The Coralogix blog

Expert insights, bold ideas, and company news

All Articles

What is Distributed Tracing? Everything You Need to Know

What is Distributed Tracing? Everything You Need to Know

Tracing, or more specifically distributed tracing or distributed request tracing, is the ability to follow...

7 mins read Read Now
An Introduction to Kubernetes Observability

An Introduction to Kubernetes Observability

If your organization is embracing cloud-native practices, then breaking systems into smaller components or services and moving those services to containers is an essential step in that journey. ...

7 mins read Read Now
Analyzing Test Results Through Your Logs & How to Choose Which Automation Tests to Implement

Analyzing Test Results Through Your Logs & How to Choose Which Automation Tests to Implement

According to the 2021 test automation report, more than 40% of companies want to expand...

8 mins read Read Now
Java Debugging: Using Tracing To Debug Applications

Java Debugging: Using Tracing To Debug Applications

Write enough programs, and you’ll agree that it’s impossible to write an exception-free program, at least in the first go. Java debugging is a major part of the...

9 mins read Read Now
Cloud Configuration Drift: What Is It and How to Mitigate it

Cloud Configuration Drift: What Is It and How to Mitigate it

More organizations than ever run on Infrastructure-as-Code cloud environments. While migration brings unparalleled scale and...

10 mins read Read Now
June 2022 Platform Updates

June 2022 Platform Updates

Our team has been hard at work this month to introduce 2 new parsing rules, DataMap improvements, updated tracing visualizations for SLA monitoring & more. Get up to...

3 mins read Read Now
How do Observability and Security Work Together?

How do Observability and Security Work Together?

There’s no question that the last 18 months have seen a pronounced increase in the sophistication of cyber threats. The technology industry is seeing a macro effect of...

9 mins read Read Now
Kubernetes Security Best Practices

Kubernetes Security Best Practices

As the container orchestration platform of choice for many enterprises, Kubernetes (or K8s, as it’s often written) is an obvious target for cybercriminals. In its early days, the...

8 mins read Read Now
Keeping IaC Secure: Common Security Risks in Infrastructure as Code

Keeping IaC Secure: Common Security Risks in Infrastructure as Code

What is infrastructure as code (IaC)? Infrastructure as Code (IaC) is the cloud-computing practice of...

10 mins read Read Now
An Introduction to Windows Event Logs

An Introduction to Windows Event Logs

The value of log files goes far beyond their traditional remit of diagnosing and troubleshooting issues reported in production.  They provide a wealth of information about your systems’...

6 mins read Read Now
New CERT-In Guidelines: What Does That Mean For You

New CERT-In Guidelines: What Does That Mean For You

An organization’s security protocols are vital to maintaining transparency, compliance with government regulations, and trust with customers. On April 28, 2022, the Indian Computer Emergency Response Team (CERT-In)...

5 mins read Read Now
Analyzing Log Data: Why It’s Important

Analyzing Log Data: Why It’s Important

From production monitoring to security concerns, businesses need to know how to analyze logs on a daily basis to make sure their system is up to par. Here...

5 mins read Read Now