Understanding Logging in FlowWright v10

Dileepa Wijayanayake • Oct 03, 2023

FlowWright has always been at the forefront of providing robust features to its users. One of the critical aspects of any software, especially those that deal with business processes, is logging. Logging not only helps in troubleshooting issues but also plays a pivotal role in ensuring security and compliance. We dive deep into the logging capabilities of FlowWright.

1. The Importance of Logging

Before we dive into the specifics, it's essential to understand why logging is crucial:

  • Troubleshooting: Logs provide a detailed account of what's happening within the system. This makes it easier to pinpoint issues and resolve them.
  • Security: By monitoring logs, one can detect and respond to security threats in real-time.
  • Compliance: For businesses that need to adhere to specific regulations, logs can be a lifesaver. They offer a transparent record of system activities.

2. The New Engine Log

FlowWright has introduced a new engine log, specifically designed to view messages from the engines. Here's what you need to know:

  • Viewing Messages: This log allows users to see detailed messages from the various engines that FlowWright uses. It's like having a conversation with the engine itself, understanding its operations, and any issues it might be facing.
  • Configurable Logging Level: Not all log messages are of equal importance. FlowWright allows users to control the level of logging through configuration. This means you can choose to see only critical errors or get a detailed trace of every single operation, depending on your needs.

3. Security/Intrusion Log

In today's digital age, security is paramount. FlowWright's Security/Intrusion log is a testament to its commitment to ensuring its users' safety. Here's what it offers:

  • View Invalid Requests: Any invalid request made to the application is logged. This could be a user trying to access a resource they don't have permission for or a malformed request.
  • Intrusion Detection: More critically, this log also captures intrusion attempts. If someone is trying to breach the system or exploit vulnerabilities, the Security/Intrusion log will have a record of it. This allows for swift action and fortification against potential threats.

4. Data Access Log

Data is the lifeblood of modern businesses. Ensuring its integrity and availability is crucial. FlowWright's Data Access Log is designed to help with this:

  • View Data Access Issues: If there's an issue accessing a particular piece of data or a dataset, it will be logged here. This could be due to permission issues, data corruption, or other reasons.
  • Error Logging: More than just access issues, any error related to data – be it retrieval, storage, or manipulation – will be captured in this log. This ensures that data-related problems can be quickly identified and rectified.


FlowWright's enhanced logging capabilities are a testament to its robustness and user-centric approach. Whether you're an IT administrator looking to troubleshoot issues, a security expert keen on ensuring system integrity, or a business leader wanting to ensure data compliance, FlowWright's logging features have got you covered.


As the platform continues to evolve, users can expect even more sophisticated tools and features to make their business processes seamless and secure. To get a demo connect with us today!


business process management software
By Dileepa Wijayanayake 06 May, 2024
The role of AI and analytics in business management will continue to evolve, becoming more sophisticated with advancements in technology.
post-execution workflow process automation software
By Dileepa Wijayanayake 26 Apr, 2024
FlowWright's handling of post-execution processes based on their statuses, ensures a dynamic and adaptable workflow environment. Book a demo today...
Share by: