The Coralogix blog
Expert insights, bold ideas, and company news
All Articles
- All
- Alerts
- OpenTelemetry
- Uncategorized
- Software development
- AI
- AWS
- Product
- CDN monitoring
- CloudWatch
- Logging
- Real user monitoring
- Data
- Gaming
- APM
- Cloud
- Fintech
- FinOps
- Kubernetes
- Microservices
- Compliance
- Observability
- Metrics
- Security advisory
- Tracing
- CI/CD
- IaC
- Elasticsearch
- Migrations
- DevOps & IT operations
- Troubleshooting
- Service Management
- Company news
- Case studies
- MDR
- Security
- Performance
- Extensions
- Tutorials
- Audit logs
- Infrastructure monitoring
- Logs
- Application performance monitoring
- Monitoring
- Log analytics
Palo Alto Global Protect Command Injection Vulnerability
On April 12, 2024, Palo Alto disclosed a critical vulnerability identified as CVE-2024-3400 in its...
Sumo Logic Flex Pricing: Is usage pricing a good idea?
When discussing observability pricing models, there are three dimensions that must be considered The first,...
What If You Could Pull Metrics Out of Your Events?
As data keeps growing at incredible rates, it’s becoming increasingly difficult to store and monitor at a reasonable cost leaving you to cherry-pick which data to store. As...
Advanced Security: Marking AWS WAF’s Homework
The same security scenarios are checked thoroughly. Privilege escalation, SQL injection, Port scanning and so on. These checks form the bedrock of defensive security, but as solutions become...
What you’re currently missing from your CDN monitoring tool
Content Delivery Networks (CDN) have been an inherent part of modern software infrastructure for years....
Coralogix Alarms: Faster than WAF IP Detection and Remediation
There is one area of technology that requires the fastest possible response time, where every...
Coralogix and observability at the edge
Observing Edge & WAF solutions is challenging. There are a host of unique problems to overcome, including security complexities and traffic intent identification. Let’s explore the complexities of...
Signs You Are Suffering From Alert Fatigue
In an IT environment with multiple alerting channels and notifications, it is easy to become overwhelmed and desensitized to alerts. This tendency to avoid or respond negatively to...
The Role of APM in DevOps and SRE Practices
As the software development world becomes faster, enterprises must adapt to customer demands by increasing their application’s deployment frequency. They often rely on DevOps and Site Reliability Engineering...
Azure Security Compromised – Hundreds Fell Victim to Phishing
In late November 2023, a phishing campaign successfully compromised hundreds of user accounts, including those...
Building Your Own Observability Solution vs Implementing a SaaS Solution
Observability is a key component of modern applications, especially highly complex ones with multiple containers,...
AWS IAM Best Practices
In today’s interconnected digital landscape, robust IAM (Identity and Access Management) practices are critical pillars of an organization’s cybersecurity strategy. IAM serves as the fortress guarding sensitive data,...