{"id":4710,"date":"2023-06-08T22:00:00","date_gmt":"2023-06-08T22:00:00","guid":{"rendered":"http:\/\/www.sumologic.com\/blog\/zelda-totk-logs"},"modified":"2025-06-11T14:21:26","modified_gmt":"2025-06-11T22:21:26","slug":"zelda-totk-logs","status":"publish","type":"blog","link":"https:\/\/www.sumologic.com\/blog\/zelda-totk-logs","title":{"rendered":"Zelda and DevOps: Linked by logs in Tears of the Kingdom"},"content":{"rendered":"\n<section class=\"e-stn e-stn-0d652506f82b000a392973813b918ee25d5b4211 e-stn--glossary-inner-content e-stn--table-of-content\"><div class=\"container\">\n<div class=\"wp-block-b3rg-row e-row row\">\n<div class=\"wp-block-b3rg-column e-col e-col-1f7b3997080fc292474d26ff00c905d99d3520fa e-col--content-wrapper  col-sm-12 col-lg-12 col-xl-12\">\n<div class=\"e-div e-div-a1b32f66e1749758df41d5aea14f647cd10e362c e-div--card-btn-link\"><div class=\"e-img \">\n<figure class=\"wp-block-image size-large\"><img loading=\"lazy\" decoding=\"async\" width=\"1400\" height=\"400\" src=\"http:\/\/www.sumologic.com\/wp-content\/uploads\/blog-zelda-header-1.png\" alt=\"\" class=\"wp-image-4700\" title=\"\"><\/figure>\n<\/div>\n\n\n<p><\/p>\n\n\n\n<p class=\"has-delft-blue-color has-text-color has-link-color wp-elements-fe590872b5d0077dc63cd2e135e4067a\">&#8220;The Legend of Zelda: Tears of the Kingdom&#8221; (TOTK) is an award-winning game that was released on May 12 this year. The game fans were so excited that some took vacation or sick leave to play uninterrupted. The game sold more than 10 million units in three days!&nbsp; Zelda TOTK presents an open world where players, as Link (the protagonist), can explore, build, and solve puzzles. An <a href=\"https:\/\/kotaku.com\/zelda-tears-kingdom-totk-link-ultrahand-logs-crafting-1850437422\" target=\"_blank\" rel=\"noopener\">interesting phenomenon emerged<\/a> in which players found they could use logs (as in \u201clong wooden objects\u201d) to solve challenges in the game.<\/p>\n\n\n\n<p class=\"has-delft-blue-color has-text-color has-link-color wp-elements-b4b076cd7fc50c763ca4a72fd5381091\">Let\u2019s look at parallels between the world of the game and the world of DevOps\u2014where logs (as in \u201ctimestamped records of events\u201d) are used to solve many puzzles as well. Some concepts hold true in both worlds, such as why logs are preferable to other tools, the limitations of logs, and how combining multiple logs is extremely useful.<\/p>\n\n\n\n<p class=\"has-delft-blue-color has-text-color has-link-color wp-elements-1129c2bd80a53f17fdee5f0d95711bc5\">If you\u2019re only here because you read all things Zelda, let\u2019s give you a primer on DevOps, observability, and logs.<\/p>\n\n\n\n<h2 class=\"wp-block-heading has-eigengrau-color has-text-color has-link-color wp-elements-7de9f50e52c6c6c6ca5c73affcd27bc1\" id=\"devops_and_observability\">DevOps and observability<\/h2>\n\n\n\n<p class=\"has-delft-blue-color has-text-color has-link-color wp-elements-0d81807087bd18394f1cd0b435f7266c\"><a href=\"https:\/\/www.sumologic.com\/glossary\/devops\/\">DevOps<\/a> is the practice that empowers developers to deliver applications, features and service at a high velocity.<\/p>\n\n\n\n<p class=\"has-delft-blue-color has-text-color has-link-color wp-elements-382406c50d17e0f85e602f3551d79eea\">An organization that embraces a DevOps approach relies heavily on observability. The state of the infrastructure, pipeline, and code in the CI pipeline must be known and accessible, and observability provides this. An effective observability stack depends on data that comes from logs, metrics, and distributed traces. The focus of this article, of course, is on logs.