Log Viewer (2024)

The Tricentis Tosca Log Viewer allows you to monitor the execution of TestCases. You can filter out relevant log information, save reports, and track the execution of your TestCases in real-time.

Start the Log Viewer

You can find the Log Viewer in two different Tricentis Tosca directories:

  • %COMMANDER_HOME%

  • %TBOX_HOME%

Each of them has a separate configuration file, which you can modify.

To start the Log Viewer, navigate to one of its directories and enter the following prompt at command line:

LogViewer.exe [<log level>] [pause]

  • Replace <LogLevel> with one of the available log level values listed below.

  • The parameter pause is optional. It hides the log information in the UI. If you expect your TestCases to log large amounts of data, use this parameter.

Available log level values

Value

Description

all

Log Viewer logs every event.

off

Log Viewer doesn't log any data.

error

Log Viewer logs errors, warnings, execution information, and debugging data.

warn

Log Viewer logs warnings, execution information, and debugging data.

info

Log Viewer logs execution information and debugging data.

debug

Log Viewer only logs debugging data.

Log Viewer (1)

In this example, you start the Log Viewer with the log level info without any log information in its UI.

Log Viewer (2)

Launch the Log Viewer with the command prompt

Navigate the Log Viewer

The Log Viewer window shows an overview of log events.

Additionally, the ribbon menu in the Log Viewer window allows you to perform the following actions:

  • Change the current log level. To do so, click on the log level in the menu and select a new one from the drop-down menu.

  • Navigate to the log Files.

  • Clear all log events in the Log Viewer window.

  • Save your current log events to a file.

  • Use Chrome Trace to save a JSONfile which you can use with Google Chrome's tracing event profiling tool.

  • Navigate through errors using the Previous Error or Next Error buttons.

Log Viewer (3)

Switch log levels

Manage your log files

Tricentis Tosca automatically saves your log files to the following directory:

%TRICENTIS_ALLUSERS_APPDATA%\logs\Automation\Log4net-log.txt

If you want to save your log files to a different directory, you can edit the respective Log Viewer configuration file:

  • LogViewer.exe.config which is located in %COMMANDER_HOME%.

  • LogViewer.exe.config which is located in %TBOX_HOME%.

For information on additional logging configuration options, see the Log4Net Documentation.

Log Viewer (2024)

FAQs

How do you know when you have sufficient amounts of logs? ›

One strategy for determining if you have sufficient monitoring is to examine the logs following penetration testing. The testers' actions should be recorded sufficiently to understand what damages they may have inflicted. Most successful attacks start with vulnerability probing.

Is too much logging bad? ›

Don't Log Too Much or Too Little

That might sound stupid, but there is a right balance for the amount of log. Too much log and it will really become hard to get any value from it.

What is a log viewer? ›

It is an independent tool designed to view single or multiple log files. A log file records activities and operations that occurred on a server/computer, maintaining an operational history of these activities.

How do you analyze logs? ›

Start by defining the problem clearly, then gather all relevant log data. Analyze the data to identify any patterns or anomalies, and trace the sequence of events leading up to the problem. Once the root cause is identified, steps can be taken to resolve the issue and prevent it from recurring.

How to write good logging messages? ›

Write clear and informative messages that precisely document the event being captured. Including ample contextual fields within each log entry helps you understand the context in which the record was captured, and lets you link related entries to see the bigger picture.

What is the risk of insufficient logging and monitoring? ›

The scan results in one false login attempt per account. The attacker can then scan on another day, using another common password. Insufficient logging and monitoring allow this activity to continue, increasing the odds that the attacker will access your network or applications.

Why is logging illegal? ›

By degrading biodiversity and forests' economic value, forest exploitation also makes land even more vulnerable to deforestation for other uses.

Why is logging dying? ›

The logging industry has seen dwindling revenue in the last five years, spurred by changes in core downstream sectors such as non-durable goods manufacturing and shifts in construction activity. The industry was hit hard by the COVID-19 pandemic as the demand for paper products dropped with the onset of remote working.

What does good logging look like? ›

Your log messages should provide critical information that is easy to read and also drives actions or provides insights. As a rule of thumb, avoid ambiguous or non-descriptive messages that only limited team members understand. Log formats should be easy to parse and keep a consistent log structure.

What is the importance of viewing logs? ›

Log files record data related to activities happening in your applications, servers, networks, or operating systems. Logs act as a trail of records that you can trace back to understand the activity that causes specific events. Thus, logs are critical in troubleshooting operational or performance issues.

Does Windows 10 have a log viewer? ›

To access the Event Viewer in Windows 8.1, Windows 10, and Server 2012 R2: Right click on the Start button and select Control Panel > System & Security and double-click Administrative tools. Double-click Event Viewer. Select the type of logs that you wish to review (ex: Application, System)

What is the purpose of logging? ›

Why does logging happen? Logging occurs for many economical reasons, such as: agriculture (planting crops), cattle-ranching, mining, oil and gas extraction, development, and subsistence-farming.

What is the purpose of log analysis? ›

Log analysis is a process that gives visibility into the performance and health of IT infrastructure and application stacks, through the review and interpretation of logs that are generated by network, operating systems, applications, servers, and other hardware and software components.

What is insufficient logging? ›

Insufficient logging and visibility refers to a CI/CD security risk arising from inadequate data capture, storage, and analysis within continuous integration and continuous deployment processes.

What is excessive logging? ›

Overlogging is a form of overexploitation caused by legal or illegal logging activities that lead to unsustainable or irrecoverable deforestation and permanent habitat destruction for forest wildlife.

What may be problem if you add too many logs? ›

It costs time to write the code to log and test. If there is a lot of log, it costs to much time to analyze and understand the problem. You should log enough to get problems solved and just that.

Top Articles
Latest Posts
Article information

Author: Fredrick Kertzmann

Last Updated:

Views: 5982

Rating: 4.6 / 5 (46 voted)

Reviews: 93% of readers found this page helpful

Author information

Name: Fredrick Kertzmann

Birthday: 2000-04-29

Address: Apt. 203 613 Huels Gateway, Ralphtown, LA 40204

Phone: +2135150832870

Job: Regional Design Producer

Hobby: Nordic skating, Lacemaking, Mountain biking, Rowing, Gardening, Water sports, role-playing games

Introduction: My name is Fredrick Kertzmann, I am a gleaming, encouraging, inexpensive, thankful, tender, quaint, precious person who loves writing and wants to share my knowledge and understanding with you.