
1. You set the _maximum job timeout_ for a runner to 24 hours
2018-02-20 23:28:08 -05:00
1. You set the _CI/CD Timeout_ for a project to **2 hours**
1. You start a job
2020-11-23 13:09:14 -05:00
1. The job, if running longer, times out after **2 hours**
2018-02-20 23:28:08 -05:00
**Example 2 - Runner timeout not configured**
2020-09-02 20:10:28 -04:00
1. You remove the _maximum job timeout_ configuration from a runner
2018-02-20 23:28:08 -05:00
1. You set the _CI/CD Timeout_ for a project to **2 hours**
1. You start a job
2020-11-23 13:09:14 -05:00
1. The job, if running longer, times out after **2 hours**
2018-02-20 23:28:08 -05:00
**Example 3 - Runner timeout smaller than project timeout**
2020-09-02 20:10:28 -04:00
1. You set the _maximum job timeout_ for a runner to **30 minutes**
2018-02-20 23:28:08 -05:00
1. You set the _CI/CD Timeout_ for a project to 2 hours
1. You start a job
2020-11-23 13:09:14 -05:00
1. The job, if running longer, times out after **30 minutes**
2018-02-20 23:28:08 -05:00
2020-06-10 23:08:30 -04:00
## Be careful with sensitive information
2015-08-25 21:42:46 -04:00
2020-09-02 20:10:28 -04:00
With some [runner executors ](https://docs.gitlab.com/runner/executors/README.html ),
if you can run a job on the runner, you can get full access to the file system,
and thus any code it runs as well as the token of the runner. With shared runners, this means that anyone
that runs jobs on the runner, can access anyone else's code that runs on the
runner.
2015-08-25 21:42:46 -04:00
2020-09-02 20:10:28 -04:00
In addition, because you can get access to the runner token, it is possible
to create a clone of a runner and submit false jobs, for example.
2015-08-25 21:42:46 -04:00
2020-09-02 20:10:28 -04:00
The above is easily avoided by restricting the usage of shared runners
2017-09-06 01:56:11 -04:00
on large public GitLab instances, controlling access to your GitLab instance,
2020-09-02 20:10:28 -04:00
and using more secure [runner executors ](https://docs.gitlab.com/runner/executors/README.html ).
2015-08-25 21:42:46 -04:00
2020-09-02 20:10:28 -04:00
### Prevent runners from revealing sensitive information
2020-06-10 23:08:30 -04:00
> [Introduced](https://gitlab.com/gitlab-org/gitlab-foss/-/merge_requests/13194) in GitLab 10.0.
2020-09-02 20:10:28 -04:00
You can protect runners so they don't reveal sensitive information.
When a runner is protected, the runner picks jobs created on
2020-06-10 23:08:30 -04:00
[protected branches ](../../user/project/protected_branches.md ) or [protected tags ](../../user/project/protected_tags.md ) only,
and ignores other jobs.
2020-09-02 20:10:28 -04:00
To protect or unprotect a runner:
2020-06-10 23:08:30 -04:00
2020-07-28 23:09:51 -04:00
1. Go to the project's **Settings > CI/CD** and expand the **Runners** section.
2020-09-02 20:10:28 -04:00
1. Find the runner you want to protect or unprotect. Make sure it's enabled.
2020-06-10 23:08:30 -04:00
1. Click the pencil button.
1. Check the **Protected** option.
1. Click **Save changes** .
2020-09-02 20:10:28 -04:00
![specific runners edit icon ](img/protected_runners_check_box.png )
2020-06-10 23:08:30 -04:00
2015-08-25 21:42:46 -04:00
### Forks
Whenever a project is forked, it copies the settings of the jobs that relate
2020-09-02 20:10:28 -04:00
to it. This means that if you have shared runners set up for a project and
someone forks that project, the shared runners serve jobs of this project.
2015-08-25 21:42:46 -04:00
2020-09-02 20:10:28 -04:00
### Attack vectors in runners
2015-08-25 21:42:46 -04:00
2020-09-02 20:10:28 -04:00
Mentioned briefly earlier, but the following things of runners can be exploited.
