Some Forge apps experienced increased 429 "Too Many Requests" errors when calling Jira REST APIs, causing disruption for end users of affected applications. The issue was caused by gateway-level rate limiting that prevented apps from making successful API calls, while Confluence APIs remained unaffected. Atlassian resolved the incident after 33.3 hours by implementing initial remediation through increased rate limits, followed by additional mitigations that restored normal service operations.
Trusted by 1,000+ teams
Stop finding out about outages from your users. Monitor 6,320+ cloud services and get alerted the second something breaks.
The issue has now been resolved, and the service is operating normally for all affected customers.
The performance degradation has been resolved, and services are now operating normally for all affected customers. We will continue to monitor performance closely to confirm stability.
We continue to see improvements in error rates, and our teams are evaluating further mitigation to expedite resolution.
After the initial remediation, we are seeing improvements and our teams continue to monitor the situation closely to confirm stability.
We will share further updates within the next 8 hours, or sooner if there are any major developments.
Our teams have implemented initial remediation by increasing certain rate limits, and we will continue to monitor the situation closely to confirm stability. We will share further updates within the next 8 hours, or sooner if we have any meaningful developments to report.
We are aware that some Forge apps are experiencing an increased number of 429 Too Many Requests errors when making calls to the Jira REST API.
This is causing disruption for end users of affected apps.
Confluence APIs are not impacted.
If your app is impacted by this issue, the 429 response will contain the following headers:
X-Failure-Category: FAILURE CLIENT RATE LIMITED
X-Ratelimit-Limit: 360000
X-Ratelimit-Remaining: 0
Note that this gateway-level rate limiting does not return a Retry-After header. You can use the X-Ratelimit-Reset header to determine when the rate limit window resets and implement a backoff strategy accordingly.
Our teams are investigating this issue with urgency, and we will provide an update within two hours.
With IsDown, you can monitor all your critical services' official status pages from one centralized dashboard and receive instant alerts the moment an outage is detected. Say goodbye to constantly checking multiple sites for updates and stay ahead of outages with IsDown.
Start free trialNo credit card required · Cancel anytime · 6320 services available
Integrations with