Movatterモバイル変換


[0]ホーム

URL:


Loading
  1. Elastic Docs/
  2. Reference/
  3. Ingestion tools/
  4. Elastic integrations

GitHub Integration

Version2.21.1 (View all)
Subscription level
What's this?
Basic
Developed by
What's this?
Elastic
Ingestion method(s)API, AWS S3, Azure Blob Storage, Azure Event Hub, Google Cloud Storage
Minimum Kibana version(s)9.1.4
9.0.7
8.19.4

The GitHub integration collects events from theGitHub API and Azure Eventhub. It can also retrieve global advisories (reviewed or unreviewed) from the GitHub Security Advisories database.

To use this integration, the following prerequisites must be met:

For GitHub Enterprise Cloud:

  • You must be an enterprise owner.
  • Your enterprise account must be on a GitHub Enterprise Cloud plan that includes audit log access.

For GitHub Enterprise Server:

  • You need to be a site administrator to access the audit log for the entire instance.
  • The audit log is part of the server deployment. Ensure audit logging is enabled in the server configuration.

For Organizations:

  • You must be an organization owner.
  • You must be using GitHub Enterprise Cloud.
  • The organization must be part of an enterprise plan that includes audit log functionality.

The GitHub audit log records all events related to the GitHub organization/enterprise. SeeOrganization audit log actions andEnterprise audit log actions for more details.

The GitHub integration can collect audit logs from the following sources:GitHub API,Azure Event Hubs,Azure Blob Storage,AWS S3 or AWS SQS andGoogle Cloud Storage.

When using GitHub API to collect audit log events, below requirements must be met for Personal Access Token (PAT):

  • You must use a Personal Access Token withread:audit_log scope. This applies to both organization and enterprise admins.
  • If you're an enterprise admin, ensure your token also includesadmin:enterprise scope to access enterprise-wide logs.

To collect audit log events from Azure Event Hubs, follow theguide to setup audit log streaming.To collect audit log events from Azure Blob Storage, follow theguide to setup audit log streaming.To collect audit log events from AWS S3 or AWS SQS, follow theguide to setup audit log streaming. For more details, refer to thisdocumentation.To collect audit log events from Google Cloud Storage, follow theguide to setup audit log streaming.

For Filebeat input documentation, refer to the following pages:

This integration is not compatible with GitHub Enterprise server.

Exported fields
FieldDescriptionType
@timestampEvent timestamp.date
aws.s3.bucket.arnThe AWS S3 bucket ARN.keyword
aws.s3.bucket.nameThe AWS S3 bucket name.keyword
aws.s3.object.keyThe AWS S3 Object key.keyword
azure.storage.blob.content_typeThe content type of the Azure Blob Storage blob objectkeyword
azure.storage.blob.nameThe name of the Azure Blob Storage blob objectkeyword
azure.storage.container.nameThe name of the Azure Blob Storage containerkeyword
data_stream.datasetData stream dataset name.constant_keyword
data_stream.namespaceData stream namespace.constant_keyword
data_stream.typeData stream type.constant_keyword
event.datasetEvent datasetconstant_keyword
event.moduleEvent moduleconstant_keyword
gcs.storage.bucket.nameThe name of the Google Cloud Storage Bucket.keyword
gcs.storage.object.content_typeThe content type of the Google Cloud Storage object.keyword
gcs.storage.object.nameThe content type of the Google Cloud Storage object.keyword
github.activeboolean
github.actor_idThe id of the actor who performed the action.keyword
github.actor_ipThe IP address of the entity performing the action.ip
github.actor_is_botboolean
github.actor_location.country_namekeyword
github.actor_location.ipip
github.audit_log_stream_enabledboolean
github.audit_log_stream_idkeyword
github.audit_log_stream_sinkkeyword
github.audit_log_stream_sink_detailskeyword
github.blocked_userThe username of the account being blocked.keyword
github.businesskeyword
github.business_idkeyword
github.categoryGitHub action category.keyword
github.changes.billing_plankeyword
github.changes.roleskeyword
github.commit_idkeyword
github.data.eventkeyword
github.data.head_branchkeyword
github.data.head_shakeyword
github.data.started_atdate
github.data.trigger_idkeyword
github.data.workflow_idkeyword
github.data.workflow_run_idkeyword
github.devicekeyword
github.eventskeyword
github.events_objectobject
github.forked_repositorykeyword
github.hashed_tokenSHA-256 hash of the token used for authentication.keyword
github.hook_idkeyword
github.integrationThe GitHub App that triggered the event.keyword
github.login_methodkeyword
github.logout_reasonkeyword
github.messagekeyword
github.multi_repoboolean
github.namekeyword
github.new_rolekeyword
github.numberlong
github.old_rolekeyword
github.operation_typekeyword
github.orgGitHub organization name.keyword
github.org_idkeyword
github.permissionGitHub user permissions for the event.keyword
github.programmatic_access_typeType of authentication used.keyword
github.public_repoboolean
github.publicly_leakedboolean
github.pull_request_idkeyword
github.pull_request_titlekeyword
github.pull_request_urlkeyword
github.reasonkeyword
github.repoGitHub repository name.keyword
github.repo_idkeyword
github.repositories_addedkeyword
github.repositories_added_namesThe name of the repository added to a GitHub App installation.keyword
github.repositories_removedkeyword
github.repositories_removed_namesThe name of the repository removed from a GitHub App installation.keyword
github.repositoryThe name of the repository.keyword
github.repository_publicWhether the GitHub repository is publicly visible.boolean
github.repository_selectionWhether all repositories have been selected or there's a selection involved.keyword
github.request_categorykeyword
github.secret_typekeyword
github.secret_type_display_namekeyword
github.secrets_updatedkeyword
github.source_branchkeyword
github.target_branchkeyword
github.teamGitHub team name.keyword
github.token_idkeyword
github.token_scopeskeyword
github.topickeyword
github.transport_protocolThe type of protocol (for example, HTTP or SSH) used to transfer Git data.long
github.transport_protocol_nameA human readable name for the protocol (for example, HTTP or SSH) used to transfer Git data.keyword
github.user_agentThe user agent of the entity performing the action.keyword
github.user_idkeyword
github.versionkeyword
github.visibilityThe repository visibility, for examplepublic orprivate.keyword
host.containerizedIf the host is a container.boolean
host.os.buildOS build information.keyword
host.os.codenameOS codename, if any.keyword
input.typeType of Filebeat input.keyword
log.offsetLog offset.long
Example
{    "@timestamp": "2020-11-18T17:05:48.837Z",    "agent": {        "ephemeral_id": "c09b35c2-fdcc-49ac-8a3a-6115c04e0ecc",        "id": "28342e9d-df80-4a76-b0ec-5d8aab2b7adc",        "name": "elastic-agent-20025",        "type": "filebeat",        "version": "8.19.4"    },    "data_stream": {        "dataset": "github.audit",        "namespace": "96282",        "type": "logs"    },    "ecs": {        "version": "8.11.0"    },    "elastic_agent": {        "id": "28342e9d-df80-4a76-b0ec-5d8aab2b7adc",        "snapshot": false,        "version": "8.19.4"    },    "event": {        "action": "repo.destroy",        "agent_id_status": "verified",        "category": [            "configuration",            "web"        ],        "created": "2025-11-24T10:06:23.406Z",        "dataset": "github.audit",        "id": "LwW2vpJZCDS-WUmo9Z-ifw",        "ingested": "2025-11-24T10:06:24Z",        "kind": "event",        "original": "{\"@timestamp\":1605719148837,\"_document_id\":\"LwW2vpJZCDS-WUmo9Z-ifw\",\"action\":\"repo.destroy\",\"actor\":\"monalisa\",\"created_at\":1605719148837,\"org\":\"mona-org\",\"repo\":\"mona-org/mona-test-repo\",\"visibility\":\"private\"}",        "type": [            "change"        ]    },    "github": {        "category": "repo",        "org": "mona-org",        "repo": "mona-org/mona-test-repo",        "visibility": "private"    },    "input": {        "type": "httpjson"    },    "related": {        "user": [            "monalisa"        ]    },    "tags": [        "forwarded",        "github-audit",        "preserve_original_event"    ],    "user": {        "name": "monalisa"    }}

The Code Scanning lets you retrieve all security vulnerabilities and coding errors from a repository setup using GitHub Advanced Security Code Scanning feature. Refer toAbout code scanning for more details.

To use this integration, GitHub Apps must have thesecurity_events read permission.Or use a personal access token with thesecurity_events scope for private repos orpublic_repo scope for public repos. Refer toList code scanning alerts.

Exported fields
FieldDescriptionTypeUnitMetric Type
@timestampDate/time when the event originated. This is the date/time extracted from the event, typically representing when the event was generated by the source. If the event source has no original timestamp, this value is typically populated by the first time the event was received by the pipeline. Required field for all events.date
data_stream.datasetThe field can contain anything that makes sense to signify the source of the data. Examples includenginx.access,prometheus,endpoint etc. For data streams that otherwise fit, but that do not have dataset set we use the value "generic" for the dataset value.event.dataset should have the same value asdata_stream.dataset. Beyond the Elasticsearch data stream naming criteria noted above, thedataset value has additional restrictions: * Must not contain- * No longer than 100 charactersconstant_keyword
data_stream.namespaceA user defined namespace. Namespaces are useful to allow grouping of data. Many users already organize their indices this way, and the data stream naming scheme now provides this best practice as a default. Many users will populate this field withdefault. If no value is used, it falls back todefault. Beyond the Elasticsearch index naming criteria noted above,namespace value has the additional restrictions: * Must not contain- * No longer than 100 charactersconstant_keyword
data_stream.typeAn overarching type for the data stream. Currently allowed values are "logs" and "metrics". We expect to also add "traces" and "synthetics" in the near future.constant_keyword
event.datasetName of the dataset. If an event source publishes more than one type of log or events (e.g. access log, error log), the dataset is used to specify which one the event comes from. It's recommended but not required to start the dataset name with the module name, followed by a dot, then the dataset name.constant_keyword
event.kindconstant_keyword
event.moduleName of the module this data is coming from. If your monitoring agent supports the concept of modules or plugins to process events of a given source (e.g. Apache logs),event.module should contain the name of this module.constant_keyword
github.code_scanning.created_atThe time that the alert was created in ISO 8601 format -YYYY-MM-DDTHH:MM:SSZ.date
github.code_scanning.dismissed_atThe time that the alert was dismissed in ISO 8601 format -YYYY-MM-DDTHH:MM:SSZ.date
github.code_scanning.dismissed_by.emailkeyword
github.code_scanning.dismissed_by.html_urlkeyword
github.code_scanning.dismissed_by.idinteger
github.code_scanning.dismissed_by.loginkeyword
github.code_scanning.dismissed_by.namekeyword
github.code_scanning.dismissed_by.site_adminboolean
github.code_scanning.dismissed_by.typekeyword
github.code_scanning.dismissed_by.urlkeyword
github.code_scanning.dismissed_commentThe dismissal comment associated with the dismissal of the alert.keyword
github.code_scanning.dismissed_reasonThe reason for dismissing or closing the alert.keyword
github.code_scanning.fixed_atThe time that the alert was no longer detected and was considered fixed in ISO 8601 format -YYYY-MM-DDTHH:MM:SSZ.date
github.code_scanning.html_urlThe GitHub URL of the alert resource.keyword
github.code_scanning.instances_urlThe REST API URL for fetching the list of instances for an alert.keyword
github.code_scanning.most_recent_instance.analysis_keyIdentifies the configuration under which the analysis was executed. For example, in GitHub Actions this includes the workflow filename and job name.keyword
github.code_scanning.most_recent_instance.categoryIdentifies the configuration under which the analysis was executed. Used to distinguish between multiple analyses for the same tool and commit, but performed on different languages or different parts of the code.keyword
github.code_scanning.most_recent_instance.classificationsClassifications that have been applied to the file that triggered the alert.\nFor example identifying it as documentation, or a generated file.keyword
github.code_scanning.most_recent_instance.commit_shaGitHub commit sha.keyword
github.code_scanning.most_recent_instance.environmentIdentifies the variable values associated with the environment in which the analysis that generated this alert instance was performed, such as the language that was analyzed.keyword
github.code_scanning.most_recent_instance.html_urlkeyword
github.code_scanning.most_recent_instance.location.end_columninteger
github.code_scanning.most_recent_instance.location.end_lineinteger
github.code_scanning.most_recent_instance.location.pathkeyword
github.code_scanning.most_recent_instance.location.start_columninteger
github.code_scanning.most_recent_instance.location.start_lineinteger
github.code_scanning.most_recent_instance.refThe full Git reference, formatted asrefs/heads/\<branch name\>,\nrefs/pull/\<number\>/merge, orrefs/pull/\<number\>/head.keyword
github.code_scanning.most_recent_instance.stateState of a code scanning alert.keyword
github.code_scanning.numberThe security alert number.integer
github.code_scanning.rule.full_descriptionDescription of the rule used to detect the alert.text
github.code_scanning.rule.helpDetailed documentation for the rule as GitHub Flavored Markdown.text
github.code_scanning.rule.security_severity_levelThe security severity of the alert.keyword
github.code_scanning.rule.severityThe severity of the alert.keyword
github.code_scanning.stateState of a code scanning alert.keyword
github.code_scanning.time_to_resolution.secThe time taken to either dismiss or fix the alert in seconds.longsgauge
github.code_scanning.tool.guidThe GUID of the tool used to generate the code scanning analysis, if provided in the uploaded SARIF data.keyword
github.code_scanning.tool.nameThe name of the tool used to generate the code scanning analysis.keyword
github.code_scanning.tool.versionThe version of the tool used to generate the code scanning analysis.keyword
github.code_scanning.updated_atThe time that the alert was last updated in ISO 8601 format -YYYY-MM-DDTHH:MM:SSZ.date
github.code_scanning.urlThe REST API URL of the alert resource.keyword
github.repository.descriptionThe repository description.text
github.repository.forkWhether the repository is a fork.boolean
github.repository.full_nameThe full, globally unique, name of the repository.keyword
github.repository.html_urlThe URL to view the repository on GitHub.com.keyword
github.repository.idA unique identifier of the repository.integer
github.repository.is_in_organizationIndicates if a repository is either owned by an organization, or is a private fork of an organization repository.boolean
github.repository.nameThe name of the repository.keyword
github.repository.owner.emailThe public email of repository owner.keyword
github.repository.owner.html_urlThe HTTP URL for the repository owner.keyword
github.repository.owner.idID of the repository owner.integer
github.repository.owner.loginLogin username of repository owner.keyword
github.repository.owner.nameName of repository owner.keyword
github.repository.owner.site_adminWhether the owner is a site administrator.boolean
github.repository.owner.typeThe type of the repository owner. Example - User.keyword
github.repository.owner.urlThe URL to get more information about the repository owner from the GitHub API.keyword
github.repository.privateWhether the repository is private.boolean
github.repository.urlThe URL to get more information about the repository from the GitHub API.keyword
host.containerizedIf the host is a container.boolean
host.os.buildOS build information.keyword
host.os.codenameOS codename, if any.keyword
input.typeInput Type.keyword
labels.is_transform_sourceDistinguishes between documents that are a source for a transform and documents that are an output of a transform, to facilitate easier filtering.constant_keyword
log.offsetLog Offset.long
Example
{    "@timestamp": "2022-06-29T18:03:27.000Z",    "agent": {        "ephemeral_id": "a8d5c536-dff6-4072-9594-3833ba1eb159",        "id": "dfc3f7de-e5e1-4502-a207-fc0596cae3aa",        "name": "elastic-agent-29299",        "type": "filebeat",        "version": "8.19.4"    },    "data_stream": {        "dataset": "github.code_scanning",        "namespace": "52388",        "type": "logs"    },    "ecs": {        "version": "8.11.0"    },    "elastic_agent": {        "id": "dfc3f7de-e5e1-4502-a207-fc0596cae3aa",        "snapshot": false,        "version": "8.19.4"    },    "event": {        "agent_id_status": "verified",        "created": "2022-06-29T18:03:27.000Z",        "dataset": "github.code_scanning",        "ingested": "2025-11-24T10:02:53Z",        "original": "{\"created_at\":\"2022-06-29T18:03:27Z\",\"html_url\":\"https://github.com/sample_owner/sample_repo/security/code-scanning/91\",\"most_recent_instance\":{\"analysis_key\":\".github/workflows/codeql-analysis.yml:analyze\",\"category\":\".github/workflows/codeql-analysis.yml:analyze/language:javascript\",\"classifications\":[],\"commit_sha\":\"3244e8b15cc1b8f2732eecd69fc1890b737f0dda\",\"location\":{\"end_column\":50,\"end_line\":67,\"path\":\"routes/chatbot.ts\",\"start_column\":23,\"start_line\":67},\"message\":{\"text\":\"(Experimental) This may be a database query that depends on a user-provided value. Identified using machine learning.(Experimental) This may be a database query that depends on a user-provided value. Identified using machine learning.\"},\"ref\":\"refs/heads/master\",\"state\":\"open\"},\"number\":90,\"rule\":{\"description\":\"SQL database query built from user-controlled sources (experimental)\",\"id\":\"js/ml-powered/sql-injection\",\"security_severity_level\":\"high\",\"severity\":\"error\",\"tags\":[\"experimental\",\"external/cwe/cwe-089\",\"security\"]},\"state\":\"open\",\"tool\":{\"name\":\"CodeQL\",\"version\":\"2.9.4\"},\"updated_at\":\"2022-06-29T18:03:27Z\",\"url\":\"https://api.github.com/repos/sample_owner/sample_repo/code-scanning/alerts/91\"}",        "type": [            "creation"        ]    },    "github": {        "code_scanning": {            "created_at": "2022-06-29T18:03:27Z",            "html_url": "https://github.com/sample_owner/sample_repo/security/code-scanning/91",            "most_recent_instance": {                "analysis_key": ".github/workflows/codeql-analysis.yml:analyze",                "category": ".github/workflows/codeql-analysis.yml:analyze/language:javascript",                "commit_sha": "3244e8b15cc1b8f2732eecd69fc1890b737f0dda",                "location": {                    "end_column": 50,                    "end_line": 67,                    "path": "routes/chatbot.ts",                    "start_column": 23,                    "start_line": 67                },                "ref": "refs/heads/master",                "state": "open"            },            "number": 90,            "rule": {                "security_severity_level": "high",                "severity": "error"            },            "state": "open",            "tool": {                "name": "CodeQL",                "version": "2.9.4"            },            "updated_at": "2022-06-29T18:03:27Z",            "url": "https://api.github.com/repos/sample_owner/sample_repo/code-scanning/alerts/91"        },        "repository": {            "html_url": "https://github.com/sample_owner/sample_repo",            "name": "sample_repo",            "owner": {                "login": "sample_owner"            },            "url": "https://api.github.com/repos/sample_owner/sample_repo"        }    },    "input": {        "type": "httpjson"    },    "message": "(Experimental) This may be a database query that depends on a user-provided value. Identified using machine learning.(Experimental) This may be a database query that depends on a user-provided value. Identified using machine learning.",    "rule": {        "description": "SQL database query built from user-controlled sources (experimental)",        "id": "js/ml-powered/sql-injection"    },    "tags": [        "forwarded",        "github-code-scanning",        "preserve_original_event",        "experimental",        "external/cwe/cwe-089",        "security"    ]}

The GitHub Secret Scanning lets you retrieve secret scanning for advanced security alerts from a repository setup using GitHub Advanced Security Secret Scanning feature. Refer toAbout Secret scanning for more details.

To use this integration, GitHub Apps must have thesecret_scanning_alerts read permission.Or you must be an administrator for the repository or for the organization that owns the repository, and you must use a personal access token with therepo scope orsecurity_events scope. For public repositories, you may instead use thepublic_repo scope. Refer toList secret scanning alerts

