Skip to main content

Troubleshooting GitHub Actions for your enterprise

Troubleshooting common issues that occur when using GitHub Actions on GitHub Enterprise Server.

Quem pode usar esse recurso?

Site administrators can troubleshoot GitHub Actions issues and modify GitHub Enterprise Server configurations.

Checking the health of GitHub Actions

You can check the health of GitHub Actions on sua instância do GitHub Enterprise Server with the ghe-actions-check command-line utility. For more information, see "Utilitários de linha de comando" and "Acesar o shell administrativo (SSH)."

Configuring self-hosted runners when using a self-signed certificate for GitHub Enterprise Server

É altamente recomendável que você configure a TLS em GitHub Enterprise Server com um certificado assinado por uma autoridade confiável. Embora um certificado autoassinado possa funcionar, é necessária uma configuração extra para os seus executores auto-hospedados, e não é recomendado para ambientes de produção. For more information, see "Configuring TLS."

Installing the certificate on the runner machine

For a self-hosted runner to connect to a GitHub Enterprise Server using a self-signed certificate, you must install the certificate on the runner machine so that the connection is security hardened.

For the steps required to install a certificate, refer to the documentation for your runner's operating system.

Configuring Node.JS to use the certificate

Most actions are written in JavaScript and run using Node.js, which does not use the operating system certificate store. For the self-hosted runner application to use the certificate, you must set the NODE_EXTRA_CA_CERTS environment variable on the runner machine.

You can set the environment variable as a system environment variable, or declare it in a file called .env in the self-hosted runner application directory (that is, the directory into which you downloaded and unpacked the runner software).

For example:

NODE_EXTRA_CA_CERTS=/usr/share/ca-certificates/extra/mycertfile.crt

Environment variables are read when the self-hosted runner application starts, so you must set the environment variable before configuring or starting the self-hosted runner application. If your certificate configuration changes, you must restart the self-hosted runner application.

Configuring Docker containers to use the certificate

If you use Docker container actions or service containers in your workflows, you might also need to install the certificate in your Docker image in addition to setting the above environment variable.

Configuring HTTP proxy settings for GitHub Actions

Se você tiver um Servidor Proxy HTTP configurado em sua instância do GitHub Enterprise Server:

  • Você deve adicionar .localhost, 127.0.0.1 e ::1 à lista de Exclusão de Proxy HTTP (nessa ordem).
  • Se o local de armazenamento externo não for encaminhável, você também precisará adicionar a URL de armazenamento externo à lista de exclusões.

Para obter mais informações sobre como alterar as configurações de proxy, confira "Configuring an outbound web proxy server".

If these settings aren't correctly configured, you might receive errors like Resource unexpectedly moved to https://IP-ADDRESS when setting or changing your GitHub Actions configuration.

Runners not connecting to GitHub Enterprise Server with a new hostname

Aviso: não altere o nome do host do GitHub Enterprise Server após a configuração inicial. Alterar o nome do host causará comportamento inesperado, até e incluindo falhas de instância e invalidação das chaves de segurança dos usuários. Se você alterou o nome do host da instância e está enfrentando problemas, entre em contato com Suporte do GitHub Enterprise ou Suporte do GitHub Premium.

If you deploy GitHub Enterprise Server in your environment with a new hostname and the old hostname no longer resolves to your instance, self-hosted runners will be unable to connect to the old hostname, and will not execute any jobs.

You will need to update the configuration of your self-hosted runners to use the new hostname for sua instância do GitHub Enterprise Server. Each self-hosted runner will require one of the following procedures:

  • In the self-hosted runner application directory, edit the .runner and .credentials files to replace all mentions of the old hostname with the new hostname, then restart the self-hosted runner application.
  • Remove the runner from GitHub Enterprise Server using the UI, and re-add it. For more information, see "Remover executores auto-hospedados" and "Adicionar executores auto-hospedados."

Stuck jobs and GitHub Actions memory and CPU limits

GitHub Actions is composed of multiple services running on sua instância do GitHub Enterprise Server. By default, these services are set up with default CPU and memory limits that should work for most instances. However, heavy users of GitHub Actions might need to adjust these settings.

You may be hitting the CPU or memory limits if you notice that jobs are not starting (even though there are idle runners), or if the job's progress is not updating or changing in the UI.

1. Check the overall CPU and memory usage in the management console

Access the management console and use the monitor dashboard to inspect the overall CPU and memory graphs under "System Health". For more information, see "Acessar o painel de monitoramento."

If the overall "System Health" CPU usage is close to 100%, or there is no free memory left, then sua instância do GitHub Enterprise Server is running at capacity and needs to be scaled up. For more information, see "Aprimorar os recursos de CPU ou memória."

2. Check the Nomad Jobs CPU and memory usage in the management console

If the overall "System Health" CPU and memory usage is OK, scroll down the monitor dashboard page to the "Nomad Jobs" section, and look at the "CPU Percent Value" and "Memory Usage" graphs.

Each plot in these graphs corresponds to one service. For GitHub Actions services, look for:

  • mps_frontend
  • mps_backend
  • token_frontend
  • token_backend
  • actions_frontend
  • actions_backend

If any of these services are at or near 100% CPU utilization, or the memory is near their limit (2 GB by default), then the resource allocation for these services might need increasing. Take note of which of the above services are at or near their limit.

3. Increase the resource allocation for services at their limit

  1. Log in to the administrative shell using SSH. For more information, see "Acesar o shell administrativo (SSH)."

  2. Run the following command to see what resources are available for allocation:

    nomad node status -self
    

    In the output, find the "Allocated Resources" section. It looks similar to the following example:

    Allocated Resources
    CPU              Memory          Disk
    7740/49600 MHZ   23 GiB/32 GiB   4.4 GiB/7.9 GiB
    

    For CPU and memory, this shows how much is allocated to the total of all services (the left value) and how much is available (the right value). In the example above, there is 23 GiB of memory allocated out of 32 GiB total. This means there is 9 GiB of memory available for allocation.

    Warning: Be careful not to allocate more than the total available resources, or services will fail to start.

  3. Change directory to /etc/consul-templates/etc/nomad-jobs/actions:

    cd /etc/consul-templates/etc/nomad-jobs/actions
    

    In this directory there are three files that correspond to the GitHub Actions services from above:

    • mps.hcl.ctmpl
    • token.hcl.ctmpl
    • actions.hcl.ctmpl
  4. For the services that you identified that need adjustment, open the corresponding file and locate the resources group that looks like the following:

    resources {
      cpu = 512
      memory = 2048
      network {
        port "http" { }
      }
    }
    

    The values are in MHz for CPU resources, and MB for memory resources.

    For example, to increase the resource limits in the above example to 1 GHz for the CPU and 4 GB of memory, change it to:

    resources {
      cpu = 1024
      memory = 4096
      network {
        port "http" { }
      }
    }
    
  5. Save and exit the file.

  6. Run ghe-config-apply to apply the changes.

    When running ghe-config-apply, if you see output like Failed to run nomad job '/etc/nomad-jobs/<name>.hcl', then the change has likely over-allocated CPU or memory resources. If this happens, edit the configuration files again and lower the allocated CPU or memory, then re-run ghe-config-apply.

  7. After the configuration is applied, run ghe-actions-check to verify that the GitHub Actions services are operational.

Troubleshooting failures when Dependabot triggers existing workflows

Depois de configurar as atualizações do Dependabot para sua instância do GitHub Enterprise Server, você poderá ver as falhas quando os fluxos de trabalho existentes forem disparados por eventos do Dependabot.

Por padrão, as execuções de fluxo de trabalho do GitHub Actions disparadas pelo Dependabot dos eventos push, pull_request, pull_request_review ou pull_request_review_comment são tratados como se eles fossem abertos de um fork do repositório. Ao contrário dos fluxos de trabalho disparados por outros atores, isso significa que eles recebem o GITHUB_TOKEN somente leitura e não têm acesso a nenhum segredo que esteja normalmente disponível. Isso fará com que quaisquer fluxos de trabalho que tentam gravar no repositório falhem quando forem acionados por Dependabot.

Há três maneiras de resolver este problema:

  1. Você pode atualizar seus fluxos de trabalho para que não sejam mais disparados pelo Dependabot usando uma expressão como: if: github.actor != 'dependabot[bot]'. Para obter mais informações, confira "Expressões".
  2. Modifique seus fluxos de trabalho para usar um processo de duas etapas que inclui pull_request_target que não tem essas limitações. Para obter mais informações, confira "Automatizando o Dependabot com GitHub Actions".
  3. Forneça fluxos de trabalho disparados pelo acesso do Dependabot aos segredos e permita que o termo permissions aumente o escopo padrão do GITHUB_TOKEN. For more information, see "Providing workflows triggered by Dependabot access to secrets and increased permissions" below.

Providing workflows triggered by Dependabot access to secrets and increased permissions

  1. Log in to the administrative shell using SSH. For more information, see "Acesar o shell administrativo (SSH)."

  2. To remove the limitations on workflows triggered by Dependabot on sua instância do GitHub Enterprise Server, use the following command.

    ghe-config app.actions.disable-dependabot-enforcement true
    
  3. Apply the configuration.

    ghe-config-apply
    
  4. Return to GitHub Enterprise Server.

Troubleshooting bundled actions in GitHub Actions

If you receive the following error when installing GitHub Actions in GitHub Enterprise Server, you can resolve the problem by installing the official bundled actions and starter workflows.

A part of the Actions setup had problems and needs an administrator to resolve.

To install the official bundled actions and starter workflows within a designated organization in GitHub Enterprise Server, follow this procedure.

  1. Identify an organization that will store the official bundled actions and starter workflows. You can create a new organization or reuse an existing one.

  2. Log in to the administrative shell using SSH. For more information, see "Acesar o shell administrativo (SSH)."

  3. To designate your organization as the location to store the bundled actions, use the ghe-config command, replacing ORGANIZATION with the name of your organization.

    ghe-config app.actions.actions-org ORGANIZATION
    

    and:

    ghe-config app.actions.github-org ORGANIZATION
    
  4. To add the bundled actions to your organization, unset the SHA.

    ghe-config --unset 'app.actions.actions-repos-sha1sum'
    
  5. Apply the configuration.

    ghe-config-apply
    

After you've completed these steps, you can resume configuring GitHub Actions at "Getting started with GitHub Actions for GitHub Enterprise Server."