Skip to content
kifarunix.com
  • Home
  • Blog
    • HowTos
    • Containers
    • Security
    • Networking
    • Storage
    • Virtualization
    • Monitoring
  • About Us
  • Contact Us

Confidential

How To Establish A Solid Foundation for Data Security, Privacy, and Confidential

How To Establish A Solid Foundation for Data Security, Privacy, and Confidential

As the business world increasingly moves online, establishing a solid foundation for data security, privacy, and confidentiality is more important than ever. You can help

Latest Posts

Integrate Request Tracker (RT) with Active Directory for Authentication

How to Enable Self-Service Password Reset in Request Tracker (RT)

Configure Request Tracker to Send Mails using MSMTP via Gmail Relay

How to Enable HTTPS for Request Tracker on Linux

Install Request Tracker on AlmaLinux/Rocky Linux

Replace OpenShift Self-Signed Ingress and API SSL/TLS Certificates with Lets Encrypt

Containers

How to Deploy Multinode OpenShift Cluster Using UPI/User Provisioned Infrastructure

Monitor Docker Swarm Node Metrics using Grafana

Working Guide: Deploy AWX on Kubernetes Cluster with AWX Operator

Setup Highly Available Kubernetes Cluster with Haproxy and Keepalived

Introduction to Kubernetes: What is it and why do you need it?

Step-by-Step Guide: How to Install Helm on Kubernetes Cluster

Security

Install OpenVPN Server on Debian 11/Debian 10

Install VeraCrypt on Debian 11

Automount LUKS Encrypted Device in Linux

Ship System Logs to ELK Stack using Elastic Agents

How to Install OSSEC Agent on Solaris 11.4

Install OpenVAS 10 (GVM) on Debian 10 Buster

Monitoring

Enroll Windows Systems into Osquery Fleet Manager

Install and Configure Tripwire Security Monitoring tool on CentOS 8

Compile and Install Zabbix Agent on FreeBSD 12

How to Check Docker Container RAM and CPU Usage

Create Squid Logs Extractors on Graylog Server

Install Sampler Shell Command Visualization tool on Linux

© 2025 kifarunix.com

Home Advertise with us Privacy Policy