Integrating GitHub Enterprise Cloud

Integrating GitHub Enterprise Cloud

You can use GitHub's API to build scripts and applications that automate processes, integrate with GitHub, and extend GitHub. For example, you could use the API to triage issues, build an analytics dashboard, or manage releases.

GitHub integration facilitates the following:

  • The GitHub audit log records all events related to the GitHub organization.

  • The Code Scanning lets you retrieve all security vulnerabilities and coding errors from a repository setup using the GitHub Advanced Security Code Scanning feature

  • The GitHub Secret Scanning lets you retrieve secret scanning for advanced security alerts from a repository setup using GitHub Advanced Security Secret Scanning feature

  • The GitHub Dependabot lets you retrieve known vulnerabilities in dependencies from a repository setup using the GitHub Advanced Security Dependabot feature

Requirements

  • A business account is required to use the GitHub integration.

  • You must be an organization owner.

  • You must be using Github Enterprise Cloud.

  • You must use a Personal Access Token with read:audit_log scope.

  • Elasticsearch is needed to store and search data, and Kibana is needed for visualizing and managing it. You can use our hosted Elasticsearch Service on Elastic Cloud, which is recommended, or self-manage the Elastic Stack on your hardware.

Set up an Events Reporting integration

  1. In the upper-right corner of any page, click your profile photo, then click Settings.

    Events Reporting.png

     

  2. In the left sidebar, click Developer settings.

  3. In the left sidebar, under Personal Access Tokens, click Tokens (classic).

  4. Select Generate new token, then click Generate new token (classic).

  5. In the Note, give your token a descriptive name.

  6. To give your token an expiration, select Expiration, then choose a default option or click Custom to enter a date.

  7. Set the following Access Token scopes:

    Access Token.png
    Access Token 2.png

  8. Click Generate token.

  9. Optionally, to copy the new token to your clipboard, click copy.

    Token.png

     

To be able to use GitHub Secret Scanning, you must have the secret_scanning_alerts read permission. Or you must be an administrator for the repository or the organization that owns the repository, and you must use a personal access token with the repo scope or security_events scope. For public repositories, you may instead use the public_repo scope.

Enable GitHub In XDR Dashboard
  1. In Barracuda XDR Dashboard, click Integrations Integrations.png.

  2. On the GitHub card, click Setup.

  3. Select the Enable check box.

  4. Enter the following values:

    • Organization Name

    • Access Token

    • API URL

      Dashboard.png

  5. Optionally, click Test to check the credentials' validity.

  6. Click Save.

 


We value your feedback.
If you have questions, suggestions, or feedback on our documentation, contact the Campus Product Documentation team.
For general product inquiries or technical support, please contact the global Barracuda Support team.