Skip to main content
ドキュメントには� �繁に更新が� えられ、その都度公開されています。本ページの翻訳はま� 未完成な部分があることをご了承く� さい。最新の情� �については、英語のドキュメンテーションをご参照く� さい。本ページの翻訳に問題がある� �合はこちらまでご連絡く� さい。

このバージョンの GitHub Enterprise はこの日付をもって終了となりました: 2022-06-03. 重大なセキュリティの問題に対してであっても、パッチリリースは作成されません。 パフォーマンスの向上、セキュリティの改善、新機能のためには、最新バージョンのGitHub Enterpriseにアップグレードしてく� さい。 アップグレードに関する支援については、GitHub Enterprise supportに連絡してく� さい。

Site admin dashboard

サイト管理ダッシュボードを使って、GitHub Enterprise Server内で直接Enterpriseのユーザ、Organization、リポジトリを管理できます。

To access the dashboard, in the upper-right corner of any page, click . Rocket ship icon for accessing site admin settings

Refer to this section of the site admin dashboard to search for users and repositories, and to query the audit log.

Management Console

Here you can launch the Management Console to manage virtual appliance settings such as the domain, authentication, and SSL.


Data for GitHub's trending page is calculated into daily, weekly, and monthly time spans for both repositories and developers. You can see when this data was last cached and queue up new trending calculation jobs from the Explore section.

Audit log

GitHub Enterprise Server keeps a running log of audited actions that you can query.

By default, the audit log shows you a list of all audited actions in reverse chronological order. You can filter this list by entering key-value pairs in the Query text box and then clicking Search, as explained in "Searching the audit log for your enterprise."

For more information on audit logging in general, see "About the audit log for your enterprise." For a full list of audited actions, see "Audit log events for your enterprise."


If you need to get information on the users, organizations, and repositories in GitHub Enterprise Serverインスタンス, you would ordinarily fetch JSON data through the GitHub API. Unfortunately, the API may not provide all of the data that you want and it requires a bit of technical expertise to use. The site admin dashboard offers a Reports section as an alternative, making it easy for you to download CSV reports with most of the information that you are likely to need for users, organizations, and repositories.

Specifically, you can download CSV reports that list

  • all users
  • all active users
  • all dormant users
  • all users who have been suspended
  • all organizations
  • all repositories

You can also access these reports programmatically via standard HTTP authentication with a site admin account. You must use a personal access token with the site_admin scope. For more information, see "Creating a personal access token."

For example, here is how you would download the "all users" report using cURL:

curl -L -u username:token http(s)://hostname/stafftools/reports/all_users.csv

To access the other reports programmatically, replace all_users with active_users, dormant_users, suspended_users, all_organizations, or all_repositories.

Note: The initial curl request will return a 202 HTTP response if there are no cached reports available; a report will be generated in the background. You can send a second request to download the report. You can use a password or an OAuth token with the site_admin scope in place of a password.

User reports

created_atWhen the user account was created (as an ISO 8601 timestamp)
idAccount ID for the user or organization
loginAccount's login name
emailAccount's primary email address
roleWhether the account is an admin or an ordinary user
suspended?Whether the account has been suspended
last_logged_ipMost recent IP address to log into the account
reposNumber of repositories owned by the account
ssh_keysNumber of SSH keys registered to the account
org_membershipsNumber of organizations to which the account belongs
dormant?Whether the account is dormant
last_activeWhen the account was last active (as an ISO 8601 timestamp)
raw_loginRaw login information (in JSON format)
2fa_enabled?Whether the user has enabled two-factor authentication

Organization reports

idOrganization ID
created_atWhen the organization was created
loginOrganization's login name
emailOrganization's primary email address
ownersNumber of organization owners
membersNumber of organization members
teamsNumber of organization teams
reposNumber of organization repositories
2fa_required?Whether the organization requires two-factor authentication

Repository reports

created_atWhen the repository was created
owner_idID of the repository's owner
owner_typeWhether the repository is owned by a user or an organization
owner_nameName of the repository's owner
idRepository ID
nameRepository name
visibilityWhether the repository is public or private
readable_sizeRepository's size in a human-readable format
raw_sizeRepository's size as a number
collaboratorsNumber of repository collaborators
fork?Whether the repository is a fork
deleted?Whether the repository has been deleted


GitHub's code search features are powered by ElasticSearch. This section of the site admin dashboard shows you the current status of your ElasticSearch cluster and provides you with several tools to control the behavior of searching and indexing. These tools are split into the following three categories.

