1000-ft view: these examples show what goes wrong when logs are missing, unstructured,
leak secrets, use bad timestamps, never trigger alerts, or are easy to tamper with.
Outputs write to demo files under /a09_logging/logs.
Why it’s bad: either nothing gets logged or the log lines are so vague you can’t tie events together (no user/IP/outcome, no correlation id).
Why it’s bad: passwords, tokens, and full SSNs get dumped into logs in cleartext, which are often widely accessible to operators or shipped to third parties.
app.log.Why it’s bad: inconsistent formats and local timestamps make SIEM rules brittle and multi-region correlation nearly impossible.
app.log with local time and ad-hoc fields.Why it’s bad: repeated failures never trigger alerts; brute-force and abuse fly under the radar.
alerts.log.Why it’s bad: anyone with file access can delete or edit lines in place — there’s no signature, no chain, no tamper evidence.
app.log (no signature).