Windows shell updates (#50819)
This commit is contained in:
@@ -67,7 +67,7 @@ For example:
|
||||
{% endlinux %}
|
||||
{% windows %}
|
||||
|
||||
```shell
|
||||
```powershell
|
||||
run.cmd --check --url https://github.com/YOUR-ORG/YOUR-REPO --pat GHP_ABCD1234
|
||||
```
|
||||
|
||||
@@ -110,22 +110,20 @@ export GITHUB_ACTIONS_RUNNER_TLS_NO_VERIFY=1
|
||||
```powershell
|
||||
[Environment]::SetEnvironmentVariable('GITHUB_ACTIONS_RUNNER_TLS_NO_VERIFY', '1')
|
||||
./config.cmd --url https://github.com/YOUR-ORG/YOUR-REPO --token
|
||||
./run.sh
|
||||
./run.cmd
|
||||
```
|
||||
|
||||
{% endwindows %}
|
||||
|
||||
{% warning %}
|
||||
|
||||
**Warning**: Disabling TLS verification is not recommended since TLS provides privacy and data integrity between the self-hosted runner application and {% data variables.product.product_name %}. We recommend that you install the {% data variables.product.product_name %} certificate in the operating system certificate store for your self-hosted runner. For guidance on how to install the {% data variables.product.product_name %} certificate, check with your operating system vendor.
|
||||
|
||||
{% endwarning %}
|
||||
> [!WARNING]
|
||||
> Disabling TLS verification is not recommended since TLS provides privacy and data integrity between the self-hosted runner application and {% data variables.product.product_name %}. We recommend that you install the {% data variables.product.product_name %} certificate in the operating system certificate store for your self-hosted runner. For guidance on how to install the {% data variables.product.product_name %} certificate, check with your operating system vendor.
|
||||
|
||||
## Reviewing the self-hosted runner application log files
|
||||
|
||||
You can monitor the status of the self-hosted runner application and its activities. Log files are kept in the `_diag` directory where you installed the runner application, and a new log is generated each time the application is started. The filename begins with `Runner_`, and is followed by a UTC timestamp of when the application was started.
|
||||
|
||||
>[!WARNING]Runner application log files for ephemeral runners must be forwarded and preserved externally for troubleshooting and diagnostic purposes. For more information about ephemeral runners and autoscaling self-hosted runners, see "[AUTOTITLE](/actions/hosting-your-own-runners/managing-self-hosted-runners/autoscaling-with-self-hosted-runners#using-ephemeral-runners-for-autoscaling)."
|
||||
> [!WARNING]
|
||||
> Runner application log files for ephemeral runners must be forwarded and preserved externally for troubleshooting and diagnostic purposes. For more information about ephemeral runners and autoscaling self-hosted runners, see "[AUTOTITLE](/actions/hosting-your-own-runners/managing-self-hosted-runners/autoscaling-with-self-hosted-runners#using-ephemeral-runners-for-autoscaling)."
|
||||
|
||||
For detailed logs on workflow job executions, see the next section describing the `Worker_` files.
|
||||
|
||||
@@ -208,14 +206,14 @@ If you want to customize the self-hosted runner application service, do not dire
|
||||
|
||||
For Windows-based self-hosted runners running the application as a service, you can use PowerShell to monitor their real-time activity. The service uses the naming convention `GitHub Actions Runner (<org>-<repo>.<runnerName>)`. You can also find the service's name by checking the _.service_ file in the runner directory:
|
||||
|
||||
```shell
|
||||
```powershell
|
||||
PS C:\actions-runner> Get-Content .service
|
||||
actions.runner.octo-org-octo-repo.runner01.service
|
||||
```
|
||||
|
||||
You can view the status of the runner in the Windows _Services_ application (`services.msc`). You can also use PowerShell to check whether the service is running:
|
||||
|
||||
```shell
|
||||
```powershell
|
||||
PS C:\actions-runner> Get-Service "actions.runner.octo-org-octo-repo.runner01.service" | Select-Object Name, Status
|
||||
Name Status
|
||||
---- ------
|
||||
@@ -224,7 +222,7 @@ actions.runner.octo-org-octo-repo.runner01.service Running
|
||||
|
||||
You can use PowerShell to check the recent activity of the self-hosted runner. In this example output, you can see the application start, receive a job named `testAction`, and then display the resulting status:
|
||||
|
||||
```shell
|
||||
```powershell
|
||||
PS C:\actions-runner> Get-EventLog -LogName Application -Source ActionsRunnerService
|
||||
|
||||
Index Time EntryType Source InstanceID Message
|
||||
|
||||
Reference in New Issue
Block a user