Overview
Replace GitHub-hosted runners with self-hosted runners running on Amazon Web Services (AWS).
Requires GitHub app (see https://github.com/apps/hyperenv-for-github-actions ) as described in the setup guide (see https://hyperenv.com/github-actions/setup-guide.html ).
Reduce costs for GitHub Actions by 30%
- More cost effective than GitHub-hosted runners.
- Pick virtual machines with less than 2 vCPU and 7 GB memory for small jobs
Access private networks
- Run build jobs with access to your private networks.
- Access resources within a VPC (Virtual Private Cloud): Relational Database Service (RDS), ...
- Access private networks connected with a VPC (VPN, Direct Connect, ...)
Customize build environment
- Modify the virtual machine image used to execute your build jobs.
- Pre-install tools and libraries
Simple to use
- Easy to install, monitor, and maintain.
- Step-by-step installation instructions
- Ready to use Infrastructure as Code (AWS CloudFormation) templates
This product optionally collects your e-mail address for sending operational alerts. Your e-mail address is stored and processed using Amazon SNS in your AWS Account and is not shared with HyperEnv.
Highlights
- Reduce costs for GitHub Actions by 30%
- Run build jobs with access to your private networks (VPC, Direct Connect, and VPN)
- Customize build environment
Details
Pricing
Dimension | Cost/unit |
---|---|
per vCPU and build minute | $0.002 |
Vendor refund policy
We do not currently support refunds, but you can cancel at any time.
Legal
Vendor terms and conditions
Content disclaimer
Delivery details
Dedicated VPC with public subnets (recommended)
Recommended option in case you do not have any specific network requirements. Deploy HyperEnv for GitHub Actions into a dedicated VPC where runners will launch in public subnets. The whole networking setup is managed by HyperEnv for GitHub Actions through AWS CloudFormation.
HyperEnv for GitHub Actions Runner creates the following IAM roles and policies.
RunnerRole HyperEnv attaches this role to EC2 instances launched to run GitHub jobs. Grants access to CloudWatch, SSM, and ECR.
WebhookRole / WebhookPolicy IAM role used by the Lambda function which recieves webhook events from GitHub. Grants access to CloudWatch, SQS, and Secrets Manager.
ConsumerRole / ConsumerPolicy IAM role used by the Lambda function which processes webhook events from SQS and launches EC2 instances. Grants access to CloudWatch, EC2, SQS, .
GitHubOrgWebhookRole / GitHubOrgWebhookPolicy IAM role used by Lambda function implementing a custom-resource which creates, updates, and deletes GitHub webhooks. Grants access to CloudWatch, and Secrets Manager.
CloudFormation Template (CFT)
AWS CloudFormation templates are JSON or YAML-formatted text files that simplify provisioning and management on AWS. The templates describe the service or application architecture you want to deploy, and AWS CloudFormation uses those templates to provision and configure the required services (such as Amazon EC2 instances or Amazon RDS DB instances). The deployed application and associated resources are called a "stack."
Version release notes
Updating to GitHub Runner 2.320.0
Additional details
Usage instructions
Requires GitHub app as described in the setup guide (see https://hyperenv.com/github-actions/setup-guide.html ) To connect to the operating system, use SSH and the username ubuntu.
Resources
Vendor resources
Support
Vendor support
Support offered via e-mail. hello@hyperenv.com
AWS infrastructure support
AWS Support is a one-on-one, fast-response support channel that is staffed 24x7x365 with experienced and technical support engineers. The service helps customers of all sizes and technical abilities to successfully utilize the products and features provided by Amazon Web Services.