Comment by Tiksi
8 years ago
> Many of the logged urls contained query strings from https requests that I don't think they intended to share.
I guess this confirms a few things.
- The complete query strings are logged,
- They don't appear to be too concerned with who accesses the logs internally or have a process that limits the access, and
- They're willing to send those logs out to a random person.
During debugging, that seems fine. The previous sentence makes it clear that they added specific logging to track down the problem. I'd rather have a process that allows engineers debugging memory corruption to see the data that's in the process they're debugging, than a process that prohibits them from seeing it.
This has nothing to do with logging.
The quoted part that specifically mentions logged urls containing query strings has nothing to do with logging?
That's Google logging stuff
12 replies →