Gitlab

Overview

Arnica’s Gitlab integration accesses selected environments to extract the necessary data and take remediation actions.

Ensure service account continuity

Create a dedicated application user

Arnica's Gitlab integration leverages a Gitlab generated app password tied to a specified user. To avoid the revocation of this token upon the impersonated user's departure, it is highly recommended to create and integrate using a standard application user.

Prerequisites

Grant permissions to application user

  1. Login to Gitlab, and click on the required Gitlab group

  2. Click on "Manage" -> "Groups"

    -Or Navigate to https://gitlab.com/groups/[YOUR_GROUP]/-/group_members

  3. Click on Invite Members , type the username or email of the dedicated service account, select an Owner role, and click on Invite

  1. Accept the invite by the dedicated service account.

Installation process

Generate a Personal Access Token

  1. Login with the application user and navigate to the Personal Access Tokens page.

  2. Click on Create App Password and assign the following settings to the token:

  1. Remove token expiration by clicking on the "X" next to the Expiration Date.

  2. Click on Create personal access token.

  3. Copy the credentials into a temporary place to use them later in the integration process below.

Integrate

  1. Navigate to the Integrations page in Arnica and click on GitLab.

  2. Click on the Access Token tab.

  3. Fill in the token from the step above.

  4. Click on Validate to ensure that the token works properly and then click on OK.

Arnica will integrate with all groups associated with this user. Arnica's default policies include scan-only functionality. While scanning will begin immediately, developers will not see any impact until Arnica's polices are updated to take actions.

Last updated

Was this helpful?