activity_dashboard_events_by_actionactivity_dashboard_events_by_actoractivity_dashboard_events_by_orgactivity_dashboard_events_by_repositoryactivity_dashboard_events_by_source_ipactivity_dashboard_secret_scanning_alertsactivity_dashboard_total_eventsbranch_protection_disabledbranch_protection_policy_overriddenorganization_application_installedorganization_application_uninstalledorganization_ip_allow_list_entry_updatedorganization_moderator_addedorganization_moderator_removedorganization_ownership_transferredorganization_two_factor_authentication_disabledorganization_user_addedorganization_user_granted_owner_roleorganization_user_removedpersonal_access_token_grantedrepository_archivedrepository_member_updatedrepository_visibility_set_publicrepository_vulnerability_alert_dismissed
Query: branch_protection_policy_overridden
Usage
powerpipe query github_audit_log_detections.query.branch_protection_policy_overridden
Tailpipe Tables
SQL
select tp_timestamp as timestamp, action as operation, concat( 'https://github.com/', repo, '/commit/', additional_fields ->> 'after' ) as resource, actor, tp_source_ip as source_ip, tp_index as organization, split_part(repo, '/', 2) as repository, tp_id as source_id, * exclude (actor, timestamp)from github_audit_logwhere action = 'protected_branch.policy_override'order by tp_timestamp desc;
Detections
The query is being used by the following detections: