GitHub appears to be struggling with measly three nines availability

Observed reliability and “nines” debate

  • Multiple commenters point to third‑party uptime aggregators showing overall GitHub availability around a single nine (~90%), with core git/Actions also below 99.9%.
  • Several argue three nines is a reasonable expectation for critical infrastructure and that GitHub is missing even its own 99.9% per‑service enterprise SLA.
  • Others note “five nines” claims in the industry are often marketing, argue 99.9% is already hard at scale, and say using “measly” for three nines shows misunderstanding.
  • Disagreement over whether aggregating all features into one uptime number is fair; but even per‑service metrics look poor.

Impact on users and workflows

  • Repeated reports of:
    • PR pages and diffs loading very slowly or partially.
    • Actions jobs being canceled or stuck, forcing people to disable workflows or move CI elsewhere.
    • Outages causing missed deploy windows, blocked PRs, and security gates being bypassed.
  • Some treat GitHub as “distribution not infrastructure,” keeping local/source‑of‑truth repos and independent deployment paths to reduce blast radius.

Suspected causes: migration, AI, and architecture

  • Many tie degradations to:
    • Forced migration from GitHub’s own bare metal/MySQL setups to Azure, with tight deadlines and little support.
    • Massive growth in traffic and PR volume from AI coding agents and “karma farming” bots.
    • Internal focus on Copilot/AI features over core reliability.
  • Technical critiques include: React front‑end replacing server‑rendered pages and hurting performance; historically weak availability design in GitHub Enterprise Server; continued lack of IPv6 and other protocol features.

GitHub Actions, CI/CD, and security

  • Actions called unreliable (frequent random failures, deprecations, pricing scares) and deeply intertwined with GitHub, making it a single point of failure for CI/CD and security scanning.
  • Security concerns around:
    • Mutable action references, composite actions’ transitive dependencies, and supply‑chain attacks.
    • GitHub’s slow response to long‑standing vulnerability patterns, despite community warnings.
  • Suggested mitigations: pinning actions to commit hashes, vendoring action dependencies, or moving to other CI tools (Jenkins, GitLab, CircleCI, self‑hosted scripts).

Microsoft ownership, strategy, and alternatives

  • Many see deterioration beginning or accelerating after the Microsoft acquisition and the later full organizational integration.
  • GitHub is perceived as optimized for pushing Copilot and Azure rather than being a neutral, rock‑solid developer hub.
  • Alternatives mentioned: GitLab, Forgejo, Codeberg, Bitbucket, Radicle, self‑hosted git + CI; though some note competitors also struggle with reliability.