-
Notifications
You must be signed in to change notification settings - Fork 1.3k
Open
Labels
bugSomething isn't workingSomething isn't workingcommunityCommunity contributionCommunity contributionneeds triageRequires review from the maintainersRequires review from the maintainers
Description
Checks
- I've already read https://github.com/actions/actions-runner-controller/blob/master/TROUBLESHOOTING.md and I'm sure my issue is not covered in the troubleshooting guide.
- I'm not using a custom entrypoint in my runner image
Controller Version
0.23.7
Helm Chart Version
0.27.6
CertManager Version
1.18
Deployment Method
Helm
cert-manager installation
kubectl apply -f https://github.com/cert-manager/cert-manager/releases/download/v1.18.2/cert-manager.yaml
Checks
- This isn't a question or user support case (For Q&A and community support, go to Discussions. It might also be a good idea to contract with any of contributors and maintainers if your business is so critical and therefore you need priority support
- I've read releasenotes before submitting this issue and I'm sure it's not due to any recently-introduced backward-incompatible changes
- My actions-runner-controller version (v0.x.y) does support the feature
- I've already upgraded ARC (including the CRDs, see charts/actions-runner-controller/docs/UPGRADING.md for details) to the latest and it didn't fix the issue
- I've migrated to the workflow job webhook event (if you using webhook driven scaling)
Resource Definitions
apiVersion: actions.summerwind.dev/v1alpha1
kind: RunnerDeployment
metadata:
name: oa-ri-srcm-runnerdeployment
spec:
template:
spec:
securityContext:
fsGroup: 1000
organization: oa-ri-srcm
containers:
- name: runner
image: nexus.rd.loreal:9092/summerwind/action-runner:1.0.0
env: []
resources:
limits:
cpu: "2000m"
memory: "8Gi"
requests:
cpu: "1600m"
memory: "6Gi"
volumeMounts:
- mountPath: /home/runner/.docker
name: docker-cache
- mountPath: /home/runner/.npm
name: npm-cache
- mountPath: /etc/ssl/certs/ca-certificates.crt
name: lorealrootca
subPath: lorealrootca.pem
readOnly: false
- name: docker-config-volume
mountPath: /home/runner/.docker/config.json # This will mount the 'config.json' file directly into /root/.docker/
readOnly: true # Good practice for secrets
subPath: config.json
- name: docker
image: nexus.rd.loreal:9093/library/docker:dind
resources:
limits:
cpu: "800m"
memory: "500Mi"
requests:
cpu: "400m"
memory: "250Mi"
volumeMounts:
- mountPath: /etc/ssl/certs/ca-certificates.crt
name: lorealrootca
subPath: lorealrootca.pem
readOnly: false
- name: docker-config-volume # <-- ADD THIS LINE! Mounted to the 'docker' daemon container
mountPath: /root/.docker/config.json # <-- This is where the Docker daemon will look for config.json
readOnly: true
subPath: config.json
volumes:
- name: lorealrootca
configMap:
name: lorealrootca
- name: docker-cache
persistentVolumeClaim:
claimName: task-pv-claim
- name: npm-cache
persistentVolumeClaim:
claimName: npm-pv-claim
- name: docker-config-volume # A name for your volume
secret:
secretName: docker-hub-config # The name of your NEW Kubernetes Secret
---
apiVersion: actions.summerwind.dev/v1alpha1
kind: HorizontalRunnerAutoscaler
metadata:
name: runnerhra
spec:
minReplicas: 5
maxReplicas: 100
