Skip to content
Merged
Show file tree
Hide file tree
Changes from all commits
Commits
File filter

Filter by extension

Filter by extension

Conversations
Failed to load comments.
Loading
Jump to
Jump to file
Failed to load files.
Loading
Diff view
Diff view
Original file line number Diff line number Diff line change
Expand Up @@ -20,9 +20,15 @@ You can export Git events data by downloading a JSON file from your enterprise a

{% data reusables.audit_log.git-events-export-limited %}

{% data reusables.audit_log.exported-log-keys-and-values %}
As an alternative to exporting log events, you can use the API to retrieve audit log events. For more information, see [AUTOTITLE](/admin/monitoring-activity-in-your-enterprise/reviewing-audit-logs-for-your-enterprise/using-the-audit-log-api-for-your-enterprise).

### Export limits

{% data reusables.audit_log.audit-log-enterprise-export-limit %}

As an alternative to exporting log events, you can use the API to retrieve audit log events, or set up {% data variables.product.github %} to stream audit data as events are logged. For more information, see [AUTOTITLE](/admin/monitoring-activity-in-your-enterprise/reviewing-audit-logs-for-your-enterprise/using-the-audit-log-api-for-your-enterprise) and [AUTOTITLE](/admin/monitoring-activity-in-your-enterprise/reviewing-audit-logs-for-your-enterprise/streaming-the-audit-log-for-your-enterprise).
### Exported log keys and values

{% data reusables.audit_log.exported-log-keys-and-values %}

## Exporting audit log data

Expand Down
Original file line number Diff line number Diff line change
Expand Up @@ -174,6 +174,12 @@ You can identify all events that were performed by a specific access token. For

{% data reusables.audit_log.git-events-export-limited %}

### Export limits

{% data reusables.audit_log.audit-log-org-export-limit %}

### Exported log keys and values

{% data reusables.audit_log.exported-log-keys-and-values %}
{% endif %}

Expand Down
13 changes: 13 additions & 0 deletions data/reusables/audit_log/audit-log-enterprise-export-limit.md
Original file line number Diff line number Diff line change
@@ -0,0 +1,13 @@
{% ifversion ghec %}

There is a hard limit when exporting the audit logs for your enterprise. These limits are either:

* **100 MB** compressed file, or
* **10 minutes** export processing time, or
* **both**.

To avoid these limits, we recommend filtering the audit log to a smaller dataset before exporting. For more information, see [AUTOTITLE](/admin/monitoring-activity-in-your-enterprise/reviewing-audit-logs-for-your-enterprise/searching-the-audit-log-for-your-enterprise).

If you intend to review a large dataset of audit logs, we recommend streaming your logs to an external data management system. For more information, see [AUTOTITLE](/admin/monitoring-activity-in-your-enterprise/reviewing-audit-logs-for-your-enterprise/streaming-the-audit-log-for-your-enterprise).

{% endif %}
15 changes: 15 additions & 0 deletions data/reusables/audit_log/audit-log-org-export-limit.md
Original file line number Diff line number Diff line change
@@ -0,0 +1,15 @@
{% ifversion fpt or ghec %}

There is a hard limit when exporting the audit logs for your organization. These limits are either:

* **100 MB** compressed file, or
* **10 minutes** export processing time, or
* **both**.

To avoid these limits, we recommend reducing the audit log to a smaller dataset before exporting. For more information, see [AUTOTITLE](/organizations/keeping-your-organization-secure/managing-security-settings-for-your-organization/reviewing-the-audit-log-for-your-organization#searching-the-audit-log).

{% ifversion ghec %}
If you intend to review a large dataset of audit logs, we recommend streaming your logs to an external data management system. For more information, see [AUTOTITLE](/admin/monitoring-activity-in-your-enterprise/reviewing-audit-logs-for-your-enterprise/streaming-the-audit-log-for-your-enterprise).
{% endif %}

