Using logs to build a solid data infrastructure | Dark Hacker News