Exported fields
FieldDescriptionTypeUnitMetric Type
@timestampDate/time when the event originated. This is the date/time extracted from the event, typically representing when the event was generated by the source. If the event source has no original timestamp, this value is typically populated by the first time the event was received by the pipeline. Required field for all events.date
data_stream.datasetThe field can contain anything that makes sense to signify the source of the data. Examples includenginx.access,prometheus,endpoint etc. For data streams that otherwise fit, but that do not have dataset set we use the value "generic" for the dataset value.event.dataset should have the same value asdata_stream.dataset. Beyond the Elasticsearch data stream naming criteria noted above, thedataset value has additional restrictions: * Must not contain- * No longer than 100 charactersconstant_keyword
data_stream.namespaceA user defined namespace. Namespaces are useful to allow grouping of data. Many users already organize their indices this way, and the data stream naming scheme now provides this best practice as a default. Many users will populate this field withdefault. If no value is used, it falls back todefault. Beyond the Elasticsearch index naming criteria noted above,namespace value has the additional restrictions: * Must not contain- * No longer than 100 charactersconstant_keyword
data_stream.typeAn overarching type for the data stream. Currently allowed values are "logs" and "metrics". We expect to also add "traces" and "synthetics" in the near future.constant_keyword
event.datasetName of the dataset. If an event source publishes more than one type of log or events (e.g. access log, error log), the dataset is used to specify which one the event comes from. It's recommended but not required to start the dataset name with the module name, followed by a dot, then the dataset name.constant_keyword
event.kindconstant_keyword
event.moduleName of the module this data is coming from. If your monitoring agent supports the concept of modules or plugins to process events of a given source (e.g. Apache logs),event.module should contain the name of this module.constant_keyword
github.repository.descriptionThe repository description.text
github.repository.forkWhether the repository is a fork.boolean
github.repository.full_nameThe full, globally unique, name of the repository.keyword
github.repository.html_urlThe URL to view the repository on GitHub.com.keyword
github.repository.idA unique identifier of the repository.integer
github.repository.is_in_organizationIndicates if a repository is either owned by an organization, or is a private fork of an organization repository.boolean
github.repository.nameThe name of the repository.keyword
github.repository.owner.emailThe public email of repository owner.keyword
github.repository.owner.html_urlThe HTTP URL for the repository owner.keyword
github.repository.owner.idID of the repository owner.integer
github.repository.owner.loginLogin username of repository owner.keyword
github.repository.owner.nameName of repository owner.keyword
github.repository.owner.site_adminWhether the owner is a site administrator.boolean
github.repository.owner.typeThe type of the repository owner. Example - User.keyword
github.repository.owner.urlThe URL to get more information about the repository owner from the GitHub API.keyword
github.repository.privateWhether the repository is private.boolean
github.repository.urlThe URL to get more information about the repository from the GitHub API.keyword
github.secret_scanning.created_atThe time that the alert was created in ISO 8601 format -YYYY-MM-DDTHH:MM:SSZ.date
github.secret_scanning.html_urlThe GitHub URL of the alert resource.keyword
github.secret_scanning.locations_urlThe REST API URL of the code locations for this alert.keyword
github.secret_scanning.numberThe security alert number.integer
github.secret_scanning.push_protection_bypassedWhether push protection was bypassed for the detected secret.boolean
github.secret_scanning.push_protection_bypassed_atThe time that push protection was bypassed in ISO 8601 format -YYYY-MM-DDTHH:MM:SSZ.date
github.secret_scanning.push_protection_bypassed_by.emailkeyword
github.secret_scanning.push_protection_bypassed_by.html_urlkeyword
github.secret_scanning.push_protection_bypassed_by.idinteger
github.secret_scanning.push_protection_bypassed_by.loginkeyword
github.secret_scanning.push_protection_bypassed_by.namekeyword
github.secret_scanning.push_protection_bypassed_by.node_idkeyword
github.secret_scanning.push_protection_bypassed_by.site_adminboolean
github.secret_scanning.push_protection_bypassed_by.typekeyword
github.secret_scanning.push_protection_bypassed_by.urlkeyword
github.secret_scanning.resolutionRequired when thestate isresolved. The reason for resolving the alert.keyword
github.secret_scanning.resolved_atThe time that the alert was resolved in ISO 8601 format -YYYY-MM-DDTHH:MM:SSZ.date
github.secret_scanning.resolved_by.emailkeyword
github.secret_scanning.resolved_by.html_urlkeyword
github.secret_scanning.resolved_by.idinteger
github.secret_scanning.resolved_by.loginkeyword
github.secret_scanning.resolved_by.namekeyword
github.secret_scanning.resolved_by.node_idkeyword
github.secret_scanning.resolved_by.site_adminboolean
github.secret_scanning.resolved_by.typekeyword
github.secret_scanning.resolved_by.urlkeyword
github.secret_scanning.secretThe secret that was detected.keyword
github.secret_scanning.secret_typeThe type of secret that secret scanning detected.keyword
github.secret_scanning.secret_type_display_nameUser-friendly name for the detected secret, matching thesecret_type.keyword
github.secret_scanning.stateState of the secret scanning alert.keyword
github.secret_scanning.time_to_resolution.secThe time taken to either fix the secret in seconds.longsgauge
github.secret_scanning.updated_atThe time that the alert was last updated in ISO 8601 format -YYYY-MM-DDTHH:MM:SSZ.date
github.secret_scanning.urlThe REST API URL of the alert resourcekeyword
host.containerizedIf the host is a container.boolean
host.os.buildOS build information.keyword
host.os.codenameOS codename, if any.keyword
input.typeInput Type.keyword
labels.is_transform_sourceDistinguishes between documents that are a source for a transform and documents that are an output of a transform, to facilitate easier filtering.constant_keyword
log.offsetLog Offset.long
Example
{    "@timestamp": "2022-06-30T18:07:27.000Z",    "agent": {        "ephemeral_id": "0ab1b8c7-ade2-42a6-abd9-1ad982cff568",        "id": "5980590c-e9fd-49fd-a2a4-365727917f35",        "name": "elastic-agent-51688",        "type": "filebeat",        "version": "8.19.4"    },    "data_stream": {        "dataset": "github.secret_scanning",        "namespace": "68527",        "type": "logs"    },    "ecs": {        "version": "8.11.0"    },    "elastic_agent": {        "id": "5980590c-e9fd-49fd-a2a4-365727917f35",        "snapshot": false,        "version": "8.19.4"    },    "event": {        "agent_id_status": "verified",        "created": "2022-06-30T18:07:27Z",        "dataset": "github.secret_scanning",        "ingested": "2025-11-24T10:09:12Z",        "original": "{\"created_at\":\"2022-06-30T18:07:27Z\",\"html_url\":\"https://github.com/sample_owner/sample_repo/security/secret-scanning/3\",\"number\":3,\"push_protection_bypassed\":true,\"push_protection_bypassed_by\":{\"html_url\":\"https://github.com/sample_owner\",\"login\":\"sample_owner\",\"type\":\"User\",\"url\":\"https://api.github.com/users/sample_owner\"},\"resolution\":\"revoked\",\"resolved_by\":{\"login\":\"sample_owner\",\"type\":\"User\",\"url\":\"https://api.github.com/users/sample_owner\"},\"secret\":\"npm_2vYJ3QzGXoGbEgMYduYS1k2M4D0wDu2opJbl\",\"secret_type\":\"npm_access_token\",\"secret_type_display_name\":\"npm Access Token\",\"state\":\"open\",\"url\":\"https://api.github.com/repos/sample_owner/sample_repo/secret-scanning/alerts/3\"}",        "type": [            "creation"        ]    },    "github": {        "repository": {            "html_url": "https://github.com/sample_owner/sample_repo",            "name": "sample_repo",            "owner": {                "login": "sample_owner"            },            "url": "https://api.github.com/repos/sample_owner/sample_repo"        },        "secret_scanning": {            "created_at": "2022-06-30T18:07:27Z",            "html_url": "https://github.com/sample_owner/sample_repo/security/secret-scanning/3",            "number": 3,            "push_protection_bypassed": true,            "push_protection_bypassed_by": {                "html_url": "https://github.com/sample_owner",                "login": "sample_owner",                "type": "User",                "url": "https://api.github.com/users/sample_owner"            },            "resolution": "revoked",            "resolved_by": {                "login": "sample_owner",                "type": "User",                "url": "https://api.github.com/users/sample_owner"            },            "secret": "npXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXbl",            "secret_type": "npm_access_token",            "secret_type_display_name": "npm Access Token",            "state": "open",            "url": "https://api.github.com/repos/sample_owner/sample_repo/secret-scanning/alerts/3"        }    },    "input": {        "type": "httpjson"    },    "tags": [        "forwarded",        "github-secret-scanning",        "preserve_original_event",        "hide_secret"    ]}

The GitHub Dependabot lets you retrieve known vulnerabilites in dependencies from a repository setup using GitHub Advanced Security Dependabot feature. CheckAbout Dependabot for more details.

To use this integration, you must be an administrator for the repository or for the organization that owns the repository, and you must use a personal access token with therepo scope orsecurity_events scope. For public repositories, you may instead use thepublic_repo scope. CheckAuthenticating with GraphQL andToken Issue

