The Coralogix blog
Expert insights, bold ideas, and company news
All Articles
- All
- Alerts
- OpenTelemetry
- Uncategorized
- Software development
- AI
- AWS
- Product
- CDN monitoring
- CloudWatch
- Logging
- Real user monitoring
- Data
- Gaming
- APM
- Cloud
- Fintech
- FinOps
- Kubernetes
- Microservices
- Compliance
- Observability
- Metrics
- Security advisory
- Tracing
- CI/CD
- IaC
- Elasticsearch
- Migrations
- DevOps & IT operations
- Troubleshooting
- Company news
- Case studies
- Security
- Performance
- Tutorials
- Audit logs
- Logs
- Application performance monitoring
- Monitoring
- Log analytics
Full-Stack Observability Guide
Like cloud-native and DevOps, full-stack observability is one of those software development terms that can sound like an empty buzzword. Look past the jargon, and you’ll find considerable...
Tracing vs. Logging: What You Need To Know
Log tracking, trace log, or logging traces… Although these three terms are easy to interchange (the wordplay certainly doesn’t help!), compare tracing vs. logging, and you’ll find they...
What is Distributed Tracing? Everything You Need to Know
Tracing, or more specifically distributed tracing or distributed request tracing, is the ability to follow...
An Introduction to Kubernetes Observability
If your organization is embracing cloud-native practices, then breaking systems into smaller components or services and moving those services to containers is an essential step in that journey. ...
Analyzing Test Results Through Your Logs & How to Choose Which Automation Tests to Implement
According to the 2021 test automation report, more than 40% of companies want to expand...
Java Debugging: Using Tracing To Debug Applications
Write enough programs, and you’ll agree that it’s impossible to write an exception-free program, at least in the first go. Java debugging is a major part of the...
Cloud Configuration Drift: What Is It and How to Mitigate it
More organizations than ever run on Infrastructure-as-Code cloud environments. While migration brings unparalleled scale and...
June 2022 Platform Updates
Our team has been hard at work this month to introduce 2 new parsing rules, DataMap improvements, updated tracing visualizations for SLA monitoring & more. Get up to...
How do Observability and Security Work Together?
There’s no question that the last 18 months have seen a pronounced increase in the sophistication of cyber threats. The technology industry is seeing a macro effect of...
Kubernetes Security Best Practices
As the container orchestration platform of choice for many enterprises, Kubernetes (or K8s, as it’s often written) is an obvious target for cybercriminals. In its early days, the...
Keeping IaC Secure: Common Security Risks in Infrastructure as Code
What is infrastructure as code (IaC)? Infrastructure as Code (IaC) is the cloud-computing practice of...
An Introduction to Windows Event Logs
The value of log files goes far beyond their traditional remit of diagnosing and troubleshooting issues reported in production. They provide a wealth of information about your systems’...