GitLab Runner

  • Tier: Free, Premium, Ultimate
  • Offering: GitLab.com, GitLab Self-Managed, GitLab Dedicated

GitLab Runner is an application that works with GitLab CI/CD to run jobs in a pipeline.

When developers push code to GitLab, they can define automated tasks in a .gitlab-ci.yml file. These tasks might include running tests, building applications, or deploying code. GitLab Runner is the application that executes these tasks on computing infrastructure.

As an administrator, you are responsible for providing and managing the infrastructure where these CI/CD jobs run. This involves installing GitLab Runner applications, configuring them, and ensuring they have adequate capacity to handle your organization’s CI/CD workload.

What GitLab Runner does

GitLab Runner connects to your GitLab instance and waits for CI/CD jobs. When a pipeline runs, GitLab sends jobs to available runners. The runner executes the job and reports the results back to GitLab.

GitLab Runner has the following features.

  • Run multiple jobs concurrently.
  • Use multiple tokens with multiple servers (even per-project).
  • Limit the number of concurrent jobs per-token.
  • Jobs can be run:
    • Locally.
    • Using Docker containers.
    • Using Docker containers and executing job over SSH.
    • Using Docker containers with autoscaling on different clouds and virtualization hypervisors.
    • Connecting to a remote SSH server.
  • Is written in Go and distributed as single binary without any other requirements.
  • Supports Bash, PowerShell Core, and Windows PowerShell.
  • Works on GNU/Linux, macOS, and Windows (pretty much anywhere you can run Docker).
  • Allows customization of the job running environment.
  • Automatic configuration reload without restart.
  • Seamless setup with support for Docker, Docker-SSH, Parallels, or SSH running environments.
  • Enables caching of Docker containers.
  • Seamless installation as a service for GNU/Linux, macOS, and Windows.
  • Embedded Prometheus metrics HTTP server.
  • Referee workers to monitor and pass Prometheus metrics and other job-specific data to GitLab.

Runner execution flow

This diagram shows how runners are registered and how jobs are requested and handled. It also shows which actions use registration and authentication tokens, and job tokens.

sequenceDiagram participant GitLab participant GitLabRunner participant Executor opt registration GitLabRunner ->>+ GitLab: POST /api/v4/runners with registration_token GitLab -->>- GitLabRunner: Registered with runner_token end loop job requesting and handling GitLabRunner ->>+ GitLab: POST /api/v4/jobs/request with runner_token GitLab -->>+ GitLabRunner: job payload with job_token GitLabRunner ->>+ Executor: Job payload Executor ->>+ GitLab: clone sources with job_token Executor ->>+ GitLab: download artifacts with job_token Executor -->>- GitLabRunner: return job output and status GitLabRunner -->>- GitLab: updating job output and status with job_token end 

Runner deployment options

GitLab-hosted runners

GitLab-hosted runners are managed by GitLab and available on GitLab.com. You don’t need to install or maintain these runners - GitLab provides them as a service. However, you have limited control over the execution environment and cannot customize the infrastructure.

Self-managed runners

Self-managed runners are GitLab Runner instances that you install, configure, and manage in your own infrastructure. You can install and register self-managed runners on all GitLab installations. As an administrator, you typically work with self-managed runners.

Unlike GitLab-hosted runners, which are hosted and managed by GitLab, you have complete control over self-managed runners.

GitLab Runner versions

For compatibility reasons, the GitLab Runner major.minor version should stay in sync with the GitLab major and minor version. Older runners may still work with newer GitLab versions, and vice versa. However, features may not be available or work properly if a version difference exists.

Backward compatibility is guaranteed between minor version updates. However, sometimes minor version updates of GitLab can introduce new features that require GitLab Runner to be on the same minor version.

If you host your own runners but host your repositories on GitLab.com, keep GitLab Runner updated to the latest version, as GitLab.com is updated continuously.

Determine runner scope and access

Before you register a runner, you should determine if everyone in GitLab should have access to it, or if you want to limit it to a specific GitLab group or project. Self-managed runners can be configured with different access scopes:

The scope of a runner is defined during the registration. Runner knows which projects it’s available for based on the scope.

Install and register runners

After you install the application, you register individual runners.

