The document discusses guidelines for logging in cloud applications to enable forensic analysis. It recommends logging key details like timestamps, severity, user information, and reasons for events. The guidelines suggest when to log, such as for errors, security events, and configuration changes. It also provides suggestions for log formats, centralized logging architectures, and reference logging setups that incorporate multiple applications and systems.
6. Applications Enable Visibility
• If you can’t control the infrastructure, control your applications
• Application logging
- needs guidelines
- better tools
- education of developers
and students?
Raffael Marty - @zrlram 6
Saturday, March 26, 2011