The Coralogix blog
Expert insights, bold ideas, and company news
All Articles
- All
- Alerts
- OpenTelemetry
- Uncategorized
- Software development
- AI
- AWS
- Product
- CDN monitoring
- CloudWatch
- Logging
- Real user monitoring
- Data
- Gaming
- APM
- Cloud
- Fintech
- FinOps
- Kubernetes
- Microservices
- Compliance
- Observability
- Metrics
- Security advisory
- Tracing
- CI/CD
- IaC
- Elasticsearch
- Migrations
- DevOps & IT operations
- Troubleshooting
- Service Management
- Company news
- Case studies
- MDR
- Security
- Performance
- Extensions
- Tutorials
- Audit logs
- Infrastructure monitoring
- Logs
- Application performance monitoring
- Dataprime
- Monitoring
- Log analytics
How to Keep Your System Visible in the Age of Remote Working
Monitoring IT infrastructure and services has always been an essential IT prerequisite. However, your log...
Fintech Industry: Are Your IT, DevOps, and Engineering Teams Siloed?
What is a silo, and why is it bad? The Cambridge English Dictionary defines a...
How to Scale Your Alerts Beyond PromQL with Coralogix Flow Alerts
When building alerts, engineers aim to create accurate, timely, and actionable alerts. In pursuit of...
Contextual Autocomplete: Why Coralogix is Focused on Developer Productivity
In the observability toolchain, all of our efforts go into data storage and analysis, and...
Distributed Tracing Observability in Microservices
Have you ever tried to find a bug in a multi-layered architecture? Although this might sound like a simple enough task, it can quickly become a nightmare if...
Akka License Change: The Impact of Akka’s Move Away From “Open Source”
Akka’s license change has surprised many of us, but it didn’t come out of nowhere....
Instantly Diagnose a Database Outage with Flow Alerts
Stateful, commonly monolithic, and absolutely fundamental to system design, the quality of your database administration...
Exploit vs. Vulnerability: What Is the Difference?
Whenever engineers discover a new security issue, the question arises every time: is this an exploit or vulnerability? What is a software vulnerability? How does it differ from...
Why Do You Need Smarter Alerts?
The way organizations process logs have changed over the past decade. From random files, scattered amongst a handful of virtual machines, to JSON documents effortlessly streamed into platforms....
What’s Missing From Almost Every Alerting Solution in 2022?
Alerting has been a fundamental part of operations strategy for the past decade. An entire...
What is Infrastructure as Code?
Cloud services were born at the beginning of 2000 with companies such as Salesforce and Amazon paving the way. Simple Queuing Service (SQS) was the first service to...
Alerting Techniques for an Observable Platform
Observable and secure platforms use three connected data sets: logs, metrics, and traces. Platforms can link these data to alerting systems to notify system administrators when an event...