2017-02-13 11:59:57 -05:00
We're always looking for contributions that can mitigate these
[Security Considerations ](https://docs.gitlab.com/runner/security/ ).
2017-06-06 12:56:30 -04:00
2020-09-02 20:10:28 -04:00
### Reset the runner registration token for a project
2018-04-10 18:03:26 -04:00
2020-06-10 23:08:30 -04:00
If you think that a registration token for a project was revealed, you should
2020-09-02 20:10:28 -04:00
reset it. A token can be used to register another runner for the project. That new runner
2020-06-10 23:08:30 -04:00
may then be used to obtain the values of secret variables or to clone project code.
2018-04-10 18:03:26 -04:00
To reset the token:
2020-07-28 23:09:51 -04:00
1. Go to the project's **Settings > CI/CD** .
2019-08-12 05:53:30 -04:00
1. Expand the **General pipelines settings** section.
1. Find the **Runner token** form field and click the **Reveal value** button.
1. Delete the value and save the form.
2018-04-10 18:03:26 -04:00
1. After the page is refreshed, expand the **Runners settings** section
2019-08-12 05:53:30 -04:00
and check the registration token - it should be changed.
2018-04-10 18:03:26 -04:00
2020-08-09 20:10:20 -04:00
From now on the old token is no longer valid and does not register
2020-09-02 20:10:28 -04:00
any new runners to the project. If you are using any tools to provision and
register new runners, the tokens used in those tools should be updated to reflect the
2019-10-17 20:07:45 -04:00
value of the new token.
2018-04-10 18:03:26 -04:00
2020-09-02 20:10:28 -04:00
## Determine the IP address of a runner
2018-03-18 20:16:18 -04:00
2020-02-06 10:09:11 -05:00
> [Introduced](https://gitlab.com/gitlab-org/gitlab-foss/-/merge_requests/17286) in GitLab 10.6.
2018-03-18 20:16:18 -04:00
2020-09-02 20:10:28 -04:00
It may be useful to know the IP address of a runner so you can troubleshoot
issues with that runner. GitLab stores and displays the IP address by viewing
2018-03-18 20:16:18 -04:00
the source of the HTTP requests it makes to GitLab when polling for jobs. The
2020-11-23 13:09:14 -05:00
IP address is always kept up to date so if the runner IP changes it
automatically updates in GitLab.
2018-03-18 20:16:18 -04:00
2020-09-02 20:10:28 -04:00
The IP address for shared runners and specific runners can be found in
2018-03-18 20:16:18 -04:00
different places.
2020-09-02 20:10:28 -04:00
### Determine the IP address of a shared runner
2018-03-18 20:16:18 -04:00
2020-09-02 20:10:28 -04:00
To view the IP address of a shared runner you must have admin access to
2018-03-18 20:16:18 -04:00
the GitLab instance. To determine this:
2020-07-28 20:09:37 -04:00
1. Visit **Admin Area > Overview > Runners** .
2020-09-02 20:10:28 -04:00
1. Look for the runner in the table and you should see a column for **IP Address** .
2018-03-18 20:16:18 -04:00
2020-09-02 20:10:28 -04:00
![shared runner IP address ](img/shared_runner_ip_address.png )
2018-03-18 20:16:18 -04:00
2020-09-02 20:10:28 -04:00
### Determine the IP address of a specific runner
2018-03-18 20:16:18 -04:00
2020-09-02 20:10:28 -04:00
To can find the IP address of a runner for a specific project,
2020-06-10 23:08:30 -04:00
you must have Owner [permissions ](../../user/permissions.md#project-members-permissions ) for the project.
