You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
Copy file name to clipboardExpand all lines: content/code-security/code-scanning/troubleshooting-sarif-uploads/results-exceed-limit.md
+22Lines changed: 22 additions & 0 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -25,6 +25,7 @@ redirect_from:
25
25
Analysis SARIF file exceeded alert limits
26
26
Rule tags in SARIF file exceed limits
27
27
Alert in SARIF upload exceeded thread flow location limits
28
+
Repository is at risk of exceeding the alert limit.
28
29
29
30
# SARIF results exceed hard limit
30
31
Alert(s) in SARIF file exceeded thread flow location limits
@@ -34,6 +35,7 @@ redirect_from:
34
35
Analysis SARIF file rejected due to result limits
35
36
Analysis SARIF file rejected due to rule limits
36
37
Analysis SARIF file rejected due to run limits
38
+
All analysis uploads blocked due to alert limit
37
39
```
38
40
39
41
{% data variables.product.prodname_code_scanning_caps %} sets two types of limits on fields in SARIF results files.
@@ -85,3 +87,23 @@ The best way to resolve this problem is usually to identify the query that repor
85
87
## Fixing "Analysis SARIF file rejected due to rule tag limits"
86
88
87
89
You need to update the SARIF file or the generator so that the array of tags reported for each `reportingDescriptor` object is fewer than 10. For more information, see `properties.tags[]` in "[AUTOTITLE](/code-security/code-scanning/integrating-with-code-scanning/sarif-support-for-code-scanning#reportingdescriptor-object)."
90
+
91
+
## Fixing "Repository is at risk of exceeding the alert limit" & "All analysis uploads blocked due to alert limit"
92
+
93
+
This limit is triggered by a repository producing more unique alerts than should ever exist as part of a well functioning {% data variables.product.prodname_code_scanning %} configuration.
94
+
It is possible that this is due to the output of a third-party tool being used, and may not be a user configuration error.
95
+
Both user configuration error and tool vendor error are possible causes.
96
+
97
+
There are a few steps to fix this problem.
98
+
99
+
1. Look at the SARIF files you are producing to identify the cause of {% data variables.product.prodname_code_scanning %} alerts being classed as distinct across runs of a tool. Usually this is due to one of the following:
100
+
* The SARIF `artifactLocation.uri` property (filepath in the {% data variables.product.prodname_code_scanning %} alert user interface) is not deterministic due to the inclusion of temporary directories or generated file names.
101
+
* The tool used produces unstable SARIF rule names or `artifactLocation object uri property` values, which is usually the result of using hashes (from git commits or docker image SHAs, for example) or other sources of data that change across runs or environments.
102
+
1. Once you have identified the source of the issue, you should update your configuration accordingly, and contact the tool vendor if their tool is the source of the unstable SARIF results.
103
+
1. Stop uploading code scanning results for any third-party tools that produce non-deterministic output until they have been fixed by the tool vendor.
104
+
105
+
### Additional steps for "All analysis uploads blocked due to alert limit"
106
+
107
+
On top of fixing the code scanning configuration and removing or fixing the output of third-party tools, you will need to contact {% data variables.contact.contact_support %} to assist you in deleting the alerts for any offending configurations.
108
+
109
+
**There is no self-service method for deleting alerts at this time, so contacting customer support is neccessary before code-scanning can be re-enabled.**
0 commit comments