The Coralogix blog
Expert insights, bold ideas, and company news
All Articles
- All
- Alerts
- OpenTelemetry
- Uncategorized
- Software development
- AI
- AWS
- Product
- CDN monitoring
- CloudWatch
- Logging
- Real user monitoring
- Data
- Gaming
- APM
- Cloud
- Fintech
- FinOps
- Kubernetes
- Microservices
- Compliance
- Observability
- Metrics
- Security advisory
- Tracing
- CI/CD
- IaC
- Elasticsearch
- Migrations
- DevOps & IT operations
- Troubleshooting
- Company news
- Case studies
- Security
- Performance
- Tutorials
- Audit logs
- Logs
- Application performance monitoring
- Monitoring
- Log analytics
8 Common Elasticsearch Configuration Mistakes That You Might Have Made
Elasticsearch was designed to allow its users to get up and running quickly, without having...
10 Ways to Take Your Error Logs Up a Level
Error logs are the first port of call for any outage. Great error logs provide context and cause to a mysterious, 3am outage. Engineers often treat error logs...
SIEM Tutorial: What should a good SIEM Provider do for you?
Modern day Security Information and Event Management (SIEM) tooling enterprise security technology combine systems together...
Are your customers catching production problems 🔥 before you do?
Availability and quality are the biggest differentiators when people opt for a service or product...
Prometheus Federation with Thanos: How Does Thanos Work?
Prometheus is the cornerstone of many monitoring solutions, and sooner or later, Prometheus federation will...
Elasticsearch Hadoop Tutorial with Hands-on Examples
In this Hadoop Tutorial lesson, we’ll learn how we can use Elasticsearch Hadoop to process very large amounts of data. For our exercise, we’ll use a simple Apache...
Writing Effective Suricata Rules with Examples [Best Practices]
This post will help you write effective Suricata Rules to materially improve your security posture....
Improve Elasticsearch Query Performance with Profiling and Slow Logs
If our end users end up too long for a query to return results due...
The Cloud Network Security Gap
Before we dive into the gap in cloud network security, let’s take a step back. If you’ve been in Operations for a while, you might remember how it...
Strategically Managing Cloud Resources for Security, Fun, and Profit
The first time I created a cloud compute instance, then called a “Cloud VM”, was...
Machine Learning Log Analysis and Why You Need It
Your log monitoring solution works through millions of lines of logs, which makes implementing a machine learning solution essential. Organizations are turning to machine learning log alerts as...
Elasticsearch Vulnerability: How to Remediate the Most Recent Issues
An Elastic Security Advisory (ESA) is a notice from Elastic to its users of a...