2018-03-18 20:16:18 -04:00
2020-07-28 23:09:51 -04:00
1. Go to the project's **Settings > CI/CD** and expand the **Runners** section.
2020-06-10 23:08:30 -04:00
1. On the details page you should see a row for **IP Address** .
2018-03-18 20:16:18 -04:00
2020-09-02 20:10:28 -04:00
![specific runner IP address ](img/specific_runner_ip_address.png )
2020-06-10 23:08:30 -04:00
2020-09-02 20:10:28 -04:00
## Use tags to limit the number of jobs using the runner
2020-06-10 23:08:30 -04:00
2020-09-02 20:10:28 -04:00
You must set up a runner to be able to run all the different types of jobs
2020-06-10 23:08:30 -04:00
that it may encounter on the projects it's shared over. This would be
2020-11-16 16:09:02 -05:00
problematic for large amounts of projects, if it weren't for tags.
2020-10-21 14:08:58 -04:00
GitLab CI tags are not the same as Git tags. GitLab CI tags are associated with runners.
Git tags are associated with commits.
2020-06-10 23:08:30 -04:00
2020-09-02 20:10:28 -04:00
By tagging a runner for the types of jobs it can handle, you can make sure
shared runners will [only run the jobs they are equipped to run ](../yaml/README.md#tags ).
2020-06-10 23:08:30 -04:00
2020-09-02 20:10:28 -04:00
For instance, at GitLab we have runners tagged with `rails` if they contain
2020-06-10 23:08:30 -04:00
the appropriate dependencies to run Rails test suites.
2020-09-02 20:10:28 -04:00
When you [register a runner ](https://docs.gitlab.com/runner/register/ ), its default behavior is to **only pick**
2020-06-10 23:08:30 -04:00
[tagged jobs ](../yaml/README.md#tags ).
To change this, you must have Owner [permissions ](../../user/permissions.md#project-members-permissions ) for the project.
2020-09-02 20:10:28 -04:00
To make a runner pick untagged jobs:
2020-06-10 23:08:30 -04:00
2020-07-28 23:09:51 -04:00
1. Go to the project's **Settings > CI/CD** and expand the **Runners** section.
2020-09-02 20:10:28 -04:00
1. Find the runner you want to pick untagged jobs and make sure it's enabled.
2020-06-10 23:08:30 -04:00
1. Click the pencil button.
1. Check the **Run untagged jobs** option.
1. Click the **Save changes** button for the changes to take effect.
2020-12-04 16:09:29 -05:00
NOTE:
2020-09-02 20:10:28 -04:00
The runner tags list can not be empty when it's not allowed to pick untagged jobs.
2020-06-10 23:08:30 -04:00
Below are some example scenarios of different variations.
2020-09-02 20:10:28 -04:00
### runner runs only tagged jobs
2020-06-10 23:08:30 -04:00
2020-09-02 20:10:28 -04:00
The following examples illustrate the potential impact of the runner being set
2020-06-10 23:08:30 -04:00
to run only tagged jobs.
Example 1:
2020-09-02 20:10:28 -04:00
1. The runner is configured to run only tagged jobs and has the `docker` tag.
2020-06-10 23:08:30 -04:00
1. A job that has a `hello` tag is executed and stuck.
Example 2:
2020-09-02 20:10:28 -04:00
1. The runner is configured to run only tagged jobs and has the `docker` tag.
2020-06-10 23:08:30 -04:00
1. A job that has a `docker` tag is executed and run.
Example 3:
2020-09-02 20:10:28 -04:00
1. The runner is configured to run only tagged jobs and has the `docker` tag.
2020-06-10 23:08:30 -04:00
1. A job that has no tags defined is executed and stuck.
2020-09-02 20:10:28 -04:00
### runner is allowed to run untagged jobs
2020-06-10 23:08:30 -04:00
2020-09-02 20:10:28 -04:00
The following examples illustrate the potential impact of the runner being set
2020-06-10 23:08:30 -04:00
to run tagged and untagged jobs.