<\/p>\n\n\n\n<h3 class=\"wp-block-heading has-eigengrau-color has-text-color has-link-color wp-elements-a80b1d20a650d0842a5ca2d0d28b46be\" id=\"why_logs_are_vital_for_observability\">Why logs are vital for observability<\/h3>\n\n\n\n<p class=\"has-delft-blue-color has-text-color has-link-color wp-elements-98a4d0ade80ab626f93dfa843cdfc6cb\">Of the different types of observability data, logs are often considered the most versatile and informative. Metrics can give you an overall picture, such as the number of errors encountered or the amount of CPU currently in use. But if you suddenly detect that the number of errors has increased, you still need to figure out what went wrong. Similarly, distributed tracing can tell you the path a request takes and the amount of time it spends along that path. But if the time spent in a particular component suddenly triples, you still need to dig deeper and figure out what&#8217;s wrong.<\/p>\n\n\n\n<p class=\"has-delft-blue-color has-text-color has-link-color wp-elements-6a7512d770e0dfdde2df7299f46ebb14\">Logs give you that detailed information. With diligent logging done right, you can often extract great analytics that can be augmented with metrics and distributed tracing. Learn more in our <a href=\"https:\/\/www.sumologic.com\/guides\/log-analytics\/\">guide to log analytics<\/a>.&nbsp;<\/p>\n\n\n\n<p class=\"has-delft-blue-color has-text-color has-link-color wp-elements-64a6079da92a5e8a5d2a555584513301\">In Zelda, the same sentiment applies. Sure, you have multiple tools and ways to solve problems and advance in the game. However, logs are the universal solution. This is so much the case that one player even <a href=\"https:\/\/twitter.com\/ImWithHelper\/status\/1657288518874574850\" target=\"_blank\" rel=\"noopener\">tweeted<\/a>: <em>I refuse to solve anything any other way than \u201cmore logs.\u201d<\/em><\/p>\n\n\n<div class=\"e-img \">\n<figure class=\"wp-block-image size-large\"><img loading=\"lazy\" decoding=\"async\" width=\"585\" height=\"465\" src=\"http:\/\/www.sumologic.com\/wp-content\/uploads\/zelda-logs-tweet-2-1.png\" alt=\"Zelda logs tweet\" class=\"wp-image-4701\" title=\"\"><\/figure>\n<\/div>\n\n\n<p class=\"has-delft-blue-color has-text-color has-link-color wp-elements-587e78f9618ffa4a1773624a85490b5f\"><em><br><\/em><\/p>\n\n\n\n<h2 class=\"wp-block-heading has-eigengrau-color has-text-color has-link-color wp-elements-bcdfc2325a480631faeda358639b2463\" id=\"collecting_logs\">Collecting logs<\/h2>\n\n\n\n<p class=\"has-delft-blue-color has-text-color has-link-color wp-elements-d5cb4a9e4a8829a4d18a54e3e578e89f\">Before we can use logs, we need to collect logs. In Zelda, you collect logs by chopping trees with your axe. <br><\/p>\n\n\n<div class=\"e-img \">\n<figure class=\"wp-block-image size-large\"><img loading=\"lazy\" decoding=\"async\" width=\"1000\" height=\"538\" src=\"http:\/\/www.sumologic.com\/wp-content\/uploads\/Logging-gotchas.jpg\" alt=\"\" class=\"wp-image-4702\" title=\"\"><\/figure>\n<\/div>\n\n\n<p class=\"has-delft-blue-color has-text-color has-link-color wp-elements-50570847fe11faaecc50247198210fc5\">In the DevOps world, applications and system components typically write logs to files. In Kubernetes, containers write to standard output, and the container runtime captures the logs.<\/p>\n\n\n\n<h2 class=\"wp-block-heading has-eigengrau-color has-text-color has-link-color wp-elements-d94f25645acefca36acb742bcc5f67d1\" id=\"aggregating_logs\">Aggregating logs<\/h2>\n\n\n\n<p class=\"has-delft-blue-color has-text-color has-link-color wp-elements-d9bbdb767f23e121a413d60b3b66fe4f\">However, just <strong>having logs lying around is not enough<\/strong>. To benefit from logs, you need to transfer them to a central location so that you can later combine them to solve problems. Learn more in our <a href=\"https:\/\/www.sumologic.com\/guides\/log-management\/\">guide to log management<\/a>.<\/p>\n\n\n\n<p class=\"has-delft-blue-color has-text-color has-link-color wp-elements-e9a74c2f021dc98279d78baba5fd3062\">In Zelda, you can use Link&#8217;s Ultrahand ability to grab logs and move them around. This is super useful when you need a lot of logs for a project, but trees are sparse. You can chop down trees in different areas and transfer all the logs you chopped to a central location. There, you can assemble them and build magnificent creations.