scaleTargetRef:
kind: RunnerDeployment
name: oa-ri-srcm-runnerdeployment
scaleUpTriggers:
- githubEvent:
checkRun:
types: ["created"]
status: "queued"
names: ["build"]
workflowJob: {}
duration: "30m"
-------
apiVersion: actions.summerwind.dev/v1alpha1
kind: RunnerDeployment
metadata:
name: oa-ri-evaluation-runnerdeployment
spec:
template:
spec:
securityContext:
fsGroup: 1000
organization: oa-ri-evaluation
containers:
- name: runner
image: nexus.rd.loreal:9093/summerwind/actions-runner:latest
env: []
resources:
limits:
cpu: "2000m"
memory: "8Gi"
requests:
cpu: "1600m"
memory: "6Gi"
volumeMounts:
- mountPath: /home/runner/.docker
name: docker-cache
- mountPath: /home/runner/.npm
name: npm-cache
- mountPath: /etc/ssl/certs/ca-certificates.crt
name: lorealrootca
subPath: lorealrootca.pem
readOnly: false
- name: docker-config-volume
mountPath: /home/runner/.docker/config.json # This will mount the 'config.json' file directly into /root/.docker/
readOnly: true # Good practice for secrets
subPath: config.json
- name: docker
image: nexus.rd.loreal:9093/library/docker:dind
resources:
limits:
cpu: "800m"
memory: "500Mi"
requests:
cpu: "400m"
memory: "250Mi"
volumeMounts:
- mountPath: /etc/ssl/certs/ca-certificates.crt
name: lorealrootca
subPath: lorealrootca.pem
readOnly: false
- name: docker-config-volume # <-- ADD THIS LINE! Mounted to the 'docker' daemon container
mountPath: /root/.docker/config.json # <-- This is where the Docker daemon will look for config.json
readOnly: true
subPath: config.json
volumes:
- name: lorealrootca
configMap:
name: lorealrootca
- name: docker-cache
persistentVolumeClaim:
claimName: task-pv-claim
- name: npm-cache
persistentVolumeClaim:
claimName: npm-pv-claim
- name: docker-config-volume # A name for your volume
secret:
secretName: docker-hub-config # The name of your NEW Kubernetes Secret
---
apiVersion: actions.summerwind.dev/v1alpha1
kind: HorizontalRunnerAutoscaler
metadata:
name: oa-ri-evaluation-runnerhra
spec:
minReplicas: 5
maxReplicas: 100
scaleTargetRef:
kind: RunnerDeployment
name: oa-ri-evaluation-runnerdeployment
scaleUpTriggers:
- githubEvent:
checkRun:
types: ["created"]
status: "queued"
names: ["docker-test"]
workflowJob: {}
duration: "30m"
To Reproduce
Update values.yml with the right PAT of Github.
Install actions-runner-controller using helm chart.
Deploy both RunnerDeployment & HRA provided above.
Run an example of Github workflow in both organizations.
Both Github Actions workflows are triggered but autoscaling works for one organization but not for the other one.
Describe the bug
Webhook driven autoscaling doesn't work for the second organization configured but work for the first one.
Describe the expected behavior
Webhook driven autoscaling should work for both organization.
Whole Controller Logs
2025-09-10T13:54:13Z DEBUG runnerdeployment Updated runnerreplicaset due to spec change {"runnerdeployment": "runners/oa-ri-evaluation-runnerdeployment", "currentDesiredReplicas": 8, "newDesiredReplicas": 5, "currentEffectiveTime": "2025-09-10 13:43:38 +0000 UTC", "newEffectiveTime": "2025-09-10 13:43:38 +0000 UTC"}