Exported fields
FieldDescriptionType
@timestampDate/time when the event originated. This is the date/time extracted from the event, typically representing when the event was generated by the source. If the event source has no original timestamp, this value is typically populated by the first time the event was received by the pipeline. Required field for all events.date
data_stream.datasetThe field can contain anything that makes sense to signify the source of the data. Examples includenginx.access,prometheus,endpoint etc. For data streams that otherwise fit, but that do not have dataset set we use the value "generic" for the dataset value.event.dataset should have the same value asdata_stream.dataset. Beyond the Elasticsearch data stream naming criteria noted above, thedataset value has additional restrictions: * Must not contain- * No longer than 100 charactersconstant_keyword
data_stream.namespaceA user defined namespace. Namespaces are useful to allow grouping of data. Many users already organize their indices this way, and the data stream naming scheme now provides this best practice as a default. Many users will populate this field withdefault. If no value is used, it falls back todefault. Beyond the Elasticsearch index naming criteria noted above,namespace value has the additional restrictions: * Must not contain- * No longer than 100 charactersconstant_keyword
data_stream.typeAn overarching type for the data stream. Currently allowed values are "logs" and "metrics". We expect to also add "traces" and "synthetics" in the near future.constant_keyword
event.datasetName of the dataset. If an event source publishes more than one type of log or events (e.g. access log, error log), the dataset is used to specify which one the event comes from. It's recommended but not required to start the dataset name with the module name, followed by a dot, then the dataset name.constant_keyword
event.kindconstant_keyword
event.moduleName of the module this data is coming from. If your monitoring agent supports the concept of modules or plugins to process events of a given source (e.g. Apache logs),event.module should contain the name of this module.constant_keyword
github.dependabot.created_atWhen was the alert created.date
github.dependabot.dependabot_update.error.bodyThe body of the error.text
github.dependabot.dependabot_update.error.error_typeThe error code.keyword
github.dependabot.dependabot_update.error.titleThe title of the error.keyword
github.dependabot.dependabot_update.pull_request.closedIf the pull request is closed.boolean
github.dependabot.dependabot_update.pull_request.closed_atIdentifies the date and time when the pull request was closed.date
github.dependabot.dependabot_update.pull_request.created_atIdentifies the date and time when the pull request was created.date
github.dependabot.dependabot_update.pull_request.mergedWhether or not the pull request was merged.boolean
github.dependabot.dependabot_update.pull_request.merged_atThe date and time that the pull request was merged.date
github.dependabot.dependabot_update.pull_request.numberIdentifies the pull request number.integer
github.dependabot.dependabot_update.pull_request.titleIdentifies the pull request title.keyword
github.dependabot.dependabot_update.pull_request.urlThe HTTP URL for this pull request.keyword
github.dependabot.dependency_scopeThe scope of an alert's dependency.keyword
github.dependabot.dismiss_reasonThe reason the alert was dismissed.keyword
github.dependabot.dismissed_atWhen was the alert dismissed.date
github.dependabot.dismisser.loginThe username of the dismisser.keyword
github.dependabot.dismisser.urlThe HTTP URL for this user.keyword
github.dependabot.fixed_atWhen was the alert fixed.date
github.dependabot.numberIdentifies the alert number.integer
github.dependabot.security_advisory.classificationThe classification of the advisory.keyword
github.dependabot.security_advisory.cvss.vector_stringThe CVSS vector string associated with this advisory.keyword
github.dependabot.security_advisory.cwesCWEs associated with this Advisory.nested
github.dependabot.security_advisory.cwes.cwe_idThe id of the CWE.keyword
github.dependabot.security_advisory.cwes.descriptionThe name of this CWE.keyword
github.dependabot.security_advisory.cwes.nameA detailed description of this CWE.keyword
github.dependabot.security_advisory.ghsa_idThe GitHub Security Advisory ID.keyword
github.dependabot.security_advisory.identifiersA list of identifiers for this advisory.nested
github.dependabot.security_advisory.identifiers.typeThe identifier type, e.g. GHSA, CVE.keyword
github.dependabot.security_advisory.identifiers.valueThe identifier.keyword
github.dependabot.security_advisory.originThe organization that originated the advisory.keyword
github.dependabot.security_advisory.permalinkThe permalink for the advisory.keyword
github.dependabot.security_advisory.published_atWhen the advisory was published.date
github.dependabot.security_advisory.severityThe severity of the advisory.keyword
github.dependabot.security_advisory.summaryA short plaintext summary of the advisory.keyword
github.dependabot.security_advisory.updated_atWhen the advisory was last updated.date
github.dependabot.security_advisory.withdrawn_atWhen the advisory was withdrawn, if it has been withdrawn.date
github.dependabot.security_vulnerability.first_patched_version.identifierThe first version containing a fix for the vulnerability.keyword
github.dependabot.security_vulnerability.package.ecosystemThe ecosystem the package belongs to, e.g. RUBYGEMS, NPM.keyword
github.dependabot.security_vulnerability.package.nameThe package name.keyword
github.dependabot.security_vulnerability.updated_atWhen the vulnerability was last updated.date
github.dependabot.security_vulnerability.vulnerable_version_rangeA string that describes the vulnerable package versions.keyword
github.dependabot.stateIdentifies the state of the alert.keyword
github.dependabot.vulnerable_manifest_filenameThe vulnerable manifest filename.keyword
github.dependabot.vulnerable_manifest_pathThe vulnerable manifest path.keyword
github.dependabot.vulnerable_requirementsThe vulnerable requirements.keyword
github.repository.descriptionThe repository description.text
github.repository.forkWhether the repository is a fork.boolean
github.repository.full_nameThe full, globally unique, name of the repository.keyword
github.repository.html_urlThe URL to view the repository on GitHub.com.keyword
github.repository.idA unique identifier of the repository.integer
github.repository.is_in_organizationIndicates if a repository is either owned by an organization, or is a private fork of an organization repository.boolean
github.repository.nameThe name of the repository.keyword
github.repository.owner.emailThe public email of repository owner.keyword
github.repository.owner.html_urlThe HTTP URL for the repository owner.keyword
github.repository.owner.idID of the repository owner.integer
github.repository.owner.loginLogin username of repository owner.keyword
github.repository.owner.nameName of repository owner.keyword
github.repository.owner.site_adminWhether the owner is a site administrator.boolean
github.repository.owner.typeThe type of the repository owner. Example - User.keyword
github.repository.owner.urlThe URL to get more information about the repository owner from the GitHub API.keyword
github.repository.privateWhether the repository is private.boolean
github.repository.urlThe URL to get more information about the repository from the GitHub API.keyword
host.containerizedIf the host is a container.boolean
host.os.buildOS build information.keyword
host.os.codenameOS codename, if any.keyword
input.typeInput Type.keyword
labels.is_transform_sourceDistinguishes between documents that are a source for a transform and documents that are an output of a transform, to facilitate easier filtering.constant_keyword
log.offsetLog Offset.long
Example
{    "@timestamp": "2022-07-11T11:39:07.000Z",    "agent": {        "ephemeral_id": "5e5fdbf3-c392-4d95-859b-00ac63daabcc",        "id": "db759089-b655-441f-8576-444f6ccaf526",        "name": "elastic-agent-69226",        "type": "filebeat",        "version": "8.16.0"    },    "data_stream": {        "dataset": "github.dependabot",        "namespace": "69666",        "type": "logs"    },    "ecs": {        "version": "8.11.0"    },    "elastic_agent": {        "id": "db759089-b655-441f-8576-444f6ccaf526",        "snapshot": false,        "version": "8.16.0"    },    "event": {        "agent_id_status": "verified",        "created": "2022-07-11T11:39:07.000Z",        "dataset": "github.dependabot",        "ingested": "2025-07-09T06:56:53Z",        "original": "{\"createdAt\":\"2022-07-11T11:39:07Z\",\"dependabotUpdate\":{\"error\":{\"body\":\"The currently installed version can't be determined.\\n\\nTo resolve the issue add a supported lockfile (package-lock.json or yarn.lock).\",\"errorType\":\"dependency_file_not_supported\",\"title\":\"Dependabot can't update vulnerable dependencies without a lockfile\"},\"pullRequest\":null},\"dependencyScope\":\"RUNTIME\",\"dismissReason\":null,\"dismissedAt\":null,\"dismisser\":null,\"fixedAt\":null,\"number\":1,\"repository\":{\"description\":\"OWASP Juice Shop: Probably the most modern and sophisticated insecure web application\",\"isInOrganization\":false,\"isPrivate\":false,\"name\":\"sample_repo\",\"owner\":{\"login\":\"sample_owner\",\"url\":\"https://github.com/sample_owner\"},\"url\":\"https://github.com/sample_owner/sample_repo\"},\"securityAdvisory\":{\"classification\":\"GENERAL\",\"cvss\":{\"score\":0,\"vectorString\":null},\"cwes\":{\"nodes\":[{\"cweId\":\"CWE-20\",\"description\":\"The product receives input or data, but it does not validate or incorrectly validates that the input has the properties that are required to process the data safely and correctly.\",\"name\":\"Improper Input Validation\"}]},\"description\":\"Versions 4.2.1 and earlier of `jsonwebtoken` are affected by a verification bypass vulnerability. This is a result of weak validation of the JWT algorithm type, occuring when an attacker is allowed to arbitrarily specify the JWT algorithm.\\n\\n\\n\\n\\n## Recommendation\\n\\nUpdate to version 4.2.2 or later.\",\"ghsaId\":\"GHSA-c7hr-j4mj-j2w6\",\"identifiers\":[{\"type\":\"GHSA\",\"value\":\"GHSA-c7hr-j4mj-j2w6\"},{\"type\":\"CVE\",\"value\":\"CVE-2015-9235\"}],\"origin\":\"UNSPECIFIED\",\"permalink\":\"https://github.com/advisories/GHSA-c7hr-j4mj-j2w6\",\"publishedAt\":\"2018-10-09T00:38:30Z\",\"references\":[{\"url\":\"https://nvd.nist.gov/vuln/detail/CVE-2015-9235\"},{\"url\":\"https://github.com/auth0/node-jsonwebtoken/commit/1bb584bc382295eeb7ee8c4452a673a77a68b687\"},{\"url\":\"https://auth0.com/blog/2015/03/31/critical-vulnerabilities-in-json-web-token-libraries/\"},{\"url\":\"https://github.com/advisories/GHSA-c7hr-j4mj-j2w6\"},{\"url\":\"https://www.npmjs.com/advisories/17\"},{\"url\":\"https://www.timmclean.net/2015/02/25/jwt-alg-none.html\"},{\"url\":\"https://nodesecurity.io/advisories/17\"}],\"severity\":\"CRITICAL\",\"summary\":\"Verification Bypass in jsonwebtoken\",\"updatedAt\":\"2021-01-08T19:00:39Z\",\"withdrawnAt\":null},\"securityVulnerability\":{\"firstPatchedVersion\":{\"identifier\":\"4.2.2\"},\"package\":{\"ecosystem\":\"NPM\",\"name\":\"jsonwebtoken\"},\"severity\":\"CRITICAL\",\"updatedAt\":\"2018-11-30T19:54:28Z\",\"vulnerableVersionRange\":\"\\u003c 4.2.2\"},\"state\":\"OPEN\",\"vulnerableManifestFilename\":\"package.json\",\"vulnerableManifestPath\":\"package.json\",\"vulnerableRequirements\":\"= 0.4.0\"}",        "start": "2022-07-11T11:39:07Z",        "type": [            "creation"        ]    },    "github": {        "dependabot": {            "created_at": "2022-07-11T11:39:07Z",            "dependabot_update": {                "error": {                    "body": "The currently installed version can't be determined.\n\nTo resolve the issue add a supported lockfile (package-lock.json or yarn.lock).",                    "error_type": "dependency_file_not_supported",                    "title": "Dependabot can't update vulnerable dependencies without a lockfile"                }            },            "dependency_scope": "RUNTIME",            "number": 1,            "security_advisory": {                "classification": "GENERAL",                "cwes": [                    {                        "cwe_id": "CWE-20",                        "description": "The product receives input or data, but it does not validate or incorrectly validates that the input has the properties that are required to process the data safely and correctly.",                        "name": "Improper Input Validation"                    }                ],                "ghsa_id": "GHSA-c7hr-j4mj-j2w6",                "identifiers": [                    {                        "type": "GHSA",                        "value": "GHSA-c7hr-j4mj-j2w6"                    },                    {                        "type": "CVE",                        "value": "CVE-2015-9235"                    }                ],                "origin": "UNSPECIFIED",                "permalink": "https://github.com/advisories/GHSA-c7hr-j4mj-j2w6",                "published_at": "2018-10-09T00:38:30Z",                "severity": "CRITICAL",                "summary": "Verification Bypass in jsonwebtoken",                "updated_at": "2021-01-08T19:00:39Z"            },            "security_vulnerability": {                "first_patched_version": {                    "identifier": "4.2.2"                },                "package": {                    "ecosystem": "NPM",                    "name": "jsonwebtoken"                },                "updated_at": "2018-11-30T19:54:28Z",                "vulnerable_version_range": "< 4.2.2"            },            "state": "open",            "vulnerable_manifest_filename": "package.json",            "vulnerable_manifest_path": "package.json",            "vulnerable_requirements": "= 0.4.0"        },        "repository": {            "description": "OWASP Juice Shop: Probably the most modern and sophisticated insecure web application",            "is_in_organization": false,            "name": "sample_repo",            "owner": {                "login": "sample_owner",                "url": "https://github.com/sample_owner"            },            "private": false,            "url": "https://github.com/sample_owner/sample_repo"        }    },    "input": {        "type": "httpjson"    },    "tags": [        "forwarded",        "github-dependabot",        "preserve_original_event"    ],    "vulnerability": {        "classification": "CVSS",        "description": "Versions 4.2.1 and earlier of `jsonwebtoken` are affected by a verification bypass vulnerability. This is a result of weak validation of the JWT algorithm type, occuring when an attacker is allowed to arbitrarily specify the JWT algorithm.\n\n\n\n\n## Recommendation\n\nUpdate to version 4.2.2 or later.",        "enumeration": "CVE",        "id": "CVE-2015-9235",        "reference": [            "https://nvd.nist.gov/vuln/detail/CVE-2015-9235",            "https://github.com/auth0/node-jsonwebtoken/commit/1bb584bc382295eeb7ee8c4452a673a77a68b687",            "https://auth0.com/blog/2015/03/31/critical-vulnerabilities-in-json-web-token-libraries/",            "https://github.com/advisories/GHSA-c7hr-j4mj-j2w6",            "https://www.npmjs.com/advisories/17",            "https://www.timmclean.net/2015/02/25/jwt-alg-none.html",            "https://nodesecurity.io/advisories/17"        ],        "scanner": {            "vendor": "Github"        },        "score": {            "base": 0        },        "severity": "critical"    }}

The GitHub Issues datastream lets you retrieve github issues, including pull requests, issue assignees, comments, labels, and milestones. CheckAbout Issues for more details. You can retrieve issues for specific repository or for entire organization. Since GitHub API considers pull requests as issues, users can usegithub.issues.is_pr field to filter for only pull requests.

