-
-
Notifications
You must be signed in to change notification settings - Fork 4k
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
Grouping Investigations #48398
Comments
NOTES:
Some notes from Slack: The advantage of rules like Since I removed the rule, you can see that we’re getting more than 1 group per transaction (see screenshot). The screenshot below shows that both IIUC It all comes from a call to a socket’s connect that fails (link to code) Should we consider grouping certain network calls based on their transaction or module? Perhaps in the UI, we give a setting to customers to choose if to NOT group certain network calls. Perhaps this is a TSC topic or bad idea right away. |
Filed and it won't be fixed due to the large amount of work. The context-line changes, thus, it creates a new group. NOTE: I grouped them already by hand. This code landed and it changed the line where the error is produced. The error used come from for user in get_suspect_commit_users(project, event) but now it comes from get_suspect_commit_users(project, event): See how the context-line changes: |
There's a Django project (project_id=4149647787) (filed) that uses The Electron SDK (filed) includes the user paths in the |
create a way to see number of groups per platform across orgs (filed). |
Arpad mentioned that this may not be a valid grouping issue:
|
Everything in this issue has been tracked internally as part of the project. |
The text was updated successfully, but these errors were encountered: