Skip to content
kifarunix.com
  • Home
  • Blog
    • HowTos
    • Containers
    • Security
    • Networking
    • Storage
    • Virtualization
    • Monitoring
  • About Us
  • Contact Us

cybersecurity studies

Studying cybersecurity and gaining the greatest achievements in data protection

Studying cybersecurity and gaining the greatest achievements in data protection

The digital age brings many great opportunities to humanity. But these opportunities never go without challenges. In this case, it goes about cybersecurity threats. How

Latest Posts

How to Integrate MinIO S3 Storage with Kubernetes/OpenShift

How to Install MinIO Object Storage Server on RHEL 9

How to Install MinIO on Ubuntu 24.04: A Step-by-Step Guide

Install and Configure iSCSI Storage Server on Ubuntu 24.04

Control OpenShift Pod Permissions with SCCs and Service Accounts

How to Install Red Hat Discovery Tool on RHEL 9

Containers

What are the core concepts in Kubernetes?

Install Portainer Extension on Docker Desktop

Setup Highly Available Kubernetes Cluster with Haproxy and Keepalived

Configuring Shared Filesystem for Kubernetes on Rook Ceph Storage

Kubernetes Resource Optimization with Vertical Pod Autoscaler (VPA)

Install and Setup Kubernetes Cluster on RHEL 9

Security

How to Enable Basic Authentication on ELK Stack

How to Scan a Remote Host using Nessus Vulnerability Scanner

How to Install Arkime with Elasticsearch 8 on Ubuntu 24.04

Configure Filebeat-Elasticsearch Authentication

Monitor SSL/TLS Certificate Expiry with Prometheus and Grafana

How to Protect SSH Server Authentication with Fail2ban Ubuntu 18.04

Monitoring

Install ELK Stack on Debian 11

Quick Way to Enable Kibana HTTPS Connection

Install Nagios Server on CentOS 9 Stream

Install Icinga Web 2 on Debian 10 Buster

Install Monitorix on Debian 10

Installing ELK Stack on CentOS 8

© 2025 kifarunix.com

Home Advertise with us Privacy Policy