{% endif %}
18 changes: 18 additions & 0 deletions src/graphql/data/fpt/changelog.json
Original file line number Diff line number Diff line change
@@ -1,4 +1,22 @@
[
{
"schemaChanges": [
{
"title": "The GraphQL schema includes these changes:",
"changes": []
}
],
"previewChanges": [],
"upcomingChanges": [
{
"title": "The following changes will be made to the schema:",
"changes": [
"<p>On member <code>User.viewerRelevantRepositories</code>:<code>viewerRelevantRepositories</code> will be removed. Use viewerCopilotChatRepositorySuggestions instead. <strong>Effective 2026-10-01</strong>.</p>"
]
}
],
"date": "2026-05-22"
},
{
"schemaChanges": [
{
Expand Down
8 changes: 8 additions & 0 deletions src/graphql/data/fpt/graphql_upcoming_changes.public.yml
Original file line number Diff line number Diff line change
Expand Up @@ -7998,6 +7998,14 @@ upcoming_changes:
date: '2026-07-01T00:00:00+00:00'
criticality: breaking
owner: peter-evans
- location: User.viewerRelevantRepositories
description:
'`viewerRelevantRepositories` will be removed. Use viewerCopilotChatRepositorySuggestions
instead.'
reason: '`viewerRelevantRepositories` has been renamed to `viewerCopilotChatRepositorySuggestions`.'
date: '2026-10-01T00:00:00+00:00'
criticality: breaking
owner: github/client-apps-platform
- location: Artifact.databaseId
description: '`databaseId` will be removed. Use `fullDatabaseId` instead.'
reason:
Expand Down
16 changes: 8 additions & 8 deletions src/graphql/data/fpt/schema.docs.graphql
Original file line number Diff line number Diff line change
Expand Up @@ -4968,7 +4968,7 @@ Choose which tools must provide code scanning results before the reference is
updated. When configured, code scanning must be enabled and have results for
both the commit and the reference being updated.
"""
type CodeScanningParameters @docsCategory(name: "repos") {
type CodeScanningParameters {
"""
Tools that must provide code scanning results for this rule to pass.
"""
Expand All @@ -4980,7 +4980,7 @@ Choose which tools must provide code scanning results before the reference is
updated. When configured, code scanning must be enabled and have results for
both the commit and the reference being updated.
"""
input CodeScanningParametersInput @docsCategory(name: "repos") {
input CodeScanningParametersInput {
"""
Tools that must provide code scanning results for this rule to pass.
"""
Expand All @@ -4990,7 +4990,7 @@ input CodeScanningParametersInput @docsCategory(name: "repos") {
"""
A tool that must provide code scanning results for this rule to pass.
"""
type CodeScanningTool @docsCategory(name: "repos") {
type CodeScanningTool {
"""
The severity level at which code scanning results that raise alerts block a
reference update. For more information on alert severity levels, see "[About code scanning alerts](${externalDocsUrl}/code-security/code-scanning/managing-code-scanning-alerts/about-code-scanning-alerts#about-alert-severity-and-security-severity-levels)."
Expand All @@ -5013,7 +5013,7 @@ type CodeScanningTool @docsCategory(name: "repos") {
"""
A tool that must provide code scanning results for this rule to pass.
"""
input CodeScanningToolInput @docsCategory(name: "repos") {
input CodeScanningToolInput {
"""
The severity level at which code scanning results that raise alerts block a
reference update. For more information on alert severity levels, see "[About code scanning alerts](${externalDocsUrl}/code-security/code-scanning/managing-code-scanning-alerts/about-code-scanning-alerts#about-alert-severity-and-security-severity-levels)."
Expand Down Expand Up @@ -43662,7 +43662,7 @@ type PullRequest implements Assignable & Closable & Comment & Labelable & Lockab
"""
Array of allowed merge methods. Allowed values include `merge`, `squash`, and `rebase`. At least one option must be enabled.
"""
enum PullRequestAllowedMergeMethods @docsCategory(name: "pulls") {
enum PullRequestAllowedMergeMethods {
"""
Add all commits from the head branch to the base branch with a merge commit.
"""
Expand Down Expand Up @@ -55696,7 +55696,7 @@ enum RepositoryRuleOrderField @docsCategory(name: "repos") {
"""
The rule types supported in rulesets
"""
enum RepositoryRuleType @docsCategory(name: "repos") {
enum RepositoryRuleType {
"""
Authorization
"""