<\/p>\n\n\n<div class=\"e-img \">\n<figure class=\"wp-block-image size-large\"><img loading=\"lazy\" decoding=\"async\" width=\"640\" height=\"360\" src=\"http:\/\/www.sumologic.com\/wp-content\/uploads\/Aggregating-logs_1.jpg\" alt=\"\" class=\"wp-image-4703\" title=\"\"><\/figure>\n<\/div>\n\n\n<p class=\"has-delft-blue-color has-text-color has-link-color wp-elements-5ea4bcbbdea1d8548c4a48a70894a2c5\">In the DevOps world, the equivalent is transferring or ingesting, logs from the machine they are recorded on to a centralized logging solution. This is often called log aggregation. When you manage more than a handful of machines, log aggregation is a best practice. Trying to review or extract log files from individual machines in an ad hoc manner is not scalable.<\/p>\n\n\n\n<p class=\"has-delft-blue-color has-text-color has-link-color wp-elements-fe0b69084c67248b7769fa4f6462f127\">Often, log aggregation is typically done by installing an agent on each machine. The agent watches the log files and sends them to the centralized logging solution. For example, Sumo Logic offers the industry standard <a href=\"https:\/\/help.sumologic.com\/docs\/send-data\/opentelemetry-collector\/\" target=\"_blank\" rel=\"noopener\">OpenTelemetry collectors<\/a> as well as <a href=\"https:\/\/help.sumologic.com\/docs\/send-data\/installed-collectors\/\" target=\"_blank\" rel=\"noopener\">installed collectors<\/a> that perform this task.<\/p>\n\n\n\n<p class=\"has-delft-blue-color has-text-color has-link-color wp-elements-899e286c0f49dc18526c78a72019bd60\">You may want to collect additional log information beyond local log files. Sumo Logic offers <a href=\"https:\/\/help.sumologic.com\/docs\/send-data\/hosted-collectors\/\" target=\"_blank\" rel=\"noopener\">hosted collectors<\/a> that can do the job without having to install anything on your organization\u2019s machines.<\/p>\n\n\n\n<h2 class=\"wp-block-heading has-eigengrau-color has-text-color has-link-color wp-elements-6b5c384d29650d8877000dbb708d9303\" id=\"combining_logs_to_solve_problems\">Combining logs to solve problems<\/h2>\n\n\n\n<p class=\"has-delft-blue-color has-text-color has-link-color wp-elements-ec400d4d4e9d79781003f0844f8b5786\">We\u2019ve collected our logs and aggregated them in one place. Next, we can combine them to solve puzzles and problems.<\/p>\n\n\n\n<p class=\"has-delft-blue-color has-text-color has-link-color wp-elements-f92e84c80bf71beb1e293ceaf9899658\">In Zelda, you combine logs by manipulating them with the handy Ultrahand ability (see what we did there?) and fusing them together. You can chain logs together to create huge bridges, put them next to each other to build rafts, or use them for anything else you can imagine.<\/p>\n\n\n\n<p class=\"has-delft-blue-color has-text-color has-link-color wp-elements-ce1594aef53073384446a78ec5e9133b\">With logs working together, you can cross bodies of water, climb slippery surfaces, or deliver items.<\/p>\n\n\n<div class=\"e-img \">\n<figure class=\"wp-block-image size-large\"><img loading=\"lazy\" decoding=\"async\" width=\"640\" height=\"360\" src=\"http:\/\/www.sumologic.com\/wp-content\/uploads\/Combining-logs-to-solve-problems.jpg\" alt=\"\" class=\"wp-image-4704\" title=\"\"><\/figure>\n<\/div>\n\n\n<p class=\"has-delft-blue-color has-text-color has-link-color wp-elements-18c4d3da029931a47a0686f950840ec8\">You can attach other objects to logs to create even more sophisticated solutions and solve more difficult problems. For example, you may attach a propeller to a few logs, yielding a fully functional raft.<\/p>\n\n\n<div class=\"e-img \">\n<figure class=\"wp-block-image size-large\"><img loading=\"lazy\" decoding=\"async\" width=\"640\" height=\"360\" src=\"http:\/\/www.sumologic.com\/wp-content\/uploads\/Combining-logs-to-solve-problems-2.jpg\" alt=\"\" class=\"wp-image-4705\" title=\"\"><\/figure>\n<\/div>\n\n\n<p class=\"has-delft-blue-color has-text-color has-link-color wp-elements-3b03d4e89de901a918cf947a71a2f721\">In the DevOps world, combining data from different log files to get useful analytics is at the heart of investigating incidents and finding the root cause of problems. Within the domain of security, forensic analysis relies heavily on audit and access logs to identify breaches and culprits.