About audit log streaming
To help protect your intellectual property and maintain compliance for your organization, you can use streaming to keep copies of your audit log data and monitor:
- Organizationもしくはリポジトリ設定へのアクセス
- 権限の変更
- Organization、リポジトリ、Teamへのユーザの追加もしくは削除
- 管理者に昇格したユーザ
- GitHub Appの権限の変更
- Git events, such as cloning, fetching, and pushing
The benefits of streaming audit data include:
- Data exploration. You can examine streamed events using your preferred tool for querying large quantities of data. The stream contains both audit events and Git events across the entire enterprise account.
- Data continuity. You can pause the stream for up to seven days without losing any audit data.
- Data retention. You can keep your exported audit logs and Git events data as long as you need to.
Enterprise owners can set up, pause, or delete a stream at any time. The stream exports the audit data for all of the organizations in your enterprise.
Setting up audit log streaming
You set up the audit log stream on GitHub Enterprise Cloud by following the instructions for your provider.
Setting up streaming to Amazon S3
To stream audit logs to Amazon's S3 endpoint, you must have a bucket and access keys. For more information, see Creating, configuring, and working with Amazon S3 buckets in the the AWS documentation. Make sure to block public access to the bucket to protect your audit log information.
To set up audit log streaming from GitHub you will need:
- The name of your Amazon S3 bucket
- Your AWS access key ID
- Your AWS secret key
For information on creating or accessing your access key ID and secret key, see Understanding and getting your AWS credentials in the AWS documentation.
-
GitHub.comの右上で、自分のプロフィール写真をクリックし、続いてYour enterprises(自分のEnterprise)をクリックしてください。
-
Enterpriseのリストで、表示したいEnterpriseをクリックしてください。
-
Enterpriseアカウントのサイドバーで、 Settings(設定)をクリックしてください。
-
Settings(設定)"の下で、Audit logをクリックしてください。
-
Click the Log streaming tab.
-
Click Configure stream and select Amazon S3.
-
On the configuration page, enter:
- The name of the bucket you want to stream to. For example,
auditlog-streaming-test
. - Your access key ID. For example,
ABCAIOSFODNN7EXAMPLE1
. - Your secret key. For example,
aBcJalrXUtnWXYZ/A1MDENG/zPxRfiCYEXAMPLEKEY
.
- The name of the bucket you want to stream to. For example,
-
Click Check endpoint to verify that GitHub can connect and write to the Amazon S3 endpoint.
-
After you have successfully verified the endpoint, click Save.
Setting up streaming to Azure Blob Storage
Before setting up a stream in GitHub, you must first have created a storage account and a container in Microsoft Azure. For details, see the Microsoft documentation, "Introduction to Azure Blob Storage."
To configure the stream in GitHub you need the URL of a SAS token.
On Microsoft Azure portal:
-
On the Home page, click Storage Accounts.
-
Click the name of the storage account you want to use, then click Containers.
-
Click the name of the container you want to use.
-
Click Shared access tokens.
-
In the Permissions drop-down menu, change the permissions to only allow
Create
andWrite
. -
Set an expiry date that complies with your secret rotation policy.
-
Click Generate SAS token and URL.
-
Copy the value of the Blob SAS URL field that's displayed. You will use this URL in GitHub.
On GitHub:
-
GitHub.comの右上で、自分のプロフィール写真をクリックし、続いてYour enterprises(自分のEnterprise)をクリックしてください。
-
Enterpriseのリストで、表示したいEnterpriseをクリックしてください。
-
Enterpriseアカウントのサイドバーで、 Settings(設定)をクリックしてください。
-
Settings(設定)"の下で、Audit logをクリックしてください。
-
Click the Log streaming tab.
-
Click Configure stream and select Azure Blob Storage.
-
On the configuration page, enter the blob SAS URL that you copied in Azure. The Container field is auto-filled based on the URL.
-
Click Check endpoint to verify that GitHub can connect and write to the Azure Blob Storage endpoint.
-
After you have successfully verified the endpoint, click Save.
Setting up streaming to Azure Event Hubs
Before setting up a stream in GitHub, you must first have an event hub namespace in Microsoft Azure. Next, you must create an event hub instance within the namespace. You'll need the details of this event hub instance when you set up the stream. For details, see the Microsoft documentation, "Quickstart: Create an event hub using Azure portal."
You need two pieces of information about your event hub: its instance name and the connection string.
On Microsoft Azure portal:
-
Search for "Event Hubs".
-
Select Event Hubs. The names of your event hubs are listed.
-
Make a note of the name of the event hub you want to stream to.
-
Click the required event hub. Then, in the left menu, select Shared Access Policies.
-
Select a shared access policy in the list of policies, or create a new policy.
-
Click the button to the right of the Connection string-primary key field to copy the connection string.
On GitHub:
-
GitHub.comの右上で、自分のプロフィール写真をクリックし、続いてYour enterprises(自分のEnterprise)をクリックしてください。
-
Enterpriseのリストで、表示したいEnterpriseをクリックしてください。
-
Enterpriseアカウントのサイドバーで、 Settings(設定)をクリックしてください。
-
Settings(設定)"の下で、Audit logをクリックしてください。
-
Click the Log streaming tab.
