How to explain Log Levels to your kids and your team – a “reshare”

On his blog,

my valued friend Ali is explaining log levels and how to use them. I think he is right with what he is asking for when it comes to choosing the right level for logging. Please find his post below, the original can be accessed under: https://huestones.co.uk/2019/12/how-to-explain-log-levels-to-your-kids-and-team/

 

I’ve had to explain log levels on many occasions when working with new teams and over time developed a hopefully simple explanation of how logging should work in any application. This post is of course opinionated; As long as you, your team and your organisation have the same opinion you should be fine and my opinion won’t matter. But if you are seeking a better explanation of logging levels then this post is here to help you reason through this.

LOG LEVELS

Fatal, Info, Debug, Trace, Silly, Verbose, Alert– there are so many logging levels that every time you start writing code and use a particular logging library it is often confusing what level to use when logging a particular message. To add to the confusion there is also a level associated with the logger and usually the loggers’ level decides what log levels will be output by that logger.

Syslog RFC 5424 section section 6.2.1 defines seven severities and many logging libraries support these. You don’t really need so many levels and the more levels you have the more the cognitive load of choosing the right level when writing code. Sticking to some core principles discussed here and a few levels should suffice.

EXPLORING A COLOSSAL CAVE

So imagine besides your nighttime programing job you are in daytime an intrepid cave explorer and are about to set out exploring a new cave with your teammate. You are the first humans ever to enter into the cave as you lead your less experienced teammate.

To share your first hand experience you have a twitter feed where you will post updates as you progress. But you are also aware of the dangers of entering an unexplored cave and are well prepared. You carry with you a walkie talkie which connects you with a fellow teammate who follows behind you and have an external hard communication line that connects you to emergency services. Both of you carry a backpack with essential first-aid kit, food and water.

You start into the cave by timing yourself and post some info into your twitter feed “We are entering the cave…”, “the time now is 14:00 hours”.

As you explore the cave you notice a deep slippery gorge filled with poisonous snakes and you warn your fellow explorer behind you “Watch your step on the left, snake nest”.

 THE LEVEL YOU LOG A MESSAGE AT SHOULD DEPEND SOLELY ON THE SEVERITY OF THE MESSAGE ITSELF. THE OUTPUT LEVEL THE LOGGER IS SET AT SHOULD NOT WORRY YOU TOO MUCH

Further in, your teammate splits up and decides to explore a small stream going down a gully. Soon you hear him cry out on your walkie talkie, “I’ve slipped, I’ve slipped, I’m going to have to drop my backpack and swim out”. “Okay I’ve gotten out but no backpack, I’m going to have to turn around.” You realise it was an error letting him go it alone and now he has had to abort the exploration, too bad. Before leaving he puts up a few flares and takes a snap of his whereabouts. He will share this internally so that you both can check and learn, debug and decipher what went wrong afterwards.

As you wander deeper into the cave you see beautiful cave paintings and in excitement make a misstep. You fall into a pit and while you manage to regain your control you hit your ankle hard and feel the crack of bone. This is critical. You need someone to come and help you out. Luckily the hardline to emergency services gets you some help.

DEFINING LOG LEVELS

So now that you are out of the Colossal Cave and resting your injured ankle you decide to use your experience and write some rules for log levels.

MESSAGE SEVERITY AND OUTPUT LEVEL

You realise that every message you want to log has a level of severity associated with it. The level you log a message at should depend solely on the severity of the message itself. The output level the logger is set at should not worry you too much. The loggers’ output level should automatically filter out messages that are of lower severity, it’s not your worry. For example, emergency services use a logger set at level critical which will automatically filter out any info messages even if you send it to the logger while your twitter feed uses a logger set at level info and will show everything on your twitter feed so your fans can follow your progress and mishaps in real time!

Importantly the loggers output level does not change the severity of your message.

LOG DATA MAY INADVERTENTLY EXPOSE RUNTIME, SECURITY OR PERSONAL DETAILS HELD IN YOUR SYSTEM…

THE RULES

info (or verbose): Use this to log messages that communicate details of where you are in your code, what you are about to do. If you are tracking performance log when you entered a code block, how long you took, what you did or did not do.

warn: Use this level to communicate expected error conditions or errors you can safely recover from. Also use it to highlight any risks which might need addressing in time or may get more serious if they continue to be ignored in subsequent releases of your code.

error: Use this level to communicate unexpected conditions that caused your code to abort what it intended to do during this run.

critical (or alert or emergency): Use this level to communicate unexpected conditions that will cause your code to continue failing even during subsequent runs. Usually critical is a call for help to some human to come and help your program or system to recover, even if it’s 2AM in the night.
Note: If your chosen logging library or platform does not support a critical level, use error and include a tag in the message to say it’s a critical condition. You can then get it immediate attention or human intervention to resolve.

debug: This is an interesting level and should be used to log information that helps you debug the program, dump the contents of memory, stack traces and other variables in context when errors happen. This kind of variable log data may inadvertently expose runtime, security or personal details held in your system and hence should be logged on this seperate level. Remember you can combine the debug level with one of the other levels, usually error or critical. First log a friendly message at one of the other levels and then log the system state variables using debug immediately after. On productions systems this gives you the option to completely turn off the debug level logs or purge the debug logs based on your organisations security guidelines.

That’s it, I hope you enjoy exploring many more caves and do so safely.

 

Image credit: Jorge Fernández on Unsplash

Hacking Contest by Google, Code Jam 2012

Get seated, ready, steady.. GO. There is another annual hacking cup coming. I already pointed to the Facebook Hacker Cup a few days ago. Now it is time to announce that also Google is doing it’s annual contest in 2012.

Google Code Jam 2012

The first round starts in March 2012, so maybe you already want to lock the door for practicing.

Last year over 30,000 coders competed, be the 30,001 hacker that gets the almighty title of Code Jam Champion, and a hefty $10,000 reward.

Continue reading “Hacking Contest by Google, Code Jam 2012”

Facebook Hacker Cup 2012 – starts in 2 weeks

Hackers around the world, here are some good news

Facebook is starting its second (now annual) Facebook Hacker Cup. Get your coke, beer or even glas of redwine next to you, arrange some brain-food and get in a relaxed postion. There will be some code to be written in the next weeks. That’s a challenge all AI-Class Students shall be interested in.

If you are willing to submit your solutions to different hacking problems, you may qualify for the first of three online rounds. The competition commences with a 72-hour Qualification Round on January 20, 2012 at 4:00 PM PT and ends on January 23, 2012 at 4:00 PM PT. You will be presented with three problems and if you correctly solves at least one problem, you will advance to Online Round 1. All online Rounds will be occuring in January 2012 with world finals held at Facebook’s headquarters in California, registration started January 4, 2012.

Facebook will pay to fly and accommodate the top 25 hackers from the third online round out to their californian campus and there is more to win:

$5,000 USD and title as world champion to the top hacker
$2,000 for second place
$1,000 for third
$100 for fourth through 25th
Awesome t-shirts for the top 100 hackers coming out of the second online round

Details:
Continue reading “Facebook Hacker Cup 2012 – starts in 2 weeks”