The Coralogix blog

Expert insights, bold ideas, and company news

All Articles

6 Tips to Integrate Container Orchestration and APM Tools

Application performance monitoring (APM) setup and strategies vary based on the application’s infrastructure design. Containers managed by orchestration...

6 mins read Read Now

DORA Metrics for $0.02 a day

There are many solutions on the market that are promising insight into the four key metrics. Alas, these solutions often come with a significant price tag. Coralogix doesn’t...

7 mins read Read Now

Coralogix secures 106 badges in G2 Spring 2024 Reports

One more season and one more clean sweep!  The G2 Spring 2024 Reports are out,...

3 mins read Read Now

Coralogix Receives FedRAMP® Ready Status: A Milestone in Secure, Compliant Data Analysis

We are excited to announce today that Coralogix has achieved FedRAMP® Ready status and is...

3 mins read Read Now

Dynamic Bad Actor Scoring in Coralogix

Bad bots, hackers, and other malicious agents can be tracked by a huge volume of metrics – session activity, HTTP headers, response times, request volume & cadence, and...

7 mins read Read Now

Database Monitoring: troubleshooting from the bottom up

A healthy relationship between services and databases is fundamental to overall application performance. Unchecked database...

4 mins read Read Now

Sentry vs Coralogix: Comparison of RUM capabilities, pricing & more

As Coralogix is a full-stack observability platform with log analytics, RUM, APM, SIEM and more,...

5 mins read Read Now

Palo Alto Global Protect Command Injection Vulnerability

On April 12, 2024, Palo Alto disclosed a critical vulnerability identified as CVE-2024-3400 in its...

3 mins read Read Now

Sumo Logic Flex Pricing: Is usage pricing a good idea?

When discussing observability pricing models, there are three dimensions that must be considered The first,...

6 mins read Read Now

What If You Could Pull Metrics Out of Your Events?

As data keeps growing at incredible rates, it’s becoming increasingly difficult to store and monitor at a reasonable cost leaving you to cherry-pick which data to store. As...

4 mins read Read Now

Advanced Security: Marking AWS WAF’s Homework

The same security scenarios are checked thoroughly. Privilege escalation, SQL injection, Port scanning and so on. These checks form the bedrock of defensive security, but as solutions become...

6 mins read Read Now

What you’re currently missing from your CDN monitoring tool

Content Delivery Networks (CDN) have been an inherent part of modern software infrastructure for years....

6 mins read Read Now