SlideShare a Scribd company logo
Farming LOGs to save
the weekend
Antonio Spinelli
@tonicospinelli
01
What is it for?
02 03
LOGs are the BEST FRIEND
of the software engineer
Best practices Tooling
Building dashboards to
visualize the application
behavior in real-time
Understand log severity,
meaningful messages
and avoid sensible data
know why it is the most
important resource to
monitor your application
What is it for?
- a monitoring resource
- giving visibility for application behavior
- criticality through severity
Best practices
- meaningful messages
- logging severity
- avoid sensible information
Meaningful
Messages
Best practices Meaningful Messages
- avoid cryptic log entries
- anticipate any emergencies
- write contextualized messages
Best practices Meaningful Messages
- add remediation information
- purpose the operation and its outcome
- messages must be independent
Best practices Meaningful Messages
- make messages Human-Readable
- think of your audience, be empathic
- never log sensitive information
Best practices Avoid Sensible Information
- Credentials, Social security numbers
- Session identifiers, Authorization tokens
- PII (Personal Identifiable Information)
- personal name, credit card numbers,
emails, birthdate
Best practices Example
cryptic
The database is down
contextualized
Fail to find attributes for customer id=1. Database out of
service. It will retry again in 5 minutes.
Severity
Best practices SEVERITY RFC-5424
0
Emergency
system is unusable
1
Alert
team must take action immediately
2
Critical
system may stop
3
Error
unexpected behavior
4
Warning
possibility of side-effect
5
Notice
normal but significant condition
6
Informational
informational messages
7
Debug
explicitly behavior
Best practices SEVERITY 7 Debug
condition
tracing information useful for debugging purposes.
example
A product=SKU was added to the cart=10 by the
customer=1. The cart has 3 products and the total
price was updated to R$ 350.00.
Best practices SEVERITY 6 Informational
condition
general information about system operations.
example
A new item was added to the cart by the customer.
The cart has 3 products and the total price was updated.
Best practices SEVERITY 5 Notice
condition
notable events that do not affect the functionality.
example
The product is out of stock. There are some orders to
be finished locking the availability of the product.
Best practices SEVERITY 4 Warning
condition
functionality may be affected.
example
The product width is empty in the webstore. This field
is required to calculate the shipping cost.
Best practices SEVERITY 3 Error
condition
there is an error and functionality is affected.
example
The payment gateway is out of service, and the order
will be stand by until it's available.
Best practices SEVERITY 2 Critical
condition
the application may stop.
example
The database connection has gone away. The
connection will be established as soon as possible.
Best practices SEVERITY 1 Alert
condition
the team must take action immediately.
example
No space left on the device. The hard disk reached the
current capacity, increases the available volume, or
archives the oldest files.
Best practices SEVERITY 0 Emergency
condition
the system is unusable or not responding.
example
The database server is not reached by application.
Verify the network is available.
Tooling
log management solutions
Tooling
Tooling New Relic
Antonio Spinelli
@tonicospinelli
references
- The 10 commandments of logging
- RFC-5424 (The Syslog Protocol)
- 12Factors (Log)

More Related Content

Similar to Farming logs to save the weekend

Final system request
Final system requestFinal system request
Final system request
Thomas Haymes
 
Full Docu IT Thesis Project In Computerized Inventory System In Brother Burg...
Full Docu IT Thesis Project In Computerized Inventory System In Brother  Burg...Full Docu IT Thesis Project In Computerized Inventory System In Brother  Burg...
Full Docu IT Thesis Project In Computerized Inventory System In Brother Burg...
JON ICK BOGUAT
 
2014 ota databreach3
2014 ota databreach32014 ota databreach3
2014 ota databreach3
Meg Weber
 
SplunkLive! Splunk for Insider Threats and Fraud Detection
SplunkLive! Splunk for Insider Threats and Fraud DetectionSplunkLive! Splunk for Insider Threats and Fraud Detection
SplunkLive! Splunk for Insider Threats and Fraud Detection
Splunk
 
