Skip to content
kifarunix.com
  • Home
  • Blog
    • HowTos
    • Containers
    • Security
    • Networking
    • Storage
    • Virtualization
    • Monitoring
  • About Us
  • Contact Us

Kifarunix

Linux Certified Engineer, with a passion for open-source technology and a strong understanding of Linux systems. With experience in system administration, troubleshooting, and automation, I am skilled in maintaining and optimizing Linux infrastructure.
redhat satellite architecture and key features

Understanding Red Hat Satellite: A Detailed Guide to Its Architecture and Key Features

In this guide, we’ll explore what Red Hat Satellite is, its key features and how its architecture enables centralized control, automation, and scalability. Managing a

integrate openstack with ceph storage cluster

Part 2: Integrate OpenStack with Ceph Storage Cluster

This is the part 2 of our tutorial on how to integrate OpenStack with Ceph Storage cluster. In cloud computing, OpenStack and Ceph stand as

Install VirtualBox Guest Additions on AlmaLinux

Install VirtualBox Guest Additions on AlmaLinux

Follow through this tutorial to learn how to install VirtualBox guest additions on AlmaLinux. We are installing the VirtualBox Guest additions on AlmaLinux Desktop. Installing

OpenShift Builds and BuildConfig

OpenShift Builds and BuildConfig Essentials: A Comprehensive Guide

In this blog post, we’ll cover OpenShift Builds and BuildConfig essentials, providing you with the fundamental knowledge and practical steps to create and manage builds

automate tasks in OpenShift with Kubernetes jobs and cron jobs

Automate Tasks in OpenShift with Kubernetes Jobs and Cron Jobs: A Practical Guide

In this guide, we’ll explore how to set up and automate tasks in OpenShift with Kubernetes jobs and cron jobs. Managing tasks in a Kubernetes-based

Useful Information You Should Know About Data Privacy

Useful Information You Should Know About Data Privacy

Staying safe online is something that’s becoming increasingly important, but how do you know if your data is really secure? From keeping track of our

How to Safely Reboot OpenStack Compute Node

How to Safely Reboot OpenStack Compute Node

How can I safely reboot OpenStack compute node? In an OpenStack environment, the compute nodes are the workhorses responsible for running virtual machines and managing

What are the Different Types of Wireless Headphones?

What are the Different Types of Wireless Headphones?

Wireless headphones are the most in-demand tech devices nowadays. Based on the size, design, technology, and connections, wireless headphones are available in a variety of

setup highly available Elasticsearch cluster with Keepalived

Setup Highly Available Elasticsearch Cluster with Keepalived

Step through this guide to learn how to setup highly available Elasticsearch cluster with Keepalived. Setting up a highly available Elasticsearch cluster with Keepalived is

Kubernetes Resource Optimization with Vertical Pod Autoscaler (VPA)

Kubernetes Resource Optimization with Vertical Pod Autoscaler (VPA)

This blog post will take you through Kubernetes resource optimization with Vertical Pod Autoscaler. Managing resource allocation efficiently in Kubernetes is crucial for optimizing costs

Older posts
Newer posts
← Previous Page1 … Page16 Page17 Page18 … Page33 Next →

Latest Posts

How to Automate OpenShift Builds with Git Webhooks: Step-by-Step Guide

How to Install Gitlab on Rocky Linux 10 with Let’s Encrypt SSL

How to Install Gitlab on AlmaLinux 10 with Let’s Encrypt SSL

How to Deploy Apps on OpenShift Using BuildConfig: A Step-by-Step Guide (2025)

OpenShift Builds and BuildConfig Essentials: A Comprehensive Guide

Automate Windows Server Patching with Ansible AWX: Step-by-Step

Containers

Install Docker CE on Ubuntu 20.04

Kubernetes Pod Management: Static Pods vs Mirror Pods vs DaemonSets

Deploy All-In-One OpenStack with Kolla-Ansible on Ubuntu 18.04

Install Fedora CoreOS on KVM Using an ISO File: A Step-by-Step Guide

Kubernetes Nodes Maintenance: Drain vs. Cordon Demystified

Install and Use Docker on Debian 10 Buster

Security

Configure strongSwan VPN Client on Ubuntu 18.04/CentOS 8

Studying cybersecurity and gaining the greatest achievements in data protection

How To Reset Or Recover Root Password On OPNsense

Install and Configure Squid Proxy on Rocky Linux 8

Restrict Access to WordPress Login Page to Specific IPs with libModSecurity

Top 8 Security Skills To Prevent Cyber Threats

Monitoring

Install Wazuh Manager with ELK on Debian 12

Integrate Wazuh Manager with ELK Stack

Deploy Nagios as a Docker Container

Install and Configure SNMP on Rocky Linux 8/9

How to Monitor Remote Linux Hosts and Services with Icinga 2 on Ubuntu 18.04

Easily Install and Setup Cacti on Ubuntu 20.04

© 2025 kifarunix.com

Home Advertise with us Privacy Policy