The Coralogix blog

Expert insights, bold ideas, and company news

All Articles

Is the New Elasticsearch SSPL License a Threat to Your Business?

Is the New Elasticsearch SSPL License a Threat to Your Business?

Recent changes to the Elasticsearch license could have consequences on your intellectual property. Elasticsearch and...

9 mins read Read Now
A Practical Guide to Logstash: Parsing Common Log Patterns with Grok

A Practical Guide to Logstash: Parsing Common Log Patterns with Grok

In a previous post, we explored the basic concepts behind using Grok patterns with Logstash...

29 mins read Read Now
Network Security: The Journey from Chewiness to Zero Trust Networking

Network Security: The Journey from Chewiness to Zero Trust Networking

Network security has changed a lot over the years, it had to. From wide open...

7 mins read Read Now
How to Troubleshoot AWS Lambda Log Collection in Coralogix

How to Troubleshoot AWS Lambda Log Collection in Coralogix

AWS Lambda is a serverless compute service that runs your code in response to events...

5 mins read Read Now
A Practical Guide to Logstash: Syslog Deep Dive

A Practical Guide to Logstash: Syslog Deep Dive

Syslog is a popular standard for centralizing and formatting log data generated by network devices. It provides a standardized way of generating and collecting log information, such as...

9 mins read Read Now
Force Multiply Your Observability Stack with a Platform Thinking Strategy

Force Multiply Your Observability Stack with a Platform Thinking Strategy

Platform thinking is a term that has spread throughout the business and technology ecosystem. But...

7 mins read Read Now
Scale Your Prometheus Metrics Indefinitely with Thanos

Scale Your Prometheus Metrics Indefinitely with Thanos

Prometheus metrics are an essential part of your observability stack. Observability comes hand in hand...

8 mins read Read Now
Is CloudWatch Really Cost Efficient?

Is CloudWatch Really Cost Efficient?

One of the keys to CloudWatch’s success is its no bang, no buck billing cloud cost optimization system. The pricing structure has been designed from the outset to...

6 mins read Read Now
Stop Enforcing Security Standards – Start Implementing Policies

Stop Enforcing Security Standards – Start Implementing Policies

In days gone by, highly regulated industries like pharmaceuticals and finance were the biggest targets...

5 mins read Read Now
Elasticsearch Configurations and 9 Common Mistakes You Should Avoid

Elasticsearch Configurations and 9 Common Mistakes You Should Avoid

The default Elasticsearch setup is pretty good. You can get running from scratch to use...

9 mins read Read Now
Spring Boot Logging Best Practices Guide

Spring Boot Logging Best Practices Guide

Logging in Spring Boot can be confusing, and the wide range of tools and frameworks make it a challenge to even know where to start. This guide talks...

16 mins read Read Now
5 Common Elasticsearch Mistakes That Lead to Data Breaches

5 Common Elasticsearch Mistakes That Lead to Data Breaches

Avon and Family Tree aren’t companies you would normally associate with cybersecurity, but this year,...

10 mins read Read Now