General
About CSC
Organisation

People
Process for CSC hosting
School Models
Role of Local Organisers
Other Roles

Participants
Past Schools

2004 2005 2006 2007 2008 2009 2010 2011

Diploma at CSC
Sport at CSC
Inverted CSCs

iCSC05 iCSC06 iCSC08 iCSC10 iCSC11

Special schools

School@chep06


Inverted School 2010

8-9 March 2010


CSC2010

CSC2010 Overview

Practical Information
Programme
Schedule
Lecturers
Participants
Organizers

 
Examination results
How to apply
 
CSC-Live

inverted CERN School of Computing 2010 8-9-March 2010, CERN

Programme Overview

 

All questions

Software management and optimization

Visualisation

System Monitoring Details of All Lectures

Schedule

Lecturers

Lecturer Bios

 

Mentors

Printable Version

Series: Advanced Tools for system data collection:

Lecture: Logs in software: How to record the what, the when and the who

A few questions addressed in the lecture

Tuesday 9 March

10:30 - 11:25

Lecture 7

Logs in software:
How to record the what, the when and the who

Luis Muñoz Mejías

Description

In this part we'll highlight the relevance of having good quality logs that are easy to understand by both humans and machines. We'll describe the properties good logs must have (relevant contents, unambiguous timestamping, easy classification, integrity...), and the existing tools designed to meet these requirements, with examples for both developers (what and how to log) and system administrators (what to do with those logs). Real-world examples of good and bad practices will be shown, together with some ideas for improvement.

 

Audience
Software developers and, perhaps, system administrators.

 

Pre-requisite

Understanding of UNIX systems. Programming experience with C/C++/Perl/Python/Java will help.

 

 
Questions
  • What is your primary source of information when you suffer a security breach?

  • Logs in software: Willing to see real-world examples of good and bad practices?

  • Can you find out who runs that funny Grid job? Can you tell on which site, which machine  it runs? Which files were used on it? What files were created?

All the answers at iCSC Lecture 7

iCSC
All on iCSCs
News
Registration
Handouts
Programme
Schedule
All questions

Software management and optimization

Lecture1

Lecture2

Lecture3

Lecture4

Living OO Design series

All theme lectures

Visualisation

Lecture5

System monitoring

Lecture6

Lecture7

Lecture8

All theme lectures

 
All iCSC Lectures
 
FAQ
 
Social event

Feedback: Computing (dot) School (at) cern (dot) ch
Last update: Monday, 18. June 2012 09:43

Copyright CERN