You need to identify all previous times that the package execution failed because of a primary key violation
You need to establish the automated validation process by using the least amount of administrative effort
You need to produce reports that combine the custom log messages with the system-generated log messages