<\/p>\n\n\n\n<p class=\"has-delft-blue-color has-text-color has-link-color wp-elements-5de1f6f8b89090c760c131b374c914ac\">Just like in Zelda\u2014where you can combine logs with other objects like sails\u2014in the DevOps world, you often combine logs and log analytics with other forms of observability data, like metrics and distributed traces. This will help you have deeper insights to solve more challenging problems by augmenting and enriching the information you extract from logs.<\/p>\n\n\n\n<h2 class=\"wp-block-heading has-eigengrau-color has-text-color has-link-color wp-elements-33d3a9ac8e8b41bf3e570b723ab46c78\" id=\"logging_gotchas\">Logging gotchas<\/h2>\n\n\n\n<p class=\"has-delft-blue-color has-text-color has-link-color wp-elements-b6bd97c4cd7b6dba4874e9bb70e155e5\">Logs are great, but they are not a panacea. You must understand how to utilize logs efficiently to achieve gains with minimal pain. Let&#8217;s look at some logging gotchas.<\/p>\n\n\n\n<p class=\"has-delft-blue-color has-text-color has-link-color wp-elements-adcb3c587895e551893488bb704cfc75\">In Zelda, if you chop too many trees, your axe might get damaged and eventually break.<\/p>\n\n\n<div class=\"e-img \">\n<figure class=\"wp-block-image size-large\"><img loading=\"lazy\" decoding=\"async\" width=\"1000\" height=\"538\" src=\"http:\/\/www.sumologic.com\/wp-content\/uploads\/Logging-gotchas-1.jpg\" alt=\"\" class=\"wp-image-4706\" title=\"\"><\/figure>\n<\/div>\n\n\n<p class=\"has-delft-blue-color has-text-color has-link-color wp-elements-1012a128f21acf47d01257ec1feff842\">You can also lose logs if you drop them into the abyss.<\/p>\n\n\n<div class=\"e-img \">\n<figure class=\"wp-block-image size-large\"><img loading=\"lazy\" decoding=\"async\" width=\"1000\" height=\"563\" src=\"http:\/\/www.sumologic.com\/wp-content\/uploads\/Logging-gotchas-2.jpg\" alt=\"\" class=\"wp-image-4707\" title=\"\"><\/figure>\n<\/div>\n\n\n<p class=\"has-delft-blue-color has-text-color has-link-color wp-elements-cd2f110f32f33ee501367246262697d6\">Another problem occurs if you&#8217;re overzealous when striking a log. You destroy it and end up with a pile of chopped wood, which can&#8217;t be used as a log.<\/p>\n\n\n<div class=\"e-img \">\n<figure class=\"wp-block-image size-large\"><img loading=\"lazy\" decoding=\"async\" width=\"640\" height=\"360\" src=\"http:\/\/www.sumologic.com\/wp-content\/uploads\/Logging-gotchas-3.jpg\" alt=\"\" class=\"wp-image-4708\" title=\"\"><\/figure>\n<\/div>\n\n\n<p class=\"has-delft-blue-color has-text-color has-link-color wp-elements-f2f8512fc2ec2b83c2af3f76ed4c4609\">One other limitation of logs in Zelda is that you can&#8217;t fuse more than 21 logs together.<br><br>Finally, some areas simply don&#8217;t have trees that you can chop down and use as logs. Check out this dreary, icy landscape.<\/p>\n\n\n<div class=\"e-img \">\n<figure class=\"wp-block-image size-large\"><img loading=\"lazy\" decoding=\"async\" width=\"640\" height=\"360\" src=\"http:\/\/www.sumologic.com\/wp-content\/uploads\/Logging-gotchas-4.jpg\" alt=\"\" class=\"wp-image-4709\" title=\"\"><\/figure>\n<\/div>\n\n\n<p class=\"has-delft-blue-color has-text-color has-link-color wp-elements-e62396616c44b7e66ad69070e3b71ef4\">Let&#8217;s turn our attention to the DevOps world, which has its own logging-related challenges.<\/p>\n\n\n\n<p class=\"has-delft-blue-color has-text-color has-link-color wp-elements-afff866ab0f0ee19aa222e855b2ef873\">In the DevOps world, you can lose and\/or destroy logs just like in Zelda. There is a little bit more complexity to this, so let&#8217;s unpack it.