TACOM 2014: Back To Basics
TACOM 2014: Back To BasicsTACOM 2014: Back To Basics
TACOM 2014: Back To Basics
Joel Cardella
 
Jane Connerton
Jane ConnertonJane Connerton
Jane Connerton
Arkivmote
 
Omkar Distb
Omkar DistbOmkar Distb
Omkar Distb
saurabmi2
 
Case Study
Case StudyCase Study
Case Study
laze
 
Mantralogix how to plug slow profit leaks
Mantralogix how to plug slow profit leaksMantralogix how to plug slow profit leaks
Mantralogix how to plug slow profit leaks
Mantralogix
 
Preventing User Mistakes by Using Machine Learning
Preventing User Mistakes by Using Machine LearningPreventing User Mistakes by Using Machine Learning
Preventing User Mistakes by Using Machine Learning
Odoo
 
SAP Global Batch Traceability - What is it and what can it do for you?
SAP Global Batch Traceability - What is it and what can it do for you?SAP Global Batch Traceability - What is it and what can it do for you?
SAP Global Batch Traceability - What is it and what can it do for you?
Q Data USA
 
Four ways to combat non actionable alerts
Four ways to combat non actionable alertsFour ways to combat non actionable alerts
Four ways to combat non actionable alerts
BigPanda
 
Product Health Talk, Knot Event at Arup
Product Health Talk, Knot Event at ArupProduct Health Talk, Knot Event at Arup
Product Health Talk, Knot Event at Arup
Peter White
 
How to assess your it needs and implement technology at your nonprofit
How to assess your it needs and implement technology at your nonprofitHow to assess your it needs and implement technology at your nonprofit
How to assess your it needs and implement technology at your nonprofit
TechSoup Canada
 
Partner Alliance Webinar - Sales Tax | Fixed Assets Solutions - An Overview
Partner Alliance Webinar - Sales Tax | Fixed Assets Solutions - An OverviewPartner Alliance Webinar - Sales Tax | Fixed Assets Solutions - An Overview
Partner Alliance Webinar - Sales Tax | Fixed Assets Solutions - An Overview
Net at Work
 
ConnXus myCBC Webinar Series: Cybersecurity Risks to Your Business
ConnXus myCBC Webinar Series: Cybersecurity Risks to Your BusinessConnXus myCBC Webinar Series: Cybersecurity Risks to Your Business
ConnXus myCBC Webinar Series: Cybersecurity Risks to Your Business
ConnXus
 
Alerts & Workflow for Sage 100 ERP
Alerts & Workflow for Sage 100 ERPAlerts & Workflow for Sage 100 ERP
Alerts & Workflow for Sage 100 ERP
Net at Work
 
What IT Needs to Consider for Legal Hold
What IT Needs to Consider for Legal HoldWhat IT Needs to Consider for Legal Hold
What IT Needs to Consider for Legal Hold
David D. Maxwell, MIT Security, CISM, CISA, CISSP
 
Synopsis on inventory_management_system
Synopsis on inventory_management_systemSynopsis on inventory_management_system
Synopsis on inventory_management_system
Divya Baghel
 
Real estate management system
Real estate management systemReal estate management system
Real estate management system
SouvikSarkar75
 

Similar to Farming logs to save the weekend (20)

Final system request
Final system requestFinal system request
Final system request
 
Full Docu IT Thesis Project In Computerized Inventory System In Brother Burg...
Full Docu IT Thesis Project In Computerized Inventory System In Brother  Burg...Full Docu IT Thesis Project In Computerized Inventory System In Brother  Burg...
Full Docu IT Thesis Project In Computerized Inventory System In Brother Burg...
 
