ScyllaDB University LIVE, FREE Virtual Training Event | March 21
Register for Free
ScyllaDB Documentation Logo Documentation
  • Server
  • Cloud
  • Tools
    • ScyllaDB Manager
    • ScyllaDB Monitoring Stack
    • ScyllaDB Operator
  • Drivers
    • CQL Drivers
    • DynamoDB Drivers
  • Resources
    • ScyllaDB University
    • Community Forum
    • Tutorials
Download
ScyllaDB Docs ScyllaDB Open Source Troubleshooting ScyllaDB Errors and Support How to Report a ScyllaDB Problem

Caution

You're viewing documentation for a previous version. Switch to the latest stable version.

How to Report a ScyllaDB Problem¶

In the event there is an issue you would like to report to ScyllaDB support, you need to submit logs and other files which help the support team diagnose the issue. Only the ScyllaDB support team members can read the data you share.

In general, there are two types of issues:

  • Scylla failure - There is some kind of failure, possibly due to a connectivity issue, a timeout, or otherwise, where the Scylla server or the Scylla nodes are not working. These cases require you to send ScyllaDB support both a Health Check Report as well as Core Dump files (if available).

  • Scylla performance - you have noticed some type of degradation of service with Scylla reads or writes. If it is clearly a performance case and not a failure, refer to Report a performance problem.

Once you have used our diagnostic tools to report the current status, you need to Send files to ScyllaDB support for further analysis.

Make sure the Scylla system logs are configured properly to report info level messages: install debug info.

Note

If you are unsure which reports need to be included, Open a support ticket or GitHub issue and consult with the ScyllaDB team.

Health Check Report¶

The Health Check Report is a script which generates:

  • An archive file (output_files.tgz) containing configuration data (hardware, OS, Scylla SW, etc.)

  • System logs

  • A Report file (<node_IP>-health-check-report.txt) based on the collected info.

If your node configuration is identical across the cluster, you only need to run the script once on one node. If not you will need to run the script on multiple nodes.

Note

In order to generate a full health check report, scylla-server and scylla-jmx must be running. Note that the script will alert you if either one is not running. By default, the script looks for scylla-jmx via port 7199. If you are running it on a different port, you will have to provide the port number at runtime.

Prepare Health Check Report¶

Procedure:

  1. Run the node healthcheck:

node_health_check

The report generates output files. Once complete, a similar message is displayed:

Health Check Report Created Successfully
Path to Report: ./192.0.2.0-health-check-report.txt

If an error message displays check that scylla-server and scylla-jmx must be running. See the note in Health Check Report.

  1. Follow the instructions in Send files to ScyllaDB support.

Core Dump¶

When Scylla fails, it creates a core dump which can later be used to debug the issue. The file is written to /var/lib/scylla/coredump. If there is no file in the directory, see Troubleshooting Core Dump.

Compress the core dump file¶

Procedure

  1. The core dump file can be very large. Make sure to zip it using xz or similar.

xz -z core.21692
  1. Upload the compressed file to upload.scylladb.com. See Send files to ScyllaDB support.

Troubleshooting Core Dump¶

In the event the /var/lib/scylla/coredump directory is empty, the following solutions may help. Note that this section only handles some of the reasons why a core dump file is not created. It should be noted that in some cases where a core dump file fails to create not because it is in the wrong location or because the system is not configured to generate core dump files, but because the failure itself created an issue where the core dump file wasn’t created or is not accessible.

Operating System not set to generate core dump files¶

If Scylla restarts for some reason and there is no core dump file, the OS system deamon needs to be modified.

Procedure

  1. Open the custom configuration file. /etc/systemd/coredump.conf.d/custom.conf.

  2. Refer to generate core dumps for details.

Note

You will need spare disk space larger than that of Scylla’s RAM.

Core dump file exists, but not where you expect it to be¶

If the scylla/coredump directory is empty even after you changed the custom configuration file, it might be that Automatic Bug Reporting Tool (ABRT) is running and all core dumps are pipelined directly to it.

Procedure

  1. Check the /proc/sys/kernel/core_pattern file. If it contains something similar to |/usr/libexec/abrt-hook-ccpp %s %c %p %u %g %t %h %e 636f726500 replace the contents with core.

Report a performance problem¶

If you are experiencing a performance issue when using Scylla, let us know and we can help. To save time and increase the likelihood of a speedy solution, it is important to supply us with as much information as possible.