2025-09-10T13:54:14Z DEBUG controller-runtime.webhook.webhooks received request {"webhook": "/mutate-actions-summerwind-dev-v1alpha1-runner", "UID": "5245677a-1162-4447-87d1-a0c468945acd", "kind": "actions.summerwind.dev/v1alpha1, Kind=Runner", "resource": {"group":"actions.summerwind.dev","version":"v1alpha1","resource":"runners"}}
2025-09-10T13:54:14Z DEBUG controller-runtime.webhook.webhooks wrote response {"webhook": "/mutate-actions-summerwind-dev-v1alpha1-runner", "code": 200, "reason": "", "UID": "5245677a-1162-4447-87d1-a0c468945acd", "allowed": true}
2025-09-10T13:54:14Z DEBUG controller-runtime.webhook.webhooks received request {"webhook": "/validate-actions-summerwind-dev-v1alpha1-runner", "UID": "e49123e1-64a0-40af-baf5-0b6cdbc06191", "kind": "actions.summerwind.dev/v1alpha1, Kind=Runner", "resource": {"group":"actions.summerwind.dev","version":"v1alpha1","resource":"runners"}}
2025-09-10T13:54:14Z INFO runner-resource validate resource to be updated {"name": "oa-ri-evaluation-runnerdeployment-5p2pf-9vg97"}
2025-09-10T13:54:14Z DEBUG controller-runtime.webhook.webhooks wrote response {"webhook": "/validate-actions-summerwind-dev-v1alpha1-runner", "code": 200, "reason": "", "UID": "e49123e1-64a0-40af-baf5-0b6cdbc06191", "allowed": true}
2025-09-10T13:54:14Z DEBUG controller-runtime.webhook.webhooks received request {"webhook": "/mutate-actions-summerwind-dev-v1alpha1-runner", "UID": "53efee9b-1c43-4e24-9e9b-a67511038ca1", "kind": "actions.summerwind.dev/v1alpha1, Kind=Runner", "resource": {"group":"actions.summerwind.dev","version":"v1alpha1","resource":"runners"}}
2025-09-10T13:54:14Z DEBUG controller-runtime.webhook.webhooks wrote response {"webhook": "/mutate-actions-summerwind-dev-v1alpha1-runner", "code": 200, "reason": "", "UID": "53efee9b-1c43-4e24-9e9b-a67511038ca1", "allowed": true}
2025-09-10T13:54:14Z DEBUG controller-runtime.webhook.webhooks received request {"webhook": "/validate-actions-summerwind-dev-v1alpha1-runner", "UID": "014372b4-c08f-4b7b-a14e-f0b3d80be75f", "kind": "actions.summerwind.dev/v1alpha1, Kind=Runner", "resource": {"group":"actions.summerwind.dev","version":"v1alpha1","resource":"runners"}}
2025-09-10T13:54:14Z INFO runner-resource validate resource to be updated {"name": "oa-ri-evaluation-runnerdeployment-5p2pf-2cnzg"}
2025-09-10T13:54:14Z DEBUG controller-runtime.webhook.webhooks wrote response {"webhook": "/validate-actions-summerwind-dev-v1alpha1-runner", "code": 200, "reason": "", "UID": "014372b4-c08f-4b7b-a14e-f0b3d80be75f", "allowed": true}
2025-09-10T13:54:14Z DEBUG controller-runtime.webhook.webhooks received request {"webhook": "/mutate-actions-summerwind-dev-v1alpha1-runner", "UID": "643d33fa-b56f-458b-b153-b9bd96496e03", "kind": "actions.summerwind.dev/v1alpha1, Kind=Runner", "resource": {"group":"actions.summerwind.dev","version":"v1alpha1","resource":"runners"}}
2025-09-10T13:54:14Z DEBUG controller-runtime.webhook.webhooks wrote response {"webhook": "/mutate-actions-summerwind-dev-v1alpha1-runner", "code": 200, "reason": "", "UID": "643d33fa-b56f-458b-b153-b9bd96496e03", "allowed": true}
2025-09-10T13:54:14Z DEBUG controller-runtime.webhook.webhooks received request {"webhook": "/validate-actions-summerwind-dev-v1alpha1-runner", "UID": "aedae7bf-c337-49c0-b079-45c92f5f238c", "kind": "actions.summerwind.dev/v1alpha1, Kind=Runner", "resource": {"group":"actions.summerwind.dev","version":"v1alpha1","resource":"runners"}}