2014 ota databreach3
2014 ota databreach32014 ota databreach3
2014 ota databreach3
 
SplunkLive! Splunk for Insider Threats and Fraud Detection
SplunkLive! Splunk for Insider Threats and Fraud DetectionSplunkLive! Splunk for Insider Threats and Fraud Detection
SplunkLive! Splunk for Insider Threats and Fraud Detection
 
TACOM 2014: Back To Basics
TACOM 2014: Back To BasicsTACOM 2014: Back To Basics
TACOM 2014: Back To Basics
 
Jane Connerton
Jane ConnertonJane Connerton
Jane Connerton
 
Omkar Distb
Omkar DistbOmkar Distb
Omkar Distb
 
Case Study
Case StudyCase Study
Case Study
 
Mantralogix how to plug slow profit leaks
Mantralogix how to plug slow profit leaksMantralogix how to plug slow profit leaks
Mantralogix how to plug slow profit leaks
 
Preventing User Mistakes by Using Machine Learning
Preventing User Mistakes by Using Machine LearningPreventing User Mistakes by Using Machine Learning
Preventing User Mistakes by Using Machine Learning
 
SAP Global Batch Traceability - What is it and what can it do for you?
SAP Global Batch Traceability - What is it and what can it do for you?SAP Global Batch Traceability - What is it and what can it do for you?
SAP Global Batch Traceability - What is it and what can it do for you?
 
Four ways to combat non actionable alerts
Four ways to combat non actionable alertsFour ways to combat non actionable alerts
Four ways to combat non actionable alerts
 
Product Health Talk, Knot Event at Arup
Product Health Talk, Knot Event at ArupProduct Health Talk, Knot Event at Arup
Product Health Talk, Knot Event at Arup
 
How to assess your it needs and implement technology at your nonprofit
How to assess your it needs and implement technology at your nonprofitHow to assess your it needs and implement technology at your nonprofit
How to assess your it needs and implement technology at your nonprofit
 
Partner Alliance Webinar - Sales Tax | Fixed Assets Solutions - An Overview
Partner Alliance Webinar - Sales Tax | Fixed Assets Solutions - An OverviewPartner Alliance Webinar - Sales Tax | Fixed Assets Solutions - An Overview
Partner Alliance Webinar - Sales Tax | Fixed Assets Solutions - An Overview
 
ConnXus myCBC Webinar Series: Cybersecurity Risks to Your Business
ConnXus myCBC Webinar Series: Cybersecurity Risks to Your BusinessConnXus myCBC Webinar Series: Cybersecurity Risks to Your Business
ConnXus myCBC Webinar Series: Cybersecurity Risks to Your Business
 
Alerts & Workflow for Sage 100 ERP
Alerts & Workflow for Sage 100 ERPAlerts & Workflow for Sage 100 ERP
Alerts & Workflow for Sage 100 ERP
 
What IT Needs to Consider for Legal Hold
What IT Needs to Consider for Legal HoldWhat IT Needs to Consider for Legal Hold
What IT Needs to Consider for Legal Hold
 
Synopsis on inventory_management_system
Synopsis on inventory_management_systemSynopsis on inventory_management_system
Synopsis on inventory_management_system
 
Real estate management system
Real estate management systemReal estate management system
Real estate management system
 

More from Antonio Spinelli

STRUCTured Type Codes
STRUCTured Type CodesSTRUCTured Type Codes
STRUCTured Type Codes
Antonio Spinelli
 
Substituir Type Codes "com" Classe
Substituir Type Codes "com" ClasseSubstituir Type Codes "com" Classe
Substituir Type Codes "com" Classe
Antonio Spinelli
 
O profissional que você respeita
O profissional que você respeitaO profissional que você respeita
O profissional que você respeita
Antonio Spinelli
 
Compartilhando qualidade e conhecimento com code review
Compartilhando qualidade e conhecimento com code reviewCompartilhando qualidade e conhecimento com code review
Compartilhando qualidade e conhecimento com code review
Antonio Spinelli
 
modernizando a arquitertura de sua aplicação
modernizando a arquitertura  de sua aplicaçãomodernizando a arquitertura  de sua aplicação
modernizando a arquitertura de sua aplicação
Antonio Spinelli
 