Include the following information in your report:

  • A complete Health Check Report

  • A Server Metrics Report

  • A Client Metrics Report

  • The contents of your tracing data. See Collecting Tracing Data.

Metrics Reports¶

There are two types of metrics you need to collect: Scylla Server and Scylla Client (node). The Scylla Server metrics can be displayed using an external monitoring service like Scylla Monitoring Stack or they can be collected using scyllatop and other commands.

Note

It is highly recommended to use the Scylla monitoring stack so that the Prometheus metrics collected can be shared.

Server Metrics¶

There are several commands you can use to see if there is a performance issue on the Scylla Server. Note that checking the CPU load using top is not a good metric for checking Scylla. Use scyllatop instead.

Note

To help the ScyllaDB support team assess your problem, it is best to pipe the results to a file which you can attach with the Health Check report.

  1. Check the Send files to ScyllaDB supportgauge-load. If the load is close to 100%, the bottleneck is Scylla CPU.

scyllatop *gauge-load
  1. Check if one of Scylla core is busier than the others:

sar -P ALL
  1. Check the load on one CPU (0 in this example)

perf top -C0
  1. Check if the disk utilization percentage is close to 100%. If yes, the disk might be the bottleneck.

ostat -x 1`` to observe the disk utilization.
  1. Collect run time statistics.

sudo perf record --call-graph dwarf -C 0 -F 99 -p $(ps -C scylla -o pid --no-headers) -g sleep 10

Alternatively, you can run the sudo ./collect-runtime-info.sh ` which does all of the above, except scyllatop and uploads the compressed result to s3.

The script contents is as follows:

#!/bin/bash -e

mkdir report
rpm -qa > ./report/rpm.txt
journalctl -b > ./report/journalctl.txt
df -k > ./report/df.txt
netstat > ./report/netstat.txt

sar -P ALL > ./report/sar.txt
iostat -d 1 10 > ./report/iostat.txt
sudo perf record --call-graph dwarf -C 0 -F 99 -p $(ps -C scylla -o pid --no-headers) -g --output ./report/perf.data sleep 10

export report_uuid=$(uuidgen)
echo $report_uuid
tar c report | xz > report.tar.xz
curl --request PUT --upload-file report.tar.xz "scylladb-users-upload.s3.amazonaws.com/$report_uuid/report.tar.xz"
echo $report_uuid

You can also see the results in ./report dir

Server Metrics with Prometheus¶

When using Grafana and Prometheus to monitor Scylla, sharing the metrics stored in Prometheus is very useful. This procedure shows how to gather the metrics from the monitoring server.

Procedure

  1. Validate Prometheus instance is running

docker ps
  1. Download the DB, using your CONTAINER ID instead of a64bf3ba0b7f

sudo docker cp a64bf3ba0b7f:/prometheus /tmp/prometheus_data
  1. Zip the file.

sudo tar -zcvf /tmp/prometheus_data.tar.gz /tmp/prometheus_data/
  1. Upload the file you created in step 3 to upload.scylladb.com (see Send files to ScyllaDB support).

Client Metrics¶

Check the client CPU using top. If the CPU is close to 100%, the bottleneck is the client CPU. In this case, you should add more loaders to stress Scylla.

Send files to ScyllaDB support¶

Once you have collected and compressed your reports, send them to ScyllaDB for analysis.

Procedure

  1. Generate a UUID:

export report_uuid=$(uuidgen)
echo $report_uuid
  1. Upload all required report files:

curl -X PUT https://upload.scylladb.com/$report_uuid/yourfile -T yourfile

For example with the health check report and node health check report:

curl -X PUT https://upload.scylladb.com/$report_uuid/output_files.tgz -T output_files.tgz
curl -X PUT https://upload.scylladb.com/$report_uuid/192.0.2.0-health-check-report.txt -T 192.0.2.0-health-check-report.txt

The UUID you generated replaces the variable $report_uuid at runtime. yourfile is any file you need to send to ScyllaDB support.

Open a support ticket or GitHub issue¶

If you have not done so already, supply ScyllaDB support with the UUID. Keep in mind that although the ID you supply is public, only ScyllaDB support team members can read the data you share. In the ticket/issue you open, list the documents you have uploaded.

Procedure

  1. Do one of the following:

  • If you are a Scylla customer, open a Support Ticket and include the UUID within the ticket.

