The Coralogix blog

Expert insights, bold ideas, and company news

All Articles

AWS Lambda Telemetry API: Enhanced Observability with Coralogix AWS Lambda Telemetry Exporter

AWS recently introduced a new Lambda Telemetry API giving users the ability to collect logs,...

3 mins read Read Now

What is Jaeger Distributed Tracing?

Distributed tracing is the ability to follow a request through a software system from beginning to end. While that may sound trivial, a single request can easily spawn...

6 mins read Read Now

Benefits of Learning Python for Game Development

The world of computer games is vast, ranging from single-player agility games and logic puzzles with simple 2D animations to the stunning graphics in 3D rendered massive multiplayer...

7 mins read Read Now

What is Istio Service Mesh, and Do I Need It?

Development teams build modern applications using microservice architectures. Individual services are built and maintained by separate teams, and then these services are combined using container-based orchestrators to comprise...

7 mins read Read Now

How to Keep Your System Visible in the Age of Remote Working

Monitoring IT infrastructure and services has always been an essential IT prerequisite. However, your log...

6 mins read Read Now

Fintech Industry: Are Your IT, DevOps, and Engineering Teams Siloed?

What is a silo, and why is it bad? The Cambridge English Dictionary defines a...

8 mins read Read Now

How to Scale Your Alerts Beyond PromQL with Coralogix Flow Alerts

When building alerts, engineers aim to create accurate, timely, and actionable alerts. In pursuit of...

6 mins read Read Now
coralogix autocomplete

Contextual Autocomplete: Why Coralogix is Focused on Developer Productivity

In the observability toolchain, all of our efforts go into data storage and analysis, and...

5 mins read Read Now

Distributed Tracing Observability in Microservices

Have you ever tried to find a bug in a multi-layered architecture? Although this might sound like a simple enough task, it can quickly become a nightmare if...

6 mins read Read Now

Akka License Change: The Impact of Akka’s Move Away From “Open Source”

Akka’s license change has surprised many of us, but it didn’t come out of nowhere....

6 mins read Read Now

Instantly Diagnose a Database Outage with Flow Alerts

Stateful, commonly monolithic, and absolutely fundamental to system design, the quality of your database administration...

4 mins read Read Now

Exploit vs. Vulnerability: What Is the Difference?

Whenever engineers discover a new security issue, the question arises every time: is this an exploit or vulnerability? What is a software vulnerability? How does it differ from...

6 mins read Read Now