<br><\/p>\n\n\n\n<h3 class=\"wp-block-heading has-eigengrau-color has-text-color has-link-color wp-elements-fcfe3853830c8ae23aad7078b42b3fff\" id=\"logs_in_the_cloud\">Logs in the cloud<\/h3>\n\n\n\n<p class=\"has-delft-blue-color has-text-color has-link-color wp-elements-199a16a6907e201f3f697b42ac21ad4d\">You can store your logs in cloud storage such as <a href=\"https:\/\/www.sumologic.com\/glossary\/aws-s3\/\">AWS S3<\/a> buckets. This mostly solves the issue of disk space, but brings a host of other challenges such as how to organize your logs (one bucket for all logs, one bucket per log, some partitioning inside some buckets, etc) and how to hydrate them. In addition, applications need to be aware of where they are supposed to write their log to and manage cloud API keys. For 3rd party open source applications it\u2019s impossible (without forking) to change their logging implementation.<\/p>\n\n\n\n<h3 class=\"wp-block-heading has-eigengrau-color has-text-color has-link-color wp-elements-297a039d9688a819afdc0dab0607b0f0\" id=\"logs_and_disk_space\">Logs and disk space<\/h3>\n\n\n\n<p class=\"has-delft-blue-color has-text-color has-link-color wp-elements-ccfd4af1e78ae61019fed6769ade68cd\">Logs on machines are usually stored on disks (local or network disks). Disks have limited space. If you&#8217;re not vigilant and just keep writing more and more logs, you will eventually run out of disk space. This might be detrimental to your applications, which may also need to write to the disk. But it will definitely be a disaster for your logs. In many cases, failure to write logs will also cause your applications to fail, as logging might be treated as a critical function.<\/p>\n\n\n\n<p class=\"has-delft-blue-color has-text-color has-link-color wp-elements-49628fe318f44aff6d4b8b019dbdeea8\">The best practice is to control your log file sizes. This is typically accomplished by log rotation, in which you periodically start writing to a new log file while old log files are deleted. Log rotation addresses the disk space issue, but if you want to inspect the deleted log files, you&#8217;re out of luck. This is where log aggregation comes into play. You can ship your logs to a centralized logging solution, which likely has elastic storage. However, if there is any problem with log transfer (such as a misconfigured log agent or an unreachable log aggregator), then you might lose your logs again.<br><\/p>\n\n\n\n<h3 class=\"wp-block-heading has-eigengrau-color has-text-color has-link-color wp-elements-d5fff77e3b07905bc890e0e9e31ab28c\" id=\"understanding_what_you_should_log\">Understanding what you should log<\/h3>\n\n\n\n<p class=\"has-delft-blue-color has-text-color has-link-color wp-elements-2f069cc80747603512511d66a72fcece\">Let\u2019s assume that you\u2019ve set up everything correctly. All your logs are flowing smoothly, stored properly, and are available for query in your centralized logging solution. The next thing you know, the CFO is on the line asking why 30% of the IT budget is dedicated to logging. Yes, engineers want to record everything and keep it forever. However, in the real world, you need to assess the business value of comprehensively logging everything at microsecond granularity.<\/p>\n\n\n\n<p class=\"has-delft-blue-color has-text-color has-link-color wp-elements-e2ab35f0617660543bf1649a8e6abe12\">So, you hunker down and start reducing the retention period of some logs, the types of events that you capture, and the frequency and amount of captured data for some events. You\u2019ve trimmed down how much you log. The logs you capture are still sufficient to diagnose most problems, but controlled enough to prevent gratuitous spending. The accountants are happy.<\/p>\n\n\n\n<p class=\"has-delft-blue-color has-text-color has-link-color wp-elements-17be4ef4c6c766189892ed50ff0c0b5a\">Not so fast! The phone rings again. This time, it&#8217;s a conference call with the head of security <em>and<\/em> the head of legal. As it turns out, your logs contain credential information like passwords and API keys. In addition, you\u2019re logging sensitive data like customer names, addresses, and email addresses. Your logging practices are violating data privacy policies and compliance requirements.