docs/troubleshooting.mdx
To solve many problems, the first step is reading the logs to find the relevant error message. To do this, follow these steps:
cmd + shift + P for MacOS or ctrl
shift + P for WindowsConsole tabTo view prompt logs/analytics, you can enable the Continue Console.
cmd/ctrl + ,)cmd/ctrl + shift + P) and searching for "Continue: Focus on Continue Console View"Open ~/.continue/logs/core.log to view the logs for the Continue plugin. The most recent logs are found at the bottom of the file.
Some JetBrains-related logs may also be found by clicking "Help" > "Show Log in Explorer/Finder".
We are constantly making fixes and improvements to Continue, but the latest changes remain in a "pre-release" version for roughly a week so that we can test their stability. If you are experiencing issues, you can try the pre-release by going to the Continue extension page in VS Code and selecting "Switch to Pre-Release" as shown below.
On JetBrains, the "pre-release" happens through their Early Access Program (EAP) channel. To download the latest EAP version, enable the EAP channel:
cmd/ctrl + ,) and go to "Plugins"If you've tried everything, reported an error, know that a previous version was working for you, and are waiting to hear back, you can try downloading an older version of the extension.
For VS Code, All versions are hosted on the Open VSX Registry here. Once you've downloaded the extension, which will be a .vsix file, you can install it manually by following the instructions here.
You can find older versions of the JetBrains extension on their marketplace, which will walk you through installing from disk.
If your keyboard shortcuts are not resolving, you may have other commands that are taking precedence over the Continue shortcuts. You can see if this is the case, and change your shortcut mappings, in the configuration of your IDE.
If you're seeing an error like Failed to connect to "<MCP Server Name>" with Error: spawn ENAMETOOLONG when using MCP servers on macOS, this is due to the environment being too large when spawning the MCP process.
Workaround: Use the full path to the command instead of relying on PATH resolution:
mcpServers:
- name: Memory MCP server
command: /usr/local/bin/npx # Use full path instead of just "npx"
args:
- -y
- "@modelcontextprotocol/server-memory"
To find the full path to a command on your system:
npx: run which npxdocker: run which dockeruv/uvx: run which uv or which uvxThis issue typically affects macOS users with large development environments and is being tracked in #7870 and #6699.
If Continue can reach your model endpoint but cannot verify its TLS certificate chain, you may see fetch failed alongside errors such as:
unable to verify the first certificateself signed certificate in certificate chaincertificate verify failedCERT_UNTRUSTEDThis usually happens when you are connecting to a self-hosted model, enterprise proxy, or internal endpoint that uses a private CA or an incomplete certificate chain.
Add the root or intermediate certificate for that endpoint to your model's requestOptions.caBundlePath:
models:
- name: Secure endpoint
provider: openai
model: gpt-4.1
apiBase: https://llm.example.com/v1
requestOptions:
caBundlePath: /path/to/ca-chain.pem
If your setup requires mutual TLS, configure requestOptions.clientCertificate too. The self-hosting guide includes an example in How to Set Up Authentication.
Reproduce the error in the Continue logs so you can confirm the exact hostname that failed.
Test the endpoint directly with curl:
curl -v https://llm.example.com/v1/models
Inspect the certificate chain with OpenSSL:
openssl s_client -showcerts -connect llm.example.com:443 -servername llm.example.com </dev/null
Save the required root or intermediate certificate as a PEM file and point requestOptions.caBundlePath at it.
Verify the fix with curl before retrying in Continue:
curl --cacert /path/to/ca-chain.pem https://llm.example.com/v1/models
For self-hosted or enterprise deployments, these options usually help:
requestOptions.caBundlePathrequestOptions.clientCertificaterequestOptions.caBundlePath remains the most reliable optionAs a temporary debugging step, you can set requestOptions.verifySsl: false to confirm the failure is certificate-related. Do not leave this disabled in normal use.
You can also join GitHub Discussions for additional support and discussions. Alternatively, you can create a GitHub issue here, providing details of your problem, and we'll be able to help you out more quickly.