Configure GitHub Enterprise Server on Azure VMware Solution

In this article, learn how to set up GitHub Enterprise Server, the "on-premises" version of GitHub.com, on your Azure VMware Solution private cloud. The scenario covers a GitHub Enterprise Server instance that can serve up to 3,000 developers running up to 25 jobs per minute on GitHub Actions. It includes the setup of (at time of writing) preview features, such as GitHub Actions. To customize the setup for your particular needs, review the requirements listed in Installing GitHub Enterprise Server on VMware.

Before you begin

GitHub Enterprise Server requires a valid license key. You can sign up for a trial license. If you're looking to extend the capabilities of GitHub Enterprise Server via an integration, check if you qualify for a free five-seat developer license. Apply for this license through GitHub's Partner Program.

Install GitHub Enterprise Server on VMware

  1. Download the current release of GitHub Enterprise Server for VMware ESXi/vSphere (OVA) and deploy the OVA template you downloaded.

    Screenshot showing the GitHub Enterprise Server on VMware installation options.

    Screenshot showing the Deploy the OVA Template menu option.

  2. Provide a recognizable name for your new virtual machine, such as GitHubEnterpriseServer. You don't need to include the release details in the VM name, as these details become stale when the instance is upgraded.

  3. Select all the defaults for now (details to be edited later) and wait for the OVA to be imported.

  4. Once imported, adjust the hardware configuration based on your needs. In our example scenario, we need the following configuration.

    Resource Standard Setup Standard Set up + "Beta Features" (Actions)
    vCPUs 4 8
    Memory 32 GB 61 GB
    Attached storage 250 GB 300 GB
    Root storage 200 GB 200 GB

    Your needs can vary. Refer to the guidance on hardware considerations in Installing GitHub Enterprise Server on VMware. Also see Adding CPU or memory resources for VMware to customize the hardware configuration based on your situation.

Configure the GitHub Enterprise Server instance

Screenshot of the Install GitHub Enterprise window.

After the newly provisioned virtual machine (VM) is powered on, configure it through your browser. You need to upload your license file and set a management console password. Be sure to write down this password somewhere safe.

Screenshot of the GitHub Enterprise SSH access screen to add a new SSH key.

We recommend at least take the following steps:

  1. Upload a public SSH key to the management console so that you can access the administrative shell via SSH.

  2. Configure TLS on your instance so that you can use a certificate signed by a trusted certificate authority. Apply your settings.

    Screenshot showing the settings being applied to your instance.

  3. While the instance restarts, configure blob storage for GitHub Actions.

    External blob storage is necessary to enable GitHub Actions on GitHub Enterprise Server (currently available as a "beta" feature). Actions use this external blob storage to store artifacts and logs. Actions on GitHub Enterprise Server supports Azure Blob Storage as a storage provider (and some others). You need to create a new Azure storage account with a storage account type of BlobStorage.

    Screenshot showing the instance details to enter for provisioning an Azure Blob Storage account.

  4. Once the new BlobStorage resource deployment completes, save the connection string (available under Access keys) to use later.

  5. After the instance restarts, create a new admin account on the instance. Be sure to make a note of this user's password as well.

    Screenshot showing the Create admin account for GitHub Enterprise.

Other configuration steps

To harden your instance for production use, the following optional setup steps are recommended:

  1. Configure high availability for protection against:

    • Software crashes (OS or application level)
    • Hardware failures (storage, CPU, RAM, and so on)
    • Virtualization host system failures
    • Logically or physically severed network
  2. Configure backup-utilities, providing versioned snapshots for disaster recovery, hosted in availability that is separate from the primary instance.

  3. Setup subdomain isolation, using a valid TLS certificate, to mitigate cross-site scripting and other related vulnerabilities.

Set up the GitHub Actions runner

At this point, you should have an instance of GitHub Enterprise Server running, with an administrator account created. You should also have external blob storage that GitHub Actions uses for persistence.

Create somewhere for GitHub Actions to run using Azure VMware Solution.

  1. Provision a new VM on the cluster and base it on a recent release of Ubuntu Server.

    Screenshot showing the virtual machine name and location to provision a new VM.

  2. Continue through the setup selecting the compute resource, storage, and compatibility.

  3. Select the guest OS you want installed on the VM.

    Screenshot showing the Guest OS Family and Guest OS version to install on the VM.

  4. Once the VM is created, power it up and connect to it via SSH.

  5. Install the Actions runner application, which runs a job from a GitHub Actions workflow. Identify and download the most current Linux x64 release of the Actions runner, either from the releases page or by running the following quick script. This script requires both curl and jq to be present on your VM.

    LATEST\_RELEASE\_ASSET\_URL=$( curl https://api.github.com/repos/actions/runner/releases/latest | \
    
    jq -r '.assets | .[] | select(.name | match("actions-runner-linux-arm64")) | .url' )
    
    DOWNLOAD\_URL=$( curl $LATEST\_RELEASE\_ASSET\_URL | \
    
    jq -r '.browser\_download\_url' )
    
    curl -OL $DOWNLOAD\_URL
    

    You should now have a file locally on your VM, actions-runner-linux-arm64-*.tar.gz. Extract this tarball locally:

    tar xzf actions-runner-linux-arm64-\*.tar.gz
    

    This extraction unpacks a few files locally, including a config.sh and run.sh script.

Enable GitHub Actions

Configure and enable GitHub Actions on the GitHub Enterprise Server instance.

  1. Access the GitHub Enterprise Server instance's administrative shell over SSH, and then run the following commands:

  2. Set an environment variable containing your Blob storage connection string.

    export CONNECTION\_STRING="<your connection string from the blob storage step>"
    
  3. Configure actions storage.

    ghe-config secrets.actions.storage.blob-provider azure
    
    ghe-config secrets.actions.storage.azure.connection-string "$CONNECTION\_STRING`      
    
  4. Apply the settings.

    ghe-config-apply
    
  5. Execute a precheck to install more software required by Actions on GitHub Enterprise Server.

    ghe-actions-precheck -p azure -cs "$CONNECTION\_STRING"
    
  6. Enable actions, and reapply the configuration.

    ghe-config app.actions.enabled true
    
    ghe-config-apply      
    
  7. Check the health of your blob storage.

    ghe-actions-check -s blob
    

    You should see output: Blob Storage is healthy.

  8. Now that GitHub Actions is configured, enable it for your users. Sign in to your GitHub Enterprise Server instance as an administrator, and select the in the upper right corner of any page.

  9. In the left sidebar, select Enterprise overview, then Policies, Actions, and select the option to enable Actions for all organizations.

  10. Configure your runner from the Self-hosted runners tab. Select Add new and then New runner from the drop-down. You're presented with a set of commands to run.

  11. Copy the command to configure the runner, for instance:

    ./config.sh --url https://10.1.1.26/enterprises/octo-org --token AAAAAA5RHF34QLYBDCHWLJC7L73MA
    
  12. Copy the config.sh command and paste it into a session on your Actions runner (created previously).

    Screenshot showing the GitHub Actions runner registration and settings.

  13. Use the ./run.sh command to run the runner:

    Tip

    To make this runner available to organizations in your enterprise, edit its organization access. You can limit access to a subset of organizations, and even to specific repositories.

    Screenshot of how to edit access for the self-hosted runners.

(Optional) Configure GitHub Connect

Although this step is optional, we recommend it if you plan to consume open-source actions available on GitHub.com. It allows you to build on the work of others by referencing these reusable actions in your workflows.

To enable GitHub Connect, follow the steps in Enabling automatic access to GitHub.com actions using GitHub Connect.

Once GitHub Connect is enabled, select the Server to use actions from GitHub.com in workflow runs option.

Screenshot of the Server can use actions from GitHub.com in workflow runs Enabled.

Set up and run your first workflow

Now that Actions and GitHub Connect is set up, let's put all this work to good use. Here's an example workflow that references the excellent octokit/request-action, allowing us to "script" GitHub through interactions using the GitHub API, powered by GitHub Actions.

In this basic workflow, use octokit/request-action to open an issue on GitHub using the API.

Screenshot of an example workflow.

Note

GitHub.com hosts the action, but when it runs on GitHub Enterprise Server, it automatically uses the GitHub Enterprise Server API.

If you chose not to enable GitHub Connect, you could use the following alternative workflow.

Screenshot of an alternative example workflow.

  1. Navigate to a repo on your instance, and add the above workflow as: .github/workflows/hello-world.yml

    Screenshot of another alternative example workflow.

  2. In the Actions tab for your repo, wait for the workflow to execute.

    Screenshot of an executed example workflow.

    You can see it being processed.

    Screenshot of the workflow processed by runner.

If everything ran successfully, you should see a new issue in your repo, entitled "Hello world."

Screenshot of the Hello world issue in GitHub created by github-actions.

Congratulations! You just completed your first Actions workflow on GitHub Enterprise Server, running on your Azure VMware Solution private cloud.

This article set up a new instance of GitHub Enterprise Server, the self-hosted equivalent of GitHub.com, on top of your Azure VMware Solution private cloud. The instance includes support for GitHub Actions and uses Azure Blob Storage for persistence of logs and artifacts. But we're just scratching the surface of what you can do with GitHub Actions. Check out the list of Actions on GitHub's Marketplace, or create your own.

Next steps

Now that you covered setting up GitHub Enterprise Server on your Azure VMware Solution private cloud, learn more about: