The Coralogix blog
Expert insights, bold ideas, and company news
All Articles
- All
- Alerts
- OpenTelemetry
- Uncategorized
- Software development
- AI
- AWS
- Product
- CDN monitoring
- CloudWatch
- Logging
- Real user monitoring
- Data
- Gaming
- APM
- Cloud
- Fintech
- FinOps
- Kubernetes
- Microservices
- Compliance
- Observability
- Metrics
- Security advisory
- Tracing
- CI/CD
- IaC
- Elasticsearch
- Migrations
- DevOps & IT operations
- Troubleshooting
- Service Management
- Company news
- Case studies
- MDR
- Security
- Performance
- Extensions
- Tutorials
- Audit logs
- Logs
- Application performance monitoring
- Monitoring
- Log analytics
Network Security: The Journey from Chewiness to Zero Trust Networking
Network security has changed a lot over the years, it had to. From wide open...
How to Troubleshoot AWS Lambda Log Collection in Coralogix
AWS Lambda is a serverless compute service that runs your code in response to events...
A Practical Guide to Logstash: Syslog Deep Dive
Syslog is a popular standard for centralizing and formatting log data generated by network devices. It provides a standardized way of generating and collecting log information, such as...
Force Multiply Your Observability Stack with a Platform Thinking Strategy
Platform thinking is a term that has spread throughout the business and technology ecosystem. But...
Scale Your Prometheus Metrics Indefinitely with Thanos
Prometheus metrics are an essential part of your observability stack. Observability comes hand in hand...
Is CloudWatch Really Cost Efficient?
One of the keys to CloudWatch’s success is its no bang, no buck billing cloud cost optimization system. The pricing structure has been designed from the outset to...
Stop Enforcing Security Standards – Start Implementing Policies
In days gone by, highly regulated industries like pharmaceuticals and finance were the biggest targets...
Elasticsearch Configurations and 9 Common Mistakes You Should Avoid
The default Elasticsearch setup is pretty good. You can get running from scratch to use...
Spring Boot Logging Best Practices Guide
Logging in Spring Boot can be confusing, and the wide range of tools and frameworks make it a challenge to even know where to start. This guide talks...
5 Common Elasticsearch Mistakes That Lead to Data Breaches
Avon and Family Tree aren’t companies you would normally associate with cybersecurity, but this year,...
Running ELK on Kubernetes with ECK – Part 3
This is last installment of our 3-part series on running ELK on Kubernetes with ECK. If you’re just getting started, make sure to check out Part 1 and...
Hands-on-Exercises: Mapping Exceptions with Elasticsearch
Mapping is an essential foundation of an index that can generally be considered the heart...