Search query syntax
Compose a search query from one or more key:value pairs separated by AND/OR logical operators.
Key | Value |
---|---|
actor_id | ID of the user account that initiated the action |
actor | Name of the user account that initiated the action |
oauth_app_id | ID of the OAuth application associated with the action |
action | Name of the audited action |
user_id | ID of the user affected by the action |
user | Name of the user affected by the action |
repo_id | ID of the repository affected by the action (if applicable) |
repo | Name of the repository affected by the action (if applicable) |
actor_ip | IP address from which the action was initiated |
created_at | Time at which the action occurred |
from | View from which the action was initiated |
note | Miscellaneous event-specific information (in either plain text or JSON format) |
org | Name of the organization affected by the action (if applicable) |
org_id | ID of the organization affected by the action (if applicable) |
For example, to see all actions that have affected the repository octocat/Spoon-Knife
since the beginning of 2017:
repo:"octocat/Spoon-Knife" AND created_at:[2017-01-01 TO *]
For a full list of actions, see "Audited actions."
Searching the audit log
-
Navigate to your enterprise account by visiting
https://HOSTNAME/enterprises/ENTERPRISE-NAME
, replacingHOSTNAME
with your instance's hostname andENTERPRISE-NAME
with your enterprise account's name. -
In the enterprise account sidebar, click Settings.
-
Under " Settings", click Audit log.
-
Type a search query.