<\/p>\n\n\n\n<p class=\"has-delft-blue-color has-text-color has-link-color wp-elements-63fe9e254316ba90e1f8c1bae493da6b\">You grab your team and quickly implement a configuration and redaction system to keep your logs clean of sensitive data. All is well in the world once again.<\/p>\n\n\n\n<h2 class=\"wp-block-heading has-eigengrau-color has-text-color has-link-color wp-elements-b7c98970829c5f572b778b26a37b1682\" id=\"conclusion\">Conclusion<\/h2>\n\n\n\n<p class=\"has-delft-blue-color has-text-color has-link-color wp-elements-8f09bbfcc089f4157c6e0a6c3b0cf496\">Logging and log analytics is a useful and valuable practice in both Zelda and DevOps. It can be used on its own but can benefit from aggregation and integration with other capabilities. In the Zelda world, the Ultrahand is your primary tool. In the DevOps world, a centralized observability platform is an essential tool for managing large-scale, distributed systems.<\/p>\n\n\n\n<p class=\"has-delft-blue-color has-text-color has-link-color wp-elements-144479ef964f857a77a8191dd4b82fb6\"><br>Learn more about how <a href=\"https:\/\/www.sumologic.com\/solutions\/log-analytics\/\">log analytics can help you troubleshoot issues fast<\/a> so you can get back to playing more TOTK.<\/p>\n<\/div>\n<\/div>\n<\/div>\n<\/div><\/section>\n","protected":false},"excerpt":{"rendered":"","protected":false},"author":324,"featured_media":25814,"template":"","meta":{"_acf_changed":false,"show_custom_date":false,"custom_date":"","featured":false,"featured_image":0,"learn_more_label":"","image_alt_text":"","learn_more_type":"","show_popup":false,"learn_more_link_file":0,"event_date":false,"event_start_date":"","event_end_date":"","place_holder_image_url":"","post_reading_time":"6","notification_enabled":false,"notification_text":"","notification_logo":"","notification_expiration_time":0,"is_enable_transparent_header":false,"selected_taxonomy_terms":{"blog-category":[125,127],"blog-tag":[]},"selected_primary_terms":[],"learn_more_link":[],"featured_page_list":[],"notification_enabled_post_list":[],"_gspb_post_css":"","_relevanssi_hide_post":"","_relevanssi_hide_content":"","_relevanssi_pin_for_all":"","_relevanssi_pin_keywords":"","_relevanssi_unpin_keywords":"","_relevanssi_related_keywords":"","_relevanssi_related_include_ids":"","_relevanssi_related_exclude_ids":"","_relevanssi_related_no_append":"","_relevanssi_related_not_related":"","_relevanssi_related_posts":"4668,71369,71176","_relevanssi_noindex_reason":"","inline_featured_image":false,"footnotes":""},"blog-category":[125,127],"blog-tag":[],"class_list":["post-4710","blog","type-blog","status-publish","has-post-thumbnail","hentry","blog-category-devops-it-operations","blog-category-secops-security"],"acf":[],"_links":{"self":[{"href":"https:\/\/www.sumologic.com\/wp-json\/wp\/v2\/blog\/4710","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.sumologic.com\/wp-json\/wp\/v2\/blog"}],"about":[{"href":"https:\/\/www.sumologic.com\/wp-json\/wp\/v2\/types\/blog"}],"author":[{"embeddable":true,"href":"https:\/\/www.sumologic.com\/wp-json\/wp\/v2\/users\/324"}],"version-history":[{"count":4,"href":"https:\/\/www.sumologic.com\/wp-json\/wp\/v2\/blog\/4710\/revisions"}],"predecessor-version":[{"id":26702,"href":"https:\/\/www.sumologic.com\/wp-json\/wp\/v2\/blog\/4710\/revisions\/26702"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.sumologic.com\/wp-json\/wp\/v2\/media\/25814"}],"wp:attachment":[{"href":"https:\/\/www.sumologic.com\/wp-json\/wp\/v2\/media?parent=4710"}],"wp:term":[{"taxonomy":"blog-category","embeddable":true,"href":"https:\/\/www.sumologic.com\/wp-json\/wp\/v2\/blog-category?post=4710"},{"taxonomy":"blog-tag","embeddable":true,"href":"https:\/\/www.sumologic.com\/wp-json\/wp\/v2\/blog-tag?post=4710"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}