2025-09-10T13:54:14Z INFO runner-resource validate resource to be updated {"name": "oa-ri-evaluation-runnerdeployment-5p2pf-lf9pl"}
2025-09-10T13:54:14Z DEBUG controller-runtime.webhook.webhooks wrote response {"webhook": "/validate-actions-summerwind-dev-v1alpha1-runner", "code": 200, "reason": "", "UID": "aedae7bf-c337-49c0-b079-45c92f5f238c", "allowed": true}
2025-09-10T13:54:14Z INFO runnerpod Runner has just been unregistered. {"runnerpod": "runners/oa-ri-evaluation-runnerdeployment-5p2pf-9vg97"}
2025-09-10T13:54:15Z INFO runnerpod Runner has just been unregistered. {"runnerpod": "runners/oa-ri-evaluation-runnerdeployment-5p2pf-2cnzg"}
2025-09-10T13:54:15Z INFO runnerpod Runner has just been unregistered. {"runnerpod": "runners/oa-ri-evaluation-runnerdeployment-5p2pf-lf9pl"}
2025-09-10T13:54:15Z INFO runnerpod Runner pod is marked as already unregistered. {"runnerpod": "runners/oa-ri-evaluation-runnerdeployment-5p2pf-9vg97"}
2025-09-10T13:54:15Z INFO runnerpod Runner pod is marked as already unregistered. {"runnerpod": "runners/oa-ri-evaluation-runnerdeployment-5p2pf-2cnzg"}
2025-09-10T13:54:15Z INFO runnerpod Runner pod is marked as already unregistered. {"runnerpod": "runners/oa-ri-evaluation-runnerdeployment-5p2pf-lf9pl"}
2025-09-10T13:54:34Z INFO runnerpod Runner pod is marked as already unregistered. {"runnerpod": "runners/oa-ri-evaluation-runnerdeployment-5p2pf-9vg97"}
2025-09-10T13:54:34Z DEBUG runner Runner appears to have been registered and running. {"runner": "runners/oa-ri-evaluation-runnerdeployment-5p2pf-9vg97", "podCreationTimestamp": "2025-09-10 13:36:46 +0000 UTC"}
2025-09-10T13:54:34Z DEBUG controller-runtime.webhook.webhooks received request {"webhook": "/mutate-actions-summerwind-dev-v1alpha1-runner", "UID": "0236d8c6-bd49-4cf9-ba80-6a6ff88cc7b3", "kind": "actions.summerwind.dev/v1alpha1, Kind=Runner", "resource": {"group":"actions.summerwind.dev","version":"v1alpha1","resource":"runners"}}
2025-09-10T13:54:34Z DEBUG controller-runtime.webhook.webhooks wrote response {"webhook": "/mutate-actions-summerwind-dev-v1alpha1-runner", "code": 200, "reason": "", "UID": "0236d8c6-bd49-4cf9-ba80-6a6ff88cc7b3", "allowed": true}
2025-09-10T13:54:34Z DEBUG controller-runtime.webhook.webhooks received request {"webhook": "/validate-actions-summerwind-dev-v1alpha1-runner", "UID": "d1a5356d-c1e6-418d-b55e-1950462018ab", "kind": "actions.summerwind.dev/v1alpha1, Kind=Runner", "resource": {"group":"actions.summerwind.dev","version":"v1alpha1","resource":"runners"}}
2025-09-10T13:54:34Z INFO runner-resource validate resource to be updated {"name": "oa-ri-evaluation-runnerdeployment-5p2pf-2cnzg"}
2025-09-10T13:54:34Z DEBUG controller-runtime.webhook.webhooks wrote response {"webhook": "/validate-actions-summerwind-dev-v1alpha1-runner", "code": 200, "reason": "", "UID": "d1a5356d-c1e6-418d-b55e-1950462018ab", "allowed": true}
2025-09-10T13:54:34Z DEBUG controller-runtime.webhook.webhooks received request {"webhook": "/mutate-actions-summerwind-dev-v1alpha1-runner", "UID": "23ed6529-860d-4531-a754-d504281467e6", "kind": "actions.summerwind.dev/v1alpha1, Kind=Runner", "resource": {"group":"actions.summerwind.dev","version":"v1alpha1","resource":"runners"}}
