The Coralogix blog
Expert insights, bold ideas, and company news
All Articles
- All
- Alerts
- OpenTelemetry
- Uncategorized
- Software development
- AI
- AWS
- Product
- CDN monitoring
- CloudWatch
- Logging
- Real user monitoring
- Data
- Gaming
- APM
- Cloud
- Fintech
- FinOps
- Kubernetes
- Microservices
- Compliance
- Observability
- Metrics
- Security advisory
- Tracing
- CI/CD
- IaC
- Elasticsearch
- Migrations
- DevOps & IT operations
- Troubleshooting
- Service Management
- Company news
- Case studies
- Security
- Performance
- Tutorials
- Audit logs
- Logs
- Application performance monitoring
- Monitoring
- Log analytics
Using Synthetic Endpoints to Quality Check your Platform
Quality control and observability of your platform are critical for any customer-facing application. Businesses need...
Coralogix’s Streama Technology: The Ultimate Party Bouncer
Coralogix is not just another monitoring or observability platform. We’re using our unique Streama technology...
Why is Application Performance Monitoring Important?
AI-powered platforms like Coralogix also have built-in technology that determines your enterprise monitoring system‘s “baseline” and reports anomalies that are difficult to identify in real-time. When combined with...
Kubernetes: Tips, Tricks, Pitfalls, and More
If you’re involved in IT, you’ve likely come across the word “Kubernetes.” It’s a Greek word that means “boat.” It’s one of the most exciting developments in cloud-native...
Elasticsearch Release: Roundup of Change in Version 8.1.0
Elastic released a major version of its platform on February 10, 2022. Version 8.0.0 is...
What is the Most Vulnerable Data My Company Holds?
Data security is on every priority list in 2022. With the frequency of breaches never higher, many businesses assess their situation and ask cybersecurity questions. With cybersecurity policy,...
What to Watch on EKS – a Guide to Kubernetes Monitoring on AWS
It’s impossible to ignore AWS service monitoring as a major player in the public cloud...
What is Red Teaming in Cyber Security? The Complete Guide
Red teaming explained Red teaming is the practice of asking a trusted group of individuals...
Splunk Indexer Vulnerability: What You Need to Know
A new vulnerability, CVE-2021-342 has been discovered in the Splunk indexer component, which is a commonly utilized part of the Splunk Enterprise suite. We’re going to explain the...
AWS Centralized Logging Guide
The key challenge with modern visibility on clouds like AWS is that data originates from various sources across every layer of the application stack, is varied in format,...
How to Tell if You Were Attacked in the Recent Okta Security Breach
Today, Okta, a leading enterprise identity and access management firm, reported that it had launched...
3 Metrics to Monitor When Using Elastic Load Balancing
One of the benefits of deploying software on the cloud is allocating a variable amount...