Scaling Workflows: Self-Hosted vs. GitHub-Hosted Runners Quiz Quiz

Explore the key differences and considerations when choosing between self-hosted and cloud-hosted runners for scaling automated workflows. This quiz evaluates your knowledge on scaling strategies, cost implications, maintenance requirements, and security aspects associated with both runner types.

  1. Runner Control and Customization

    Which type of runner provides the highest level of control over hardware specifications and pre-installed software for specialized workflow needs?

    1. Reserved runners
    2. Shared cloud-hosted runners
    3. Self-hosted runners
    4. Temporary runners

    Explanation: Self-hosted runners allow users to configure hardware components, operating systems, and install custom software, making them ideal for specialized or legacy requirements. Shared cloud-hosted runners offer generic environments without custom control. Reserved runners typically refer to specific allocations but do not guarantee full hardware or software configuration control. Temporary runners are ephemeral and not intended for customization beyond basic setups.

  2. Scaling Flexible Capacity

    In a scenario where workload demand fluctuates significantly, which runner type is generally better suited for quickly scaling to handle large surges of workflow jobs?

    1. Manual self-hosted runners
    2. Cloud-hosted runners
    3. Offline runners
    4. Single-core runners

    Explanation: Cloud-hosted runners are designed to scale on demand and can automatically handle surges in workflow jobs by instantly provisioning additional capacity. Manual self-hosted runners require more effort to scale and may not respond instantly to spikes. Single-core runners refer to hardware limits, which does not address scaling needs. Offline runners are unavailable for job execution and cannot help with scaling at all.

  3. Cost Considerations When Scaling

    What is a typical benefit of using self-hosted runners when scaling workflows for a large volume of jobs over time?

    1. No impact on organizational infrastructure
    2. Higher direct costs for each workflow run
    3. Reduced long-term operational costs
    4. Automatic software patching

    Explanation: Self-hosted runners may offer cost savings over time since the infrastructure is owned or managed by the organization, especially at scale. Higher direct costs per run are usually associated with usage-based cloud models, not self-hosting. Self-hosted solutions do impact organizational infrastructure, requiring oversight. Automatic software patching is not a typical feature of self-hosted setups and would need manual intervention or automation.

  4. Security Responsibility

    Who is primarily responsible for applying security updates and maintaining the operating system on machines used for self-hosted runners?

    1. No one, as it's done automatically
    2. The third-party security vendor
    3. The organization managing the runners
    4. The workflow engine provider

    Explanation: With self-hosted runners, the hosting organization is responsible for security updates and operating system maintenance. Providers of workflow engines or automation services cannot update external infrastructure. Security vendors may offer advice but do not manage the system directly. Assuming maintenance is fully automated without setup is incorrect, as it requires explicit scheduling and management.

  5. Network Accessibility Risks

    What is a potential security risk when using self-hosted runners that have access to your internal network?

    1. Improved download speeds due to proximity
    2. Automatic failover to external backup runners
    3. Malicious workflows could target internal resources
    4. Complete isolation from external threats

    Explanation: Self-hosted runners with network access to internal systems are vulnerable if a workflow contains malicious code, as it could compromise internal resources. Automatic failover does not directly relate to security risk; it's a resilience feature. Improved download speeds are a performance benefit but not a risk. Complete isolation from external threats is incorrect since the runner executes externally-supplied code and may increase attack surfaces.