The Coralogix blog

Expert insights, bold ideas, and company news

All Articles

How to Keep Your System Visible in the Age of Remote Working

How to Keep Your System Visible in the Age of Remote Working

Monitoring IT infrastructure and services has always been an essential IT prerequisite. However, your log...

6 mins read Read Now
Fintech Industry: Are Your IT, DevOps, and Engineering Teams Siloed?

Fintech Industry: Are Your IT, DevOps, and Engineering Teams Siloed?

What is a silo, and why is it bad? The Cambridge English Dictionary defines a...

8 mins read Read Now
How to Scale Your Alerts Beyond PromQL with Coralogix Flow Alerts

How to Scale Your Alerts Beyond PromQL with Coralogix Flow Alerts

When building alerts, engineers aim to create accurate, timely, and actionable alerts. In pursuit of...

6 mins read Read Now
Contextual Autocomplete: Why Coralogix is Focused on Developer Productivity

Contextual Autocomplete: Why Coralogix is Focused on Developer Productivity

In the observability toolchain, all of our efforts go into data storage and analysis, and...

5 mins read Read Now
Distributed Tracing Observability in Microservices

Distributed Tracing Observability in Microservices

Have you ever tried to find a bug in a multi-layered architecture? Although this might sound like a simple enough task, it can quickly become a nightmare if...

6 mins read Read Now
Akka License Change: The Impact of Akka’s Move Away From “Open Source”

Akka License Change: The Impact of Akka’s Move Away From “Open Source”

Akka’s license change has surprised many of us, but it didn’t come out of nowhere....

6 mins read Read Now
Instantly Diagnose a Database Outage with Flow Alerts

Instantly Diagnose a Database Outage with Flow Alerts

Stateful, commonly monolithic, and absolutely fundamental to system design, the quality of your database administration...

4 mins read Read Now
Exploit vs. Vulnerability: What Is the Difference?

Exploit vs. Vulnerability: What Is the Difference?

Whenever engineers discover a new security issue, the question arises every time: is this an exploit or vulnerability? What is a software vulnerability? How does it differ from...

6 mins read Read Now
Why Do You Need Smarter Alerts?

Why Do You Need Smarter Alerts?

The way organizations process logs have changed over the past decade. From random files, scattered amongst a handful of virtual machines, to JSON documents effortlessly streamed into platforms....

4 mins read Read Now
What’s Missing From Almost Every Alerting Solution in 2022?

What’s Missing From Almost Every Alerting Solution in 2022?

Alerting has been a fundamental part of operations strategy for the past decade. An entire...

4 mins read Read Now
What is Infrastructure as Code?

What is Infrastructure as Code?

Cloud services were born at the beginning of 2000 with companies such as Salesforce and Amazon paving the way. Simple Queuing Service (SQS) was the first service to...

5 mins read Read Now
Alerting Techniques for an Observable Platform

Alerting Techniques for an Observable Platform

Observable and secure platforms use three connected data sets: logs, metrics, and traces. Platforms can link these data to alerting systems to notify system administrators when an event...

8 mins read Read Now