Example 1:
2020-09-02 20:10:28 -04:00
1. The runner is configured to run untagged jobs and has the `docker` tag.
2020-06-10 23:08:30 -04:00
1. A job that has no tags defined is executed and run.
1. A second job that has a `docker` tag defined is executed and run.
Example 2:
2020-09-02 20:10:28 -04:00
1. The runner is configured to run untagged jobs and has no tags defined.
2020-06-10 23:08:30 -04:00
1. A job that has no tags defined is executed and run.
1. A second job that has a `docker` tag defined is stuck.
2020-08-23 20:10:19 -04:00
2020-11-09 22:09:04 -05:00
## Configure runner behavior with variables
You can use [CI/CD variables ](../variables/README.md ) to configure runner Git behavior
globally or for individual jobs:
- [`GIT_STRATEGY` ](#git-strategy )
- [`GIT_SUBMODULE_STRATEGY` ](#git-submodule-strategy )
- [`GIT_CHECKOUT` ](#git-checkout )
- [`GIT_CLEAN_FLAGS` ](#git-clean-flags )
- [`GIT_FETCH_EXTRA_FLAGS` ](#git-fetch-extra-flags )
- [`GIT_DEPTH` ](#shallow-cloning ) (shallow cloning)
- [`GIT_CLONE_PATH` ](#custom-build-directories ) (custom build directories)
You can also use variables to configure how many times a runner
[attempts certain stages of job execution ](#job-stages-attempts ).
### Git strategy
> - Introduced in GitLab 8.9 as an experimental feature.
> - `GIT_STRATEGY=none` requires GitLab Runner v1.7+.
2020-11-10 10:09:14 -05:00
You can set the `GIT_STRATEGY` used to fetch the repository content, either
globally or per-job in the [`variables` ](../yaml/README.md#variables ) section:
2020-11-09 22:09:04 -05:00
```yaml
variables:
GIT_STRATEGY: clone
```
2020-11-10 10:09:14 -05:00
There are three possible values: `clone` , `fetch` , and `none` . If left unspecified,
jobs use the [project's pipeline setting ](../pipelines/settings.md#git-strategy ).
`clone` is the slowest option. It clones the repository from scratch for every
job, ensuring that the local working copy is always pristine.
If an existing worktree is found, it is removed before cloning.
2020-11-09 22:09:04 -05:00
`fetch` is faster as it re-uses the local working copy (falling back to `clone`
if it does not exist). `git clean` is used to undo any changes made by the last
2020-11-10 10:09:14 -05:00
job, and `git fetch` is used to retrieve commits made after the last job ran.
2020-11-09 22:09:04 -05:00
2020-11-10 10:09:14 -05:00
However, `fetch` does require access to the previous worktree. This works
well when using the `shell` or `docker` executor because these
try to preserve worktrees and try to re-use them by default.
2020-11-09 22:09:04 -05:00
2020-11-10 10:09:14 -05:00
This has limitations when using the [Docker Machine executor ](https://docs.gitlab.com/runner/executors/docker_machine.html ).
2020-11-09 22:09:04 -05:00
2020-11-10 10:09:14 -05:00
It does not work for [the `kubernetes` executor ](https://docs.gitlab.com/runner/executors/kubernetes.html ),
but a [feature proposal ](https://gitlab.com/gitlab-org/gitlab-runner/-/issues/3847 ) exists.
The `kubernetes` executor always clones into an temporary directory.
2020-11-09 22:09:04 -05:00
2020-11-10 10:09:14 -05:00
A Git strategy of `none` also re-uses the local working copy, but skips all Git
operations normally done by GitLab. GitLab Runner pre-clone scripts are also skipped,
if present. This strategy could mean you need to add `fetch` and `checkout` commands
to [your `.gitlab-ci.yml` script ](../yaml/README.md#script ).
2020-11-09 22:09:04 -05:00
2020-11-10 10:09:14 -05:00
It can be used for jobs that operate exclusively on artifacts, like a deployment job.
Git repository data may be present, but it's likely out of date. You should only
rely on files brought into the local working copy from cache or artifacts.
2020-11-09 22:09:04 -05:00
### Git submodule strategy
> Requires GitLab Runner v1.10+.
The `GIT_SUBMODULE_STRATEGY` variable is used to control if / how Git
submodules are included when fetching the code before a build. You can set them
globally or per-job in the [`variables` ](../yaml/README.md#variables ) section.
