New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
Sentry 24.4.2 and severe log spam from clickhouse/snuba #3042
Comments
I created this ticket following comments from @tm-artemb, @peektoseen and @krzysieqq here: #2963 (comment) |
The spam is caused by the rust consumer. Please refer to this comment #2876 (comment) or getsentry/snuba#5707 (comment) If changing that fixed the problem, please let me know, and I'll close this issue :D |
Reverting to Python fixes the issue, but there is a real bug to be fixed in snuba rust consumers. |
The issue's already there, see getsentry/snuba#5707 |
Thank you for the help here. |
Self-Hosted Version
24.4.2
CPU Architecture
x86_64
Docker Version
26.1.2
Docker Compose Version
2.27.0
Steps to Reproduce
Ensure you blocked HTTP and HTTPS to your sentry instance.
Simply restart everything with
docker compose up -d --force-recreate
Look at the logs.
Expected Result
Logs contain valuable information
Actual Result
Logs are constantly spammed with a high volume of:
Event ID
No response
The text was updated successfully, but these errors were encountered: