# GitHub Integration

# **GitHub Integration**

## **Introduction**

Elastic’s GitHub integration allows you to ingest GitHub logs, alerts, and developer activities into the Elastic Stack for centralized analysis. This supports use cases like vulnerability management, compliance auditing, and DevSecOps monitoring.

Note: This integration is only compatible with **GitHub Enterprise Cloud** and is **not supported on GitHub Enterprise Server**.

---

## **GitHub Data Streams Overview**

<div class="_tableContainer_16hzy_1" id="bkmrk-feature-integration-"><div class="_tableWrapper_16hzy_14 group flex w-fit flex-col-reverse" tabindex="-1"><table class="w-fit min-w-(--thread-content-width)" data-end="1400" data-start="639"><thead data-end="747" data-start="639"><tr data-end="747" data-start="639"><th data-col-size="sm" data-end="659" data-start="639">Feature</th><th data-col-size="sm" data-end="678" data-start="659">Integration Type</th><th data-col-size="md" data-end="747" data-start="678">Description</th></tr></thead><tbody data-end="1400" data-start="856"><tr data-end="964" data-start="856"><td data-col-size="sm" data-end="876" data-start="856">Audit Logs</td><td data-col-size="sm" data-end="895" data-start="876">PAT</td><td data-col-size="md" data-end="964" data-start="895">Track org-level admin and security events</td></tr><tr data-end="1073" data-start="965"><td data-col-size="sm" data-end="985" data-start="965">Code Scanning</td><td data-col-size="sm" data-end="1004" data-start="985">GitHub App / PAT</td><td data-col-size="md" data-end="1073" data-start="1004">Pull static analysis results from GitHub Advanced Security</td></tr><tr data-end="1182" data-start="1074"><td data-col-size="sm" data-end="1094" data-start="1074">Secret Scanning</td><td data-col-size="sm" data-end="1113" data-start="1094">GitHub App / PAT</td><td data-col-size="md" data-end="1182" data-start="1113">Detect exposed secrets (API keys, tokens, etc.) in repositories</td></tr><tr data-end="1291" data-start="1183"><td data-col-size="sm" data-end="1203" data-start="1183">Dependabot Alerts</td><td data-col-size="sm" data-end="1222" data-start="1203">GitHub App / PAT</td><td data-col-size="md" data-end="1291" data-start="1222">Retrieve alerts on insecure open-source dependencies</td></tr><tr data-end="1400" data-start="1292"><td data-col-size="sm" data-end="1312" data-start="1292">Issues &amp; PRs</td><td data-col-size="sm" data-end="1331" data-start="1312">GitHub App / PAT</td><td data-col-size="md" data-end="1400" data-start="1331">Sync issues, pull requests, comments, labels, and milestones</td></tr></tbody></table>

