@ask, since a few days I think, the system logs on various of my monitors are getting spammed by messages like the following:
Dec 19 14:01:54 debian ntppool-agent[25478]: level=INFO msg="failed to send logs to https://api-buzz.mon.ntppool.dev/v1/logs: 404 Not Found (body: default backend - 404)"
Dec 19 14:02:04 debian ntppool-agent[25478]: level=INFO msg="failed to send logs to https://api-buzz.mon.ntppool.dev/v1/logs: 404 Not Found (body: default backend - 404)"
Dec 19 14:02:06 debian ntppool-agent[25478]: level=INFO msg="failed to upload metrics: failed to send metrics to https://api-buzz.mon.ntppool.dev/v1/metrics: 404 Not Found (body: default backend - 404)"
Dec 19 14:02:14 debian ntppool-agent[25478]: level=INFO msg="failed to send logs to https://api-buzz.mon.ntppool.dev/v1/logs: 404 Not Found (body: default backend - 404)"
Dec 19 14:02:21 debian ntppool-agent[25478]: level=INFO msg="failed to upload metrics: failed to send metrics to https://api-buzz.mon.ntppool.dev/v1/metrics: 404 Not Found (body: default backend - 404)"
Dec 19 14:02:24 debian ntppool-agent[25478]: level=INFO msg="failed to send logs to https://api-buzz.mon.ntppool.dev/v1/logs: 404 Not Found (body: default backend - 404)"
Dec 19 14:02:33 debian ntppool-agent[25478]: level=INFO msg="traces export: failed to send to https://api-buzz.mon.ntppool.dev/v1/traces: 404 Not Found (body: default backend - 404)"
Dec 19 14:02:34 debian ntppool-agent[25478]: level=INFO msg="failed to send logs to https://api-buzz.mon.ntppool.dev/v1/logs: 404 Not Found (body: default backend - 404)"
Dec 19 14:02:36 debian ntppool-agent[25478]: level=INFO msg="failed to upload metrics: failed to send metrics to https://api-buzz.mon.ntppool.dev/v1/metrics: 404 Not Found (body: default backend - 404)"
Dec 19 14:02:36 debian ntppool-agent[25478]: level=INFO msg="traces export: failed to send to https://api-buzz.mon.ntppool.dev/v1/traces: 404 Not Found (body: default backend - 404)"
Dec 19 14:02:42 debian ntppool-agent[25478]: level=INFO msg="traces export: failed to send to https://api-buzz.mon.ntppool.dev/v1/traces: 404 Not Found (body: default backend - 404)"
Dec 19 14:02:44 debian ntppool-agent[25478]: level=INFO msg="failed to send logs to https://api-buzz.mon.ntppool.dev/v1/logs: 404 Not Found (body: default backend - 404)"
Dec 19 14:02:51 debian ntppool-agent[25478]: level=INFO msg="failed to upload metrics: failed to send metrics to https://api-buzz.mon.ntppool.dev/v1/metrics: 404 Not Found (body: default backend - 404)"
Dec 19 14:02:54 debian ntppool-agent[25478]: level=INFO msg="failed to send logs to https://api-buzz.mon.ntppool.dev/v1/logs: 404 Not Found (body: default backend - 404)"
Dec 19 14:02:57 debian ntppool-agent[25478]: level=INFO msg="traces export: failed to send to https://api-buzz.mon.ntppool.dev/v1/traces: 404 Not Found (body: default backend - 404)"
Could this have to do with the recent monitor software upgrade? The ntppool-agent was already spamming the system log as it is, as it is sending all messages with the same log level to the system log, despite its internal log level differentiation, but this is adding even more spam.
Would it be possible to somehow address this so that the system log isn’t spammed anymore, please?
(On relevant nodes, where I often need the system log for other purposes, I typically disable the logging of ntppool-agent completely. But I often also found that after something happening, I would have liked to be able to look at the logs. So actually getting this fixed would be preferable over simply quieting ntppool-agent completely.)
Also, I note that api-buzz.mon.ntppool.dev only has an IPv4 address. However, recently, one of my dual-stack nodes lost only the IPv4 side of its connectivity, while IPv6 kept working. Not sure whether the data uploaded to that server is critical, but at least ntppool-agent was also complaining about the server not being reachable. (I had the impression the agent also wasn’t providing its monitoring results anymore, but I now don’t remember whether I investigated enough to find a causal link between the two.)
Would it be possible to IPv6-enable this server, please?