Developing for Business
Developing for BusinessDeveloping for Business
Developing for Business
Antonio Spinelli
 

More from Antonio Spinelli (6)

STRUCTured Type Codes
STRUCTured Type CodesSTRUCTured Type Codes
STRUCTured Type Codes
 
Substituir Type Codes "com" Classe
Substituir Type Codes "com" ClasseSubstituir Type Codes "com" Classe
Substituir Type Codes "com" Classe
 
O profissional que você respeita
O profissional que você respeitaO profissional que você respeita
O profissional que você respeita
 
Compartilhando qualidade e conhecimento com code review
Compartilhando qualidade e conhecimento com code reviewCompartilhando qualidade e conhecimento com code review
Compartilhando qualidade e conhecimento com code review
 
modernizando a arquitertura de sua aplicação
modernizando a arquitertura  de sua aplicaçãomodernizando a arquitertura  de sua aplicação
modernizando a arquitertura de sua aplicação
 
Developing for Business
Developing for BusinessDeveloping for Business
Developing for Business
 

Recently uploaded

Cosa hanno in comune un mattoncino Lego e la backdoor XZ?
Cosa hanno in comune un mattoncino Lego e la backdoor XZ?Cosa hanno in comune un mattoncino Lego e la backdoor XZ?
Cosa hanno in comune un mattoncino Lego e la backdoor XZ?
Speck&Tech
 
Encryption in Microsoft 365 - ExpertsLive Netherlands 2024
Encryption in Microsoft 365 - ExpertsLive Netherlands 2024Encryption in Microsoft 365 - ExpertsLive Netherlands 2024
Encryption in Microsoft 365 - ExpertsLive Netherlands 2024
Albert Hoitingh
 
Artificial Intelligence for XMLDevelopment
Artificial Intelligence for XMLDevelopmentArtificial Intelligence for XMLDevelopment
Artificial Intelligence for XMLDevelopment
Octavian Nadolu
 
Goodbye Windows 11: Make Way for Nitrux Linux 3.5.0!
Goodbye Windows 11: Make Way for Nitrux Linux 3.5.0!Goodbye Windows 11: Make Way for Nitrux Linux 3.5.0!
Goodbye Windows 11: Make Way for Nitrux Linux 3.5.0!
SOFTTECHHUB
 
Introduction to CHERI technology - Cybersecurity
Introduction to CHERI technology - CybersecurityIntroduction to CHERI technology - Cybersecurity
Introduction to CHERI technology - Cybersecurity
mikeeftimakis1
 
UiPath Test Automation using UiPath Test Suite series, part 5
UiPath Test Automation using UiPath Test Suite series, part 5UiPath Test Automation using UiPath Test Suite series, part 5
UiPath Test Automation using UiPath Test Suite series, part 5
DianaGray10
 
20240605 QFM017 Machine Intelligence Reading List May 2024
20240605 QFM017 Machine Intelligence Reading List May 202420240605 QFM017 Machine Intelligence Reading List May 2024
20240605 QFM017 Machine Intelligence Reading List May 2024
Matthew Sinclair
 
みなさんこんにちはこれ何文字まで入るの?40文字以下不可とか本当に意味わからないけどこれ限界文字数書いてないからマジでやばい文字数いけるんじゃないの?えこ...
みなさんこんにちはこれ何文字まで入るの?40文字以下不可とか本当に意味わからないけどこれ限界文字数書いてないからマジでやばい文字数いけるんじゃないの?えこ...みなさんこんにちはこれ何文字まで入るの?40文字以下不可とか本当に意味わからないけどこれ限界文字数書いてないからマジでやばい文字数いけるんじゃないの?えこ...
みなさんこんにちはこれ何文字まで入るの?40文字以下不可とか本当に意味わからないけどこれ限界文字数書いてないからマジでやばい文字数いけるんじゃないの?えこ...
名前 です男
 
