We'd like to understand where IP actors can get created from. We should be careful not to overwhelm the logs.
First figure out:
- What to log
- How to log it
- What proportion of the time to log (is 100% OK?)
Then implement the logging and agree a strategy for monitoring the data with @jwang.