data.day

The Rant: Stop Asking Me Who Deleted the File When No One Turned Logging On

Data loss is inevitable. Unexplained data loss is negligence. Why defaulting to 'no logs' is a business risk you cannot afford.

The Predictable Crisis

It happens on a Tuesday. It is always a Tuesday. A frantic message arrives. “The financial projection sheet is gone. It was there yesterday. Who deleted it?”

The panic is palpable. This document is the foundation of the quarter’s strategy. The team looks at the server. The file is absent.

Then comes the demand: “Hugo, find out who did this.”

I access the system properties. I inspect the configuration. I see the default settings are intact. logging_enabled: false

I close the terminal. I cannot help you. You have chosen to operate in the dark.

The Gap: Convenience Over Security

It is a common pattern in small and medium enterprises. Systems are set up for speed. They are set up for convenience. Logging requires storage space. Logging requires configuration. Therefore, it is often viewed as an unnecessary overhead.

“We trust our team,” the founder says.

Trust is not a disaster recovery plan.

When logging is disabled, you create an accountability gap. In this gap, negligence thrives.

  • Was it malicious intent?
  • Was it a script error?
  • Was it an accidental drag-and-drop into a nested folder?

Without the log, all three possibilities are equal. You cannot discipline an employee because you cannot prove the action. You cannot fix the script because you cannot trace the execution. You are left with suspicion and a backup restoration bill.

The record shows that teams prefer the convenience of “default settings” until the first dispute arises. Then, the cost of that convenience arrives instantly and at maximum intensity.

The Log: The Cost of Truth is Low

There is no excuse for this posture. Modern storage is inexpensive. Text logs compress efficiently.

A proper logging strategy is not paranoia. It is housekeeping. A clean archive is a defensible archive.

When the log is active, the scenario plays out differently.

  1. The file disappears.
  2. We query the Ledger.
  3. The result appears:

Event: DELETE User: j.smith (Marketing) Time: 09:42 AM Method: Sync Client

Now we have facts. We approach J. Smith. It turns out J. Smith thought he was deleting a shortcut, not the source file. This is a training issue, not a criminal one. The crisis is averted. The file is restored. The workflow is corrected.

This clarity is impossible without the log.

[TO EDITOR: Visualization idea. A flowchart. Top box: ‘File Missing’. Branch Left: ‘No Logs’ -> ‘Unknown Cause’ -> ‘Suspicion/Risk’. Branch Right: ‘Logs Active’ -> ‘Identify Actor’ -> ‘Identify Root Cause’ -> ‘Resolution’.]

Consequently, verify your settings today. Do not assume your IT provider turned them on. Do not assume your SaaS platform tracks this by default. Many do not.

Check your retention policies. Check your audit trails. If the answer to “Who deleted this?” is “I don’t know,” you are failing in your duty as a steward of the business’s data.

Do not ask me for answers you refused to record. Turn the logging on.

FAQs

Does logging slow down the system?

Minimal latency is possible, but negligible in modern systems. The cost of a lost file far exceeds the cost of a millisecond of processing time.

Is logging a violation of privacy?

In a corporate environment, it is not. It is a record of professional activity on company assets. It is accountability.

Can we recover data without logs?

We can sometimes recover the file. We cannot recover the truth of how it was lost.