GitLab.com & Self-hosted GitLab CI

Blazing fast GitLab CIwithout the complexity.

Secure, ephemeral Firecracker microVMs for every job. No Kubernetes to manage. No Docker In Docker security nightmares. Just fast, isolated builds on your own infrastructure.

Faster Builds

Bare-metal performance with builds typically 2-3x faster than hosted runners.

No K8s to Manage

No Helm charts, no Kubernetes clusters. Just install our agent on bare-metal or VMs.

No DIND Nightmares

Run Docker natively in each microVM. No privileged containers, no socket binding.

Instant Boot

VMs boot and start running jobs in under 1 second. Faster than Kubernetes pod scheduling.

Two supported modes

Whether you use GitLab.com or run GitLab on your own infrastructure, Actuated has you covered.

GitLab.com

Connect your own servers as runners for GitLab.com projects. Get bare-metal speed with the convenience of GitLab's hosted platform.

  • Bring your own bare-metal or cloud servers
  • Full isolation between jobs
  • No changes to your existing pipelines

GitLab CI (Self-hosted)

Run Actuated alongside your self-hosted GitLab instance. Full control over your CI infrastructure with enterprise-grade isolation.

  • On-premises or cloud hosted GitLab
  • Private peering for firewalled networks
  • Docker and Shell executors supported

How it works

When a pipeline is triggered, the Actuated control plane launches a dedicated Firecracker microVM for every job. The VM boots in under a second, runs the job, then is destroyed completely.

1
Pipeline triggered
A commit, merge request, or manual trigger starts the pipeline.
2
MicroVM boots instantly
A fresh Firecracker microVM spins up and registers as a runner in under 1 second.
3
Job runs with full isolation
sudo, Docker, Kubernetes - everything works out of the box with KVM-level security.
4
VM destroyed
No side effects, no leakage between jobs. Every build starts completely fresh.
Actuated for GitLab CI - conceptual architecture
Docker in Docker security notice from the GitLab Helm chart

Security notice displayed by the GitLab Helm chart warning against Docker in Docker.

Say goodbye to DIND

Docker-in-Docker (DIND) requires privileged mode. The GitLab Helm chart disables it by default for good reason - it's a significant security risk.

With Actuated, Docker runs natively inside each microVM. No privileged containers, no socket binding from the host, no flakey VFS driver. No need to switch to Kaniko, Buildah, or fight with user namespaces.

You get sudo, a fresh Docker engine, and systemd in every VM - things like Kubernetes work out of the box for E2E testing.

Everything you need for GitLab CI

Faster builds with bare-metal performance
No Kubernetes cluster to manage
No Docker In Docker (DIND) security nightmares
Instant boot - VMs ready in under 1 second
Ephemeral microVMs destroyed after every job
Mixed Docker and Shell executors
Flexible VM sizing per job via tags
Private peering for on-premises networks

Simple to configure

Add the actuated tag to any job. Size VMs per-job with tags like actuated-4cpu-8gb. No predefined sizes - pick any combination of vCPU and RAM.

Switch between Docker and Shell executors per-job by adding the shell tag. The Shell executor gives you full VM access - perfect for running KinD or K3s clusters for E2E testing.

.gitlab-ci.yml

build:
  image: docker:latest
  script:
    - docker build -t myapp .
    - docker push myapp
  tags:
    - actuated-4cpu-8gb

test-e2e:
  script:
    - k3sup install --local
    - kubectl apply -f ./manifests
    - ./run-tests.sh
  tags:
    - actuated-8cpu-16gb
    - shell

See it in action

Watch Actuated launch parallel GitLab CI jobs in dedicated Firecracker microVMs - each booting in under a second.

Demo: Actuated for GitLab CI

Run anywhere with KVM support

Actuated works with bare-metal servers and nested virtualisation across all major providers.

AWS

EC2 bare-metal or nested virtualisation

Azure

Bare-metal or nested virtualisation

GCP

Bare-metal or nested virtualisation

OpenStack

KVM-enabled instances

VMware

Nested virtualisation support

On-premises

Your own data centre hardware

Bare-metal

Dedicated servers from any provider

Private peering for enterprise

Servers behind a private network? Enable peering for an outbound connection that passes through firewalls, NAT, HTTP Proxies and VPNs without additional configuration.

  • No additional networking or firewall changes
  • Agent only accessible to the Actuated control-plane
  • All traffic encrypted with TLS
Private peering diagram for enterprise networks

Ready to speed up your GitLab CI?No sales pitch, just a quick chat with our engineers.