Assign a unique ID to each request and include it in every log entry, enabling you to trace a request across services 3. **Do not log sensitive data** — Never log passwords, tokens, credit card numbers, or personally identifiable information (PII) 4. **Log at the right level** — Too much logging was