Key Scenarios
This series of topics describes common situations developers must address when providing logging functionality in their applications. Each scenario explains the task, describes a real-world situation where such a task might arise, and includes code demonstrating how to use the Logging Application Block to complete the task. The scenarios are as follows:
- Logging to a Database. This topic describes the process you should follow for using the Logging Application Block to implement the common requirement of logging to a database.
- Logging to Windows Event Log. This topic describes the process you should follow for using the Logging Application Block to implement the common requirement of logging to Windows Event Log.
- Logging to a Disk File. This topic describes the process you should follow for using the Logging Application Block to implement the common requirement of logging to a disk file.
- Logging to Windows Message Queuing. This topic describes the process you should follow for using the Logging Application Block to implement the common requirement of logging to Windows Message Queuing.
- Logging to WMI. This topic describes the process you should follow for using the Logging Application Block to implement the common requirement of logging to the Windows Management Instrumentation repository.
- Logging as E-mail Messages. This topic describes the process you should follow for using the Logging Application Block to implement the common requirement of sending logging information in e-mail messages.
- Populating and Raising Events from Code. This scenario illustrates how to write code to specify the data to be logged, along with a category and priority, and pass it to the application block.
- Populating a Log Message with Additional Context Information. This scenario illustrates how to populate a dictionary of custom information to be added to a log entry.
- Tracing Activities and Propagating Context Information. This scenario illustrates how to log the start and end of an activity and trace key activity points in between.
- Checking Filter Status before Constructing Log Messages. This scenario illustrates how to avoid collecting log information for messages that will not be logged according to the current configuration information.