The Coralogix blog

Expert insights, bold ideas, and company news

All Articles

Kubernetes Logging with Elasticsearch, Fluentd, and Kibana

Kubernetes Logging with Elasticsearch, Fluentd, and Kibana

Kubernetes, a Greek word meaning pilot, has found its way into the center stage of...

29 mins read Read Now
Proactive Monitoring vs. Reactive Monitoring

Proactive Monitoring vs. Reactive Monitoring

Log monitoring is a fundamental pillar of modern software development. With the advent of modern software architectures like microservices, the demand for high-performance monitoring and alerting shifted from...

5 mins read Read Now
3 Key Benefits to Web Log Analysis

3 Key Benefits to Web Log Analysis

Whether it’s Apache, Nginx, ILS, or anything else, web servers are at the core of online services, and web log monitoring and analysis can reveal a treasure trove...

5 mins read Read Now
Using Synthetic Endpoints to Quality Check your Platform

Using Synthetic Endpoints to Quality Check your Platform

Quality control and observability of your platform are critical for any customer-facing application. Businesses need...

7 mins read Read Now
Coralogix’s Streama Technology: The Ultimate Party Bouncer

Coralogix’s Streama Technology: The Ultimate Party Bouncer

Coralogix is not just another monitoring or observability platform. We’re using our unique Streama technology...

6 mins read Read Now
Why is Application Performance Monitoring Important?

Why is Application Performance Monitoring Important?

AI-powered platforms like Coralogix also have built-in technology that determines your enterprise monitoring system‘s “baseline” and reports anomalies that are difficult to identify in real-time. When combined with...

6 mins read Read Now
Kubernetes: Tips, Tricks, Pitfalls, and More

Kubernetes: Tips, Tricks, Pitfalls, and More

If you’re involved in IT, you’ve likely come across the word “Kubernetes.” It’s a Greek word that means “boat.” It’s one of the most exciting developments in cloud-native...

4 mins read Read Now
Elasticsearch Release: Roundup of Change in Version 8.1.0

Elasticsearch Release: Roundup of Change in Version 8.1.0

Elastic released a major version of its platform on February 10, 2022. Version 8.0.0 is...

5 mins read Read Now
What is the Most Vulnerable Data My Company Holds?

What is the Most Vulnerable Data My Company Holds?

Data security is on every priority list in 2022. With the frequency of breaches never higher, many businesses assess their situation and ask cybersecurity questions. With cybersecurity policy,...

8 mins read Read Now
What to Watch on EKS – a Guide to Kubernetes Monitoring on AWS

What to Watch on EKS – a Guide to Kubernetes Monitoring on AWS

It’s impossible to ignore AWS service monitoring as a major player in the public cloud...

8 mins read Read Now
What is Red Teaming in Cyber Security? The Complete Guide

What is Red Teaming in Cyber Security? The Complete Guide

Red teaming explained Red teaming is the practice of asking a trusted group of individuals...

12 mins read Read Now
Splunk Indexer Vulnerability: What You Need to Know

Splunk Indexer Vulnerability: What You Need to Know

A new vulnerability, CVE-2021-342 has been discovered in the Splunk indexer component, which is a commonly utilized part of the Splunk Enterprise suite. We’re going to explain the...

5 mins read Read Now