There are three possible values: `none` , `normal` , and `recursive` :
- `none` means that submodules are not included when fetching the project
code. This is the default, which matches the pre-v1.10 behavior.
- `normal` means that only the top-level submodules are included. It's
equivalent to:
```shell
git submodule sync
git submodule update --init
```
- `recursive` means that all submodules (including submodules of submodules)
are included. This feature needs Git v1.8.1 and later. When using a
GitLab Runner with an executor not based on Docker, make sure the Git version
meets that requirement. It's equivalent to:
```shell
git submodule sync --recursive
git submodule update --init --recursive
```
For this feature to work correctly, the submodules must be configured
(in `.gitmodules` ) with either:
- the HTTP(S) URL of a publicly-accessible repository, or
- a relative path to another repository on the same GitLab server. See the
[Git submodules ](../git_submodules.md ) documentation.
### Git checkout
> Introduced in GitLab Runner 9.3.
The `GIT_CHECKOUT` variable can be used when the `GIT_STRATEGY` is set to either
`clone` or `fetch` to specify whether a `git checkout` should be run. If not
specified, it defaults to true. You can set them globally or per-job in the
[`variables` ](../yaml/README.md#variables ) section.
If set to `false` , the runner:
- when doing `fetch` - updates the repository and leaves the working copy on
the current revision,
- when doing `clone` - clones the repository and leaves the working copy on the
default branch.
If `GIT_CHECKOUT` is set to `true` , both `clone` and `fetch` work the same way.
The runner checks out the working copy of a revision related
to the CI pipeline:
```yaml
variables:
GIT_STRATEGY: clone
GIT_CHECKOUT: "false"
script:
- git checkout -B master origin/master
- git merge $CI_COMMIT_SHA
```
### Git clean flags
> Introduced in GitLab Runner 11.10
The `GIT_CLEAN_FLAGS` variable is used to control the default behavior of
`git clean` after checking out the sources. You can set it globally or per-job in the
[`variables` ](../yaml/README.md#variables ) section.
`GIT_CLEAN_FLAGS` accepts all possible options of the [`git clean` ](https://git-scm.com/docs/git-clean )
command.
`git clean` is disabled if `GIT_CHECKOUT: "false"` is specified.
If `GIT_CLEAN_FLAGS` is:
- Not specified, `git clean` flags default to `-ffdx` .
- Given the value `none` , `git clean` is not executed.
For example:
```yaml
variables:
GIT_CLEAN_FLAGS: -ffdx -e cache/
script:
- ls -al cache/
```
### Git fetch extra flags
> [Introduced](https://gitlab.com/gitlab-org/gitlab-runner/-/issues/4142) in GitLab Runner 13.1.
The `GIT_FETCH_EXTRA_FLAGS` variable is used to control the behavior of
`git fetch` . You can set it globally or per-job in the [`variables` ](../yaml/README.md#variables ) section.
`GIT_FETCH_EXTRA_FLAGS` accepts all options of the [`git fetch` ](https://git-scm.com/docs/git-fetch ) command. However, `GIT_FETCH_EXTRA_FLAGS` flags are appended after the default flags that can't be modified.
The default flags are:
- [GIT_DEPTH ](#shallow-cloning ).
- The list of [refspecs ](https://git-scm.com/book/en/v2/Git-Internals-The-Refspec ).
- A remote called `origin` .
If `GIT_FETCH_EXTRA_FLAGS` is:
- Not specified, `git fetch` flags default to `--prune --quiet` along with the default flags.
- Given the value `none` , `git fetch` is executed only with the default flags.
For example, the default flags are `--prune --quiet` , so you can make `git fetch` more verbose by overriding this with just `--prune` :
```yaml
variables:
GIT_FETCH_EXTRA_FLAGS: --prune
script:
- ls -al cache/
```
The configuration above results in `git fetch` being called this way:
```shell
git fetch origin $REFSPECS --depth 50 --prune
```
Where `$REFSPECS` is a value provided to the runner internally by GitLab.
### Shallow cloning
> Introduced in GitLab 8.9 as an experimental feature.