2025-09-10T13:54:34Z DEBUG controller-runtime.webhook.webhooks wrote response {"webhook": "/mutate-actions-summerwind-dev-v1alpha1-runner", "code": 200, "reason": "", "UID": "23ed6529-860d-4531-a754-d504281467e6", "allowed": true}
2025-09-10T13:54:35Z DEBUG controller-runtime.webhook.webhooks received request {"webhook": "/validate-actions-summerwind-dev-v1alpha1-runner", "UID": "72fe9aea-1b9a-466b-b421-e88fb0b8efcd", "kind": "actions.summerwind.dev/v1alpha1, Kind=Runner", "resource": {"group":"actions.summerwind.dev","version":"v1alpha1","resource":"runners"}}
2025-09-10T13:54:35Z INFO runner-resource validate resource to be updated {"name": "oa-ri-evaluation-runnerdeployment-5p2pf-lf9pl"}
2025-09-10T13:54:35Z DEBUG controller-runtime.webhook.webhooks wrote response {"webhook": "/validate-actions-summerwind-dev-v1alpha1-runner", "code": 200, "reason": "", "UID": "72fe9aea-1b9a-466b-b421-e88fb0b8efcd", "allowed": true}
2025-09-10T13:54:35Z DEBUG controller-runtime.webhook.webhooks received request {"webhook": "/mutate-actions-summerwind-dev-v1alpha1-runner", "UID": "505726cb-5f9f-4953-b2b9-10704e3e82ec", "kind": "actions.summerwind.dev/v1alpha1, Kind=Runner", "resource": {"group":"actions.summerwind.dev","version":"v1alpha1","resource":"runners"}}
2025-09-10T13:54:35Z DEBUG controller-runtime.webhook.webhooks wrote response {"webhook": "/mutate-actions-summerwind-dev-v1alpha1-runner", "code": 200, "reason": "", "UID": "505726cb-5f9f-4953-b2b9-10704e3e82ec", "allowed": true}
2025-09-10T13:54:35Z DEBUG controller-runtime.webhook.webhooks received request {"webhook": "/validate-actions-summerwind-dev-v1alpha1-runner", "UID": "7768ede0-28fe-4e56-8345-72ce117e09d2", "kind": "actions.summerwind.dev/v1alpha1, Kind=Runner", "resource": {"group":"actions.summerwind.dev","version":"v1alpha1","resource":"runners"}}
2025-09-10T13:54:35Z INFO runner-resource validate resource to be updated {"name": "oa-ri-evaluation-runnerdeployment-5p2pf-9vg97"}
2025-09-10T13:54:35Z DEBUG controller-runtime.webhook.webhooks wrote response {"webhook": "/validate-actions-summerwind-dev-v1alpha1-runner", "code": 200, "reason": "", "UID": "7768ede0-28fe-4e56-8345-72ce117e09d2", "allowed": true}
2025-09-10T13:54:35Z DEBUG controller-runtime.webhook.webhooks received request {"webhook": "/mutate-actions-summerwind-dev-v1alpha1-runner", "UID": "8d54dc83-18d3-4201-a68b-148b080533b7", "kind": "actions.summerwind.dev/v1alpha1, Kind=Runner", "resource": {"group":"actions.summerwind.dev","version":"v1alpha1","resource":"runners"}}
2025-09-10T13:54:35Z DEBUG controller-runtime.webhook.webhooks wrote response {"webhook": "/mutate-actions-summerwind-dev-v1alpha1-runner", "code": 200, "reason": "", "UID": "8d54dc83-18d3-4201-a68b-148b080533b7", "allowed": true}
2025-09-10T13:54:35Z DEBUG controller-runtime.webhook.webhooks received request {"webhook": "/validate-actions-summerwind-dev-v1alpha1-runner", "UID": "173bf4bd-7109-4fcd-8b3a-966ebd30b2e4", "kind": "actions.summerwind.dev/v1alpha1, Kind=Runner", "resource": {"group":"actions.summerwind.dev","version":"v1alpha1","resource":"runners"}}
2025-09-10T13:54:35Z INFO runner-resource validate resource to be updated {"name": "oa-ri-evaluation-runnerdeployment-5p2pf-9vg97"}