All issues includingclosed are retrieved by default. If users want to retrieve onlyopen requests, you need to changeState parameter toopen.

To use this integration, users must use GitHub Apps or Personal Access Token withread permission to repositories or organization. Refer toGitHub Apps Permissions Required andPersonal Access Token Permissions Required for more details.

Note

The Issues API can fetch a maximum of 30,000 issues when querying at the organization level. No limitation exists when querying for the repository level.

Note

Ensure the GitHub Personal Access Token includes following fine-grained permission for the repository:

  • At leastRead-only permission on Issues
  • At leastRead-only permission on MetadataIf misconfigured, the integration could run successfully without any data being processed. Alternatively, you might encounter an error like⁠GET: server returned a 404 (Not Found).
Exported fields
FieldDescriptionTypeUnitMetric Type
@timestampDate/time when the event originated. This is the date/time extracted from the event, typically representing when the event was generated by the source. If the event source has no original timestamp, this value is typically populated by the first time the event was received by the pipeline. Required field for all events.date
data_stream.datasetThe field can contain anything that makes sense to signify the source of the data. Examples includenginx.access,prometheus,endpoint etc. For data streams that otherwise fit, but that do not have dataset set we use the value "generic" for the dataset value.event.dataset should have the same value asdata_stream.dataset. Beyond the Elasticsearch data stream naming criteria noted above, thedataset value has additional restrictions: * Must not contain- * No longer than 100 charactersconstant_keyword
data_stream.namespaceA user defined namespace. Namespaces are useful to allow grouping of data. Many users already organize their indices this way, and the data stream naming scheme now provides this best practice as a default. Many users will populate this field withdefault. If no value is used, it falls back todefault. Beyond the Elasticsearch index naming criteria noted above,namespace value has the additional restrictions: * Must not contain- * No longer than 100 charactersconstant_keyword
data_stream.typeAn overarching type for the data stream. Currently allowed values are "logs" and "metrics". We expect to also add "traces" and "synthetics" in the near future.constant_keyword
event.datasetName of the dataset. If an event source publishes more than one type of log or events (e.g. access log, error log), the dataset is used to specify which one the event comes from. It's recommended but not required to start the dataset name with the module name, followed by a dot, then the dataset name.constant_keyword
event.kindconstant_keyword
event.moduleName of the module this data is coming from. If your monitoring agent supports the concept of modules or plugins to process events of a given source (e.g. Apache logs),event.module should contain the name of this module.constant_keyword
github.issues.active_lock_reasonkeyword
github.issues.assignee.emailkeyword
github.issues.assignee.html_urlkeyword
github.issues.assignee.idinteger
github.issues.assignee.loginkeyword
github.issues.assignee.namekeyword
github.issues.assignee.site_adminboolean
github.issues.assignee.typekeyword
github.issues.assignee.urlkeyword
github.issues.assigneesInformation of users who were assigned the issue.flattened
github.issues.author_associationkeyword
github.issues.bodytext
github.issues.closed_atThe time that the issue was closed in ISO 8601 format -YYYY-MM-DDTHH:MM:SSZ.date
github.issues.closed_by.emailkeyword
github.issues.closed_by.html_urlkeyword
github.issues.closed_by.idinteger
github.issues.closed_by.loginkeyword
github.issues.closed_by.namekeyword
github.issues.closed_by.site_adminboolean
github.issues.closed_by.typekeyword
github.issues.closed_by.urlkeyword
github.issues.commentsinteger
github.issues.comments_urlkeyword
github.issues.created_atThe time that the issue was created in ISO 8601 format -YYYY-MM-DDTHH:MM:SSZ.date
github.issues.draftboolean
github.issues.events_urlkeyword
github.issues.html_urlkeyword
github.issues.idThe id of GitHub issue.integer
github.issues.is_prboolean
github.issues.labels.descriptionkeyword
github.issues.labels.integrationkeyword
github.issues.labels.namekeyword
github.issues.labels.teamkeyword
github.issues.labels_urlkeyword
github.issues.lockedboolean
github.issues.node_idThe node_id of GitHub issue.keyword
github.issues.numberinteger
github.issues.pull_request.diff_urlkeyword
github.issues.pull_request.html_urlkeyword
github.issues.pull_request.patch_urlkeyword
github.issues.pull_request.urlkeyword
github.issues.repository_urlThe repository containing the GitHub issue.keyword
github.issues.statekeyword
github.issues.state_reasonkeyword
github.issues.time_to_close.secThe time taken to close an issue in seconds.longsgauge
github.issues.timeline_urlkeyword
github.issues.titlekeyword
github.issues.updated_atThe time that the issue was last updated in ISO 8601 format -YYYY-MM-DDTHH:MM:SSZ.date
github.issues.urlThe url of GitHub issue.keyword
github.issues.user.emailkeyword
github.issues.user.html_urlkeyword
github.issues.user.idinteger
github.issues.user.loginkeyword
github.issues.user.namekeyword
github.issues.user.site_adminboolean
github.issues.user.typekeyword
github.issues.user.urlkeyword
github.repository.descriptionThe repository description.text
github.repository.forkWhether the repository is a fork.boolean
github.repository.full_nameThe full, globally unique, name of the repository.keyword
github.repository.html_urlThe URL to view the repository on GitHub.com.keyword
github.repository.idA unique identifier of the repository.integer
github.repository.is_in_organizationIndicates if a repository is either owned by an organization, or is a private fork of an organization repository.boolean
github.repository.nameThe name of the repository.keyword
github.repository.owner.emailThe public email of repository owner.keyword
github.repository.owner.html_urlThe HTTP URL for the repository owner.keyword
github.repository.owner.idID of the repository owner.integer
github.repository.owner.loginLogin username of repository owner.keyword
github.repository.owner.nameName of repository owner.keyword
github.repository.owner.site_adminWhether the owner is a site administrator.boolean
github.repository.owner.typeThe type of the repository owner. Example - User.keyword
github.repository.owner.urlThe URL to get more information about the repository owner from the GitHub API.keyword
github.repository.privateWhether the repository is private.boolean
github.repository.urlThe URL to get more information about the repository from the GitHub API.keyword
host.containerizedIf the host is a container.boolean
host.os.buildOS build information.keyword
host.os.codenameOS codename, if any.keyword
input.typeInput Type.keyword
labels.is_transform_sourceDistinguishes between documents that are a source for a transform and documents that are an output of a transform, to facilitate easier filtering.constant_keyword
log.offsetLog Offset.long
Example
{    "@timestamp": "2011-04-22T13:33:48.000Z",    "agent": {        "ephemeral_id": "a263f7f1-a457-4b20-ae6e-458f8bf47a03",        "id": "716707b5-76c9-4707-b805-cfe61efc5968",        "name": "elastic-agent-58663",        "type": "filebeat",        "version": "8.19.4"    },    "data_stream": {        "dataset": "github.issues",        "namespace": "85867",        "type": "logs"    },    "ecs": {        "version": "8.11.0"    },    "elastic_agent": {        "id": "716707b5-76c9-4707-b805-cfe61efc5968",        "snapshot": false,        "version": "8.19.4"    },    "event": {        "agent_id_status": "verified",        "created": "2011-04-22T13:33:48.000Z",        "dataset": "github.issues",        "ingested": "2025-11-24T10:11:01Z",        "original": "{\"active_lock_reason\":\"too heated\",\"assignee\":{\"avatar_url\":\"https://github.com/images/error/octocat_happy.gif\",\"events_url\":\"https://api.github.com/users/octocat/events{/privacy}\",\"followers_url\":\"https://api.github.com/users/octocat/followers\",\"following_url\":\"https://api.github.com/users/octocat/following{/other_user}\",\"gists_url\":\"https://api.github.com/users/octocat/gists{/gist_id}\",\"gravatar_id\":\"\",\"html_url\":\"https://github.com/octocat\",\"id\":1,\"login\":\"octocat\",\"node_id\":\"MDQ6VXNlcjE=\",\"organizations_url\":\"https://api.github.com/users/octocat/orgs\",\"received_events_url\":\"https://api.github.com/users/octocat/received_events\",\"repos_url\":\"https://api.github.com/users/octocat/repos\",\"site_admin\":false,\"starred_url\":\"https://api.github.com/users/octocat/starred{/owner}{/repo}\",\"subscriptions_url\":\"https://api.github.com/users/octocat/subscriptions\",\"type\":\"User\",\"url\":\"https://api.github.com/users/octocat\"},\"assignees\":[{\"avatar_url\":\"https://github.com/images/error/octocat_happy.gif\",\"events_url\":\"https://api.github.com/users/octocat/events{/privacy}\",\"followers_url\":\"https://api.github.com/users/octocat/followers\",\"following_url\":\"https://api.github.com/users/octocat/following{/other_user}\",\"gists_url\":\"https://api.github.com/users/octocat/gists{/gist_id}\",\"gravatar_id\":\"\",\"html_url\":\"https://github.com/octocat\",\"id\":1,\"login\":\"octocat\",\"node_id\":\"MDQ6VXNlcjE=\",\"organizations_url\":\"https://api.github.com/users/octocat/orgs\",\"received_events_url\":\"https://api.github.com/users/octocat/received_events\",\"repos_url\":\"https://api.github.com/users/octocat/repos\",\"site_admin\":false,\"starred_url\":\"https://api.github.com/users/octocat/starred{/owner}{/repo}\",\"subscriptions_url\":\"https://api.github.com/users/octocat/subscriptions\",\"type\":\"User\",\"url\":\"https://api.github.com/users/octocat\"}],\"author_association\":\"COLLABORATOR\",\"body\":\"I'm having a problem with this.