On Wed, 2009-03-25 at 10:38 -0500, Vijay Gurbani wrote:
> Dale Worley wrote:
> > Not really, because log files slice the universe of data the wrong way.
> 
> Not as much wrong as different; i.e., log files slice the universe of
> data a different way.
> 
> > A log file tells everything that happens at a particular element, almost
> > all of which is irrelevant regarding a particular transaction.
> 
> Depends.  If that element is misbehaving -- either through flawed source
> code or because of external influences -- the state of a transaction
> preserved in a log file from the point of that element is of extreme
> interest for analysis.
> 
> However, as you note, log files do not help in dynamic tracing
> of the transaction across a set of elements.

As we both understand, the two mechanisms slice the universe of data in
different ways, which are most useful for attacking different problems.

What makes the problem more complex is that different elements have
different owners, and one can reasonably say that the UAC-owner can look
at the action of a proxy in regard to one of the UAC's requests, but not
have the right to examine the proxy's full log.

Conversely, taking the intersection of the two questions, a log file
format should record at least enough information about a transaction as
you would want in a trace facility.

Dale


_______________________________________________
Sip mailing list  https://www.ietf.org/mailman/listinfo/sip
This list is for NEW development of the core SIP Protocol
Use [email protected] for questions on current sip
Use [email protected] for new developments on the application of sip

Reply via email to