  • If you are a Scylla user, open an issue on GitHub and include the UUID within the issue.

See Also¶

Scylla benchmark results for an example of the level of details required in your reports.

Was this page helpful?

PREVIOUS
Errors and Support
NEXT
Error Messages
  • Create an issue
  • Edit this page

On this page

  • How to Report a ScyllaDB Problem
    • Health Check Report
      • Prepare Health Check Report
    • Core Dump
      • Compress the core dump file
    • Troubleshooting Core Dump
      • Operating System not set to generate core dump files
      • Core dump file exists, but not where you expect it to be
    • Report a performance problem
      • Metrics Reports
        • Server Metrics
        • Server Metrics with Prometheus
        • Client Metrics
    • Send files to ScyllaDB support
    • Open a support ticket or GitHub issue
      • See Also
ScyllaDB Open Source
  • 5.2
    • master
    • 6.2
    • 6.1
    • 6.0
    • 5.4
    • 5.2
    • 5.1
  • Getting Started
    • Install ScyllaDB
      • ScyllaDB Web Installer for Linux
      • ScyllaDB Unified Installer (relocatable executable)
      • Air-gapped Server Installation
      • What is in each RPM
      • ScyllaDB Housekeeping and how to disable it
      • ScyllaDB Developer Mode
      • ScyllaDB Configuration Reference
    • Configure ScyllaDB
    • ScyllaDB Requirements
      • System Requirements
      • OS Support by Linux Distributions and Version
      • ScyllaDB in a Shared Environment
    • Migrate to ScyllaDB
      • Migration Process from Cassandra to Scylla
      • Scylla and Apache Cassandra Compatibility
      • Migration Tools Overview
    • Integration Solutions
      • Integrate Scylla with Spark
      • Integrate Scylla with KairosDB
      • Integrate Scylla with Presto
      • Integrate Scylla with Elasticsearch
      • Integrate Scylla with Kubernetes
      • Integrate Scylla with the JanusGraph Graph Data System
      • Integrate Scylla with DataDog
      • Integrate Scylla with Kafka
      • Integrate Scylla with IOTA Chronicle
      • Integrate Scylla with Spring
      • Shard-Aware Kafka Connector for Scylla
      • Install Scylla with Ansible
      • Integrate Scylla with Databricks
    • Tutorials
  • ScyllaDB for Administrators
    • Administration Guide
    • Procedures
      • Cluster Management
      • Backup & Restore
      • Change Configuration
      • Maintenance
      • Best Practices
      • Benchmarking Scylla
      • Migrate from Cassandra to Scylla
      • Disable Housekeeping
    • Security
      • ScyllaDB Security Checklist
      • Enable Authentication
      • Enable and Disable Authentication Without Downtime
      • Generate a cqlshrc File
      • Reset Authenticator Password
      • Enable Authorization
      • Grant Authorization CQL Reference
      • Role Based Access Control (RBAC)
      • ScyllaDB Auditing Guide
      • Encryption: Data in Transit Client to Node
      • Encryption: Data in Transit Node to Node
      • Generating a self-signed Certificate Chain Using openssl
      • Encryption at Rest
      • LDAP Authentication
      • LDAP Authorization (Role Management)
    • Admin Tools
      • Nodetool Reference
      • CQLSh
      • REST
      • Tracing
      • Scylla SStable
      • Scylla Types
      • SSTableLoader
      • cassandra-stress
      • SSTabledump
      • SSTable2json
      • Scylla Logs
      • Seastar Perftune
      • Virtual Tables
    • ScyllaDB Monitoring Stack
    • ScyllaDB Operator
    • ScyllaDB Manager
    • Upgrade Procedures
      • ScyllaDB Open Source Upgrade
      • ScyllaDB Open Source to ScyllaDB Enterprise Upgrade
      • ScyllaDB Image
      • ScyllaDB Enterprise
    • System Configuration
      • System Configuration Guide
      • scylla.yaml
      • ScyllaDB Snitches
    • Benchmarking ScyllaDB
  • ScyllaDB for Developers
    • Learn To Use ScyllaDB
      • Scylla University
      • Course catalog
      • Scylla Essentials
      • Basic Data Modeling
      • Advanced Data Modeling
      • MMS - Learn by Example
      • Care-Pet an IoT Use Case and Example