-
Click Configure stream and select Azure Event Hubs.
-
On the configuration page, enter:
- The name of the Azure Event Hubs instance.
- The connection string.
-
Click Check endpoint to verify that GitHub can connect and write to the Azure Events Hub endpoint.
-
After you have successfully verified the endpoint, click Save.
Setting up streaming to Google Cloud Storage
To set up streaming to Google Cloud Storage, you must create a service account in Google Cloud with the appropriate credentials and permissions, then configure audit log streaming in GitHub Enterprise Cloud using the service account's credentials for authentication.
-
Create a service account for Google Cloud. You do not need to set access controls or IAM roles for the service account. For more information, see Creating and managing service accounts in the Google Cloud documentation.
-
Create a JSON key for the service account, and store the key securely. For more information, see Creating and managing service account keys in the Google Cloud documentation.
-
If you haven't created a bucket yet, create the bucket. For more information, see Creating storage buckets in the Google Cloud documentation.
-
Give the service account the Storage Object Creator role for the bucket. For more information, see Using Cloud IAM permissions in the Google Cloud documentation.
-
GitHub.comの右上で、自分のプロフィール写真をクリックし、続いてYour enterprises(自分のEnterprise)をクリックしてください。
-
Enterpriseのリストで、表示したいEnterpriseをクリックしてください。
-
Enterpriseアカウントのサイドバーで、 Settings(設定)をクリックしてください。
-
Settings(設定)"の下で、Audit logをクリックしてください。
-
Click the Log streaming tab.
-
Select the Configure stream drop-down menu and click Google Cloud Storage.
-
Under "Bucket", type the name of your Google Cloud Storage bucket.
-
Under "JSON Credentials", paste the entire contents of the file for your service account's JSON key.
-
To verify that GitHub can connect and write to the Google Cloud Storage bucket, click Check endpoint.
-
After you have successfully verified the endpoint, click Save.
Setting up streaming to Splunk
To stream audit logs to Splunk's HTTP Event Collector (HEC) endpoint you must make sure that the endpoint is configured to accept HTTPS connections. For more information, see Set up and use HTTP Event Collector in Splunk Web in the Splunk documentation.
-
GitHub.comの右上で、自分のプロフィール写真をクリックし、続いてYour enterprises(自分のEnterprise)をクリックしてください。
-
Enterpriseのリストで、表示したいEnterpriseをクリックしてください。
-
Enterpriseアカウントのサイドバーで、 Settings(設定)をクリックしてください。
-
Settings(設定)"の下で、Audit logをクリックしてください。
-
Click the Log streaming tab.
-
Click Configure stream and select Splunk.
-
On the configuration page, enter:
-
The domain on which the application you want to stream to is hosted.
If you are using Splunk Cloud,
Domain
should behttp-inputs-<host>
, wherehost
is the domain you use in Splunk Cloud. たとえば、http-inputs-mycompany.splunkcloud.com
などです。 -
The port on which the application accepts data.
If you are using Splunk Cloud,
Port
should be443
if you haven't changed the port configuration. If you are using the free trial version of Splunk Cloud,Port
should be8088
. -
A token that GitHub can use to authenticate to the third-party application.
-
-
Leave the Enable SSL verification check box selected.
Audit logs are always streamed as encrypted data, however, with this option selected, GitHub verifies the SSL certificate of your Splunk instance when delivering events. SSL verification helps ensure that events are delivered to your URL endpoint securely. You can clear the selection of this option, but we recommend you leave SSL verification enabled.
-
Click Check endpoint to verify that GitHub can connect and write to the Splunk endpoint.
-
After you have successfully verified the endpoint, click Save.
Pausing audit log streaming
Pausing the stream allows you to perform maintenance on the receiving application without losing audit data. Audit logs are stored for up to seven days on GitHub.com and are then exported when you unpause the stream.
-
GitHub.comの右上で、自分のプロフィール写真をクリックし、続いてYour enterprises(自分のEnterprise)をクリックしてください。
-
Enterpriseのリストで、表示したいEnterpriseをクリックしてください。
-
Enterpriseアカウントのサイドバーで、 Settings(設定)をクリックしてください。
-
Settings(設定)"の下で、Audit logをクリックしてください。
-
Click the Log streaming tab.
-
Click Pause stream.
-
A confirmation message is displayed. Click Pause stream to confirm.
When the application is ready to receive audit logs again, click Resume stream to restart streaming audit logs.
Deleting the audit log stream
-
GitHub.comの右上で、自分のプロフィール写真をクリックし、続いてYour enterprises(自分のEnterprise)をクリックしてください。
-
Enterpriseのリストで、表示したいEnterpriseをクリックしてください。
-
Enterpriseアカウントのサイドバーで、 Settings(設定)をクリックしてください。
-
Settings(設定)"の下で、Audit logをクリックしてください。
-
Click the Log streaming tab.
-
Click Delete stream.
-
A confirmation message is displayed. Click Delete stream to confirm.