UiPath Test Automation using UiPath Test Suite series, part 6
UiPath Test Automation using UiPath Test Suite series, part 6UiPath Test Automation using UiPath Test Suite series, part 6
UiPath Test Automation using UiPath Test Suite series, part 6
DianaGray10
 
Climate Impact of Software Testing at Nordic Testing Days
Climate Impact of Software Testing at Nordic Testing DaysClimate Impact of Software Testing at Nordic Testing Days
Climate Impact of Software Testing at Nordic Testing Days
Kari Kakkonen
 
Mind map of terminologies used in context of Generative AI
Mind map of terminologies used in context of Generative AIMind map of terminologies used in context of Generative AI
Mind map of terminologies used in context of Generative AI
Kumud Singh
 
Pushing the limits of ePRTC: 100ns holdover for 100 days
Pushing the limits of ePRTC: 100ns holdover for 100 daysPushing the limits of ePRTC: 100ns holdover for 100 days
Pushing the limits of ePRTC: 100ns holdover for 100 days
Adtran
 
A tale of scale & speed: How the US Navy is enabling software delivery from l...
A tale of scale & speed: How the US Navy is enabling software delivery from l...A tale of scale & speed: How the US Navy is enabling software delivery from l...
A tale of scale & speed: How the US Navy is enabling software delivery from l...
sonjaschweigert1
 
GraphSummit Singapore | The Art of the Possible with Graph - Q2 2024
GraphSummit Singapore | The Art of the  Possible with Graph - Q2 2024GraphSummit Singapore | The Art of the  Possible with Graph - Q2 2024
GraphSummit Singapore | The Art of the Possible with Graph - Q2 2024
Neo4j
 
How to use Firebase Data Connect For Flutter
How to use Firebase Data Connect For FlutterHow to use Firebase Data Connect For Flutter
How to use Firebase Data Connect For Flutter
Daiki Mogmet Ito
 
TrustArc Webinar - 2024 Global Privacy Survey
TrustArc Webinar - 2024 Global Privacy SurveyTrustArc Webinar - 2024 Global Privacy Survey
TrustArc Webinar - 2024 Global Privacy Survey
TrustArc
 
PCI PIN Basics Webinar from the Controlcase Team
PCI PIN Basics Webinar from the Controlcase TeamPCI PIN Basics Webinar from the Controlcase Team
PCI PIN Basics Webinar from the Controlcase Team
ControlCase
 
“I’m still / I’m still / Chaining from the Block”
“I’m still / I’m still / Chaining from the Block”“I’m still / I’m still / Chaining from the Block”
“I’m still / I’m still / Chaining from the Block”
Claudio Di Ciccio
 
Video Streaming: Then, Now, and in the Future
Video Streaming: Then, Now, and in the FutureVideo Streaming: Then, Now, and in the Future
Video Streaming: Then, Now, and in the Future
Alpen-Adria-Universität
 
Monitoring Java Application Security with JDK Tools and JFR Events
Monitoring Java Application Security with JDK Tools and JFR EventsMonitoring Java Application Security with JDK Tools and JFR Events
Monitoring Java Application Security with JDK Tools and JFR Events
Ana-Maria Mihalceanu
 

Recently uploaded (20)

Cosa hanno in comune un mattoncino Lego e la backdoor XZ?
Cosa hanno in comune un mattoncino Lego e la backdoor XZ?Cosa hanno in comune un mattoncino Lego e la backdoor XZ?
Cosa hanno in comune un mattoncino Lego e la backdoor XZ?
 