<div class="sticky end-(--thread-content-margin) h-0 self-end select-none"><div class="absolute end-0 flex items-end"><span class="" data-state="closed"><button class="bg-token-bg-primary hover:bg-token-bg-tertiary text-token-text-secondary my-1 rounded-sm p-1 transition-opacity group-[:not(:hover):not(:focus-within)]:pointer-events-none group-[:not(:hover):not(:focus-within)]:opacity-0"><svg class="icon" fill="currentColor" height="20" viewbox="0 0 20 20" width="20" xmlns="http://www.w3.org/2000/svg"><path d="M12.668 10.667C12.668 9.95614 12.668 9.46258 12.6367 9.0791C12.6137 8.79732 12.5758 8.60761 12.5244 8.46387L12.4688 8.33399C12.3148 8.03193 12.0803 7.77885 11.793 7.60254L11.666 7.53125C11.508 7.45087 11.2963 7.39395 10.9209 7.36328C10.5374 7.33197 10.0439 7.33203 9.33301 7.33203H6.5C5.78896 7.33203 5.29563 7.33195 4.91211 7.36328C4.63016 7.38632 4.44065 7.42413 4.29688 7.47559L4.16699 7.53125C3.86488 7.68518 3.61186 7.9196 3.43555 8.20703L3.36524 8.33399C3.28478 8.49198 3.22795 8.70352 3.19727 9.0791C3.16595 9.46259 3.16504 9.95611 3.16504 10.667V13.5C3.16504 14.211 3.16593 14.7044 3.19727 15.0879C3.22797 15.4636 3.28473 15.675 3.36524 15.833L3.43555 15.959C3.61186 16.2466 3.86474 16.4807 4.16699 16.6348L4.29688 16.6914C4.44063 16.7428 4.63025 16.7797 4.91211 16.8027C5.29563 16.8341 5.78896 16.835 6.5 16.835H9.33301C10.0439 16.835 10.5374 16.8341 10.9209 16.8027C11.2965 16.772 11.508 16.7152 11.666 16.6348L11.793 16.5645C12.0804 16.3881 12.3148 16.1351 12.4688 15.833L12.5244 15.7031C12.5759 15.5594 12.6137 15.3698 12.6367 15.0879C12.6681 14.7044 12.668 14.211 12.668 13.5V10.667ZM13.998 12.665C14.4528 12.6634 14.8011 12.6602 15.0879 12.6367C15.4635 12.606 15.675 12.5492 15.833 12.4688L15.959 12.3975C16.2466 12.2211 16.4808 11.9682 16.6348 11.666L16.6914 11.5361C16.7428 11.3924 16.7797 11.2026 16.8027 10.9209C16.8341 10.5374 16.835 10.0439 16.835 9.33301V6.5C16.835 5.78896 16.8341 5.29563 16.8027 4.91211C16.7797 4.63025 16.7428 4.44063 16.6914 4.29688L16.6348 4.16699C16.4807 3.86474 16.2466 3.61186 15.959 3.43555L15.833 3.36524C15.675 3.28473 15.4636 3.22797 15.0879 3.19727C14.7044 3.16593 14.211 3.16504 13.5 3.16504H10.667C9.9561 3.16504 9.46259 3.16595 9.0791 3.19727C8.79739 3.22028 8.6076 3.2572 8.46387 3.30859L8.33399 3.36524C8.03176 3.51923 7.77886 3.75343 7.60254 4.04102L7.53125 4.16699C7.4508 4.32498 7.39397 4.53655 7.36328 4.91211C7.33985 5.19893 7.33562 5.54719 7.33399 6.00195H9.33301C10.022 6.00195 10.5791 6.00131 11.0293 6.03809C11.4873 6.07551 11.8937 6.15471 12.2705 6.34668L12.4883 6.46875C12.984 6.7728 13.3878 7.20854 13.6533 7.72949L13.7197 7.87207C13.8642 8.20859 13.9292 8.56974 13.9619 8.9707C13.9987 9.42092 13.998 9.97799 13.998 10.667V12.665ZM18.165 9.33301C18.165 10.022 18.1657 10.5791 18.1289 11.0293C18.0961 11.4302 18.0311 11.7914 17.8867 12.1279L17.8203 12.2705C17.5549 12.7914 17.1509 13.2272 16.6553 13.5313L16.4365 13.6533C16.0599 13.8452 15.6541 13.9245 15.1963 13.9619C14.8593 13.9895 14.4624 13.9935 13.9951 13.9951C13.9935 14.4624 13.9895 14.8593 13.9619 15.1963C13.9292 15.597 13.864 15.9576 13.7197 16.2939L13.6533 16.4365C13.3878 16.9576 12.9841 17.3941 12.4883 17.6982L12.2705 17.8203C11.8937 18.0123 11.4873 18.0915 11.0293 18.1289C10.5791 18.1657 10.022 18.165 9.33301 18.165H6.5C5.81091 18.165 5.25395 18.1657 4.80371 18.1289C4.40306 18.0962 4.04235 18.031 3.70606 17.8867L3.56348 17.8203C3.04244 17.5548 2.60585 17.151 2.30176 16.6553L2.17969 16.4365C1.98788 16.0599 1.90851 15.6541 1.87109 15.1963C1.83431 14.746 1.83496 14.1891 1.83496 13.5V10.667C1.83496 9.978 1.83432 9.42091 1.87109 8.9707C1.90851 8.5127 1.98772 8.10625 2.17969 7.72949L2.30176 7.51172C2.60586 7.0159 3.04236 6.6122 3.56348 6.34668L3.70606 6.28027C4.04237 6.136 4.40303 6.07083 4.80371 6.03809C5.14051 6.01057 5.53708 6.00551 6.00391 6.00391C6.00551 5.53708 6.01057 5.14051 6.03809 4.80371C6.0755 4.34588 6.15483 3.94012 6.34668 3.56348L6.46875 3.34473C6.77282 2.84912 7.20856 2.44514 7.72949 2.17969L7.87207 2.11328C8.20855 1.96886 8.56979 1.90385 8.9707 1.87109C9.42091 1.83432 9.978 1.83496 10.667 1.83496H13.5C14.1891 1.83496 14.746 1.83431 15.1963 1.87109C15.6541 1.90851 16.0599 1.98788 16.4365 2.17969L16.6553 2.30176C17.151 2.60585 17.5548 3.04244 17.8203 3.56348L17.8867 3.70606C18.031 4.04235 18.0962 4.40306 18.1289 4.80371C18.1657 5.25395 18.165 5.81091 18.165 6.5V9.33301Z"></path></svg></button></span></div></div></div></div>---

