Logging
REVIEWLogging requirements
Understand the reason for logging within a component and write log statements appropriate to these reasons.
Reasons may include:
- Application support
Logs can be used to track down issues in production. It should be possible to read logs and understand the flow through a programme to help track down where something may have gone wrong. - Application monitoring
Logs can be monitored and used to trigger alerts when something goes wrong. Logs should be monitored for application errors and security events at a minimum. Client errors may not be actively monitored, although they should be logged. - Application profiling
Logs can be used to understand how an application is behaving in production. For instance to identify bottlenecks or performance issues. - Audit
Care must be taken when considering logging for audit purposes. Personally Identifiable Information must not be recorded in logs. Logs should only contain an audit of events, identified by system generated IDs. For instance:
User: [id] logged into application: [application-a]
- Management information
Care must be taken when using logs for management information. The production database is a more accurate source of truth. However logs can provide a useful picture of how an application is behaving.
Security
Adhere to best practice secure logging techniques as defined in the OWASP logging cheatsheet
We also use the NCSC guidance for logging for security purposes
Logging must adhere to the Protective Monitoring Standard. In particular, consult the security focussed monitoring standard to understand the various security events that must be logged.
Data protection
Data used in log entries must not include Personally Identifiable Information except for internal system IDs. Logging IDs allows individuals to be identified if necessary by cross reference to a transactional data store. Access to production data stores is controlled.
For full guidance on use of PII, refer to Guidance for coding with Personal Data.
Tools
We make use of logging libraries that simplify adherance to good practice:
- Logging standard meta data (see below)
- Separation of log statements from output channel
- Logging with rich data formats
In Java, we use Slf4J as our logging API, with Logback as the logging implementation. We use the Lombok @slf4j
annotation to ease creation of the logger in code.
In Node, we use Winston for logging.
We use UTF-8 encoding and output in JSON for simpler integration into Datadog, our centralised log collation service.
Logging levels
DEBUG
DEBUG
output MUST NOT be enabled on production systems as this exposes the risk of logging PII from library code such as object mappers and ORM frameworks
The following standard logging levels should be used:
DEBUG
is used for development purposes only.
Do not rely on DEBUG to understand any potential production issue.INFO
is used to present normal application flow.
For example- On startup/shutdown it is helpful to log configuration properties.
Secrets and sensitive data MUST NOT be logged at INFO. - On successful authentication
- On creation/change of user privileges
- On entry to/exit from the public interface to an application
- On calls to/response from a downstream service
- On notable business logic
- On failed input validation (although WARN may be used instead)
- On startup/shutdown it is helpful to log configuration properties.
WARN
is used to present undesirable but non-critical errors in application flow
For example:- On failed authentication
- On failed authorisation
- On client error
- On server error that is recoverable
- On session management failures
Events logged at WARN are candidates for monitoring so that alerts may be raised after multiple events
ERROR
is used to present errors in application flow that require immediate attention
All events logged at ERROR should be monitored so that alerts may be raised after a single event
For example:- On server error that is unrecoverable
- On failed output validation (e.g. database failed to insert)
- On failed application startup/shutdown
Meta information
The following meta information should be logged:
- unique ID per log statement
- timestamp in ISO8601 format with minimum milliseconds precision and timezone information
- unique host identifier
- containerised environments should uniquely identify the container
- application/system name
- application specific category e.g. class name
- process ID
- thread ID
- unique request ID
- unique correlation ID for requests that span multiple applications and services
The following meta information must not be logged:
- client session ID
Client held session IDs should not be logged, as this opens a security risk.
If tracing session interactions is required, then it is permissable to log a secure hash of the session ID.
Logging Guidance
Never print logging information direct to ‘system output’ except through configuration of a logging library. For instance, avoid statements like this:
System.out.println("A useful log statement");
console.log("A useful log statement");
Logging libraries should provide data as arguments to log messages with placeholders. This has performance benefits in languages such as Java, but more importantly it allows data to be sanitised within the library. For instance, use this form:
logger.info("Here is some data - {}", data);
logger.log('info', 'Here is some data - %s', data);
and avoid this form:
logger.info("Here is some data - " + data);
logger.log('info', 'Here is some data - ' + data);
Content
Log entries should represent atomic events with contextual information to understand the event.
- It should not be necessary to cross reference one log entry with another to understand it.
- Contextual information should include the application flow and logic that caused the event
- Contextual information should include enough data to identify what caused the event
Data used in log entries should be prefixed with a contextual keyword (e.g. User:
) and wrapped in delimiters (e.g. []
) to facilitate parsing
- Depending on the capability of the logging library, delimiters may be automatically included for data items.
- Parsing of logged data should be verified with a working example script
- Don’t leave log parsing until its needed to resolve a live issue. A working script that parses data according to the defined delimiters will verify that the data can be parsed and used.
- Datadog provides a pipeline feature to allow extraction of marked up data items as metrics.
logger.info("User: [{}] successfully authenticated", user.getId())
logger.info("User: [%s] successfully authenticated", user.id)
Data in log statements should be placed in order of relevance to the event
- When reviewing log files it is very helpful to see data in priority order within a single log statement so that the most important aspect of the event is read first. For instance, you may want to search for all log events on a particular case by ID. Once that is done, the actual case ID become less relevant than the thing that happened to it.
logger.info("Changed NewState: [{}] for Case: [{}]", case.getState(), case.getId());
logger.info("Change NewState: [%s] for Case: [%s]", case.state, case.id);
Error cases
Exceptions should be logged with a full stack trace
- Some exceptions will contain additional information that should also be logged.
For example, Java SQLExceptions can contain a chain of other SQLExceptions. Ideally all of the exceptions should be logged - Exceptions should not be logged and then thrown.
The log and throw anti-pattern creates noisy logs with duplicate log entries for a single event. - When throwing exceptions, the original exception cause should be passed in to allow a full stack trace to be logged at the point the exception is handled.
Applications should provide a top level exception handler so that all exceptions are logged.
Asynchronous code must be guarded to ensure that exceptions do not propagate and break subsequent calls in the framework.
Known errors should be logged with a unique error code to identify them. This requires the development team to create and maintain a catalogue of known system errors and codes
logger.error("[{}] OldStatus: [{}] NewStatus: [{}] disallowed for Case: [{}]",
ServiceErrors.CASE_INVALID_STATUS_CHANGE, case.getStatus(), newStatus, case.getId());
logger.error("[%s] OldStatus: [%s] NewStatus: [%s] disallowed for Case: [%s]",
ServiceErrors.CASE_INVALID_STATUS_CHANGE, case.status, newStatus, case.id);
Log review
A review of log events must be undertaken prior to any minor release. A log review should show:
- Application flow is visible from reading logs alone: Do you know what’s happening from reading the logs
- Application errors are being logged and with enough contextual information to identify the cause of the error
- Client errors are being logged and with enough contextual information to identify the cause of the error
- Security events are being logged
References
- OWASP logging cheatsheet
- NCSC guidance for logging for security purposes
- Protective Monitoring Standard
- Guidance for Coding with Personal Data
- Slf4J
- Logback
- Lombok
- Winston
- Datadog
Improve the playbook
If you spot anything factually incorrect with this page or have ideas for improvement, please share your suggestions.
Before you start, you will need a GitHub account. Github is an open forum where we collect feedback.
Published:
Last reviewed:
Next review due: