title | intro | permissions | redirect_from | versions | topics | shortTitle | |||||||||
---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
Viewing code scanning logs | You can view the output generated during {% data variables.product.prodname_code_scanning %} analysis in {% data variables.product.github %}. | {% data reusables.permissions.code-scanning-pr-alerts %} |
|
|
| View code scanning logs |
{% data reusables.code-scanning.enterprise-enable-code-scanning-actions %}
You can use a variety of tools to configure {% data variables.product.prodname_code_scanning %} in your repository. For more information, see AUTOTITLE and AUTOTITLE.
The log and diagnostic information available to you depends on the method you use for {% data variables.product.prodname_code_scanning %} in your repository. You can check the type of {% data variables.product.prodname_code_scanning %} you're using in the Security tab of your repository, by using the Tool drop-down menu in the alert list. For more information, see AUTOTITLE.
You can see analysis and diagnostic information for {% data variables.product.prodname_code_scanning %} run using {% data variables.product.prodname_codeql %} analysis on {% data variables.product.prodname_dotcom %}.
Analysis information is shown for the most recent analysis in a header at the top of the list of alerts. For more information, see AUTOTITLE.
Diagnostic information is displayed in the Action workflow logs and consists of summary metrics and extractor diagnostics. For information about accessing {% data variables.product.prodname_code_scanning %} logs on {% data variables.product.prodname_dotcom %}, see Viewing the logging output from {% data variables.product.prodname_code_scanning %} below.
If you're using the {% data variables.product.prodname_codeql_cli %} outside {% data variables.product.prodname_dotcom %}, you'll see diagnostic information in the output generated during database analysis. This information is also included in the SARIF results file you upload to {% data variables.product.prodname_dotcom %} with the {% data variables.product.prodname_code_scanning %} results.
For information about the {% data variables.product.prodname_codeql_cli %}, see AUTOTITLE.
{% data reusables.code-scanning.summary-metrics %}
{% data reusables.code-scanning.extractor-diagnostics %}
You can see more detailed information about {% data variables.product.prodname_codeql %} extractor errors and warnings that occurred during database creation by enabling debug logging. For more information, see AUTOTITLE.
This section applies to {% data variables.product.prodname_code_scanning %} run using {% data variables.product.prodname_actions %} ({% data variables.product.prodname_codeql %} or third-party).
After configuring {% data variables.product.prodname_code_scanning %} for your repository, you can watch the output of the actions as they run.
{% data reusables.repositories.actions-tab %}
You'll see a list that includes an entry for running the {% data variables.product.prodname_code_scanning %} workflow. The text of the entry is the title you gave your commit message.
Click the entry for the {% data variables.product.prodname_code_scanning %} workflow.
[!NOTE] If you are looking for the {% data variables.product.prodname_codeql %} workflow run triggered by enabling default setup, the text of the entry is "{% data variables.product.prodname_codeql %}."
Click the job name on the left. For example, Analyze (LANGUAGE).
Review the logging output from the actions in this workflow as they run.
Optionally, to see more detail about the commit that triggered the workflow run, click the short commit hash. The short commit hash is 7 lowercase characters immediately following the commit author's username.
Once all jobs are complete, you can view the details of any {% data variables.product.prodname_code_scanning %} alerts that were identified. For more information, see AUTOTITLE.
{% ifversion org-private-registry %}
Determining whether {% data variables.product.prodname_code_scanning %} default setup used any private registries
{% data variables.product.prodname_code_scanning_caps %} default setup includes a Setup proxy or registries
step. When you are looking at a log file for default setup, you can expand this step. If the step includes:
Using registries_credentials input.
At least one private registry is configured for the organization.Credentials loaded for the following registries:
- No further output in the step. Access was unsuccessful.
Type: nuget_feed;
Default set up accessed a private Nuget feed.Type: maven_repository;
Default set up accessed a private Maven repository.
For more information, see AUTOTITLE.
{% endif %}