Expand Down Expand Up @@ -57814,7 +57814,7 @@ enum RuleEnforcement @docsCategory(name: "repos") {
"""
Types which can be parameters for `RepositoryRule` objects.
"""
union RuleParameters @docsCategory(name: "repos") =
union RuleParameters =
| BranchNamePatternParameters
| CodeScanningParameters
| CommitAuthorEmailPatternParameters
Expand All @@ -57836,7 +57836,7 @@ union RuleParameters @docsCategory(name: "repos") =
"""
Specifies the parameters for a `RepositoryRule` object. Only one of the fields should be specified.
"""
input RuleParametersInput @docsCategory(name: "repos") {
input RuleParametersInput {
"""
Parameters used for the `branch_name_pattern` rule type
"""
Expand Down
8 changes: 0 additions & 8 deletions src/graphql/data/fpt/schema.json
Original file line number Diff line number Diff line change
Expand Up @@ -13304,7 +13304,6 @@
"id": "codescanningparameters",
"href": "/graphql/reference/objects#codescanningparameters",
"description": "<p>Choose which tools must provide code scanning results before the reference is\nupdated. When configured, code scanning must be enabled and have results for\nboth the commit and the reference being updated.</p>",
"isDeprecated": false,
"fields": [
{
"name": "codeScanningTools",
Expand All @@ -13320,7 +13319,6 @@
"id": "codescanningtool",
"href": "/graphql/reference/objects#codescanningtool",
"description": "<p>A tool that must provide code scanning results for this rule to pass.</p>",
"isDeprecated": false,
"fields": [
{
"name": "alertsThreshold",
Expand Down Expand Up @@ -85567,7 +85565,6 @@
"id": "pullrequestallowedmergemethods",
"href": "/graphql/reference/enums#pullrequestallowedmergemethods",
"description": "<p>Array of allowed merge methods. Allowed values include <code>merge</code>, <code>squash</code>, and <code>rebase</code>. At least one option must be enabled.</p>",
"isDeprecated": false,
"values": [
{
"name": "MERGE",
Expand Down Expand Up @@ -86709,7 +86706,6 @@
"id": "repositoryruletype",
"href": "/graphql/reference/enums#repositoryruletype",
"description": "<p>The rule types supported in rulesets.</p>",
"isDeprecated": false,
"values": [
{
"name": "AUTHORIZATION",
Expand Down Expand Up @@ -91185,7 +91181,6 @@
"id": "ruleparameters",
"href": "/graphql/reference/unions#ruleparameters",
"description": "<p>Types which can be parameters for <code>RepositoryRule</code> objects.</p>",
"isDeprecated": false,
"possibleTypes": [
{
"name": "BranchNamePatternParameters",
Expand Down Expand Up @@ -93386,7 +93381,6 @@
"id": "codescanningparametersinput",
"href": "/graphql/reference/input-objects#codescanningparametersinput",
"description": "<p>Choose which tools must provide code scanning results before the reference is\nupdated. When configured, code scanning must be enabled and have results for\nboth the commit and the reference being updated.</p>",
"isDeprecated": false,
"inputFields": [
{
"name": "codeScanningTools",
Expand All @@ -93402,7 +93396,6 @@
"id": "codescanningtoolinput",
"href": "/graphql/reference/input-objects#codescanningtoolinput",
"description": "<p>A tool that must provide code scanning results for this rule to pass.</p>",
"isDeprecated": false,
"inputFields": [
{
"name": "alertsThreshold",
Expand Down Expand Up @@ -100774,7 +100767,6 @@
"id": "ruleparametersinput",
"href": "/graphql/reference/input-objects#ruleparametersinput",
"description": "<p>Specifies the parameters for a <code>RepositoryRule</code> object. Only one of the fields should be specified.</p>",
"isDeprecated": false,
"inputFields": [
{
"name": "branchNamePattern",
Expand Down
10 changes: 10 additions & 0 deletions src/graphql/data/fpt/upcoming-changes.json
Original file line number Diff line number Diff line change
Expand Up @@ -17,6 +17,16 @@
"owner": "github/actions-persistence"
}
],
"2026-10-01": [
{
"location": "User.viewerRelevantRepositories",
"description": "<p><code>viewerRelevantRepositories</code> will be removed. Use viewerCopilotChatRepositorySuggestions instead.</p>",
"reason": "<p><code>viewerRelevantRepositories</code> has been renamed to <code>viewerCopilotChatRepositorySuggestions</code>.</p>",
"date": "2026-10-01",
"criticality": "breaking",
"owner": "github/client-apps-platform"
}
],
"2026-07-01": [
{
"location": "Team.viewerSubscription",
Expand Down