\",\"closed_at\":null,\"closed_by\":{\"avatar_url\":\"https://github.com/images/error/octocat_happy.gif\",\"events_url\":\"https://api.github.com/users/octocat/events{/privacy}\",\"followers_url\":\"https://api.github.com/users/octocat/followers\",\"following_url\":\"https://api.github.com/users/octocat/following{/other_user}\",\"gists_url\":\"https://api.github.com/users/octocat/gists{/gist_id}\",\"gravatar_id\":\"\",\"html_url\":\"https://github.com/octocat\",\"id\":1,\"login\":\"octocat\",\"node_id\":\"MDQ6VXNlcjE=\",\"organizations_url\":\"https://api.github.com/users/octocat/orgs\",\"received_events_url\":\"https://api.github.com/users/octocat/received_events\",\"repos_url\":\"https://api.github.com/users/octocat/repos\",\"site_admin\":false,\"starred_url\":\"https://api.github.com/users/octocat/starred{/owner}{/repo}\",\"subscriptions_url\":\"https://api.github.com/users/octocat/subscriptions\",\"type\":\"User\",\"url\":\"https://api.github.com/users/octocat\"},\"comments\":0,\"comments_url\":\"https://api.github.com/repos/octocat/Hello-World/issues/1347/comments\",\"created_at\":\"2011-04-22T13:33:48Z\",\"events_url\":\"https://api.github.com/repos/octocat/Hello-World/issues/1347/events\",\"html_url\":\"https://github.com/octocat/Hello-World/issues/1347\",\"id\":1,\"labels\":[{\"color\":\"f29513\",\"default\":true,\"description\":\"Something isn't working\",\"id\":208045946,\"name\":\"bug\",\"node_id\":\"MDU6TGFiZWwyMDgwNDU5NDY=\",\"url\":\"https://api.github.com/repos/octocat/Hello-World/labels/bug\"}],\"labels_url\":\"https://api.github.com/repos/octocat/Hello-World/issues/1347/labels{/name}\",\"locked\":true,\"milestone\":{\"closed_at\":\"2013-02-12T13:22:01Z\",\"closed_issues\":8,\"created_at\":\"2011-04-10T20:09:31Z\",\"creator\":{\"avatar_url\":\"https://github.com/images/error/octocat_happy.gif\",\"events_url\":\"https://api.github.com/users/octocat/events{/privacy}\",\"followers_url\":\"https://api.github.com/users/octocat/followers\",\"following_url\":\"https://api.github.com/users/octocat/following{/other_user}\",\"gists_url\":\"https://api.github.com/users/octocat/gists{/gist_id}\",\"gravatar_id\":\"\",\"html_url\":\"https://github.com/octocat\",\"id\":1,\"login\":\"octocat\",\"node_id\":\"MDQ6VXNlcjE=\",\"organizations_url\":\"https://api.github.com/users/octocat/orgs\",\"received_events_url\":\"https://api.github.com/users/octocat/received_events\",\"repos_url\":\"https://api.github.com/users/octocat/repos\",\"site_admin\":false,\"starred_url\":\"https://api.github.com/users/octocat/starred{/owner}{/repo}\",\"subscriptions_url\":\"https://api.github.com/users/octocat/subscriptions\",\"type\":\"User\",\"url\":\"https://api.github.com/users/octocat\"},\"description\":\"Tracking milestone for version 1.0\",\"due_on\":\"2012-10-09T23:39:01Z\",\"html_url\":\"https://github.com/octocat/Hello-World/milestones/v1.0\",\"id\":1002604,\"labels_url\":\"https://api.github.com/repos/octocat/Hello-World/milestones/1/labels\",\"node_id\":\"MDk6TWlsZXN0b25lMTAwMjYwNA==\",\"number\":1,\"open_issues\":4,\"state\":\"open\",\"title\":\"v1.0\",\"updated_at\":\"2014-03-03T18:58:10Z\",\"url\":\"https://api.github.com/repos/octocat/Hello-World/milestones/1\"},\"node_id\":\"MDU6SXNzdWUx\",\"number\":1347,\"pull_request\":{\"diff_url\":\"https://github.com/octocat/Hello-World/pull/1347.diff\",\"html_url\":\"https://github.com/octocat/Hello-World/pull/1347\",\"patch_url\":\"https://github.com/octocat/Hello-World/pull/1347.patch\",\"url\":\"https://api.github.com/repos/octocat/Hello-World/pulls/1347\"},\"repository_url\":\"https://api.github.com/repos/octocat/Hello-World\",\"state\":\"open\",\"state_reason\":\"completed\",\"title\":\"Found a bug\",\"updated_at\":\"2011-04-22T13:33:48Z\",\"url\":\"https://api.github.com/repos/octocat/Hello-World/issues/1347\",\"user\":{\"avatar_url\":\"https://github.com/images/error/octocat_happy.gif\",\"events_url\":\"https://api.github.com/users/octocat/events{/privacy}\",\"followers_url\":\"https://api.github.com/users/octocat/followers\",\"following_url\":\"https://api.github.com/users/octocat/following{/other_user}\",\"gists_url\":\"https://api.github.com/users/octocat/gists{/gist_id}\",\"gravatar_id\":\"\",\"html_url\":\"https://github.com/octocat\",\"id\":1,\"login\":\"octocat\",\"node_id\":\"MDQ6VXNlcjE=\",\"organizations_url\":\"https://api.github.com/users/octocat/orgs\",\"received_events_url\":\"https://api.github.com/users/octocat/received_events\",\"repos_url\":\"https://api.github.com/users/octocat/repos\",\"site_admin\":false,\"starred_url\":\"https://api.github.com/users/octocat/starred{/owner}{/repo}\",\"subscriptions_url\":\"https://api.github.com/users/octocat/subscriptions\",\"type\":\"User\",\"url\":\"https://api.github.com/users/octocat\"}}",        "type": [            "creation"        ]    },    "github": {        "issues": {            "active_lock_reason": "too heated",            "assignee": {                "html_url": "https://github.com/octocat",                "id": 1,                "login": "octocat",                "site_admin": false,                "type": "User",                "url": "https://api.github.com/users/octocat"            },            "assignees": [                {                    "html_url": "https://github.com/octocat",                    "id": 1,                    "login": "octocat",                    "site_admin": false,                    "type": "User",                    "url": "https://api.github.com/users/octocat"                }            ],            "author_association": "COLLABORATOR",            "body": "I'm having a problem with this.",            "closed_by": {                "html_url": "https://github.com/octocat",                "id": 1,                "login": "octocat",                "site_admin": false,                "type": "User",                "url": "https://api.github.com/users/octocat"            },            "comments": 0,            "comments_url": "https://api.github.com/repos/octocat/Hello-World/issues/1347/comments",            "created_at": "2011-04-22T13:33:48.000Z",            "events_url": "https://api.github.com/repos/octocat/Hello-World/issues/1347/events",            "html_url": "https://github.com/octocat/Hello-World/issues/1347",            "id": 1,            "is_pr": true,            "labels": [                {                    "description": "Something isn't working",                    "name": "bug"                }            ],            "labels_url": "https://api.github.com/repos/octocat/Hello-World/issues/1347/labels{/name}",            "locked": true,            "node_id": "MDU6SXNzdWUx",            "number": 1347,            "pull_request": {                "diff_url": "https://github.com/octocat/Hello-World/pull/1347.diff",                "html_url": "https://github.com/octocat/Hello-World/pull/1347",                "patch_url": "https://github.com/octocat/Hello-World/pull/1347.patch",                "url": "https://api.github.com/repos/octocat/Hello-World/pulls/1347"            },            "repository_url": "https://api.github.com/repos/octocat/Hello-World",            "state": "open",            "state_reason": "completed",            "title": "Found a bug",            "updated_at": "2011-04-22T13:33:48.000Z",            "url": "https://api.github.com/repos/octocat/Hello-World/issues/1347",            "user": {                "html_url": "https://github.com/octocat",                "id": 1,                "login": "octocat",                "site_admin": false,                "type": "User",                "url": "https://api.github.com/users/octocat"            }        },        "repository": {            "html_url": "https://github.com/octocat/Hello-World",            "name": "Hello-World",            "owner": {                "login": "octocat"            },            "url": "https://api.github.com/repos/octocat/Hello-World"        }    },    "input": {        "type": "httpjson"    },    "related": {        "user": [            "octocat"        ]    },    "tags": [        "forwarded",        "github-issues",        "preserve_original_event"    ],    "user": {        "id": "1",        "name": "octocat"    }}

