Self-Managed Gitlab
Ensure service account continuity
Create a dedicated application user
Arnica's GitLab integration uses a GitLab-generated app password tied to a specified user. To prevent the token from being revoked when that user leaves, we recommend creating and integrating with a dedicated application user.
The created user will be visible to all developers as part of Arnica's interactions, such as comments on merge requests. Hence, it is recommended to name the service account properly, such as arnica-service-account
Prerequisites
Ensure network connectivity between Arnica and Self-Managed GitLab
Ensure that your on-premises GitLab instance is accessible to Arnica by configuring the necessary DNS and NAT rules.
Grant Group permissions to the application user
Login to Gitlab, and click on the required Gitlab group
Click on "Manage" -> "Groups"
-Or Navigate to
https://gitlab.com/groups/[YOUR_GROUP]/-/group_members
Click on
Invite Members
, type the username or email of the dedicated service account, select anOwner
role, and click onInvite

Accept the invite by the dedicated service account.
If your environment is comprised of multiple groups, repeat the steps above for each group with the same user.
Grant Admin Permissions to the application user
Login to your Self-Managed GitLab
At the lower-left side of the screen, hit
Admin Area
Under the
Overview
menu, hitUsers
Locate the Arnica Integration user, and hit
Edit
Scroll down, and under
Access level
, selectAdministrator
Hit
Save changes
Integration process
Generate a Personal Access Token
Login with the application user and navigate to the Personal Access Tokens page.
Click on
Create App Password
and assign the following settings to the token:

Remove token expiration by clicking on the "X" next to the Expiration Date.
Click on
Create personal access token
.Copy the credentials into a temporary place to use them later in the integration process below.
Integrate
Navigate to the Integrations page in Arnica and click on
GitLab
.Click on the
Access Token
tab.Fill in the token from the step above.
Click on
Validate
to ensure that the token works properly and then click onOK
.
Last updated
Was this helpful?