github-docs-arabic-enhanced / content /code-security /code-scanning /troubleshooting-sarif-uploads /default-setup-enabled.md
| title: 'Upload was rejected because CodeQL default setup is enabled for {% data variables.product.prodname_code_scanning %}' | |
| shortTitle: Default setup is enabled | |
| allowTitleToDifferFromFilename: true | |
| intro: 'You cannot upload SARIF results generated by the {% data variables.product.prodname_codeql %} action or {% data variables.product.prodname_codeql %} CLI when default setup for {% data variables.product.prodname_code_scanning %} is enabled. Check your configuration and decide whether to keep default setup or unblock SARIF upload.' | |
| type: reference | |
| topics: | |
| - Code scanning | |
| - Errors | |
| - SARIF | |
| - Troubleshooting | |
| versions: | |
| fpt: '*' | |
| ghes: '*' | |
| ghec: '*' | |
| redirect_from: | |
| - /code-security/code-scanning/troubleshooting-sarif/default-setup-enabled | |
| ## About this error | |
| ```text | |
| Upload with CodeQL results rejected due to "default setup" | |
| ``` | |
| This error is reported if a process attempts to upload a SARIF file containing results of {% data variables.product.prodname_codeql %} analysis to a repository where {% data variables.product.prodname_codeql %} default setup is enabled. This includes uploads using the REST API and the {% data variables.product.prodname_codeql_cli %}. SARIF uploads are blocked when {% data variables.product.prodname_codeql %} default setup is enabled to reduce the potential for users to be confused by seeing similar {% data variables.product.prodname_code_scanning %} alerts generated by different systems. | |
| You will only see this error for SARIF files that contain results created using {% data variables.product.prodname_codeql %}. | |
| ## Confirming the cause of the error | |
| {% data reusables.repositories.navigate-to-repo %} | |
| {% data reusables.repositories.sidebar-settings %} | |
| {% data reusables.repositories.navigate-to-code-security-and-analysis %} | |
| 1. In the "{% data variables.product.UI_code_security_scanning %}" section of the page, next to "{% data variables.product.prodname_codeql %} analysis," click {% octicon "kebab-horizontal" aria-label="Menu" %}. | |
| 1. If there is a **{% octicon "workflow" aria-hidden="true" aria-label="workflow" %} Switch to advanced** option, default setup is enabled for the repository. | |
| ## Fixing the problem | |
| Before you can fix the problem, you need to decide whether {% data variables.product.prodname_code_scanning %} alerts from {% data variables.product.prodname_codeql %} analysis in this repository should be generated using default setup or uploaded from SARIF files. | |
| ### Continuing to generate alerts using default setup | |
| 1. Leave the repository settings as they are, with default setup enabled. | |
| 1. Disable the process or processes that tried to upload SARIF files to the repository. | |
| ### Disabling default setup to unblock SARIF upload | |
| 1. In the "{% data variables.product.prodname_code_scanning_caps %}" section of the page, next to "{% data variables.product.prodname_codeql %} analysis," from the {% octicon "kebab-horizontal" aria-label="Menu" %} menu select **{% octicon "stop" aria-hidden="true" aria-label="stop" %} Disable {% data variables.product.prodname_codeql %}**. | |
| {% data reusables.code-scanning.sarif-upload-retry %} | |