You can specify the depth of fetching and cloning using `GIT_DEPTH` .
`GIT_DEPTH` does a shallow clone of the repository and can significantly speed up cloning.
It can be helpful for repositories with a large number of commits or old, large binaries. The value is
passed to `git fetch` and `git clone` .
In GitLab 12.0 and later, newly-created projects automatically have a
[default `git depth` value of `50` ](../pipelines/settings.md#git-shallow-clone ).
If you use a depth of `1` and have a queue of jobs or retry
jobs, jobs may fail.
Git fetching and cloning is based on a ref, such as a branch name, so runners
can't clone a specific commit SHA. If multiple jobs are in the queue, or
you're retrying an old job, the commit to be tested must be within the
Git history that is cloned. Setting too small a value for `GIT_DEPTH` can make
it impossible to run these old commits and `unresolved reference` is displayed in
job logs. You should then reconsider changing `GIT_DEPTH` to a higher value.
Jobs that rely on `git describe` may not work correctly when `GIT_DEPTH` is
set since only part of the Git history is present.
To fetch or clone only the last 3 commits:
```yaml
variables:
GIT_DEPTH: "3"
```
You can set it globally or per-job in the [`variables` ](../yaml/README.md#variables ) section.
### Custom build directories
> [Introduced](https://gitlab.com/gitlab-org/gitlab-runner/-/issues/2211) in GitLab Runner 11.10.
By default, GitLab Runner clones the repository in a unique subpath of the
`$CI_BUILDS_DIR` directory. However, your project might require the code in a
specific directory (Go projects, for example). In that case, you can specify
the `GIT_CLONE_PATH` variable to tell the runner the directory to clone the
repository in:
```yaml
variables:
GIT_CLONE_PATH: $CI_BUILDS_DIR/project-name
test:
script:
- pwd
```
The `GIT_CLONE_PATH` has to always be within `$CI_BUILDS_DIR` . The directory set in `$CI_BUILDS_DIR`
is dependent on executor and configuration of [runners.builds_dir ](https://docs.gitlab.com/runner/configuration/advanced-configuration.html#the-runners-section )
setting.
This can only be used when `custom_build_dir` is enabled in the
[runner's configuration ](https://docs.gitlab.com/runner/configuration/advanced-configuration.html#the-runnerscustom_build_dir-section ).
This is the default configuration for the `docker` and `kubernetes` executors.
#### Handling concurrency
An executor that uses a concurrency greater than `1` might lead
to failures. Multiple jobs might be working on the same directory if the `builds_dir`
is shared between jobs.
The runner does not try to prevent this situation. It's up to the administrator
and developers to comply with the requirements of runner configuration.
To avoid this scenario, you can use a unique path within `$CI_BUILDS_DIR` , because runner
exposes two additional variables that provide a unique `ID` of concurrency:
- `$CI_CONCURRENT_ID` : Unique ID for all jobs running within the given executor.
- `$CI_CONCURRENT_PROJECT_ID` : Unique ID for all jobs running within the given executor and project.
The most stable configuration that should work well in any scenario and on any executor
is to use `$CI_CONCURRENT_ID` in the `GIT_CLONE_PATH` . For example:
```yaml
variables:
GIT_CLONE_PATH: $CI_BUILDS_DIR/$CI_CONCURRENT_ID/project-name
test:
script:
- pwd
```
The `$CI_CONCURRENT_PROJECT_ID` should be used in conjunction with `$CI_PROJECT_PATH`
as the `$CI_PROJECT_PATH` provides a path of a repository. That is, `group/subgroup/project` . For example:
```yaml
variables:
GIT_CLONE_PATH: $CI_BUILDS_DIR/$CI_CONCURRENT_ID/$CI_PROJECT_PATH
test:
script:
- pwd
```
#### Nested paths
The value of `GIT_CLONE_PATH` is expanded once and nesting variables
within is not supported.
