The Coralogix blog
Expert insights, bold ideas, and company news
All Articles
- All
- Alerts
- OpenTelemetry
- Uncategorized
- Software development
- AI
- AWS
- Product
- CDN monitoring
- CloudWatch
- Logging
- Real user monitoring
- Data
- Gaming
- APM
- Cloud
- Fintech
- FinOps
- Kubernetes
- Microservices
- Compliance
- Observability
- Metrics
- Security advisory
- Tracing
- CI/CD
- IaC
- Elasticsearch
- Migrations
- DevOps & IT operations
- Troubleshooting
- Company news
- Case studies
- Security
- Performance
- Tutorials
- Audit logs
- Logs
- Application performance monitoring
- Monitoring
- Log analytics
This Win is for Our Customers – We’ve Just Raised $142 Million in a Series D Round
While 2020 and 2021 were significant years for us, we’ve entered this year ready to...
On-premise vs. On the Cloud
Since its emergence in the mid-2000s, the cloud computing market has evolved significantly. The benefits of reliability, scalability, and cost reduction using cloud computing have created a demand...
May 2022 Platform Updates
Our team has been working hard on building exciting new features like our DataMap, advanced Tracing UI, and more that will give you even greater power to monitor...
How to Use SIEM Tools in the Modern World
In our highly connected world, organizations of all sizes need to be alert to the risk of cyberattacks. The genuine threats to today’s enterprises include data leaks, ransomware,...
AWS Service Observability using OpenTelemetry
Effective AWS observability tools can help teams proactively solve problems. The efficient use of observability statistics is essential to any microservice architecture. OpenTelemetry is a project supported by...
What Is a Log Agent and Why It Matters, Plus Examples
This article was last updated on June 28, 2023. If you’ve been investigating log monitoring...
4 Different Ways to Ingest Data in AWS OpenSearch
AWS OpenSearch is a project based on Elastic’s Elasticsearch and Kibana projects. Amazon created OpenSearch from the last open-source version of ElasticSearch (7.10) and is part of the...
What is a Security Whitelist?
In April 2022 alone, there were 14.3m records breached due to 80 significant security incidents. These incidents make up a complex, shifting landscape of cyberattacks that require increasingly...
Kubernetes Logging with Elasticsearch, Fluentd, and Kibana
Kubernetes, a Greek word meaning pilot, has found its way into the center stage of...
Proactive Monitoring vs. Reactive Monitoring
Log monitoring is a fundamental pillar of modern software development. With the advent of modern software architectures like microservices, the demand for high-performance monitoring and alerting shifted from...
3 Key Benefits to Web Log Analysis
Whether it’s Apache, Nginx, ILS, or anything else, web servers are at the core of online services, and web log monitoring and analysis can reveal a treasure trove...
Using Synthetic Endpoints to Quality Check your Platform
Quality control and observability of your platform are critical for any customer-facing application. Businesses need...