This is a follow up post on Suspecting the Unsuspected. Extracting and Analyzing Log Anomalies. While the previous post
engineering.mercari.com