Skip to content
kifarunix.com
  • Home
  • Blog
    • HowTos
    • Containers
    • Security
    • Networking
    • Storage
    • Virtualization
    • Monitoring
  • About Us
  • Contact Us

Kifarunix

DevOps Engineer and Linux Specialist with deep expertise in RHEL, Debian, SUSE, Ubuntu, FreeBSD... Passionate about open-source technologies, I specialize in Kubernetes, Docker, OpenShift, Ansible automation, and Red Hat Satellite. With extensive experience in Linux system administration, infrastructure optimization, information security, and automation, I design and deploy secure, scalable solutions for complex environments. Leveraging tools like Terraform and CI/CD pipelines, I ensure seamless integration and delivery while enhancing operational efficiency across Linux-based infrastructures.
How to Disable Weak SSH Algorithms on RHEL 8/9/10 (SHA-1 HMACs, SHA-1 Kex, CBC, 3DES)

How to Disable Weak SSH Algorithms on RHEL 8/9/10 (SHA-1 HMACs, SHA-1 Kex, CBC, 3DES)

In this tutorial, we will quickly look at how to disable weak SSH algorithms on RHEL 8/9/10, including SHA-1 HMACs, SHA-1 key exchange methods, CBC

Revolutionize Your Employee Engagement With The Bites App

Revolutionize Your Employee Engagement With The Bites App

In the dynamic and fiercely competitive world of modern business, one truth remains constant: employee engagement is an indispensable cornerstone of any successful organization. As

Configure Request Tracker to Send Mails using MSMTP via Gmail Relay

Configure Request Tracker to Send Mails using MSMTP via Gmail Relay

In this tutorial, you will learn how to configure Request Tracker to send mails using MSMTP via Gmail Relay. Request Tracker (RT) is an enterprise-grade issue

install apache guacamole

How to Install Apache Guacamole on Ubuntu 24.04

In this guide, we are going to learn how to install Apache Guacamole on Ubuntu 24.04. Apache Guacamole is a clientless HTML5 web based remote desktop

Why Creating a Secure Password is Crucial

Why Creating a Secure Password is Crucial

In today’s digital age, where almost every aspect of our lives has moved online, the security of our personal information is more important than ever.

Static Pods vs Mirror Pods vs DaemonSets

Kubernetes Pod Management: Static Pods vs Mirror Pods vs DaemonSets

This tutorial serves as a guide to demystify different type of Kubernetes pods, in essence, Static Pods vs Mirror Pods vs DaemonSets. In Kubernetes, a

ubuntu 24.04 RAID 1 and UEFI

Install Ubuntu 24.04 with UEFI and Software RAID 1

In this tutorial, we will guide you through the process to install Ubuntu 24.04 with UEFI and Software RAID 1. UEFI (Unified Extensible Firmware Interface)

Website Wonders: 6 Insider Tips to Transform Your Business Online

In the dynamic world of digital marketing, leveraging your online presence is crucial to the growth and success of your business. This guide will explore

Exploring API Authentication Methods for Digital Infrastructure Security in Business

Exploring API Authentication Methods for Digital Infrastructure Security in Business

As businesses become more reliant on digital infrastructure, securing sensitive data is essential. Why API User Authentication Matters API user authentication contributes to the prevention

install gitlab linux

How to Install Gitlab on Rocky Linux 10 with Let’s Encrypt SSL

In this tutorial, you will learn how to install Gitlab on Rocky Linux 10. GitLab is an open source end-to-end software development platform with built-in version control,

Older posts
Newer posts
← Previous Page1 … Page30 Page31 Page32 … Page36 Next →

Latest Posts

How to Deploy an OpenShift Cluster Using Agent-Based Installer (Bootable ISO, KVM & Bare Metal)

Integrate Request Tracker (RT) with Active Directory for Authentication

How to Enable Self-Service Password Reset in Request Tracker (RT)

Configure Request Tracker to Send Mails using MSMTP via Gmail Relay

How to Enable HTTPS for Request Tracker on Linux

Install Request Tracker on AlmaLinux/Rocky Linux

Containers

Understanding OpenShift Security Context Constraints: The Complete Guide

How to Upgrade OpenShift Cluster: Seamless Steps for Success

Provision Block Storage for Kubernetes on Rook Ceph Cluster

Deploy WordPress using Docker Compose

Deploy a Single Node ELK Stack Cluster on Docker Containers

Kubernetes Nodes Maintenance: Drain vs. Cordon Demystified

Security

How to fix WordPress could not establish a secure connection to WordPress.org

Enable HTTPS Connection Between Elasticsearch Nodes

How to Protect From Identity Theft Online: A Detailed Guide for 2022

Connect to OpenVPN using Network Manager on CentOS 8/Ubuntu 18.04

Website Security Testing: What Is It and Why Is It Important?

Stages of Anonymity and Security Development on the Internet

Monitoring

Install InfluxDB on Fedora 30/Fedora 29

Install Zabbix 4.x from Sources on Debian 10 Buster

Install and Configure SNMP on Ubuntu 18.04 and CentOS 7

How to Install Wazuh Agent on RHEL 8/9/10

Install ModSecurity with Apache on Ubuntu 22.04

Monitor Squid logs with Grafana and Graylog

© 2026 kifarunix.com

Home Advertise with us Privacy Policy