## **Option 1: GitHub Audit Logs**

**Description:**  
Audit logs contain records of all administrative and security events within a GitHub organization.

### Requirements

- GitHub Enterprise Cloud
- You must be an organization owner
- Use a Personal Access Token (PAT) with `read:audit_log` scope

### What It Does

- Captures repository creation, permission changes, team updates, and more
- Helps detect suspicious or non-compliant behavior

### Setup Steps

1. **Create a PAT**
    
    
    - Go to GitHub → Developer Settings → Personal Access Tokens
    - Click "Generate new token"
    - Select `read:audit_log` scope
    - Save the token securely
2. **Configure Integration in Elastic**
    
    
    - Navigate to Integrations in Kibana
    - Search for "GitHub" and click "Add GitHub integration"
    - Select the "Audit Logs" data stream
    - Enter your organization name and paste your PAT
3. **Test and Deploy**
    
    
    - Click "Test integration" to verify connectivity
    - Choose a data stream name and index settings
    - Click "Save and Deploy"
4. **Verify in Kibana**
    
    
    - Navigate to Discover
    - Use the index pattern `logs-github.audit-*`
    - Filter using fields such as `actor`, `action`, or `created_at`

---

## **Option 2: Code Scanning Alerts**

**Description:**  
Collect static code analysis results from GitHub Advanced Security Code Scanning.

### Requirements

- Code Scanning must be enabled per repository
- Use either:
    
    
    - GitHub App with `security_events` read permission
    - PAT with:
        
        
        - `security_events` (for private repositories)
        - `public_repo` (for public repositories)

### What It Does

- Ingests vulnerabilities and insecure code patterns
- Supports SARIF format scan results

### Setup Steps

1. **Enable Code Scanning in GitHub**
    
    
    - Go to your repository → Security → Code scanning alerts
    - Enable GitHub Advanced Security
    - Configure workflows such as CodeQL
2. **Generate PAT or GitHub App**
    
    
    - If using a PAT, ensure it includes `security_events` or `public_repo` scope
3. **Configure Integration in Elastic**
    
    
    - Open Integrations in Kibana
    - Add GitHub integration and select "Code Scanning"
    - Input organization name and credentials
4. **Test and Configure**
    
    
    - Test the integration
    - Set polling frequency (e.g., every 5 minutes)
    - Save and deploy
5. **Monitor in Kibana**
    
    
    - Use Discover with the index pattern `logs-github.code_scanning-*`
    - Filter by fields such as `severity`, `rule_id`, or `repository.name`

---

## **Option 3: Secret Scanning Alerts**

**Description:**  
Detect and alert on exposed secrets in source code repositories.

### Requirements

- Secret Scanning must be enabled in repository settings
- You must be a repository or organization administrator
- Use either:
    
    
    - GitHub App with `secret_scanning_alerts` read permission
    - PAT with:
        
        
        - `repo` or `security_events` (for private repos)
        - `public_repo` (for public repos)

### What It Does

- Flags exposed API keys, tokens, and credentials
- Helps prevent credential leaks

### Setup Steps

1. **Enable Secret Scanning**
    
    
    - Go to GitHub repo → Settings → Code Security and Analysis
    - Enable "Secret scanning alerts"
2. **Generate Access**
    
    
    - Create a PAT with appropriate scopes
    - Or set up a GitHub App with necessary permissions
3. **Configure in Elastic**
    
    
    - Go to the GitHub integration in Kibana
    - Enable the "Secret Scanning" stream
    - Provide token and repository/org details
4. **Test and Save**
    
    
    - Test the connection
    - Select desired polling interval (e.g., 10 minutes)
    - Save and deploy
5. **Analyze Alerts**
    
    
    - Open Discover and use `logs-github.secret_scanning-*`
    - Use filters such as `alert_type`, `secret_type`, and `state`