8 changes: 8 additions & 0 deletions src/graphql/data/ghec/graphql_upcoming_changes.public.yml
Original file line number Diff line number Diff line change
Expand Up @@ -7998,6 +7998,14 @@ upcoming_changes:
date: '2026-07-01T00:00:00+00:00'
criticality: breaking
owner: peter-evans
- location: User.viewerRelevantRepositories
description:
'`viewerRelevantRepositories` will be removed. Use viewerCopilotChatRepositorySuggestions
instead.'
reason: '`viewerRelevantRepositories` has been renamed to `viewerCopilotChatRepositorySuggestions`.'
date: '2026-10-01T00:00:00+00:00'
criticality: breaking
owner: github/client-apps-platform
- location: Artifact.databaseId
description: '`databaseId` will be removed. Use `fullDatabaseId` instead.'
reason:
Expand Down
16 changes: 8 additions & 8 deletions src/graphql/data/ghec/schema.docs.graphql
Original file line number Diff line number Diff line change
Expand Up @@ -4968,7 +4968,7 @@ Choose which tools must provide code scanning results before the reference is
updated. When configured, code scanning must be enabled and have results for
both the commit and the reference being updated.
"""
type CodeScanningParameters @docsCategory(name: "repos") {
type CodeScanningParameters {
"""
Tools that must provide code scanning results for this rule to pass.
"""
Expand All @@ -4980,7 +4980,7 @@ Choose which tools must provide code scanning results before the reference is
updated. When configured, code scanning must be enabled and have results for
both the commit and the reference being updated.
"""
input CodeScanningParametersInput @docsCategory(name: "repos") {
input CodeScanningParametersInput {
"""
Tools that must provide code scanning results for this rule to pass.
"""
Expand All @@ -4990,7 +4990,7 @@ input CodeScanningParametersInput @docsCategory(name: "repos") {
"""
A tool that must provide code scanning results for this rule to pass.
"""
type CodeScanningTool @docsCategory(name: "repos") {
type CodeScanningTool {
"""
The severity level at which code scanning results that raise alerts block a
reference update. For more information on alert severity levels, see "[About code scanning alerts](${externalDocsUrl}/code-security/code-scanning/managing-code-scanning-alerts/about-code-scanning-alerts#about-alert-severity-and-security-severity-levels)."
Expand All @@ -5013,7 +5013,7 @@ type CodeScanningTool @docsCategory(name: "repos") {
"""
A tool that must provide code scanning results for this rule to pass.
"""
input CodeScanningToolInput @docsCategory(name: "repos") {
input CodeScanningToolInput {
"""
The severity level at which code scanning results that raise alerts block a
reference update. For more information on alert severity levels, see "[About code scanning alerts](${externalDocsUrl}/code-security/code-scanning/managing-code-scanning-alerts/about-code-scanning-alerts#about-alert-severity-and-security-severity-levels)."
Expand Down Expand Up @@ -43662,7 +43662,7 @@ type PullRequest implements Assignable & Closable & Comment & Labelable & Lockab
"""
Array of allowed merge methods. Allowed values include `merge`, `squash`, and `rebase`. At least one option must be enabled.
"""
enum PullRequestAllowedMergeMethods @docsCategory(name: "pulls") {
enum PullRequestAllowedMergeMethods {
"""
Add all commits from the head branch to the base branch with a merge commit.
"""
Expand Down Expand Up @@ -55696,7 +55696,7 @@ enum RepositoryRuleOrderField @docsCategory(name: "repos") {
"""
The rule types supported in rulesets
"""
enum RepositoryRuleType @docsCategory(name: "repos") {
enum RepositoryRuleType {
"""
Authorization
"""
Expand Down Expand Up @@ -57814,7 +57814,7 @@ enum RuleEnforcement @docsCategory(name: "repos") {
"""
Types which can be parameters for `RepositoryRule` objects.
"""
union RuleParameters @docsCategory(name: "repos") =
union RuleParameters =
| BranchNamePatternParameters
| CodeScanningParameters
| CommitAuthorEmailPatternParameters
Expand All @@ -57836,7 +57836,7 @@ union RuleParameters @docsCategory(name: "repos") =
"""
Specifies the parameters for a `RepositoryRule` object. Only one of the fields should be specified.
"""
input RuleParametersInput @docsCategory(name: "repos") {
input RuleParametersInput {
"""
Parameters used for the `branch_name_pattern` rule type
"""
Expand Down
Loading
Loading