Qodo Single Tenant (GitLab)
Installation Guide
This guide helps you install and configure Qodo with GitLab (both Cloud and self-hosted). You can install Qodo on a single project to start small or expand it across multiple projects as needed.
Assuming your Qodo environment is already set up, configuring GitLab typically takes about 20 minutes. This includes creating access tokens, configuring the service, and setting up webhooks.
Once complete, Qodo processes merge requests and delivers actionable output—such as code reviews and insights—directly in your MRs. Setting up Qodo for GitLab brings automated merge request intelligence into your GitLab workflow.
Prerequisites
Before you begin, ensure you have:
A Qodo single-tenant deployment You will receive your Qodo single-tenant URL from your Qodo Account Manager. It typically looks like:
qodo-merge.yourcompanyname.st.qodo.aiSystem administrator access Required if you want to set up Qodo at the group level
Installation (Group level)
Step 1: Generate a token
Navigate to the Groups section in GitLab and select the group where you want to set up Qodo.

Within the selected group, go to Group settings → Access tokens.

Configure the access token with the following settings:
Name: Any name will suffice
Expiration date: Choose an appropriate period
For a proof of value (PoV): 1–2 months
For a customer setup: 1 year
Role: At least Developer
Scopes: Select only the api scope

Important: Copy and save the bearer token immediately—you will not be able to view it again.

Step 2: Create a shared webhook secret
Select a strong secret value (it can be any string). You can use any secret generation tool you prefer.
Step 3: Create a Group Webhook
Within the selected group, navigate to Group settings → Webhooks.

Select Add new webhook

Create the webhook
Configure the webhook with the following settings:
Name: Choose an appropriate name (no specific requirement)
Description: Free text
URL: Use the Qodo single-tenant URL provided by your Qodo Account Manager (for example:
qodo-merge.yourcompanyname.st.qodo.ai)Secret token: The shared secret you created in Step 2
Triggers: Select Comments and Merge request events



Step 4: Provide configuration details to Qodo
Share the following details with your Qodo account contact so they can complete the configuration of your Qodo instance:
Access token created in Step 1
Webhook secret created in Step 3
GitLab group ID(s) for the group selected in Step 1
GitLab URL (required only for self-hosted GitLab deployments)
You’re all set. Wait for the Qodo team to confirm that the installation was successful.
Installation (project level)
If you want to limit Qodo to a specific GitLab project (repository), you can follow the same steps outlined above (Steps 1–4), but perform them at the project level instead of the group level.
You can repeat this process for multiple projects. Note that:
Each project must use a unique webhook secret
Configuration details must be provided to the Qodo team for each project separately
Verification
After receiving confirmation from the Qodo team, you can proceed to testing the installation.
Run a test merge request
Open a new merge request in one of the projects within the selected group where Qodo was configured.
Qodo should automatically post a review comment on the merge request.
Alternatively, you can add a comment such as /review to an existing merge request to trigger a review manually.
Verify that Qodo responds with code suggestions and review feedback.
Troubleshooting
If Qodo is not responding:
Verify that the merge request is opened in a repository that is included in the configured group or project scope.
Contact the Qodo team for assistance.
Last updated