The Coralogix blog

Expert insights, bold ideas, and company news

All Articles

Best Practices for Writing Secure Java Code

Best Practices for Writing Secure Java Code

Every Java developer should follow coding standards and best practices to develop secure Java code. It is critical your code is not vulnerable to exploits or malicious attacks....

7 mins read Read Now
What is Chaos Engineering and How to Implement It

What is Chaos Engineering and How to Implement It

Chaos Engineering is one of the hottest new approaches in DevOps. Netflix first pioneered it back in 2008, and since then it’s been adopted by thousands of companies,...

8 mins read Read Now
System Traceability: What is It and How Can You Implement It?

System Traceability: What is It and How Can You Implement It?

System traceability is one of the three pillars of observability stack. The basic concept of...

4 mins read Read Now
Elasticsearch Tutorial: From Deployment to Basic Usage

Elasticsearch Tutorial: From Deployment to Basic Usage

Elastic is “an index”, “a search engine”, “a big data solution”, an analytics platform with...

13 mins read Read Now
Are Your Customers Catching Your Software Problems For You?

Are Your Customers Catching Your Software Problems For You?

Software problems have a very real impact on your bottom line. Availability and quality are...

4 mins read Read Now
A Practical Guide to Logstash: Input Plugins

A Practical Guide to Logstash: Input Plugins

In a previous post, we went through a few input plugins like the file input plugin, the TCP/UDP input plugins, etc for collecting data using Logstash. In this...

27 mins read Read Now
Syslog 101: Everything You Need to Know to Get Started

Syslog 101: Everything You Need to Know to Get Started

Syslog takes its name from the System Logging Protocol. It is a standard for message...

9 mins read Read Now
Is the New Elasticsearch SSPL License a Threat to Your Business?

Is the New Elasticsearch SSPL License a Threat to Your Business?

Recent changes to the Elasticsearch license could have consequences on your intellectual property. Elasticsearch and...

9 mins read Read Now
A Practical Guide to Logstash: Parsing Common Log Patterns with Grok

A Practical Guide to Logstash: Parsing Common Log Patterns with Grok

In a previous post, we explored the basic concepts behind using Grok patterns with Logstash...

29 mins read Read Now
Network Security: The Journey from Chewiness to Zero Trust Networking

Network Security: The Journey from Chewiness to Zero Trust Networking

Network security has changed a lot over the years, it had to. From wide open...

7 mins read Read Now
How to Troubleshoot AWS Lambda Log Collection in Coralogix

How to Troubleshoot AWS Lambda Log Collection in Coralogix

AWS Lambda is a serverless compute service that runs your code in response to events...

5 mins read Read Now
A Practical Guide to Logstash: Syslog Deep Dive

A Practical Guide to Logstash: Syslog Deep Dive

Syslog is a popular standard for centralizing and formatting log data generated by network devices. It provides a standardized way of generating and collecting log information, such as...

9 mins read Read Now