2025-09-10T13:54:35Z DEBUG controller-runtime.webhook.webhooks wrote response {"webhook": "/validate-actions-summerwind-dev-v1alpha1-runner", "code": 200, "reason": "", "UID": "173bf4bd-7109-4fcd-8b3a-966ebd30b2e4", "allowed": true}
2025-09-10T13:54:35Z INFO runner Removed finalizer {"runner": "runners/oa-ri-evaluation-runnerdeployment-5p2pf-9vg97"}
2025-09-10T13:54:35Z DEBUG controller-runtime.webhook.webhooks received request {"webhook": "/mutate-actions-summerwind-dev-v1alpha1-runner", "UID": "bfaee1c3-6842-4478-9b9a-7c9c1a6c87e9", "kind": "actions.summerwind.dev/v1alpha1, Kind=Runner", "resource": {"group":"actions.summerwind.dev","version":"v1alpha1","resource":"runners"}}
2025-09-10T13:54:35Z DEBUG controller-runtime.webhook.webhooks wrote response {"webhook": "/mutate-actions-summerwind-dev-v1alpha1-runner", "code": 200, "reason": "", "UID": "bfaee1c3-6842-4478-9b9a-7c9c1a6c87e9", "allowed": true}
2025-09-10T13:54:35Z DEBUG controller-runtime.webhook.webhooks received request {"webhook": "/validate-actions-summerwind-dev-v1alpha1-runner", "UID": "b091cc5a-fc5e-44f4-984f-27519cea46f9", "kind": "actions.summerwind.dev/v1alpha1, Kind=Runner", "resource": {"group":"actions.summerwind.dev","version":"v1alpha1","resource":"runners"}}
2025-09-10T13:54:35Z INFO runner-resource validate resource to be updated {"name": "oa-ri-evaluation-runnerdeployment-5p2pf-2cnzg"}
2025-09-10T13:54:35Z DEBUG controller-runtime.webhook.webhooks wrote response {"webhook": "/validate-actions-summerwind-dev-v1alpha1-runner", "code": 200, "reason": "", "UID": "b091cc5a-fc5e-44f4-984f-27519cea46f9", "allowed": true}
2025-09-10T13:54:35Z INFO runner Removed finalizer {"runner": "runners/oa-ri-evaluation-runnerdeployment-5p2pf-2cnzg"}
2025-09-10T13:54:35Z INFO runnerpod Runner pod is marked as already unregistered. {"runnerpod": "runners/oa-ri-evaluation-runnerdeployment-5p2pf-9vg97"}
2025-09-10T13:54:35Z DEBUG controller-runtime.webhook.webhooks received request {"webhook": "/mutate-actions-summerwind-dev-v1alpha1-runner", "UID": "d662211d-741f-4453-9dc7-617dfb71edb8", "kind": "actions.summerwind.dev/v1alpha1, Kind=Runner", "resource": {"group":"actions.summerwind.dev","version":"v1alpha1","resource":"runners"}}
2025-09-10T13:54:35Z DEBUG controller-runtime.webhook.webhooks wrote response {"webhook": "/mutate-actions-summerwind-dev-v1alpha1-runner", "code": 200, "reason": "", "UID": "d662211d-741f-4453-9dc7-617dfb71edb8", "allowed": true}
2025-09-10T13:54:35Z DEBUG controller-runtime.webhook.webhooks received request {"webhook": "/validate-actions-summerwind-dev-v1alpha1-runner", "UID": "dae09bd3-4d7e-4dfc-9ec8-f8352102f02c", "kind": "actions.summerwind.dev/v1alpha1, Kind=Runner", "resource": {"group":"actions.summerwind.dev","version":"v1alpha1","resource":"runners"}}
2025-09-10T13:54:35Z INFO runner-resource validate resource to be updated {"name": "oa-ri-evaluation-runnerdeployment-5p2pf-lf9pl"}
2025-09-10T13:54:35Z DEBUG controller-runtime.webhook.webhooks wrote response {"webhook": "/validate-actions-summerwind-dev-v1alpha1-runner", "code": 200, "reason": "", "UID": "dae09bd3-4d7e-4dfc-9ec8-f8352102f02c", "allowed": true}
2025-09-10T13:54:35Z INFO runner Removed finalizer {"runner": "runners/oa-ri-evaluation-runnerdeployment-5p2pf-lf9pl"}