The GitHub Security Advisories datastream lets you retrieve reviewed and unreviewed global security advisories from the GitHub advisory database. CheckWorking with security advisories for more details.

To use this integration, you mustcreate a fine-grained personal access token (GitHub App user access tokens, GitHub App installation access tokens, Fine-grained personal access tokens). This fine-grained token does not require any permissions.

Exported fields
FieldDescriptionType
@timestampEvent timestamp.date
data_stream.datasetData stream dataset.constant_keyword
data_stream.namespaceData stream namespace.constant_keyword
data_stream.typeData stream type.constant_keyword
github.security_advisory.credits.avatar_urlkeyword
github.security_advisory.credits.events_urlkeyword
github.security_advisory.credits.followers_urlkeyword
github.security_advisory.credits.following_urlkeyword
github.security_advisory.credits.gists_urlkeyword
github.security_advisory.credits.html_urlkeyword
github.security_advisory.credits.idlong
github.security_advisory.credits.loginkeyword
github.security_advisory.credits.node_idkeyword
github.security_advisory.credits.organizations_urlkeyword
github.security_advisory.credits.received_events_urlkeyword
github.security_advisory.credits.repos_urlkeyword
github.security_advisory.credits.site_adminboolean
github.security_advisory.credits.starred_urlkeyword
github.security_advisory.credits.subscriptions_urlkeyword
github.security_advisory.credits.typekeyword
github.security_advisory.credits.urlkeyword
github.security_advisory.credits.user.avatar_urlkeyword
github.security_advisory.credits.user.events_urlkeyword
github.security_advisory.credits.user.followers_urlkeyword
github.security_advisory.credits.user.following_urlkeyword
github.security_advisory.credits.user.gists_urlkeyword
github.security_advisory.credits.user.gravatar_idkeyword
github.security_advisory.credits.user.html_urlkeyword
github.security_advisory.credits.user.idlong
github.security_advisory.credits.user.loginkeyword
github.security_advisory.credits.user.node_idkeyword
github.security_advisory.credits.user.organizations_urlkeyword
github.security_advisory.credits.user.received_events_urlkeyword
github.security_advisory.credits.user.repos_urlkeyword
github.security_advisory.credits.user.site_adminboolean
github.security_advisory.credits.user.starred_urlkeyword
github.security_advisory.credits.user.subscriptions_urlkeyword
github.security_advisory.credits.user.typekeyword
github.security_advisory.credits.user.urlkeyword
github.security_advisory.credits.user.user_view_typekeyword
github.security_advisory.credits.user_view_typekeyword
github.security_advisory.cve_idkeyword
github.security_advisory.cvss.scorefloat
github.security_advisory.cvss.vector_stringkeyword
github.security_advisory.cvss_severities.cvss_v3.scorefloat
github.security_advisory.cvss_severities.cvss_v3.vector_stringkeyword
github.security_advisory.cvss_severities.cvss_v4.scorefloat
github.security_advisory.cvss_severities.cvss_v4.vector_stringkeyword
github.security_advisory.cwes.cwe_idkeyword
github.security_advisory.cwes.namekeyword
github.security_advisory.descriptionmatch_only_text
github.security_advisory.epss.percentagefloat
github.security_advisory.epss.percentilefloat
github.security_advisory.ghsa_idkeyword
github.security_advisory.github_reviewed_atdate
github.security_advisory.html_urlkeyword
github.security_advisory.identifiers.typekeyword
github.security_advisory.identifiers.valuekeyword
github.security_advisory.nvd_published_atdate
github.security_advisory.published_atdate
github.security_advisory.referenceskeyword
github.security_advisory.repository_advisory_urlkeyword
github.security_advisory.severitykeyword
github.security_advisory.source_code_locationkeyword
github.security_advisory.summarykeyword
github.security_advisory.typekeyword
github.security_advisory.updated_atdate
github.security_advisory.urlkeyword
github.security_advisory.vulnerabilities.first_patched_versionkeyword
github.security_advisory.vulnerabilities.package.ecosystemkeyword
github.security_advisory.vulnerabilities.package.namekeyword
github.security_advisory.vulnerabilities.vulnerable_version_rangekeyword
github.security_advisory.withdrawn_atdate
input.typeType of filebeat input.keyword
Example
{    "@timestamp": "2025-07-09T07:00:19.578Z",    "agent": {        "ephemeral_id": "783ac826-d0e3-421b-9e05-3f8df55ef1f4",        "id": "827d1836-740e-4d2c-840e-e42baa4160d9",        "name": "elastic-agent-76840",        "type": "filebeat",        "version": "8.16.0"    },    "data_stream": {        "dataset": "github.security_advisories",        "namespace": "89850",        "type": "logs"    },    "ecs": {        "version": "8.11.0"    },    "elastic_agent": {        "id": "827d1836-740e-4d2c-840e-e42baa4160d9",        "snapshot": false,        "version": "8.16.0"    },    "event": {        "agent_id_status": "verified",        "category": [            "vulnerability"        ],        "dataset": "github.security_advisories",        "ingested": "2025-07-09T07:00:22Z",        "kind": "enrichment",        "type": [            "info"        ]    },    "github": {        "security_advisory": {            "credits": [                {                    "type": "reporter",                    "user": {                        "avatar_url": "https://avatars.githubusercontent.com/u/170187038?v=4",                        "events_url": "https://api.github.com/users/4rdr/events{/privacy}",                        "followers_url": "https://api.github.com/users/4rdr/followers",                        "following_url": "https://api.github.com/users/4rdr/following{/other_user}",                        "gists_url": "https://api.github.com/users/4rdr/gists{/gist_id}",                        "html_url": "https://github.com/4rdr",                        "id": 170187038,                        "login": "4rdr",                        "node_id": "U_kgDOCiTZHg",                        "organizations_url": "https://api.github.com/users/4rdr/orgs",                        "received_events_url": "https://api.github.com/users/4rdr/received_events",                        "repos_url": "https://api.github.com/users/4rdr/repos",                        "site_admin": false,                        "starred_url": "https://api.github.com/users/4rdr/starred{/owner}{/repo}",                        "subscriptions_url": "https://api.github.com/users/4rdr/subscriptions",                        "type": "User",                        "url": "https://api.github.com/users/4rdr",                        "user_view_type": "public"                    }                },                {                    "type": "remediation_developer",                    "user": {                        "avatar_url": "https://avatars.githubusercontent.com/u/1593467?v=4",                        "events_url": "https://api.github.com/users/Forceu/events{/privacy}",                        "followers_url": "https://api.github.com/users/Forceu/followers",                        "following_url": "https://api.github.com/users/Forceu/following{/other_user}",                        "gists_url": "https://api.github.com/users/Forceu/gists{/gist_id}",                        "html_url": "https://github.com/Forceu",                        "id": 1593467,                        "login": "Forceu",                        "node_id": "MDQ6VXNlcjE1OTM0Njc=",                        "organizations_url": "https://api.github.com/users/Forceu/orgs",                        "received_events_url": "https://api.github.com/users/Forceu/received_events",                        "repos_url": "https://api.github.com/users/Forceu/repos",                        "site_admin": false,                        "starred_url": "https://api.github.com/users/Forceu/starred{/owner}{/repo}",                        "subscriptions_url": "https://api.github.com/users/Forceu/subscriptions",                        "type": "User",                        "url": "https://api.github.com/users/Forceu",                        "user_view_type": "public"                    }                }            ],            "cve_id": "CVE-2025-48494",            "cvss_severities": {                "cvss_v3": {                    "score": 0                },                "cvss_v4": {                    "score": 4.8,                    "vector_string": "CVSS:4.0/AV:N/AC:L/AT:N/PR:H/UI:P/VC:N/VI:N/VA:N/SC:L/SI:L/SA:L"                }            },            "cwes": [                {                    "cwe_id": "CWE-79",                    "name": "Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting')"                },                {                    "cwe_id": "CWE-87",                    "name": "Improper Neutralization of Alternate XSS Syntax"                }            ],            "description": "### Impact\n\nWhen using end-to-end encryption, a stored XSS vulnerability can be exploited by uploading a file with JavaScript code embedded in the filename. After upload and every time someone opens the upload list, the script is then parsed.\n\nWith the affected versions <v2.0, there was no user permission system implemented, therefore all authenticated users were already able to see and modify all resources, even if end-to-end encrypted, as the encryption key had to be the same for all users with <v2.0. Nethertheless with XSS, other attack vectors like redirection or crypto mining would be possble.\n\n### Patches\n\nThis CVE has been fixed in v2.0.0\n\n### Workarounds\n\nIf you are the only authenticated user using Gokapi, you are not affected. A workaround would be to disable end-to-end encryption.",            "epss": {                "percentage": 0.00023,                "percentile": 0.0471            },            "ghsa_id": "GHSA-95rc-wc32-gm53",            "github_reviewed_at": "2025-06-03T06:28:08.000Z",            "html_url": "https://github.com/advisories/GHSA-95rc-wc32-gm53",            "identifiers": [                {                    "type": "GHSA",                    "value": "GHSA-95rc-wc32-gm53"                },                {                    "type": "CVE",                    "value": "CVE-2025-48494"                }            ],            "nvd_published_at": "2025-06-02T11:15:22.000Z",            "published_at": "2025-06-03T06:28:08.000Z",            "references": [                "https://github.com/Forceu/Gokapi/security/advisories/GHSA-95rc-wc32-gm53",                "https://nvd.nist.gov/vuln/detail/CVE-2025-48494",                "https://github.com/Forceu/Gokapi/commit/343cc566cfd7f4efcd522c92371561d494aed6b0",                "https://github.com/Forceu/Gokapi/releases/tag/v2.0.0",                "https://github.com/advisories/GHSA-95rc-wc32-gm53"            ],            "repository_advisory_url": "https://api.github.com/repos/Forceu/Gokapi/security-advisories/GHSA-95rc-wc32-gm53",            "severity": "medium",            "source_code_location": "https://github.com/Forceu/Gokapi",            "summary": "Gokapi vulnerable to stored XSS via uploading file with malicious file name",            "type": "reviewed",            "updated_at": "2025-06-03T06:28:10.000Z",            "url": "https://api.github.com/advisories/GHSA-95rc-wc32-gm53",            "vulnerabilities": [                {                    "package": {                        "ecosystem": "go",                        "name": "github.com/forceu/gokapi"                    },                    "vulnerable_version_range": ">= 1.0.1, <= 1.9.6"                },                {                    "first_patched_version": "0.0.0-20250530191232-343cc566cfd7",                    "package": {                        "ecosystem": "go",                        "name": "github.com/forceu/gokapi"                    },                    "vulnerable_version_range": "< 0.0.0-20250530191232-343cc566cfd7"                }            ]        }    },    "input": {        "type": "cel"    },    "tags": [        "forwarded",        "github-security-advisories"    ],    "url": {        "domain": "github.com",        "full": "https://github.com/advisories/GHSA-95rc-wc32-gm53",        "original": "https://github.com/advisories/GHSA-95rc-wc32-gm53",        "path": "/advisories/GHSA-95rc-wc32-gm53",        "scheme": "https"    },    "vulnerability": {        "classification": "CVSS",        "description": "### Impact\n\nWhen using end-to-end encryption, a stored XSS vulnerability can be exploited by uploading a file with JavaScript code embedded in the filename. After upload and every time someone opens the upload list, the script is then parsed.\n\nWith the affected versions <v2.0, there was no user permission system implemented, therefore all authenticated users were already able to see and modify all resources, even if end-to-end encrypted, as the encryption key had to be the same for all users with <v2.0. Nethertheless with XSS, other attack vectors like redirection or crypto mining would be possble.\n\n### Patches\n\nThis CVE has been fixed in v2.0.0\n\n### Workarounds\n\nIf you are the only authenticated user using Gokapi, you are not affected. A workaround would be to disable end-to-end encryption.",        "enumeration": "CVE",        "id": "CVE-2025-48494",        "severity": "medium"    }}

This integration includes one or more Kibana dashboards that visualizes the data collected by the integration. The screenshots below illustrate how the ingested data is displayed.