This allows you to enable or disable both search and index operations on source code.

Code search index repair

This controls how the code search index is repaired. You can

  • enable or disable index repair jobs
  • start a new index repair job
  • reset all index repair state

GitHub Enterprise uses repair jobs to reconcile the state of the search index with data stored in a database (issues, pull requests, repositories, and users) and data stored in Git repositories (source code). This happens when

  • a new search index is created;
  • missing data needs to be backfilled; or
  • old search data needs to be updated.

In other words, repair jobs are started as needed and run in the background—they are not scheduled by site admins in any way.

Furthermore, repair jobs use a "repair offset" for parallelization. This is an offset into the database table for the record being reconciled. Multiple background jobs can synchronize work based on this offset.

A progress bar shows the current status of a repair job across all of its background workers. It is the percentage difference of the repair offset with the highest record ID in the database. Don't worry about the value shown in the progress bar after a repair job has completed: because it shows the difference between the repair offset and the highest record ID in the database, it will decrease as more repositories are added to GitHub Enterprise Serverインスタンス even though those repositories are actually indexed.

You can start a new code-search index repair job at any time. It will use a single CPU as it reconciles the search index with database and Git repository data. To minimize the effects this will have on I/O performance and reduce the chances of operations timing out, try to run a repair job during off-peak hours first. Monitor your system's load averages and CPU usage with a utility like top; if you don't notice any significant changes, it should be safe to run an index repair job during peak hours, as well.

Issues index repair

This controls how the Issues index is repaired. You can

  • enable or disable index repair jobs
  • start a new index repair job
  • reset all index repair state

Reserved logins

Certain words are reserved for internal use in GitHub Enterprise Serverインスタンス, which means that these words cannot be used as usernames.

For example, the following words are reserved, among others:

  • admin
  • enterprise
  • login
  • staff
  • support

For the full list or reserved words, navigate to "Reserved logins" in the site admin dashboard.

Advanced Security Committers

You can see the number of active committers that are currently using seats for GitHub Advanced Security, and you can calculate how many additional seats would be used if you enabled GitHub Advanced Security for more organizations and repositories.

Under "Current active committer count", you can see the number of active committers for repositories with GitHub Advanced Security enabled. This is the number of licensed seats that are currently being used.

Under "Maximum committers across entire instance", you can see the number of active committers across all the repositories in your enterprise. This is the number of seats that would be used if you enabled GitHub Advanced Security for every repository in your enterprise.

Under "Calculate Additional Advanced Committers", you can calculate how many more additional seats will be used if you enable GitHub Advanced Security for specific organizations and repositories. Under "Organizations and Repositories", enter or paste a list of organizations and repositories, with one organization or repository per line.


The result is the number of additional seats that would be used if you enabled GitHub Advanced Security for those organizations and repositories.

For more information about billing for Advanced Security, see "About billing for Advanced Security."

Enterprise overview

Refer to this section of the site admin dashboard to manage organizations, people, policies, and settings.


This is a list of the repositories on GitHub Enterprise Serverインスタンス. You can click on a repository name and access functions for administering the repository.

All users

Here you can see all of the users on GitHub Enterprise Serverインスタンス, and initiate an SSH key audit.

Site admins

Here you can see all of the administrators on GitHub Enterprise Serverインスタンス, and initiate an SSH key audit.

Dormant users

Here you can see and suspend all of the inactive users on GitHub Enterprise Serverインスタンス. A user account is considered to be inactive ("dormant") when it:

  • Has existed for longer than the dormancy threshold that's set for GitHub Enterprise Serverインスタンス.
  • Has not generated any activity within that time period.
  • Is not a site administrator.

休� の閾値は、休� と見なされるまでにユーザがアクティブであってはならない期間です。 デフォルトの休� の閾値は90日ですが、GitHub Enterprise Serverインスタンスの休� の閾値はカスタマイズできます。 For more information, see "Managing dormant users."

Suspended users

Here you can see all of the users who have been suspended on GitHub Enterprise Serverインスタンス, and initiate an SSH key audit.