    • Scylla Alternator
    • Scylla Features
      • Scylla Open Source Features
      • Scylla Enterprise Features
    • Scylla Drivers
      • Scylla CQL Drivers
      • Scylla DynamoDB Drivers
    • Workload Attributes
  • CQL Reference
    • CQLSh: the CQL shell
    • Appendices
    • Compaction
    • Consistency Levels
    • Consistency Level Calculator
    • Data Definition
    • Data Manipulation
    • Data Types
    • Definitions
    • Global Secondary Indexes
    • Additional Information
    • Expiring Data with Time to Live (TTL)
    • Additional Information
    • Functions
    • JSON Support
    • Materialized Views
    • Non-Reserved CQL Keywords
    • Reserved CQL Keywords
    • ScyllaDB CQL Extensions
  • ScyllaDB Architecture
    • ScyllaDB Ring Architecture
    • ScyllaDB Fault Tolerance
    • Consistency Level Console Demo
    • ScyllaDB Anti-Entropy
      • Scylla Hinted Handoff
      • Scylla Read Repair
      • Scylla Repair
    • SSTable
      • ScyllaDB SSTable - 2.x
      • ScyllaDB SSTable - 3.x
    • Compaction Strategies
    • Raft Consensus Algorithm in ScyllaDB
  • Troubleshooting ScyllaDB
    • Errors and Support
      • Report a Scylla problem
      • Error Messages
      • Change Log Level
    • ScyllaDB Startup
      • Ownership Problems
      • Scylla will not Start
      • Scylla Python Script broken
    • Upgrade
      • Inaccessible configuration files after ScyllaDB upgrade
    • Cluster and Node
      • Failed Decommission Problem
      • Cluster Timeouts
      • Node Joined With No Data
      • SocketTimeoutException
      • NullPointerException
    • Data Modeling
      • Scylla Large Partitions Table
      • Scylla Large Rows and Cells Table
      • Large Partitions Hunting
    • Data Storage and SSTables
      • Space Utilization Increasing
      • Disk Space is not Reclaimed
      • SSTable Corruption Problem
      • Pointless Compactions
      • Limiting Compaction
    • CQL
      • Time Range Query Fails
      • COPY FROM Fails
      • CQL Connection Table
      • Reverse queries fail
    • ScyllaDB Monitor and Manager
      • Manager and Monitoring integration
      • Manager lists healthy nodes as down
  • Knowledge Base
    • Upgrading from experimental CDC
    • Compaction
    • Counting all rows in a table is slow
    • CQL Query Does Not Display Entire Result Set
    • When CQLSh query returns partial results with followed by “More”
    • Run Scylla and supporting services as a custom user:group
    • Decoding Stack Traces
    • Snapshots and Disk Utilization
    • DPDK mode
    • Debug your database with Flame Graphs
    • How to Change gc_grace_seconds for a Table
    • Gossip in Scylla
    • Increase Permission Cache to Avoid Non-paged Queries
    • How does Scylla LWT Differ from Apache Cassandra ?
    • Map CPUs to Scylla Shards
    • Scylla Memory Usage
    • NTP Configuration for Scylla
    • Updating the Mode in perftune.yaml After a ScyllaDB Upgrade
    • POSIX networking for Scylla
    • Scylla consistency quiz for administrators
    • Recreate RAID devices
    • How to Safely Increase the Replication Factor
    • Scylla and Spark integration
    • Increase Scylla resource limits over systemd
    • Scylla Seed Nodes
    • How to Set up a Swap Space
    • Scylla Snapshots
    • Scylla payload sent duplicated static columns
    • Stopping a local repair
    • System Limits
    • How to flush old tombstones from a table
    • Time to Live (TTL) and Compaction
    • Scylla Nodes are Unresponsive
    • Update a Primary Key
    • Using the perf utility with Scylla
    • Configure Scylla Networking with Multiple NIC/IP Combinations
  • ScyllaDB FAQ
  • Contribute to ScyllaDB
  • Glossary
  • Alternator: DynamoDB API in Scylla
    • Getting Started With ScyllaDB Alternator
    • ScyllaDB Alternator for DynamoDB users
Docs Tutorials University Contact Us About Us
© 2025, ScyllaDB. All rights reserved. | Terms of Service | Privacy Policy | ScyllaDB, and ScyllaDB Cloud, are registered trademarks of ScyllaDB, Inc.
Last updated on 08 May 2025.
Powered by Sphinx 7.4.7 & ScyllaDB Theme 1.8.6