About external storage for GitHub Actions
GitHub Actions uses external blob storage to store data generated by workflow runs, such as workflow logs, caches, and user-uploaded build artifacts. For more information, see "Getting started with GitHub Actions for GitHub Enterprise Server."
Note: The only GitHub-supported S3 storage providers are Amazon S3 and MinIO Gateway for NAS.
There are other S3 API-compatible storage products that GitHub partners have self-validated as working with GitHub Actions on GitHub Enterprise Server. For more information, see the GHES Storage Partners repository.
For storage products validated through the GitHub Technology Partnership program, the storage provider is responsible for support and documentation for using the storage product with GitHub Actions.
Before enabling GitHub Actions, make sure you have completed the following steps:
Create your Amazon S3 bucket for storing data generated by workflow runs.
Review the hardware requirements for GitHub Actions. For more information, see "Getting started with GitHub Actions for GitHub Enterprise Server."
TLS must be configured for your GitHub Enterprise Server instance's domain. For more information, see "Configuring TLS."
Note: We strongly recommend that you configure TLS on GitHub Enterprise Server with a certificate signed by a trusted authority. Although a self-signed certificate can work, extra configuration is required for your self-hosted runners, and it is not recommended for production environments.
If you have an HTTP Proxy Server configured on your GitHub Enterprise Server instance:
- You must add
127.0.0.1to the HTTP Proxy Exclusion list.
- If your external storage location is not routable, then you must also add your external storage URL to the exclusion list.
For more information on changing your proxy settings, see "Configuring an outbound web proxy server."
- You must add
Enabling GitHub Actions with Amazon S3 storage
Using the AWS Console or CLI, create an access key for your storage bucket. GitHub Actions requires the following permissions for the access key that will access the bucket:
kms:GenerateDataKey(if Key Management Service (KMS) encryption has been enabled)
For more information on managing AWS access keys, see the "AWS Identity and Access Management Documentation."
From an administrative account on GitHub Enterprise Server, in the upper-right corner of any page, click .
If you're not already on the "Site admin" page, in the upper-left corner, click Site admin.
In the " Site admin" sidebar, click Management Console.
In the "Settings"" sidebar, click Actions.
Under "GitHub Actions", select Enable GitHub Actions.
Under "Artifact & Log Storage", select Amazon S3, then enter your storage bucket's details:
AWS Service URL: The service URL for your bucket. For example, if your S3 bucket was created in the
us-west-2region, this value should be
For more information, see "AWS service endpoints" in the AWS documentation.
AWS S3 Bucket: The name of your S3 bucket.
AWS S3 Access Key and AWS S3 Secret Key: The AWS access key ID and secret key for your bucket.
Click the Test storage settings button to validate your storage settings.
If there are any errors validating the storage settings, check the settings with your storage provider and try again.
Under the "Settings" sidebar, click Save settings.
Note: Saving settings in the Management Console restarts system services, which could result in user-visible downtime.
Wait for the configuration run to complete.
After the configuration run has successfully completed, GitHub Actions will be enabled on your GitHub Enterprise Server instance. For your next steps, such as managing GitHub Actions access permissions and adding self-hosted runners, return to "Getting started with GitHub Actions for GitHub Enterprise Server."