Atlassian incident · via Atlassian Developer

Some Forge apps experiencing increased Jira API rate limiting errors (429)

Major Resolved View vendor source →
Started
Apr 22, 2026, 06:57 AM UTC
Resolved
Apr 23, 2026, 04:14 PM UTC
Duration
1d 9h
Detected by Pingoru
Apr 22, 2026, 06:57 AM UTC

Affected components

Bitbucket Cloud APIsApp listing managementApp DeploymentApp listingsConfluence Cloud APIsArtifactory (Maven repository)Atlassian Support contact formApp pricingJira Cloud APIsCreate and manage appsDeveloper communityDeveloper documentationDeveloper service deskApp submissionsAuthentication and user managementProduct EventsMarketplace service deskUser APIsCategory landing pagesForge App InstallationWebhooksEvaluations and purchasesAtlassian SupportForge CDN (Custom UI)In-product Marketplace and app installation (Cloud)Forge Function InvocationWeb TriggersVulnerability management [AMS]In-product Marketplace and app installation (Server)aui-cdn.atlassian.comNotificationsForge App LogsPrivate listingsForge App MonitoringReporting APIs and dashboardsDeveloper consoleSearchForge direct app distributionVendor managementHosted storageVendor Home PageForge CLIEnd-user consentForge App AlertsApp Data ResidencyForge SQLForge MonetisationForge Feature Flags Evaluations

Update timeline

  1. investigating Apr 22, 2026, 06:57 AM UTC

    We are aware that some Forge apps are experiencing an increased number of 429 Too Many Requests errors when making calls to the Jira REST API. This is causing disruption for end users of affected apps. Confluence APIs are not impacted. If your app is impacted by this issue, the 429 response will contain the following headers: X-Failure-Category: FAILURE CLIENT RATE LIMITED X-Ratelimit-Limit: 360000 X-Ratelimit-Remaining: 0 Note that this gateway-level rate limiting does not return a Retry-After header. You can use the X-Ratelimit-Reset header to determine when the rate limit window resets and implement a backoff strategy accordingly. Our teams are investigating this issue with urgency, and we will provide an update within two hours.

  2. identified Apr 22, 2026, 08:53 AM UTC

    Our teams have implemented initial remediation by increasing certain rate limits, and we will continue to monitor the situation closely to confirm stability. We will share further updates within the next 8 hours, or sooner if we have any meaningful developments to report.

  3. identified Apr 22, 2026, 04:21 PM UTC

    After the initial remediation, we are seeing improvements and our teams continue to monitor the situation closely to confirm stability. We will share further updates within the next 8 hours, or sooner if there are any major developments.

  4. identified Apr 22, 2026, 11:29 PM UTC

    We continue to see improvements in error rates, and our teams are evaluating further mitigation to expedite resolution.

  5. monitoring Apr 23, 2026, 03:27 PM UTC

    The performance degradation has been resolved, and services are now operating normally for all affected customers. We will continue to monitor performance closely to confirm stability.

  6. resolved Apr 23, 2026, 04:14 PM UTC

    The issue has now been resolved, and the service is operating normally for all affected customers.

Looking to track Atlassian downtime and outages?

Pingoru polls Atlassian's status page every 5 minutes and alerts you the moment it reports an issue — before your customers do.

  • Real-time alerts when Atlassian reports an incident
  • Email, Slack, Discord, Microsoft Teams, and webhook notifications
  • Track Atlassian alongside 5,000+ providers in one dashboard
  • Component-level filtering
  • Notification groups + maintenance calendar
Start monitoring Atlassian for free

5 free monitors · No credit card required