Log Streaming

Enabling Support To Support You

This document discusses the manner in which the GRAX application streams application logs, the content of said logs, and the security implications of such behavior.

What is Log Streaming?

GRAX is designed to operate in secure, restrictive environments that minimize the ingress and egress paths available as well as those that don't allow any vendor access. As such, Log Streaming is an authenticated egress-only zero-infrastructure-access method of making your logs available to GRAX Engineering for the sake of supportability and bug fixing. Without such a feature, GRAX Support is flying blind when it comes to application failures in your environment.

Before diving deeper, some key points:

  • GRAX logging never contains your Salesforce records or any system secrets.
  • Logs utilize the same authenticated hq.grax.com connection as licensing and telemetry.
  • Access to these logs is tightly controlled internally at GRAX.
  • Logs are only retained for 15 days by default.
  • This functionality cannot be disabled.

Log Streaming is a forward-only live collector of logs and does not transmit logs from an earlier point in time.

What is Contained in These Logs?

Logs emitted by GRAX never contain customer CRM data, PII, or secrets. These logs are intentionally designed to be useful for GRAX engineers; as such, they contain:

  1. Source Function Names
  2. Source File Names
  3. Function Timing Information
  4. API Request Methods
  5. API Request Paths
  6. CPU Performance Metrics / Profiles
  7. Memory Performance Metrics / Profiles
  8. Storage Performance Metrics / Profiles
  9. Function Metadata (Object Names, Batch Sizes, Record Counts, etc.)

As you can see, the data logged within the GRAX logging system is strictly related to operation and performance of the GRAX application, with no exposure of protected data at any time.

Who Can View The Logs?

Your logs are only visible to the engineers who directly support and manage operation of the GRAX application. For more information about security controls, audits, and compliance, see here.