Skip to content

Commit 25bc496

Browse files
committed
Removing unneeded docs as it will be covered in another ticket
1 parent a74b02d commit 25bc496

File tree

1 file changed

+0
-44
lines changed

1 file changed

+0
-44
lines changed

pages/pipelines/secrets.md

Lines changed: 0 additions & 44 deletions
Original file line numberDiff line numberDiff line change
@@ -162,47 +162,3 @@ steps:
162162
https://api.github.com/repos/my-org/my-app/deployments
163163
```
164164
{: codeblock-file="pipeline.yml"}
165-
166-
## Audit Logging for Secrets
167-
[Audit Log](/docs/pipelines/audit-log) also includes the transactions in which secrets are accessed.
168-
169-
>📘 Secret audit logging does not contain the value of the secret.
170-
171-
172-
This enables visibility into which secrets were accessed by whom and when. The following operations will be audited:
173-
* Creating a secret:
174-
- **Who:**
175-
- **What:**
176-
- **Where:**
177-
- **When:**
178-
* Deleting a secret:
179-
- **Who:**
180-
- **What:**
181-
- **Where:**
182-
- **When:**
183-
* Reading the value of a secret:
184-
- **Who:**
185-
- **What:**
186-
- **Where:**
187-
- **When:**
188-
* Querying a secret:
189-
- **Who:**
190-
- **What:**
191-
- **Where:**
192-
- **When:**
193-
* Updating the value of a secret:
194-
- **Who:**
195-
- **What:**
196-
- **Where:**
197-
- **When:**
198-
199-
200-
The following GraphQL `Audit Event` types are available for secrets and you can find more details about them in the in the [GraphQL explorer](https://buildkite.com/docs/apis/graphql-api#getting-started).
201-
202-
```
203-
SECRET_CREATED
204-
SECRET_DELETED
205-
SECRET_QUERIED
206-
SECRET_READ
207-
SECRET_UPDATED
208-
```

0 commit comments

Comments
 (0)