Serilog Sinks Seq Versions Save

A Serilog sink that writes events to the Seq structured log server

v7.0.1

2 weeks ago
  • #215 - add a missing ConfigureAwait(false) (@lordmilko)
  • #217, #218 - update Serilog.Sinks.PeriodicBatching to 4.1.0 to fix idle-state memory leak (@nblumhardt)

v7.0.0

2 months ago
  • #211 - update to Serilog.Sinks.PeriodicBatching v4.0.0 (@nblumhardt)

  • #210 - default to not propagating traceparent in batched log requests (@nblumhardt)

  • #209 - recognize and ingest traces from SerilogTracing* (@nblumhardt)

  • Note that until Seq 2024.2 ships, span kinds will appear in Seq as @Properties['@sk'].

v6.0.0

6 months ago
  • #200 - propagate Serilog 3.1's trace and span id fields into @sp and @tr for Seq (@nblumhardt)
  • #201 - accept an ITextFormatter to allow customization of payload content (@nblumhardt)

v5.2.3

7 months ago
  • #193 - include event body sample when generating oversized event placeholder (@nblumhardt)

v5.2.2

1 year ago
  • #189 - don't crash on Blazor, where PooledConnectionLifetime is not supported (@nblumhardt)

v5.2.1

1 year ago
  • #185 - dependency update only - update to Serilog.Sinks.PeriodicBatching for better compatibility with other sinks (@nblumhardt)

v5.2.0

1 year ago
  • #179 - support IAsyncDisposable and bump dependency on Serilog.Sinks.PeriodicBatching to 3.0.0 to prevent deadlocks when flushing on AWS Lambda (@nblumhardt)
  • #180 - limit the default pooled HTTP connection lifetime on .NET 5 and later runtimes (@nblumhardt)
  • #182 - update dependencies including Serilog.Sinks.File (@nblumhardt)

v5.1.1

2 years ago
  • #165 - fix migration from the old durable buffer file format to the new one (@nblumhardt)

v5.1.0

2 years ago
  • #157 - more robust handling of unformattable events when using durable log shipping, log placeholder events in more problem scenarios (@nblumhardt)
  • #159 - enable non-null reference type checking (@nblumhardt)
  • #160 - internal cleanup (@nblumhardt)

v5.0.1

3 years ago
  • #147 - update System.Net.Http for netstandard1.1 and netstandard1.3 (avoids CVE-2018-8292)