Skip to content
kifarunix.com
  • Home
  • Blog
    • HowTos
    • Containers
    • Security
    • Networking
    • Storage
    • Virtualization
    • Monitoring
  • About Us
  • Contact Us

Database activity monitoring

6 Tools That Can Help Protect Your Sensitive Business Information

6 Tools That Can Help Protect Your Sensitive Business Information

How do you protect your business information? The answer to that question can be a difficult one, but it’s important because the amount of sensitive

Latest Posts

Integrate Request Tracker (RT) with Active Directory for Authentication

How to Enable Self-Service Password Reset in Request Tracker (RT)

Configure Request Tracker to Send Mails using MSMTP via Gmail Relay

How to Enable HTTPS for Request Tracker on Linux

Install Request Tracker on AlmaLinux/Rocky Linux

Replace OpenShift Self-Signed Ingress and API SSL/TLS Certificates with Lets Encrypt

Containers

Automate OpenShift Deployments with GitLab CI/CD Pipelines

Assign Roles to Users and Groups in Kubernetes Cluster

Provision Block Storage for Kubernetes on Rook Ceph Cluster

Introduction to Kubernetes: What is it and why do you need it?

How to Setup Three Node Docker Swarm Cluster on Ubuntu 22.04

Installing Minikube on Ubuntu 24.04

Security

Install FortiClient VPN Client on Ubuntu 20.04/Ubuntu 18.04

Install and Configure OpenVPN Client on CentOS 8/Ubuntu 18.04

How to Integrate TheHive with MISP

Enforce Password Complexity Policy On Ubuntu 18.04

Install and Setup DVWA on Debian 10

Setup IPSec VPN server with Libreswan on Rocky Linux

Monitoring

Monitoring Gitlab Metrics with Prometheus and Grafana

Install LibreNMS on Rocky Linux

Install Sensu Agent on Windows systems

Generate Wildcard SSL Certificates for Elasticsearch

Configure Kibana Dashboards/Visualizations to use Custom Index

Deploy a Single Node ELK Stack Cluster on Docker Containers

© 2025 kifarunix.com

Home Advertise with us Privacy Policy