---

## **Option 4: Dependabot Alerts**

**Description:**  
Monitor dependency vulnerabilities in GitHub repositories using Dependabot.

### Requirements

- Dependabot must be enabled in repository settings
- You must be a repository or organization administrator
- Use either:
    
    
    - GitHub App
    - PAT with:
        
        
        - `repo`, `security_events`, or `public_repo` scope

### What It Does

- Identifies and alerts on known insecure packages
- Includes CVE metadata and suggested fixes

### Setup Steps

1. **Enable Dependabot in GitHub**
    
    
    - Go to Repository → Settings → Code Security and Analysis
    - Enable "Dependency Graph" and "Dependabot alerts"
2. **Generate GitHub App or PAT**
    
    
    - Ensure scopes include `repo`, `security_events`, or `public_repo`
3. **Configure in Elastic**
    
    
    - Go to GitHub integration
    - Enable "Dependabot"
    - Enter org/repo and credentials
4. **Test and Deploy**
    
    
    - Test the integration
    - Select polling interval
    - Save settings
5. **Monitor in Kibana**
    
    
    - Use Discover → `logs-github.dependabot-*`
    - Filter by `dependency_name`, `ecosystem`, `severity`, etc.

---

## **Option 5: Issues &amp; Pull Requests**

**Description:**  
Ingest GitHub issues, pull requests, comments, labels, milestones, and other metadata.

### Requirements

- Use a GitHub App or PAT with:
    
    
    - `repo` (for private repositories)
    - `public_repo` (for public repositories)
    - Optional: `read:org` for org-wide access

### What It Does

- Collects all issue and PR activity
- Enables filtering of pull requests with `github.issues.is_pr = true`

### Setup Steps

1. **Create or Use PAT / GitHub App**
    
    
    - Ensure appropriate access to repositories
2. **Enable GitHub Integration in Elastic**
    
    
    - Choose "Issues" as the data stream
    - Enter credentials and repository/organization name
3. **Customize Settings**
    
    
    - Set state filter (e.g., `state=open` for open issues only)
    - Configure sync interval
4. **Test and Activate**
    
    
    - Verify GitHub API connectivity
    - Deploy integration
5. **View Data in Kibana**
    
    
    - Go to Discover → `logs-github.issues-*`
    - Use filters such as `assignees`, `labels`, `state`, or `is_pr`

---

## **Comparison Table**

<div class="_tableContainer_16hzy_1" id="bkmrk-feature-github-app-p"><div class="_tableWrapper_16hzy_14 group flex w-fit flex-col-reverse" tabindex="-1"><table class="w-fit min-w-(--thread-content-width)" data-end="8289" data-start="7307"><thead data-end="7445" data-start="7307"><tr data-end="7445" data-start="7307"><th data-col-size="sm" data-end="7327" data-start="7307">Feature</th><th data-col-size="sm" data-end="7340" data-start="7327">GitHub App</th><th data-col-size="sm" data-end="7370" data-start="7340">PAT Support</th><th data-col-size="sm" data-end="7413" data-start="7370">Required Scopes</th><th data-col-size="sm" data-end="7428" data-start="7413">Public Repos</th><th data-col-size="sm" data-end="7445" data-start="7428">Private Repos</th></tr></thead><tbody data-end="8289" data-start="7585"><tr data-end="7725" data-start="7585"><td data-col-size="sm" data-end="7605" data-start="7585">Audit Logs</td><td data-col-size="sm" data-end="7618" data-start="7605">No</td><td data-col-size="sm" data-end="7648" data-start="7618">Yes</td><td data-col-size="sm" data-end="7691" data-start="7648">`read:audit_log`</td><td data-col-size="sm" data-end="7706" data-start="7691">No</td><td data-col-size="sm" data-end="7725" data-start="7706">Yes</td></tr><tr data-end="7866" data-start="7726"><td data-col-size="sm" data-end="7746" data-start="7726">Code Scanning</td><td data-col-size="sm" data-end="7759" data-start="7746">Yes</td><td data-col-size="sm" data-end="7789" data-start="7759">Yes</td><td data-col-size="sm" data-end="7832" data-start="7789">`security_events`, `public_repo`</td><td data-col-size="sm" data-end="7847" data-start="7832">Yes</td><td data-col-size="sm" data-end="7866" data-start="7847">Yes</td></tr><tr data-end="8007" data-start="7867"><td data-col-size="sm" data-end="7887" data-start="7867">Secret Scanning</td><td data-col-size="sm" data-end="7900" data-start="7887">Yes</td><td data-col-size="sm" data-end="7930" data-start="7900">Yes</td><td data-col-size="sm" data-end="7973" data-start="7930">`repo`, `security_events`, `public_repo`</td><td data-col-size="sm" data-end="7988" data-start="7973">Yes</td><td data-col-size="sm" data-end="8007" data-start="7988">Yes</td></tr><tr data-end="8148" data-start="8008"><td data-col-size="sm" data-end="8028" data-start="8008">Dependabot Alerts</td><td data-col-size="sm" data-end="8041" data-start="8028">Yes</td><td data-col-size="sm" data-end="8071" data-start="8041">Yes</td><td data-col-size="sm" data-end="8114" data-start="8071">`repo`, `security_events`, `public_repo`</td><td data-col-size="sm" data-end="8129" data-start="8114">Yes</td><td data-col-size="sm" data-end="8148" data-start="8129">Yes</td></tr><tr data-end="8289" data-start="8149"><td data-col-size="sm" data-end="8169" data-start="8149">Issues &amp; PRs</td><td data-col-size="sm" data-end="8182" data-start="8169">Yes</td><td data-col-size="sm" data-end="8212" data-start="8182">Yes</td><td data-col-size="sm" data-end="8255" data-start="8212">`repo`, `public_repo`, `read:org`</td><td data-col-size="sm" data-end="8270" data-start="8255">Yes</td><td data-col-size="sm" data-end="8289" data-start="8270">Yes</td></tr></tbody></table>

