The Coralogix blog

Expert insights, bold ideas, and company news

All Articles

An Introduction to Windows Event Logs

An Introduction to Windows Event Logs

The value of log files goes far beyond their traditional remit of diagnosing and troubleshooting issues reported in production.  They provide a wealth of information about your systems’...

6 mins read Read Now
New CERT-In Guidelines: What Does That Mean For You

New CERT-In Guidelines: What Does That Mean For You

An organization’s security protocols are vital to maintaining transparency, compliance with government regulations, and trust with customers. On April 28, 2022, the Indian Computer Emergency Response Team (CERT-In)...

5 mins read Read Now
Analyzing Log Data: Why It’s Important

Analyzing Log Data: Why It’s Important

From production monitoring to security concerns, businesses need to know how to analyze logs on a daily basis to make sure their system is up to par. Here...

5 mins read Read Now
CDN Log Analysis

CDN Log Analysis

As user tolerance for slow page loads and refresh rates continues to diminish, poor website performance can directly impact visitor counts, click-throughs, and conversions. This is where CDN...

7 mins read Read Now
This Win is for Our Customers – We’ve Just Raised $142 Million in a Series D Round

This Win is for Our Customers – We’ve Just Raised $142 Million in a Series D Round

While 2020 and 2021 were significant years for us, we’ve entered this year ready to...

5 mins read Read Now
On-premise vs. On the Cloud

On-premise vs. On the Cloud

Since its emergence in the mid-2000s, the cloud computing market has evolved significantly. The benefits of reliability, scalability, and cost reduction using cloud computing have created a demand...

8 mins read Read Now
May 2022 Platform Updates

May 2022 Platform Updates

Our team has been working hard on building exciting new features like our DataMap, advanced Tracing UI, and more that will give you even greater power to monitor...

2 mins read Read Now
How to Use SIEM Tools in the Modern World

How to Use SIEM Tools in the Modern World

In our highly connected world, organizations of all sizes need to be alert to the risk of cyberattacks. The genuine threats to today’s enterprises include data leaks, ransomware,...

8 mins read Read Now
AWS Service Observability using OpenTelemetry 

AWS Service Observability using OpenTelemetry 

Effective AWS observability tools can help teams proactively solve problems. The efficient use of observability statistics is essential to any microservice architecture. OpenTelemetry is a project supported by...

8 mins read Read Now
What Is a Log Agent and Why It Matters, Plus Examples 

What Is a Log Agent and Why It Matters, Plus Examples 

This article was last updated on June 28, 2023.  If you’ve been investigating log monitoring...

8 mins read Read Now
4 Different Ways to Ingest Data in AWS OpenSearch

4 Different Ways to Ingest Data in AWS OpenSearch

AWS OpenSearch is a project based on Elastic’s Elasticsearch and Kibana projects. Amazon created OpenSearch from the last open-source version of ElasticSearch (7.10) and is part of the...

8 mins read Read Now
What is a Security Whitelist?

What is a Security Whitelist?

In April 2022 alone, there were 14.3m records breached due to 80 significant security incidents. These incidents make up a complex, shifting landscape of cyberattacks that require increasingly...

6 mins read Read Now