Skip to content
Open
Show file tree
Hide file tree
Changes from 1 commit
Commits
File filter

Filter by extension

Filter by extension

Conversations
Failed to load comments.
Loading
Jump to
Jump to file
Failed to load files.
Loading
Diff view
Diff view
Prev Previous commit
Next Next commit
wip
  • Loading branch information
cbehera-newrelic committed Oct 28, 2025
commit c4f0f413af35baeecdd7529166a4f5002acdeb36
Original file line number Diff line number Diff line change
@@ -1,5 +1,5 @@
---
title: Service Architecture Intelligence with GitHub Cloud Integration
title: Service Architecture Intelligence with GitHub cloud integration
tags:
- New Relic integrations
- GitHub integration
Expand Down
Original file line number Diff line number Diff line change
@@ -1,5 +1,5 @@
---
title: Service Architecture Intelligence with GitHub Enterprise Integration
title: Service Architecture Intelligence with GitHub Enterprise (On-prem)
tags:
- New Relic integrations
- GitHub Enterprise integration
Expand All @@ -21,7 +21,6 @@ This integration streamlines the onboarding process for users and teams, simplif
**Prerequisites**

* Login to your GitHub Enterprise account you plan to integrate with New Relic.
Copy link
Contributor

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

Suggested change
* Login to your GitHub Enterprise account you plan to integrate with New Relic.
* Login to the GitHub Enterprise account you plan to integrate with New Relic.

Copy link
Contributor

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

How is signing in a prerequisite?

* You must be the Organization Manager or Authentication Domain Manager.
* Docker environment to run the collector service within your GHE network.

**To set up the GitHub Enterprise integration:**
Expand All @@ -40,7 +39,7 @@ This integration streamlines the onboarding process for users and teams, simplif
<tr>
<th>Variable</th>
<th>Source</th>
<th>How to Obtain</th>
<th>How to obtain</th>
</tr>
</thead>
<tbody>
Expand Down Expand Up @@ -77,15 +76,55 @@ This integration streamlines the onboarding process for users and teams, simplif
</tbody>
</table>

The following are optional environment variables for making API HTTPS.

<table>
<thead>
<tr>
<th>Optional Variable</th>
<th>Source</th>
<th>How to obtain</th>
</tr>
</thead>
<tbody>
<tr>
<td>`SERVER_SSL_KEY_STORE`</td>
<td>SSL Configuration</td>
<td>Path to the SSL keystore file for HTTPS configuration.</td>
</tr>
<tr>
<td>`SERVER_SSL_KEY_STORE_PASSWORD`</td>
<td>SSL Configuration</td>
<td>Password for the SSL keystore file.</td>
</tr>
<tr>
<td>`SERVER_SSL_KEY_STORE_TYPE`</td>
<td>SSL Configuration</td>
<td>Type of the SSL keystore (e.g., PKCS12, JKS).</td>
</tr>
<tr>
<td>`SERVER_SSL_KEY_ALIAS`</td>
<td>SSL Configuration</td>
<td>Alias for the SSL key within the keystore.</td>
</tr>
<tr>
<td>`SERVER_PORT`</td>
<td>SSL Configuration</td>
<td>Server port for HTTPS communication. Use 8443 for HTTPS.</td>
</tr>
</tbody>
</table>

3. **Deploy the collector service**: The collector service is delivered as a Docker image. Deployment can be done in one of two ways:

**Option A: Using Docker Compose (Recommended)**

We will provide a sample Docker Compose file that automates the download and deployment of the service.

1. Download the provided Docker Compose file.
2. Configure the environment variables from step 2.
3. Run the following command:
a. Download the provided Docker Compose file.
b. Configure the environment variables as described in step 2.
c. Run the following command:

```bash
docker-compose up -d
```
Expand Down