When you register a runner, you are setting up communication between your GitLab instance and the machine where GitLab Runner is installed.

Runners usually process jobs on the same machine where you installed GitLab Runner. However, you can also have a runner process jobs in a container, in a Kubernetes cluster, or in auto-scaled instances in the cloud.

Choose an executor

When you register a runner, you must choose an executor. GitLab Runner uses an executor system to determine where and how jobs run. An executor determines the environment each job runs in.

For example:

  • If you want your CI/CD job to run PowerShell commands, you might install GitLab Runner on a Windows server and then register a runner that uses the shell executor.
  • If you want your CI/CD job to run commands in a custom Docker container, you might install GitLab Runner on a Linux server and register a runner that uses the Docker executor.

These examples are only a couple of possible configurations. You can install GitLab Runner on a virtual machine and have it use another virtual machine as an executor.

When you install GitLab Runner in a Docker container and choose the Docker executor to run your jobs, it’s sometimes referred to as a “Docker-in-Docker” configuration.

Add tags

When you register a runner, you can add tags to it.

When a CI/CD job runs, it knows which runner to use by looking at the assigned tags. Tags are the only way to filter the list of available runners for a job.

For example, if a runner has the ruby tag, you would add this code to your project’s .gitlab-ci.yml file:

job:  tags:  - ruby

When the job runs, it uses the runner with the ruby tag.

Configure runners

You can configure the runner by editing the config.toml file. This file is installed during the runner installation process.

In this file you can edit settings for a specific runner, or for all runners.

You can specify settings like logging and cache. You can set concurrency, memory, CPU limits, and more.

Scale a fleet of runners

When your organization scales to having a fleet of runners, you should plan for how you can monitor and adjust performance for these runners.

Use Terraform to create and manage a fleet of runners

You can create and manage several common runner configurations by using the GitLab Runner Infrastructure Toolkit (GRIT). GRIT is a library of Terraform modules used to create and manage many common runner configurations on public cloud providers. GRIT is created and maintained by the runner team.

Monitor runners

GitLab Runner provides built-in Prometheus metrics to help you monitor runner health and performance. You can track key metrics like active job count, CPU utilization, memory usage, job success rates, and queue lengths to ensure your runners operate efficiently.

Use a runner to run jobs

After a runner is configured and available for your project, your CI/CD jobs can use the runner.

Troubleshooting

Learn how to troubleshoot common issues.

Glossary

  • GitLab Runner: The application that executes CI/CD jobs from GitLab pipelines on a target computing platform.
  • Runner: A configured instance of GitLab Runner that can execute jobs. Depending on the type of executor, this machine could be local to the runner manager (shell or docker executor) or a remote machine created by an autoscaler (docker-autoscaler or kubernetes).
  • Runner configuration: A single [[runner]] entry in the config.toml that displays as a runner in the UI.
  • Runner manager: The process that reads the config.toml file and runs all the runner configurations and job executions concurrently.
  • Machine: A virtual machine (VM) or pod that the runner operates in. GitLab Runner automatically generates a unique, persistent machine ID so that when multiple machines are given the same runner configuration, jobs can be routed separately but the runner configurations are grouped in the UI.
  • Executor: The method GitLab Runner uses to execute jobs (Docker, Shell, Kubernetes, etc.).
  • Pipeline: A collection of jobs that run automatically when code is pushed to GitLab.
  • Job: A single task in a pipeline, such as running tests or building an application.
  • Runner token: A unique identifier that allows a runner to authenticate with GitLab.
  • Tags: Labels assigned to runners that determine which jobs they can execute.
  • Concurrent jobs: The number of jobs a runner can execute simultaneously.
  • Self-managed runner: A runner installed and managed on your own infrastructure.
  • GitLab-hosted runner: A runner provided and managed by GitLab.

For more information, see the official GitLab Word List and the GitLab Architecture entry for GitLab Runner.

Contributing

Contributions are welcome. See CONTRIBUTING.md and the development documentation for details.

If you’re a reviewer of GitLab Runner project, take a moment to read the Reviewing GitLab Runner document.

You can also review the release process for the GitLab Runner project.

Changelog

See the CHANGELOG to view recent changes.

License

This code is distributed under the MIT license. View the LICENSE file.