Skip to main content

Set up a Microsoft Azure VM build infrastructure

note

Currently, this feature is behind the Feature Flag CI_VM_INFRASTRUCTURE. Contact Harness Support to enable the feature.

This topic describes how to set up a CI build infrastructure in Microsoft Azure. To do this, you will create a VM and install a Harness Delegate and Drone VM Runner on it. The runner creates VMs dynamically in response to CI build requests. The delegate and runner VM can be inside or outside Azure; however, the instructions on this page assume you will create the VM in Azure.

This is one of several CI build infrastructure options. For example, you can also set up a Kubernetes cluster build infrastructure.

The following diagram illustrates a CI build farm. The Harness Delegate communicates directly with your Harness instance. The VM Runner maintains a pool of VMs for running builds. When the delegate receives a build request, it forwards the request to the runner, which runs the build on an available VM.

Prepare the Azure VM

These are the requirements to configure an Azure VM application, Entra ID app registration, and Azure VM. This VM is the primary VM where you will host your Harness Delegate and runner. You must have access to Azure and permission to create Azure applications, register applications in Entra ID, and create Azure VMs.

  1. In Azure, go to Virtual Machines, and create a VM to host your Harness Delegate and runner. Select a machine type with 4 vCPU and 16 GiB memory or more. Harness recommends the following machine images:

  2. Create a resource group for your VM.

  3. Configure the VM to allow ingress on the following:

    • Port 22 for Linux for SSH login.
    • Port 3389 if you want to run Windows builds and be able to RDP into your build VMs.
  4. Install Docker and Docker Compose on the VM.

    1. To install Docker on Windows, you must enable Hyper-V or WSL on your Azure VM.
    2. Follow the Microsoft documentation to prep Windows for containers.
    3. Install Docker and Docker Compose on the VM.
  5. Create a VM application, and assign your VM app to the Contributor role for your Azure subscription.

    For information about role assignment, go to the Microsoft documentation on Assigning Azure roles.

  6. Go to Microsoft Entra ID and register your VM application.

  7. Assign your Azure VM to the Owner role for your VM application.

    1. Go to Virtual Machines, and select your Azure VM.
    2. Select Access control (IAM), and select Add role assignment.
    3. On the Role tab, select the Owner role, and then select Next.
    4. On the Members tab, select User, group, or service principal, select Select members, and then select the VM app that you registered in Entra ID.
    5. Select Next, and then select Review + assign.

    For more information, go to the Microsoft documentation on Assigning Azure roles.

Configure the Drone pool on the Azure VM

The pool.yml file defines the VM spec and pool size for the VM instances used to run a pipeline. A pool is a group of instantiated VM that are immediately available to run CI pipelines. You can configure multiple pools in pool.yml, such as a Windows VM pool and a Linux VM pool.

  1. Create a /runner folder on your delegate VM and cd into it:

    mkdir /runner
    cd /runner
  2. In the /runner folder, create a pool.yml file.

  3. Modify pool.yml as described in the pool.yml examples and the Pool settings reference.

pool.yml examples

version: "1"
instances:
- name: ubuntu-azure-pool
default: true
type: azure
pool: 1
limit: 4
platform:
os: linux
arch: amd64
spec:
account:
client_id: XXXXXX ## Required for the runner to be able to create new VMs.
client_secret: XXXXX ## Required for the runner to be able to create new VMs.
subscription_id: XXXXXX ## Required for the runner to be able to create new VMs.
tenant_id: XXXXXX ## Required for the runner to be able to create new VMs.
location: eastus2 ## To minimize latency, use the same region as your Azure VM.
size : Standard_F2s
tags:
tagName: tag
image: ## Azure VM image specs to use for build VMs.
username: azureuser
password: XXXXXXX
publisher: Canonical
offer: UbuntuServer
sku: 18.04-LTS
version: latest

Pool settings reference

You can configure the following settings in your pool.yml file. You can also learn more in the Drone documentation for the Pool File and Azure drivers.

info

The account settings (client_id, client_secret, subscription_id, and tenant_id) are required to allow the runner to create new VMs.

SettingTypeExampleDescription
nameStringname: windows_poolUnique identifier of the pool. You will need to specify this pool name in Harness when you set up the CI stage build infrastructure.
poolIntegerpool: 1Warm pool size number. Denotes the number of VMs in ready state to be used by the runner.
limitIntegerlimit: 3Maximum number of VMs the runner can create at any time. pool indicates the number of warm VMs, and the runner can create more VMs on demand up to the limit.
For example, assume pool: 3 and limit: 10. If the runner gets a request for 5 VMs, it immediately provisions the 3 warm VMs (from pool) and provisions 2 more, which are not warm and take time to initialize.
platformKey-value pairs, stringsplatform: os: linux arch: amd64 variant: VERSIONSpecify VM platform operating system (os) and architecture (arch). variant is optional.
specKey-value pairs, variousGo to pool.yml examples.Configure settings for the build VMs.
  • account: Provide Azure account settings the runner needs to create new VMs:
    • client_id: Your VM application's client ID from the Entra ID app registration. To find the client ID in Entra ID, go to App Registrations, select your VM app, and then locate the Application (client) ID on the Overview page.
    • client_secret: To create a client secret, go to your app in Entra ID, and then select Certificates and Secrets.
    • subscription_id: The Azure subscription ID where your VM application is a Contributor.
    • tenant_id: Your Entra directory ID. To find the tenant ID in Entra ID, go to App Registrations, select your VM app, and then locate the Directory (tenant) ID on the Overview page.
  • image: The image type to use for the build VM. You can use your own custom-created image or use one from the Azure VM image list.
  • location: The Azure region for the build VMs. To minimize latency, use the same region as the delegate VM.
  • size: The Azure VM size.
  • tag: You can add an optional tag to identify build VMs.
  • disk: You can provide the size (as an integer representing GB) and type (as a string)

Start the runner

SSH into your Azure VM and run the following command to start the runner:

docker run -v /runner:/runner -p 3000:3000 drone/drone-runner-aws:latest  delegate --pool /runner/pool.yml

This command mounts the volume to the Docker container providing access to pool.yml to authenticate with Azure. It also exposes port 3000 and passes arguments to the container.