<div class="sticky end-(--thread-content-margin) h-0 self-end select-none"><div class="absolute end-0 flex items-end"><span class="" data-state="closed"><button class="bg-token-bg-primary hover:bg-token-bg-tertiary text-token-text-secondary my-1 rounded-sm p-1 transition-opacity group-[:not(:hover):not(:focus-within)]:pointer-events-none group-[:not(:hover):not(:focus-within)]:opacity-0"><svg class="icon" fill="currentColor" height="20" viewbox="0 0 20 20" width="20" xmlns="http://www.w3.org/2000/svg"><path d="M12.668 10.667C12.668 9.95614 12.668 9.46258 12.6367 9.0791C12.6137 8.79732 12.5758 8.60761 12.5244 8.46387L12.4688 8.33399C12.3148 8.03193 12.0803 7.77885 11.793 7.60254L11.666 7.53125C11.508 7.45087 11.2963 7.39395 10.9209 7.36328C10.5374 7.33197 10.0439 7.33203 9.33301 7.33203H6.5C5.78896 7.33203 5.29563 7.33195 4.91211 7.36328C4.63016 7.38632 4.44065 7.42413 4.29688 7.47559L4.16699 7.53125C3.86488 7.68518 3.61186 7.9196 3.43555 8.20703L3.36524 8.33399C3.28478 8.49198 3.22795 8.70352 3.19727 9.0791C3.16595 9.46259 3.16504 9.95611 3.16504 10.667V13.5C3.16504 14.211 3.16593 14.7044 3.19727 15.0879C3.22797 15.4636 3.28473 15.675 3.36524 15.833L3.43555 15.959C3.61186 16.2466 3.86474 16.4807 4.16699 16.6348L4.29688 16.6914C4.44063 16.7428 4.63025 16.7797 4.91211 16.8027C5.29563 16.8341 5.78896 16.835 6.5 16.835H9.33301C10.0439 16.835 10.5374 16.8341 10.9209 16.8027C11.2965 16.772 11.508 16.7152 11.666 16.6348L11.793 16.5645C12.0804 16.3881 12.3148 16.1351 12.4688 15.833L12.5244 15.7031C12.5759 15.5594 12.6137 15.3698 12.6367 15.0879C12.6681 14.7044 12.668 14.211 12.668 13.5V10.667ZM13.998 12.665C14.4528 12.6634 14.8011 12.6602 15.0879 12.6367C15.4635 12.606 15.675 12.5492 15.833 12.4688L15.959 12.3975C16.2466 12.2211 16.4808 11.9682 16.6348 11.666L16.6914 11.5361C16.7428 11.3924 16.7797 11.2026 16.8027 10.9209C16.8341 10.5374 16.835 10.0439 16.835 9.33301V6.5C16.835 5.78896 16.8341 5.29563 16.8027 4.91211C16.7797 4.63025 16.7428 4.44063 16.6914 4.29688L16.6348 4.16699C16.4807 3.86474 16.2466 3.61186 15.959 3.43555L15.833 3.36524C15.675 3.28473 15.4636 3.22797 15.0879 3.19727C14.7044 3.16593 14.211 3.16504 13.5 3.16504H10.667C9.9561 3.16504 9.46259 3.16595 9.0791 3.19727C8.79739 3.22028 8.6076 3.2572 8.46387 3.30859L8.33399 3.36524C8.03176 3.51923 7.77886 3.75343 7.60254 4.04102L7.53125 4.16699C7.4508 4.32498 7.39397 4.53655 7.36328 4.91211C7.33985 5.19893 7.33562 5.54719 7.33399 6.00195H9.33301C10.022 6.00195 10.5791 6.00131 11.0293 6.03809C11.4873 6.07551 11.8937 