The Coralogix blog

Expert insights, bold ideas, and company news

All Articles

Network Security: The Journey from Chewiness to Zero Trust Networking

Network Security: The Journey from Chewiness to Zero Trust Networking

Network security has changed a lot over the years, it had to. From wide open...

7 mins read Read Now
How to Troubleshoot AWS Lambda Log Collection in Coralogix

How to Troubleshoot AWS Lambda Log Collection in Coralogix

AWS Lambda is a serverless compute service that runs your code in response to events...

5 mins read Read Now
A Practical Guide to Logstash: Syslog Deep Dive

A Practical Guide to Logstash: Syslog Deep Dive

Syslog is a popular standard for centralizing and formatting log data generated by network devices. It provides a standardized way of generating and collecting log information, such as...

9 mins read Read Now
Force Multiply Your Observability Stack with a Platform Thinking Strategy

Force Multiply Your Observability Stack with a Platform Thinking Strategy

Platform thinking is a term that has spread throughout the business and technology ecosystem. But...

7 mins read Read Now
Scale Your Prometheus Metrics Indefinitely with Thanos

Scale Your Prometheus Metrics Indefinitely with Thanos

Prometheus metrics are an essential part of your observability stack. Observability comes hand in hand...

8 mins read Read Now
Is CloudWatch Really Cost Efficient?

Is CloudWatch Really Cost Efficient?

One of the keys to CloudWatch’s success is its no bang, no buck billing cloud cost optimization system. The pricing structure has been designed from the outset to...

6 mins read Read Now
Stop Enforcing Security Standards – Start Implementing Policies

Stop Enforcing Security Standards – Start Implementing Policies

In days gone by, highly regulated industries like pharmaceuticals and finance were the biggest targets...

5 mins read Read Now
Elasticsearch Configurations and 9 Common Mistakes You Should Avoid

Elasticsearch Configurations and 9 Common Mistakes You Should Avoid

The default Elasticsearch setup is pretty good. You can get running from scratch to use...

9 mins read Read Now
Spring Boot Logging Best Practices Guide

Spring Boot Logging Best Practices Guide

Logging in Spring Boot can be confusing, and the wide range of tools and frameworks make it a challenge to even know where to start. This guide talks...

16 mins read Read Now
5 Common Elasticsearch Mistakes That Lead to Data Breaches

5 Common Elasticsearch Mistakes That Lead to Data Breaches

Avon and Family Tree aren’t companies you would normally associate with cybersecurity, but this year,...

10 mins read Read Now
Running ELK on Kubernetes with ECK – Part 3

Running ELK on Kubernetes with ECK – Part 3

This is last installment of our 3-part series on running ELK on Kubernetes with ECK. If you’re just getting started, make sure to check out Part 1 and...

13 mins read Read Now
Hands-on-Exercises: Mapping Exceptions with Elasticsearch

Hands-on-Exercises: Mapping Exceptions with Elasticsearch

Mapping is an essential foundation of an index that can generally be considered the heart...

10 mins read Read Now