-
-
Notifications
You must be signed in to change notification settings - Fork 1.7k
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
Error monitoring of the self-hosted installer #1679
Conversation
There was a problem hiding this comment.
Choose a reason for hiding this comment
The reason will be displayed to describe this comment to others. Learn more.
Nice!
There was a problem hiding this comment.
Choose a reason for hiding this comment
The reason will be displayed to describe this comment to others. Learn more.
This will be great! Thanks!
Some questions though:
- Can non-sentry collaborator (myself :) ) view these logs and if yes, how?
- Do we have a sample log of what will be sent?
I'd also suggest adding some uuid (some hash of IP?) which gets printed and gets sent. Then we can ask users their uuid to view their logs on our instance too. I'm not sure about privacy/policy issues this may brought, but as we're already getting users' IP, I don't think a hash of that would be a problem. This can be pasted in github in public too without a problem.
The sentry instance is not SaaS, so I'll talk to @chadwhitacre about if this would be possible.
We don't, but I could generate one. It is the same as the default log we store locally after installation.
This is a good idea. I am worried that someone could just enumerate all hashes of IPs (there aren't that many IPv4s) and so it wouldn't be secret. I'll have to think about a better source for the hash but I think this is a good idea overall. |
I am checking with Legal to see what we can offer here. At the very least Sentry has a feature for sharing public links to specific events, I don't have a ton of experience with it but once we start collecting data we can experiment with this to see if it's anonymized enough. Here's a contrived example (I'm not finding mention of this in the docs): https://self-hosted.getsentry.net/share/issue/81cdf4322c86473e8fd7662aac0f8d51/ |
There was a problem hiding this comment.
Choose a reason for hiding this comment
The reason will be displayed to describe this comment to others. Learn more.
A few open items. Looking good so far!
Co-authored-by: Chad Whitacre <[email protected]>
I hate to say it but I think we should check for whether there is a |
lol, just tried running the Perhaps it was failing in the first place due to syntax issues and we never got around to verifying that. I don't even think we need to include separate logic for arm64 |
well, pushed up changes! could use some assistance just to confirm that this works |
Here's what I get:
What do you think @ethanhs? Is this okay to ship? |
I think with one or two minor changes!
I think this is still an issue? But I'm not sure why it is happening tbh. I wanted to hash the traceback as a means of making the issues grouped based on traceback, but it seems that isn't happening... |
I do see an event showing up, so it appears to work despite the warning. |
I'm not going to block on this. Generally the exit code will likely be stable, it was a bit of a fluke that it varied for us.
I think it's happening because the exit code is not included in the traceback, it only appears in |
To add more context for the warning
I get that for other images we use in |
https://docs.docker.com/desktop/mac/apple-silicon/ That makes it sound like we have to be explicit, but we're not. 🤔 |
We set self-hosted/install/detect-platform.sh Lines 18 to 23 in 0e1239c
So why does it say, "and no specific platform was requested"? |
lolsob |
What's also interesting is that I don't get that warning when pulling sentry-cli:latest
|
Ok then I think this is ready, @chadwhitacre want to give it the green check-mark? |
Oh wow @hubertdeng123 I wonder if the delta between your env and mine is related to what we're seeing on #1671? I think we're good here though. We use |
This is what I was thinking as well. |
Okay, pushed one more commit 5df2ab6 to fail gracefully, if the I'm ready to merge if yinz are! |
In getsentry/self-hosted#1679 we require a `.reporterrors` file, this adds it to the cloudbuild config.
In this PR we:
This seems to work if I sprinkle a "false" into one of the files in
install/
and the grouping seems to work correctly too.Fixes #740