Self-Managed Gitlab
Ensure service account continuity
Create a dedicated application user
Arnica's GitLab integration uses a GitLab-generated app password tied to a specified user. To prevent the token from being revoked when that user leaves, we recommend creating and integrating with a dedicated application user.
The created user will be visible to all developers as part of Arnica's interactions, such as comments on merge requests. Hence, it is recommended to name the service account properly, such as arnica-service-account
Prerequisites
Ensure network connectivity between Arnica and Self-Managed GitLab
Ensure that your on-premises GitLab instance is accessible to Arnica by configuring the necessary DNS and NAT rules.
Grant Group permissions to the application user
Login to Gitlab, and click on the required Gitlab group
Click on "Manage" -> "Groups"
-Or Navigate to
https://gitlab.com/groups/[YOUR_GROUP]/-/group_membersClick on
Invite Members, type the username or email of the dedicated service account, select anOwnerrole, and click onInvite

Accept the invite by the dedicated service account.
If your environment is comprised of multiple groups, repeat the steps above for each group with the same user.
Grant Admin Permissions to the application user
Login to your Self-Managed GitLab
At the lower-left side of the screen, hit
Admin AreaUnder the
Overviewmenu, hitUsersLocate the Arnica Integration user, and hit
EditScroll down, and under
Access level, selectAdministratorHit
Save changes
Integration process
Generate a Personal Access Token
Login with the application user and navigate to the Personal Access Tokens page.
Click on
Create App Passwordand assign the following settings to the token:

Remove token expiration by clicking on the "X" next to the Expiration Date.
Click on
Create personal access token.Copy the credentials into a temporary place to use them later in the integration process below.
Integrate
Navigate to the Integrations page in Arnica and click on
GitLab.Click on the
Access Tokentab.Fill in the token from the step above.
Click on
Validateto ensure that the token works properly and then click onOK.
Last updated
Was this helpful?