For example, you define both the variables below in your
`.gitlab-ci.yml` file:
```yaml
variables:
GOPATH: $CI_BUILDS_DIR/go
GIT_CLONE_PATH: $GOPATH/src/namespace/project
```
The value of `GIT_CLONE_PATH` is expanded once into
`$CI_BUILDS_DIR/go/src/namespace/project` , and results in failure
because `$CI_BUILDS_DIR` is not expanded.
### Job stages attempts
> Introduced in GitLab, it requires GitLab Runner v1.9+.
You can set the number of attempts that the running job tries to execute
the following stages:
| Variable | Description |
|---------------------------------|--------------------------------------------------------|
| `ARTIFACT_DOWNLOAD_ATTEMPTS` | Number of attempts to download artifacts running a job |
| `EXECUTOR_JOB_SECTION_ATTEMPTS` | [In GitLab 12.10 ](https://gitlab.com/gitlab-org/gitlab-runner/-/issues/4450 ) and later, the number of attempts to run a section in a job after a [`No Such Container` ](https://gitlab.com/gitlab-org/gitlab-runner/-/issues/4450 ) error ([Docker executor](https://docs.gitlab.com/runner/executors/docker.html) only). |
| `GET_SOURCES_ATTEMPTS` | Number of attempts to fetch sources running a job |
| `RESTORE_CACHE_ATTEMPTS` | Number of attempts to restore the cache running a job |
The default is one single attempt.
Example:
```yaml
variables:
GET_SOURCES_ATTEMPTS: 3
```
You can set them globally or per-job in the [`variables` ](../yaml/README.md#variables ) section.
2020-08-23 20:10:19 -04:00
## System calls not available on GitLab.com shared runners
GitLab.com shared runners run on CoreOS. This means that you cannot use some system calls, like `getlogin` , from the C standard library.
2021-02-10 16:09:24 -05:00
## Artifact and cache settings
> Introduced in GitLab Runner 13.9.
Artifact and cache settings control the compression ratio of artifacts and caches.
Use these settings to specify the size of the archive produced by a job.
- On a slow network, uploads might be faster for smaller archives.
- On a fast network where bandwidth and storage are not a concern, uploads might be faster using the fastest compression ratio, despite the archive produced being larger.
For [GitLab Pages ](../../user/project/pages/index.md ) to serve
[HTTP Range requests ](https://developer.mozilla.org/en-US/docs/Web/HTTP/Range_requests ), artifacts
should use the `ARTIFACT_COMPRESSION_LEVEL: fastest` setting, as only uncompressed zip archives
support this feature.
A meter can also be enabled to provide the rate of transfer for uploads and downloads.
```yaml
variables:
# output upload and download progress every 2 seconds
TRANSFER_METER_FREQUENCY: "2s"
# Use fast compression for artifacts, resulting in larger archives
ARTIFACT_COMPRESSION_LEVEL: "fast"
# Use no compression for caches
CACHE_COMPRESSION_LEVEL: "fastest"
```
| Variable | Description |
|---------------------------------|--------------------------------------------------------|
| `TRANSFER_METER_FREQUENCY` | Specify how often to print the meter's transfer rate. It can be set to a duration (for example, `1s` or `1m30s` ). A duration of `0` disables the meter (default). When a value is set, the pipeline shows a progress meter for artifact and cache uploads and downloads. |
2021-02-10 22:09:06 -05:00
| `ARTIFACT_COMPRESSION_LEVEL` | To adjust compression ratio, set to `fastest` , `fast` , `default` , `slow` , or `slowest` . This setting works with the Fastzip archiver only, so the GitLab Runner feature flag [`FF_USE_FASTZIP` ](https://docs.gitlab.com/runner/configuration/feature-flags.html#available-feature-flags ) must also be enabled. |
| `CACHE_COMPRESSION_LEVEL` | To adjust compression ratio, set to `fastest` , `fast` , `default` , `slow` , or `slowest` . This setting works with the Fastzip archiver only, so the GitLab Runner feature flag [`FF_USE_FASTZIP` ](https://docs.gitlab.com/runner/configuration/feature-flags.html#available-feature-flags ) must also be enabled. |