If using an Ubuntu machine image, you might need to modify the command to use sudo and specify the runner directory path, for example:

sudo docker run -v ./runner:/runner -p 3000:3000 drone/drone-runner-aws:latest  delegate --pool /runner/pool.yml
What does the runner do?

When a build starts, the delegate receives a request for VMs on which to run the build. The delegate forwards the request to the runner, which then allocates VMs from the warm pool (specified by pool in pool.yml) and, if necessary, spins up additional VMs (up to the limit specified in pool.yml).

The runner includes lite engine, and the lite engine process triggers VM startup through a cloud init script. This script downloads and installs Scoop package manager, Git, the Drone plugin, and lite engine on the build VMs. The plugin and lite engine are downloaded from GitHub releases. Scoop is downloaded from get.scoop.sh.

Firewall restrictions can prevent the script from downloading these dependencies. Make sure your images don't have firewall or anti-malware restrictions that are interfering with downloading the dependencies.

Install the delegate

Install a Harness Docker Delegate on your Azure VM.

  1. In Harness, go to Account Settings, select Account Resources, and then select Delegates.

    You can also create delegates at the project scope. In your Harness project, select Project Settings, and then select Delegates.

  2. Select New Delegate or Install Delegate.

  3. Select Docker.

  4. Enter a Delegate Name.

  5. Copy the delegate install command and paste it in a text editor.

  6. To the first line, add --network host, and, if required, sudo. For example:

    sudo docker run --cpus=1 --memory=2g --network host
  7. SSH into your Azure VM and run the delegate install command.

tip

The delegate install command uses the default authentication token for your Harness account. If you want to use a different token, you can create a token and then specify it in the delegate install command:

  1. In Harness, go to Account Settings, then Account Resources, and then select Delegates.
  2. Select Tokens in the header, and then select New Token.
  3. Enter a token name and select Apply to generate a token.
  4. Copy the token and paste it in the value for DELEGATE_TOKEN.

For more information about delegates and delegate installation, go to Delegate installation overview.

Verify connectivity

  1. Verify that the delegate and runner containers are running correctly. You might need to wait a few minutes for both processes to start. You can run the following commands to check the process status:

    $ docker ps
    $ docker logs DELEGATE_CONTAINER_ID
    $ docker logs RUNNER_CONTAINER_ID
  2. In the Harness UI, verify that the delegate appears in the delegates list. It might take two or three minutes for the Delegates list to update. Make sure the Connectivity Status is Connected. If the Connectivity Status is Not Connected, make sure the Docker host can connect to https://app.harness.io.

The delegate and runner are now installed, registered, and connected.

Specify build infrastructure

Configure your pipeline's Build (CI) stage to use your Azure VMs as build infrastructure.

    - stage:
name: build
identifier: build
description: ""
type: CI
spec:
cloneCodebase: true
infrastructure:
type: VM
spec:
type: Pool
spec:
poolName: POOL_NAME_FROM_POOL_YML
os: Linux
execution:
steps:
...

Delegate selectors with self-managed VM build infrastructures

note

Currently, delegate selectors for self-managed VM build infrastructures is behind the feature flag CI_ENABLE_VM_DELEGATE_SELECTOR. Contact Harness Support to enable the feature.

Although you must install a delegate to use a self-managed VM build infrastructure, you can choose to use a different delegate for executions and cleanups in individual pipelines or stages. To do this, use pipeline-level delegate selectors or stage-level delegate selectors.

Delegate selections take precedence in the following order:

  1. Stage
  2. Pipeline
  3. Platform (build machine delegate)

This means that if delegate selectors are present at the pipeline and stage levels, then these selections override the platform delegate, which is the delegate that you installed on your primary VM with the runner. If a stage has a stage-level delegate selector, then it uses that delegate. Stages that don't have stage-level delegate selectors use the pipeline-level selector, if present, or the platform delegate.

For example, assume you have a pipeline with three stages called alpha, beta, and gamma. If you specify a stage-level delegate selector on alpha and you don't specify a pipeline-level delegate selector, then alpha uses the stage-level delegate, and the other stages (beta and gamma) use the platform delegate.

Early access feature: Use delegate selectors for codebase tasks
note

Currently, delegate selectors for CI codebase tasks is behind the feature flag CI_CODEBASE_SELECTOR. Contact Harness Support to enable the feature.

By default, delegate selectors aren't applied to delegate-related CI codebase tasks.

With this feature flag enabled, Harness uses your delegate selectors for delegate-related codebase tasks. Delegate selection for these tasks takes precedence in order of pipeline selectors over connector selectors.

Troubleshoot self-managed VM build infrastructure

Go to the CI Knowledge Base for questions and issues related to self-managed VM build infrastructures, including: