Private network access
CI needs to reach GCP services, registries, or internal endpoints safely.
Design-partner access for GCP-first platform teams
Run GitHub Actions on ephemeral, autoscaled GCP infrastructure you control, without building the runner platform yourself.
Built for GCP-first teams evaluating self-hosted runners, larger runners, ARC, or AWS-first runner products.
jobs:
build:
runs-on: runnerdock-gcp
Why teams evaluate runnerdock
CI needs to reach GCP services, registries, or internal endpoints safely.
Generic hosted machines do not match every image, region, hardware, or policy need.
Static self-hosted runners and custom autoscalers create maintenance work.
Hosted minutes, idle VMs, cache behavior, and platform charges need a clearer model.
GCP-native use cases
Route GitHub Actions jobs toward GCP-adjacent capacity without opening broad network paths.
Evaluate build and test workflows against GCP runner profiles using real job data.
Replace static runner fleets with job-scoped capacity where the lifecycle can return to zero.
Give platform teams a managed path before they build their own ARC or autoscaler stack.
Architecture
Architecture details are being finalized with design partners. This model shows the intended operating shape without claiming final implementation specifics.
Configure runner access for selected repositories or organizations.
Choose the GCP project, region, labels, and machine profiles for pilots.
Update runs-on labels for a focused workflow evaluation.
Jobs execute on GCP capacity and return to zero when idle, where supported.
Control and trust
We will confirm runner lifecycle, permissions, log retention, and network boundaries during the design-partner review before asking you to move production workflows.
Cost model
runnerdock is intended for teams whose CI cost includes idle capacity, slow feedback loops, cloud locality, cache misses, and platform maintenance. In pilots, we compare a current workflow against a GCP runner profile using real job data.
Design-partner access
We are looking for GCP-first teams with active GitHub Actions workloads, clear runner pain, and willingness to validate one production-like workflow. Bring CI usage data, security constraints, and a named technical owner.
FAQ
No. runnerdock is intended to keep GitHub Actions as the workflow layer while moving runner execution into GCP-backed capacity.
The intended migration path is to pilot selected workflows by changing runner labels. Final label syntax and supported workflow patterns are pending product confirmation.
The exact resource model is being finalized with design partners. The evaluation will confirm project boundaries, IAM, networking, logs, and teardown behavior.
GitHub larger runners can be a good fit when hosted capacity is enough. runnerdock is aimed at teams that want runner capacity and operating controls inside their Google Cloud account.
ARC is a valid Kubernetes-centered path for teams ready to operate that stack. runnerdock is intended to reduce custom runner-platform work for GCP-first teams.
Those options can be strong depending on cloud strategy. runnerdock focuses on GitHub Actions teams whose runner requirements are tied to Google Cloud infrastructure control.
Available support is being confirmed during design-partner pilots. Bring the capability list you need, and we will evaluate fit against the current roadmap.
Compare using your workflow data: queue time, job duration, idle capacity, cloud locality, cache behavior, and platform maintenance. We are not publishing hard savings claims before pilot data exists.