2025-09-10T13:54:35Z INFO runnerpod Runner pod is marked as already unregistered. {"runnerpod": "runners/oa-ri-evaluation-runnerdeployment-5p2pf-2cnzg"}
2025-09-10T13:54:35Z INFO runnerpod Runner pod is marked as already unregistered. {"runnerpod": "runners/oa-ri-evaluation-runnerdeployment-5p2pf-lf9pl"}
2025-09-10T13:55:10Z DEBUG horizontalrunnerautoscaler Calculated desired replicas of 5 {"horizontalrunnerautoscaler": "runners/oa-ri-evaluation-runnerhra", "suggested": 5, "reserved": 0, "min": 5, "max": 100}
2025-09-10T13:55:10Z DEBUG horizontalrunnerautoscaler Calculated desired replicas of 5 {"horizontalrunnerautoscaler": "runners/runnerhra", "suggested": 5, "reserved": 0, "min": 5, "max": 100}
Whole Runner Pod Logs
Defaulted container "runner" out of: runner, docker
2025-09-10 13:53:50.459 NOTICE --- Runner init started with pid 7
2025-09-10 13:53:50.470 DEBUG --- Github endpoint URL https://github.com/
2025-09-10 13:53:54.316 DEBUG --- Passing --ephemeral to config.sh to enable the ephemeral runner.
2025-09-10 13:53:54.325 DEBUG --- Configuring the runner.
--------------------------------------------------------------------------------
| ____ _ _ _ _ _ _ _ _ |
| / ___(_) |_| | | |_ _| |__ / \ ___| |_(_) ___ _ __ ___ |
| | | _| | __| |_| | | | | '_ \ / _ \ / __| __| |/ _ \| '_ \/ __| |
| | |_| | | |_| _ | |_| | |_) | / ___ \ (__| |_| | (_) | | | \__ \ |
| \____|_|\__|_| |_|\__,_|_.__/ /_/ \_\___|\__|_|\___/|_| |_|___/ |
| |
| Self-hosted runner registration |
| |
--------------------------------------------------------------------------------
# Authentication
√ Connected to GitHub
# Runner Registration
√ Runner successfully added
√ Runner connection is good
# Runner settings
√ Settings Saved.
2025-09-10 13:54:00.814 DEBUG --- Runner successfully configured.
{
"agentId": 351,
"agentName": "oa-ri-evaluation-runnerdeployment-5p2pf-7fwzc",
"poolId": 1,
"poolName": "Default",
"ephemeral": true,
"serverUrl": "https://pipelinesghubeus3.actions.githubusercontent.com/ZJ1st5nIxOWjqFU1YiGWm7R7cqHPhtsvaAvBalzQqZ7vTCOq2P/",
"gitHubUrl": "https://github.com/oa-ri-evaluation",
"workFolder": "/runner/_work",
"useV2Flow": true,
"serverUrlV2": "https://broker.actions.githubusercontent.com/"
2025-09-10 13:54:00.824 DEBUG --- Docker enabled runner detected and Docker daemon wait is enabled
2025-09-10 13:54:00.827 DEBUG --- Waiting until Docker is available or the timeout of 120 seconds is reached
}CONTAINER ID IMAGE COMMAND CREATED STATUS PORTS NAMES
2025-09-10 13:54:00.861 NOTICE --- WARNING LATEST TAG HAS BEEN DEPRECATED. SEE GITHUB ISSUE FOR DETAILS:
2025-09-10 13:54:00.864 NOTICE --- https://github.com/actions/actions-runner-controller/issues/2056
√ Connected to GitHub
Current runner version: '2.328.0'
2025-09-10 13:54:03Z: Listening for Jobs
Additional Context
As you can see the runners are deployed for two organizations but the webhook driven autoscaling works only for one. Please note also that I have one single webhook url. Should I deploy the helm chart for the second orga? Or the same helm chart should work for both?
Metadata
Metadata
Assignees
Labels
bugSomething isn't workingSomething isn't workingcommunityCommunity contributionCommunity contributionneeds triageRequires review from the maintainersRequires review from the maintainers