Azure-Sentinel/DataConnectors/GitHub
pensivepaddle 272a029e17
Update readme.md
Fixed markdown hyperlinks.
2024-01-29 10:44:16 +01:00
..
ORGS.json Readme 2020-06-02 15:28:47 +00:00
azuredeploy.json Update azuredeploy.json GitHubVulnAlerts App 2020-10-08 19:39:03 -04:00
lastrun-Audit.json more fixes 2020-06-10 02:01:38 +00:00
readme.md Update readme.md 2024-01-29 10:44:16 +01:00

readme.md

Ingest GitHub AuditLog and API Data

Author: Nicholas DiCola

Get-GitHubAuditEntry playbook ingests GitHub AuditLog via GraphQL events and writes them to a custom log table called GitHub_CL. Get-GitHubRepoLogs playbook ingests GitHub Traffic Logs data and writes them to a custom log table called GitHubRepoLogs_CL. Get-GitHubVulnerabilityAlerts playbook ingests GitHub Security Vulnerability data and writes them to a custom log table called GitHubRepoLogs_CL

There are a number of configuration steps required to deploy the Logic App playbooks.

Configuration Steps

  1. Generate a GitHub Personal Access Token. GitHub user settings -> Developer settings -> Personal access tokens.
  2. Get the objectId for a user that the Logic App can use. Azure Portal -> Azure Active Directory -> Users -> User. This user will be used to grant access to the Key Vault secret.
  3. Deploy the ARM template and fill in the parameters.
"PersonalAccessToken": This is the GITHUB PAT
"UserName": A user that will be granted access to the key vault
"principalId": The user object ID for the user
"workspaceId": The Sentinel Workspace ID
"workSpaceKey": The Sentinel Workspace Key
  1. There are two json files (ORGS.json and lastrun-Audit.json).
  2. Edit the ORGS.json file and update "org": "sampleorg" and replace sample org with your org name. If you have addtional orgs, add another line {"org": "sampleorg"} for each org.
  3. Upload the ORGS.json, and lastrun-Audit.json to the storage account githublogicapp container.
  4. Go to the keyvault-GitHubPlaybooks connection resource.
  5. Click Edit API Connection.
  6. Click Authorize. Sign in as the user. Click Save.
  7. The playbooks are deployed as disabled since the json files and connection has to be authorized. Go to each playbook and click Enable.

Note: there are two parsers here to make the logs useful

Deploy the Logic App template

Deploy to Azure Deploy to Azure Gov