Comment by eru
4 years ago
It's a lot of effort, but you can make a system like this work.
Eg Google does for example.
(SREs can still look at some metadata of the running system, like load etc.
Logs themselves have to be carefully anonymized.
The data itself is almost completly off-limits.)
No comments yet
Contribute on Hacker News ↗