Contains all activities related to crediting a contributor for a security advisory in the GitHub Advisory Database. For more information, see "About GitHub Security Advisories."
Contains repository-level activities related to security advisories in the GitHub Advisory Database. For more information, see "About GitHub Security Advisories."
Use the created qualifier to filter events in the audit log based on when they occurred. 日付の形式は ISO8601標準に従い、YYYY-MM-DD(年-月-日) とする必要があります。 オプションの時間情報のTHH:MM:SS+00:00を日付の後に付けて、時、分、秒で検索できるようにすることもできます。 これはTの後にHH:MM:SS(時-分-秒)、そしてUTCオフセット(+00:00)を続けたものです。
When you search for a date, you can use greater than, less than, and range qualifiers to further filter results. 詳しい情報については、「検索構文を理解する」を参照してください。
Using the qualifier country, you can filter events in the audit log based on the originating country. 国の 2 文字のショートコードまたはフル ネームを使用できます。 名前に空白がある国は引用符で囲む必要があることに注意してください。 例:
Note: The audit log GraphQL API is available for organizations using GitHub Enterprise. For more information, see "GitHub's products."
To ensure a secure IP and maintain compliance for your organization, you can use the audit log GraphQL API to keep copies of your audit log data and monitor:
Access to your organization or repository settings
Changes in permissions
Added or removed users in an organization, repository, or team
Users being promoted to admin
Changes to permissions of a GitHub App
Note that you can't retrieve Git events using the GraphQL API. To retrieve Git events, use the REST API instead. For more information, see "git category actions."
GraphQL のレスポンスには、90 日から 120 日までのデータを含めることができます。
たとえば、GraphQL にリクエストして、Organization に新しく追加された Organization メンバー全員を表示できます。 詳細は「GraphQL API Audit Log」を参照してください。
Note: The audit log REST API is available as a public beta for users of GitHub Enterprise Cloud only.
To ensure a secure IP and maintain compliance for your organization, you can use the audit log REST API to keep copies of your audit log data and monitor:
Access to your organization or repository settings
Changes in permissions
Added or removed users in an organization, repository, or team
Users being promoted to admin
Changes to permissions of a GitHub App
Git events, such as cloning, fetching, and pushing
The audit log retains Git events for 7 days. This is shorter than other audit log events, which can be retained for 90 days.
For more information about the audit log REST API, see "Organizations" in the REST API documentation.
Note: To access Git events in the audit log, you must use the audit log REST API. This functionality is available as a public beta for users of GitHub Enterprise Cloud only.
For more information about the audit log REST API, see "Organizations" in the REST API documentation.
The audit log retains Git events for 7 days. This is shorter than other audit log events, which can be retained for 90 days.
アクション
説明
クローン
Triggered when a repository is cloned.
フェッチ
Triggered when changes are fetched from a repository.
プッシュ
Triggered when changes are pushed to a repository.
Triggered when an owner disables a two-factor authentication requirement for all members, billing managers, and outside collaborators in an organization.
Triggered when a repository owner or person with admin access to the repository disables the dependency graph for a private repository. 詳しい情報については、「依存関係グラフについて」を参照してください。
enable
Triggered when a repository owner or person with admin access to the repository enables the dependency graph for a private repository.
Triggered when a repository owner or person with admin access to the repository disables secret scanning for a private repository. 詳しい情報については、「シークレットスキャニングについて」を参照してください。
enable
Triggered when a repository owner or person with admin access to the repository enables secret scanning for a private repository.
Triggered when an organization owner or a person with admin permissions to the repository updates the list of people or teams authorized to receive Dependabot alerts for vulnerable dependencies in the repository. For more information, see "Managing security and analysis settings for your repository."
disable
Triggered when a repository owner or person with admin access to the repository disables Dependabot alerts.
enable
Triggered when a repository owner or person with admin access to the repository enables Dependabot alerts.
demote_maintainer | Triggered when a user was demoted from a team maintainer to a team member. For more information, see "Giving "team maintainer" permissions to an organization member." | destroy | Triggered when a team is deleted from the organization. team.promote_maintainer | Triggered when a user was promoted from a team member to a team maintainer. For more information, see "Giving "team maintainer" permissions to an organization member." | remove_member | Triggered when a member of an organization is removed from a team. | remove_repository | Triggered when a repository is no longer under a team's control.