The Coralogix blog
Expert insights, bold ideas, and company news
All Articles
- All
- Alerts
- OpenTelemetry
- Uncategorized
- Software development
- AI
- AWS
- Product
- CDN monitoring
- CloudWatch
- Logging
- Real user monitoring
- Data
- Gaming
- APM
- Cloud
- Fintech
- FinOps
- Kubernetes
- Microservices
- Compliance
- Observability
- Metrics
- Security advisory
- Tracing
- CI/CD
- IaC
- Elasticsearch
- Migrations
- DevOps & IT operations
- Troubleshooting
- Company news
- Case studies
- Security
- Performance
- Tutorials
- Audit logs
- Logs
- Application performance monitoring
- Monitoring
- Log analytics
Common Pitfalls in Maintaining Speed of Software Development
Google is known for giving developers difficult and quirky brain teasers during the hiring process....
Best Practices for Logging in Kotlin
If you’re reading this, you have probably been convinced that taking on Kotlin for your mobile application is the most sensible choice. Now that you’ve come to this...
What You Need to Know About IoT Logging
The Internet of Things (or, IoT) is an umbrella term for multiple connected devices sharing real-time data, and IoT logging is an important part of this. Troubleshooting bug...
How to Maximize Logging Performance with Kafka
As software is evolving away from monoliths and towards service-based architectures, it is becoming more apparent than ever that monitoring logging performance needs to be a first-class consideration...
5 Essential MySQL Database Logs To Keep an Eye On
MySQL is the de facto choice for open-source relational databases, and you should learn how to use MySQL database logs to improve efficiency and security. As an open-source...
The Secret Ingredient That Converts Metrics Into Insights
Metrics and Insight have been the obsession of every sector for decades now. Using data...
PCI Logging Rules Your Organization NEEDS to Know
For an organization to be compliant with PCI logging requirements, it must follow PCI Requirement 10 of the Payment Card Industry Data Security Standards (PCI DSS). Below, we’ve...
8 Common Elasticsearch Configuration Mistakes That You Might Have Made
Elasticsearch was designed to allow its users to get up and running quickly, without having...
10 Ways to Take Your Error Logs Up a Level
Error logs are the first port of call for any outage. Great error logs provide context and cause to a mysterious, 3am outage. Engineers often treat error logs...
SIEM Tutorial: What should a good SIEM Provider do for you?
Modern day Security Information and Event Management (SIEM) tooling enterprise security technology combine systems together...
Are your customers catching production problems 🔥 before you do?
Availability and quality are the biggest differentiators when people opt for a service or product...
Prometheus Federation with Thanos: How Does Thanos Work?
Prometheus is the cornerstone of many monitoring solutions, and sooner or later, Prometheus federation will...