Running with gitlab-runner 16.10.0 (81ab07f6) on gitlab-runner-instance-02-577878b99f-d68hp jkD5TfzPt, system ID: r_hgMM9mLUHhIU Preparing the "kubernetes" executor 00:00 Using Kubernetes namespace: gitlab-runner Using Kubernetes executor with image sll-dev-regs.kemenhub.go.id/library/docker:24.0.5 ... Using attach strategy to execute scripts... Preparing environment 00:00 ERROR: Error cleaning up secrets: resource name may not be empty ERROR: Job failed (system failure): prepare environment: setting up credentials: secrets is forbidden: User "system:serviceaccount:gitlab-runner-02:default" cannot create resource "secrets" in API group "" in the namespace "gitlab-runner-02". Check https://docs.gitlab.com/runner/shells/index.html#shell-profile-loading for more information
Membuat Cluster role berikut contohnya, bisa juga dengan menggunakan rancher gui untuk membuat role nya
apiVersion: rbac.authorization.k8s.io/v1
kind: ClusterRole
metadata:
  name: cr-gitlab-runner-instance-01
rules:
  - apiGroups:
      - '*'
    resources:
      - '*'
    verbs:
      - create
      - delete
      - get
      - list
      - patch
      - update
      - watch
#  - apiGroups:
#      - string
#    nonResourceURLs:
#      - string
#    resourceNames:
#      - string
#    resources:
#      - string
#    verbs:
#      - string
Role diatas harus di koneksikan (binding)
Membuat Cluster Role binding dengan Service account
apiVersion: rbac.authorization.k8s.io/v1
kind: ClusterRoleBinding
metadata:
  name: crb-gitlab-runner-instance-01
roleRef:
  apiGroup: rbac.authorization.k8s.io
  kind: ClusterRole
  name: cr-gitlab-runner-instance-01
subjects:
  - kind: ServiceAccount
    name: default
    namespace: gitlab-runnerBisa juga langsung jadi satu menjalankannya dengan di pisahkan tanda — sebagaimana :
apiVersion: rbac.authorization.k8s.io/v1
kind: ClusterRole
metadata:
  name: cr-gitlab-runner-instance-01
rules:
  - apiGroups:
      - '*'
    resources:
      - '*'
    verbs:
      - create
      - delete
      - get
      - list
      - patch
      - update
      - watch
#  - apiGroups:
#      - string
#    nonResourceURLs:
#      - string
#    resourceNames:
#      - string
#    resources:
#      - string
#    verbs:
#      - string
---
apiVersion: rbac.authorization.k8s.io/v1
kind: ClusterRoleBinding
metadata:
  name: crb-gitlab-runner-instance-01
roleRef:
  apiGroup: rbac.authorization.k8s.io
  kind: ClusterRole
  name: cr-gitlab-runner-instance-01
subjects:
  - kind: ServiceAccount
    name: default
    namespace: gitlab-runner