Hacker News new | past | comments | ask | show | jobs | submit login

>This article is pretty confused.

Articles like this are often written by someone that manages a trivial or non-critical path system. They have strong feelings about logging because they lack other things to have strong feelings about.

This person seems confused in general. They say "don't log, send it to sentry". Sentry is logging. Sentry is usually configured as a logging destination. It just does some preprocessing on those logs to aggregate and enrich them.

I don't know anyone that fishes through text logs over ssh anymore. We use simple automations to roll everything up for convenient access.

Furthermore he overlooks other use cases for logging. Including analytics, fixing concurrency/heisenbugs, and a myriad of other problems that logging addresses.




> I don't know anyone that fishes through text logs over ssh anymore.

Good points, though it's funny: In my day job I only ever fish through logs (not by ssh -- I don't have that much access to the systems).

But that's only because by the time it gets to me multiple levels of people (who really know what they are doing, BTW, so it doesn't happen often) have done everything else.




Guidelines | FAQ | Lists | API | Security | Legal | Apply to YC | Contact

Search: