Depot GitHub Actions runners can access your private resources, like internal APIs, databases, or other services.
By default, each Depot runner launches with a unique public IP address from the AWS (Amazon Web Services) address pool. This approach has the following implications:
If you need to securely access your private resources from your Depot runner, then we recommend choosing from several alternatives to static IP addresses. In general, options like placing your runners on your VPN or VPC peering (if you use AWS) perform better, are easier to maintain, and cost less.
We recommend the following approaches to securely connect Depot runners to your private resources. You can adapt these patterns to your infrastructure and requirements.
The Tailscale integration allows Depot CI runners and container build runners to join your private Tailscale network, giving them secure access to internal resources without any infrastructure changes.
When to use this approach:
How it works:
Setup:
If you're using Cloudflare for authentication and access control, you can install Cloudflare Warp within your CI runners to give them a verifiable identity in your Zero Trust configuration.
When to use this approach:
How it works:
Example usage:
steps:
- uses: actions/checkout@v4
- uses: cloudflare/warp-action@v1
with:
organization: your-org
- run: curl https://internal-service.example.com
For AWS-based infrastructure, Depot can establish direct VPC peering between your AWS account and the VPC where your runners operate. Depot configures a peering connection between VPCs, allowing runners to access resources in your private subnets and ensuring that traffic stays within the AWS network.
When to use this approach:
Requirements:
If you have an absolute requirement for static IP addresses, you can consider upgrading to our Business plan for a custom deployment.
Depot provisions dedicated infrastructure with dedicated VPCs for your runners. All runners either peer with your AWS account or are configured to use a NAT gateway for static outbound IP addresses. These IPs can then be allowlisted in your firewall or security policies.
When to use this approach:
Tradeoffs compared to our default IP addressing model:
Requirements:
Deployment options:
Reach out if you're not sure which option is right for your use case.