Understanding Logging in FlowWright v10

Dileepa WIjayanayake
October 3, 2023

Understanding Logging in FlowWright v10

FlowWright has always been at the forefront of providing robust features to its users. One of the critical aspects of any software, especially those that deal with business processes, is logging. Logging not only helps in troubleshooting issues but also plays a pivotal role in ensuring security and compliance. We dive deep into the logging capabilities of FlowWright.

1. The Importance of Logging

Before we dive into the specifics, it's essential to understand why logging is crucial:

  • Troubleshooting: Logs provide a detailed account of what's happening within the system. This makes it easier to pinpoint issues and resolve them.
  • Security: By monitoring logs, one can detect and respond to security threats in real-time.
  • Compliance: For businesses that need to adhere to specific regulations, logs can be a lifesaver. They offer a transparent record of system activities.

2. The New Engine Log

FlowWright has introduced a new engine log, specifically designed to view messages from the engines. Here's what you need to know:

  • Viewing Messages: This log allows users to see detailed messages from the various engines that FlowWright uses. It's like having a conversation with the engine itself, understanding its operations, and any issues it might be facing.
  • Configurable Logging Level: Not all log messages are of equal importance. FlowWright allows users to control the level of logging through configuration. This means you can choose to see only critical errors or get a detailed trace of every single operation, depending on your needs.

3. Security/Intrusion Log

In today's digital age, security is paramount. FlowWright's Security/Intrusion log is a testament to its commitment to ensuring its users' safety. Here's what it offers:

  • View Invalid Requests: Any invalid request made to the application is logged. This could be a user trying to access a resource they don't have permission for or a malformed request.
  • Intrusion Detection: More critically, this log also captures intrusion attempts. If someone is trying to breach the system or exploit vulnerabilities, the Security/Intrusion log will have a record of it. This allows for swift action and fortification against potential threats.

4. Data Access Log

Data is the lifeblood of modern businesses. Ensuring its integrity and availability is crucial. FlowWright's Data Access Log is designed to help with this:

  • View Data Access Issues: If there's an issue accessing a particular piece of data or a dataset, it will be logged here. This could be due to permission issues, data corruption, or other reasons.
  • Error Logging: More than just access issues, any error related to data – be it retrieval, storage, or manipulation – will be captured in this log. This ensures that data-related problems can be quickly identified and rectified.


FlowWright's enhanced logging capabilities are a testament to its robustness and user-centric approach. Whether you're an IT administrator looking to troubleshoot issues, a security expert keen on ensuring system integrity, or a business leader wanting to ensure data compliance, FlowWright's logging features have got you covered.


As the platform continues to evolve, users can expect even more sophisticated tools and features to make their business processes seamless and secure. To get a demo connect with us today!


See of FlowWright IDP in action. Let's customize your free proof of concept (POC).

Why FlowWright?

Business solutions

Enterprise Architects

Professional Developers

Software Companies (OEM)

Platform

Business Engine

Enterprise service bus

Features overview

Forms automation

Microservices

Rules Engine

Pricing

Resources

FAQ

Blogs & News

Case studies

Training center

Technical documentation

Support portal

Socials

Reviews

Share this article

Read More Featured Articles

Blog

Why Automation Is A Key Part Of Innovation...

Our most advanced Project Management tool ensures that critical tasks get executed in the right order, by the right people, in the right workstream at the right location.

Blog

Today's processes are not for tomorrow

Our most advanced Project Management tool ensures that critical tasks get executed in the right order, by the right people, in the right workstream at the right location.

Whitepaper

Real business Agility requires a dynamic model-driven approach

Our most advanced Project Management tool ensures that critical tasks get executed in the right order, by the right people, in the right workstream at the right location.