6.15471 12.2705 6.34668L12.4883 6.46875C12.984 6.7728 13.3878 7.20854 13.6533 7.72949L13.7197 7.87207C13.8642 8.20859 13.9292 8.56974 13.9619 8.9707C13.9987 9.42092 13.998 9.97799 13.998 10.667V12.665ZM18.165 9.33301C18.165 10.022 18.1657 10.5791 18.1289 11.0293C18.0961 11.4302 18.0311 11.7914 17.8867 12.1279L17.8203 12.2705C17.5549 12.7914 17.1509 13.2272 16.6553 13.5313L16.4365 13.6533C16.0599 13.8452 15.6541 13.9245 15.1963 13.9619C14.8593 13.9895 14.4624 13.9935 13.9951 13.9951C13.9935 14.4624 13.9895 14.8593 13.9619 15.1963C13.9292 15.597 13.864 15.9576 13.7197 16.2939L13.6533 16.4365C13.3878 16.9576 12.9841 17.3941 12.4883 17.6982L12.2705 17.8203C11.8937 18.0123 11.4873 18.0915 11.0293 18.1289C10.5791 18.1657 10.022 18.165 9.33301 18.165H6.5C5.81091 18.165 5.25395 18.1657 4.80371 18.1289C4.40306 18.0962 4.04235 18.031 3.70606 17.8867L3.56348 17.8203C3.04244 17.5548 2.60585 17.151 2.30176 16.6553L2.17969 16.4365C1.98788 16.0599 1.90851 15.6541 1.87109 15.1963C1.83431 14.746 1.83496 14.1891 1.83496 13.5V10.667C1.83496 9.978 1.83432 9.42091 1.87109 8.9707C1.90851 8.5127 1.98772 8.10625 2.17969 7.72949L2.30176 7.51172C2.60586 7.0159 3.04236 6.6122 3.56348 6.34668L3.70606 6.28027C4.04237 6.136 4.40303 6.07083 4.80371 6.03809C5.14051 6.01057 5.53708 6.00551 6.00391 6.00391C6.00551 5.53708 6.01057 5.14051 6.03809 4.80371C6.0755 4.34588 6.15483 3.94012 6.34668 3.56348L6.46875 3.34473C6.77282 2.84912 7.20856 2.44514 7.72949 2.17969L7.87207 2.11328C8.20855 1.96886 8.56979 1.90385 8.9707 1.87109C9.42091 1.83432 9.978 1.83496 10.667 1.83496H13.5C14.1891 1.83496 14.746 1.83431 15.1963 1.87109C15.6541 1.90851 16.0599 1.98788 16.4365 2.17969L16.6553 2.30176C17.151 2.60585 17.5548 3.04244 17.8203 3.56348L17.8867 3.70606C18.031 4.04235 18.0962 4.40306 18.1289 4.80371C18.1657 5.25395 18.165 5.81091 18.165 6.5V9.33301Z"></path></svg></button></span></div></div></div></div>---

## **Documentation References**

- Elastic GitHub Integration: [Cytech Docs](https://docs.cytechint.io/link/294#bkmrk-to-use-this-integrat-4)
- GitHub Official Docs:
    
    
    - [Audit Logs](https://docs.github.com/en/enterprise-cloud@latest/admin/monitoring-activity-in-your-enterprise/auditing-audit-log)
    - [Code Scanning](https://docs.github.com/en/code-security/code-scanning)
    - [Secret Scanning](https://docs.github.com/en/code-security/secret-scanning)
    - [Dependabot](https://docs.github.com/en/code-security/supply-chain-security)
    - [Issues API](https://docs.github.com/en/rest/issues/issues)