Encryption in Microsoft 365 - ExpertsLive Netherlands 2024
Encryption in Microsoft 365 - ExpertsLive Netherlands 2024Encryption in Microsoft 365 - ExpertsLive Netherlands 2024
Encryption in Microsoft 365 - ExpertsLive Netherlands 2024
 
Artificial Intelligence for XMLDevelopment
Artificial Intelligence for XMLDevelopmentArtificial Intelligence for XMLDevelopment
Artificial Intelligence for XMLDevelopment
 
Goodbye Windows 11: Make Way for Nitrux Linux 3.5.0!
Goodbye Windows 11: Make Way for Nitrux Linux 3.5.0!Goodbye Windows 11: Make Way for Nitrux Linux 3.5.0!
Goodbye Windows 11: Make Way for Nitrux Linux 3.5.0!
 
Introduction to CHERI technology - Cybersecurity
Introduction to CHERI technology - CybersecurityIntroduction to CHERI technology - Cybersecurity
Introduction to CHERI technology - Cybersecurity
 
UiPath Test Automation using UiPath Test Suite series, part 5
UiPath Test Automation using UiPath Test Suite series, part 5UiPath Test Automation using UiPath Test Suite series, part 5
UiPath Test Automation using UiPath Test Suite series, part 5
 
20240605 QFM017 Machine Intelligence Reading List May 2024
20240605 QFM017 Machine Intelligence Reading List May 202420240605 QFM017 Machine Intelligence Reading List May 2024
20240605 QFM017 Machine Intelligence Reading List May 2024
 
みなさんこんにちはこれ何文字まで入るの?40文字以下不可とか本当に意味わからないけどこれ限界文字数書いてないからマジでやばい文字数いけるんじゃないの?えこ...
みなさんこんにちはこれ何文字まで入るの?40文字以下不可とか本当に意味わからないけどこれ限界文字数書いてないからマジでやばい文字数いけるんじゃないの?えこ...みなさんこんにちはこれ何文字まで入るの?40文字以下不可とか本当に意味わからないけどこれ限界文字数書いてないからマジでやばい文字数いけるんじゃないの?えこ...
みなさんこんにちはこれ何文字まで入るの?40文字以下不可とか本当に意味わからないけどこれ限界文字数書いてないからマジでやばい文字数いけるんじゃないの?えこ...
 
UiPath Test Automation using UiPath Test Suite series, part 6
UiPath Test Automation using UiPath Test Suite series, part 6UiPath Test Automation using UiPath Test Suite series, part 6
UiPath Test Automation using UiPath Test Suite series, part 6
 
Climate Impact of Software Testing at Nordic Testing Days
Climate Impact of Software Testing at Nordic Testing DaysClimate Impact of Software Testing at Nordic Testing Days
Climate Impact of Software Testing at Nordic Testing Days
 
Mind map of terminologies used in context of Generative AI
Mind map of terminologies used in context of Generative AIMind map of terminologies used in context of Generative AI
Mind map of terminologies used in context of Generative AI
 
Pushing the limits of ePRTC: 100ns holdover for 100 days
Pushing the limits of ePRTC: 100ns holdover for 100 daysPushing the limits of ePRTC: 100ns holdover for 100 days
Pushing the limits of ePRTC: 100ns holdover for 100 days
 
A tale of scale & speed: How the US Navy is enabling software delivery from l...
A tale of scale & speed: How the US Navy is enabling software delivery from l...A tale of scale & speed: How the US Navy is enabling software delivery from l...
A tale of scale & speed: How the US Navy is enabling software delivery from l...
 
GraphSummit Singapore | The Art of the Possible with Graph - Q2 2024
GraphSummit Singapore | The Art of the  Possible with Graph - Q2 2024GraphSummit Singapore | The Art of the  Possible with Graph - Q2 2024
GraphSummit Singapore | The Art of the Possible with Graph - Q2 2024
 
How to use Firebase Data Connect For Flutter
How to use Firebase Data Connect For FlutterHow to use Firebase Data Connect For Flutter
How to use Firebase Data Connect For Flutter
 
TrustArc Webinar - 2024 Global Privacy Survey
TrustArc Webinar - 2024 Global Privacy SurveyTrustArc Webinar - 2024 Global Privacy Survey
TrustArc Webinar - 2024 Global Privacy Survey
 
