The TL;DR is that Sentry looks for potentially sensitive values (e.g. credit cards, social security numbers, things that look like API keys, etc.) and removes everything. To be on the safe side, it is particularly aggressive by default.
@benvinegar some additional feedback: I find this scrubbing to be too aggressive so have needed to disable it. It has otherwise been interfering with my ability to troubleshoot problems. I would have been OK to start selectively removing some default rules, but those don’t seem to be exposed to me to see? i.e. it seems to give you a choice of “Either use our default options, or start from a blank slate yourself”, right? Or can I assume that the list on the documentation page is complete and accurate?
@benvinegar thank you. As @rarkins wrote It would help a lot if it could be more configurable. At this point I am not sure how it will work if I turn off the server side filtering but I want to Authorization Header still be filtered.
Is there a way how to say, that Authorizastion header should be always filtered, but data in the params should be always visible unless it is said otherwise by some setting eg. filtered params in the Sentry raven library?
Every Sentry client library has a means of performing self-filtering. I recommend taking a look at your client docs – you should be able to configure it to do what you’re asking.
Do you have any idea why is Sentry filtering my message: “Authenticating user123”? I was using the example from the docs to play with breadcrumbs. If I turn off Data Scrubber in project settings it works, but I dont want to remove this feature.
I have read the source code and it seems that message is untouched until it is being sent so where does it get filtered? Can I do anything about it?