GitHub audit overview
GitHub user overview
GitHub security advisories overview
GitHub advance security overview
GitHub code scanning overview
GitHub dependabot overview
GitHub issues overview
GitHub secret scanning overview
Changelog
VersionDetailsMinimum Kibana version
2.21.1Bug fix (View pull request)
Remove duplicate security-solution-default tag references
9.1.4
9.0.7
8.19.4
2.21.0Enhancement (View pull request)
Clarify GitHub PAT permissions required for Issues data stream.
9.1.4
9.0.7
8.19.4
2.20.0Enhancement (View pull request)
Updateevent.kind to "alert" forcode_scanning.alert_created andsecret_scanning_alert.create actions.
9.1.4
9.0.7
8.19.4
2.19.0Enhancement (View pull request)
Document the limitation of Issues API for organization-level queries.
9.1.4
9.0.7
8.19.4
2.18.0Enhancement (View pull request)
Prevent updating the fleet health status to degraded when the link is not present in the header.
9.1.4
9.0.7
8.19.4
2.17.3Bug fix (View pull request)
Fix HTTPJSON cursor logic for audit data stream.
9.0.0
8.17.1
2.17.2Bug fix (View pull request)
Remove updated_at field from latest issues transform unique keys.
9.0.0
8.17.1
2.17.1Bug fix (View pull request)
Update the latest issues by transforming unique keys to utilize the id and updated_at fields.
9.0.0
8.17.1
2.17.0Enhancement (View pull request)
Add malware advisory type to GitHub security advisories data stream.
9.0.0
8.17.1
2.16.0Enhancement (View pull request)
Update deprecated controls and filters in Audit dashboards.
9.0.0
8.17.1
2.15.1Bug fix (View pull request)
Added missing oauth2 toggle in audit data stream.
9.0.0
8.17.1
2.15.0Enhancement (View pull request)
Added support for abs and gcs inputs in audit data stream.
9.0.0
8.17.1
2.14.0Enhancement (View pull request)
Add links panel widget in dashboards.
9.0.0
8.16.0
2.13.0Enhancement (View pull request)
Improve documentation
9.0.0
8.16.0
2.12.0Enhancement (View pull request)
Harmonise appearance of dashboards. Add dashboard link for security advisories dashboard. Add table of content in audit, security advisories and user dashboards.

Bug fix (View pull request)
Fix data view in security advisories dashboard.
9.0.0
8.16.0
2.11.0Enhancement (View pull request)
Add support for AWS S3 and AWS SQS input in audit dataset.
9.0.0
8.16.0
2.10.1Bug fix (View pull request)
Fix "Top users with assigned issues [GitHub Issues]" lens visual
9.0.0
8.16.0
2.10.0Enhancement (View pull request)
Useterminate processor instead offail processor to handle agent errors.
9.0.0
8.16.0
2.9.0Enhancement (View pull request)
Add security advisories dashboard.
9.0.0
8.15.0
2.8.2Bug fix (View pull request)
Fix minor spelling mistakes.
9.0.0
8.15.0
2.8.1Bug fix (View pull request)
Fix state's advisory_type for next interval in security advisories datastream.
9.0.0
8.15.0
2.8.0Enhancement (View pull request)
Add security advisories datastream.
9.0.0
8.15.0
2.7.0Enhancement (View pull request)
Improve handling of pagination end.
9.0.0
8.15.0
2.6.1Bug fix (View pull request)
Fix audit log URL for enterprises.
9.0.0
8.13.0
2.6.0Enhancement (View pull request)
Update audit ingest pipeline to cover all fields.
9.0.0
8.13.0
2.5.0Enhancement (View pull request)
Add Azure Eventhub support for audit logs.
9.0.0
8.13.0
2.4.1Bug fix (View pull request)
Add missing ECS field in latest_code_scanning transform.
9.0.0
8.13.0
2.4.0Enhancement (View pull request)
Update Kibana constraint to support 9.0.0.
9.0.0
8.13.0
2.3.1Bug fix (View pull request)
Updated SSL description to be uniform and to include links to documentation.
8.13.0
2.3.0Enhancement (View pull request)
Do not removeevent.original in main ingest pipeline.
8.13.0
2.2.0Enhancement (View pull request)
Add "preserve_original_event" tag to documents withevent.kind set to "pipeline_error".
8.13.0
2.1.1Bug fix (View pull request)
Addressed some missing documentation issues and fixed timestamp values in sample enterprise audit logs.
8.13.0
2.1.0Enhancement (View pull request)
Added support for enterprise audit logs in the audit data stream.
8.13.0
2.0.0Enhancement (View pull request)
Update fields inside fingerprint processor in code_scanning, secret_scanning, and dependabot to ingest all event updates.

Enhancement (View pull request)
Reformat fields to add package-fields.yml across all datastreams.

Breaking change (View pull request)
Remove github.state, github.severity due to inconsistency across datastreams. Update dashboards to use corresponding datastream-level fields instead.

Breaking change (View pull request)
Remove event.action field from code_scanning, secret_scanning, dependabot, and issues as it is redundant. Update dashboards to use data_stream.dataset instead.

Enhancement (View pull request)
Add latest transforms for github issues, dependabot, code_scanning, and secret_scanning alerts.

Enhancement (View pull request)
Add navigation to all dashboards.

Enhancement (View pull request)
Upgrade legacy visualization to latest for code_scanning and secret_scanning.

Enhancement (View pull request)
Change dashboards to point to destination index for issues, dependabot, code_scanning, and secret_scanning alerts.
8.13.0
1.29.3Bug fix (View pull request)
Use triple-brace Mustache templating when referencing variables in ingest pipelines.
8.13.0
1.29.2Bug fix (View pull request)
Use triple-brace Mustache templating when referencing variables in ingest pipelines.
8.13.0
1.29.1Bug fix (View pull request)
Fix definition of nested subfields
8.13.0
1.29.0Enhancement (View pull request)
Update the kibana constraint to ^8.13.0. Modified the field definitions to remove ECS fields made redundant by the ecs@mappings component template.
8.13.0
1.28.0Enhancement (View pull request)
Set sensitive values as secret and fix incorrect mappings.
8.12.0
1.27.3Bug fix (View pull request)
Clean up null handling, formatting
8.7.1
1.27.2Enhancement (View pull request)
Changed owners
8.7.1
1.27.1Bug fix (View pull request)
Event duration was in seconds, not nanoseconds.
8.7.1
1.27.0Enhancement (View pull request)
Limit request tracer log count to five.
8.7.1
1.26.0Enhancement (View pull request)
ECS version updated to 8.11.0.
8.7.1
1.25.0Enhancement (View pull request)
Improve 'event.original' check to avoid errors if set.
8.7.1
1.24.0Enhancement (View pull request)
Add support for additional audit log fields.
8.7.1
1.23.1Bug fix (View pull request)
Fix docs for GitHub Audit log permissions.
8.7.1
1.23.0Enhancement (View pull request)
ECS version updated to 8.10.0.
8.7.1
1.22.0Enhancement (View pull request)
The format_version in the package manifest changed from 2.11.0 to 3.0.0. Removed dotted YAML keys from package manifest. Added 'owner.type: elastic' to package manifest.
8.7.1
1.21.0Enhancement (View pull request)
Add tags.yml file so that integration's dashboards and saved searches are tagged with "Security Solution" and displayed in the Security Solution UI.
8.7.1
1.20.1Bug fix (View pull request)
Make datastreams agree on type ofgithub.repository.description.
8.7.1
1.20.0Enhancement (View pull request)
Add support forgithub.permission andgithub.repository_public fields.
8.7.1
1.19.0Enhancement (View pull request)
Update package to ECS 8.9.0.
8.7.1
1.18.0Enhancement (View pull request)
Document duration units.
8.7.1
1.17.0Enhancement (View pull request)
Update package-spec to 2.9.0.
8.7.1
1.16.0Enhancement (View pull request)
Convert dashboard visualizations to lens.
8.7.1
1.15.0Enhancement (View pull request)
Document valid duration units.
8.7.1
1.14.0Enhancement (View pull request)
Document valid duration units.
1.13.0Enhancement (View pull request)
Ensure event.kind is correctly set for pipeline errors.
8.7.1
1.12.2Bug fix (View pull request)
Fix documentation for audit log prerequisites
8.7.1
1.12.1Bug fix (View pull request)
Remove additional repository fields github.issues.
8.7.1
1.12.0Enhancement (View pull request)
Update package to ECS 8.8.0.
8.7.1
1.11.0Enhancement (View pull request)
Add a new flag to enable request tracing
8.7.1
1.10.2Bug fix (View pull request)
Removed fixReason from Dependabot request
8.4.1
1.10.1Bug fix (View pull request)
Add issues datastream into README.
8.4.1
1.10.0Enhancement (View pull request)
Update package to ECS 8.7.0.
8.4.1
1.9.0Enhancement (View pull request)
Release GitHub datastreams as GA.
8.4.1
1.8.2Enhancement (View pull request)
Added categories and/or subcategories.
8.4.1
1.8.1Bug fix (View pull request)
Fix pagination in GitHub audit
8.4.1
1.8.0Enhancement (View pull request)
Add GitHub Issues datastream
8.4.1
1.7.0Enhancement (View pull request)
Update package to ECS 8.6.0.
8.4.1
1.6.0Enhancement (View pull request)
Update package to ECS 8.5.0.
8.4.1
1.5.0Enhancement (View pull request)
Add org endpoints for code_scanning and secret_scanning along with dashboards
8.4.1
1.4.0Enhancement (View pull request)
Add Dependabot alerts
8.3.0
1.3.0Enhancement (View pull request)
Update package to ECS 8.4.0
8.0.0
7.16.0
1.2.3Bug fix (View pull request)
Fix proxy URL documentation rendering.
8.0.0
7.16.0
1.2.2Bug fix (View pull request)
Update GitHub Secret Scanning fingerprint with resolved_at
8.0.0
7.16.0
1.2.1Enhancement (View pull request)
Update package name and description to align with standard wording
8.0.0
7.16.0
1.2.0Enhancement (View pull request)
Add GitHub Advanced Security integration
8.0.0
7.16.0
1.1.0Enhancement (View pull request)
Update package to ECS 8.3.0.
8.0.0
7.16.0
1.0.3Bug fix (View pull request)
Add support for@timestamp and missingcreated_at fields
1.0.2Bug fix (View pull request)
Add correct field mapping for event.created
8.0.0
7.16.0
1.0.1Enhancement (View pull request)
Update readme
8.0.0
7.16.0
1.0.0Enhancement (View pull request)
Make GA
8.0.0
7.16.0
0.4.0Enhancement (View pull request)
Update to ECS 8.2
0.3.4Bug fix (View pull request)
Fix typo in config template for ignoring host enrichment
0.3.3Enhancement (View pull request)
Add documentation for multi-fields
0.3.2Bug fix (View pull request)
Fix date format used in queries.
0.3.1Bug fix (View pull request)
Resolve invalid query operator
0.3.0Enhancement (View pull request)
Update to ECS 8.0
0.2.2Bug fix (View pull request)
Removes saved search used for testing
0.2.1Bug fix (View pull request)
Regenerate test files using the new GeoIP database
0.2.0Enhancement (View pull request)
Add 8.0.0 version constraint
0.1.1Bug fix (View pull request)
Update Title and Description.
0.1.0Enhancement (View pull request)
initial release

[8]ページ先頭

©2009-2026 Movatter.jp