PCI PIN Basics Webinar from the Controlcase Team
PCI PIN Basics Webinar from the Controlcase TeamPCI PIN Basics Webinar from the Controlcase Team
PCI PIN Basics Webinar from the Controlcase Team
 
“I’m still / I’m still / Chaining from the Block”
“I’m still / I’m still / Chaining from the Block”“I’m still / I’m still / Chaining from the Block”
“I’m still / I’m still / Chaining from the Block”
 
Video Streaming: Then, Now, and in the Future
Video Streaming: Then, Now, and in the FutureVideo Streaming: Then, Now, and in the Future
Video Streaming: Then, Now, and in the Future
 
Monitoring Java Application Security with JDK Tools and JFR Events
Monitoring Java Application Security with JDK Tools and JFR EventsMonitoring Java Application Security with JDK Tools and JFR Events
Monitoring Java Application Security with JDK Tools and JFR Events
 

Farming logs to save the weekend

  • 1. Farming LOGs to save the weekend Antonio Spinelli @tonicospinelli
  • 2. 01 What is it for? 02 03 LOGs are the BEST FRIEND of the software engineer Best practices Tooling Building dashboards to visualize the application behavior in real-time Understand log severity, meaningful messages and avoid sensible data know why it is the most important resource to monitor your application
  • 3. What is it for? - a monitoring resource - giving visibility for application behavior - criticality through severity
  • 4. Best practices - meaningful messages - logging severity - avoid sensible information
  • 6. Best practices Meaningful Messages - avoid cryptic log entries - anticipate any emergencies - write contextualized messages
  • 7. Best practices Meaningful Messages - add remediation information - purpose the operation and its outcome - messages must be independent
  • 8. Best practices Meaningful Messages - make messages Human-Readable - think of your audience, be empathic - never log sensitive information
  • 9. Best practices Avoid Sensible Information - Credentials, Social security numbers - Session identifiers, Authorization tokens - PII (Personal Identifiable Information) - personal name, credit card numbers, emails, birthdate
  • 10. Best practices Example cryptic The database is down contextualized Fail to find attributes for customer id=1. Database out of service. It will retry again in 5 minutes.
  • 12. Best practices SEVERITY RFC-5424 0 Emergency system is unusable 1 Alert team must take action immediately 2 Critical system may stop 3 Error unexpected behavior 4 Warning possibility of side-effect 5 Notice normal but significant condition 6 Informational informational messages 7 Debug explicitly behavior
  • 13. Best practices SEVERITY 7 Debug condition tracing information useful for debugging purposes. example A product=SKU was added to the cart=10 by the customer=1. The cart has 3 products and the total price was updated to R$ 350.00.
  • 14. Best practices SEVERITY 6 Informational condition general information about system operations. example A new item was added to the cart by the customer. The cart has 3 products and the total price was updated.
  • 15. Best practices SEVERITY 5 Notice condition notable events that do not affect the functionality. example The product is out of stock. There are some orders to be finished locking the availability of the product.
  • 16. Best practices SEVERITY 4 Warning condition functionality may be affected. example The product width is empty in the webstore. This field is required to calculate the shipping cost.
  • 17. Best practices SEVERITY 3 Error condition there is an error and functionality is affected. example The payment gateway is out of service, and the order will be stand by until it's available.
  • 18. Best practices SEVERITY 2 Critical condition the application may stop. example The database connection has gone away. The connection will be established as soon as possible.
  • 19. Best practices SEVERITY 1 Alert condition the team must take action immediately. example No space left on the device. The hard disk reached the current capacity, increases the available volume, or archives the oldest files.
  • 20. Best practices SEVERITY 0 Emergency condition the system is unusable or not responding. example The database server is not reached by application. Verify the network is available.
  • 24. Antonio Spinelli @tonicospinelli references - The 10 commandments of logging - RFC-5424 (The Syslog Protocol) - 12Factors (Log)