Skip to content
kifarunix.com
  • Home
  • Blog
    • HowTos
    • Containers
    • Security
    • Networking
    • Storage
    • Virtualization
    • Monitoring
  • About Us
  • Contact Us

Database activity monitoring

6 Tools That Can Help Protect Your Sensitive Business Information

6 Tools That Can Help Protect Your Sensitive Business Information

How do you protect your business information? The answer to that question can be a difficult one, but it’s important because the amount of sensitive

Latest Posts

Automate RHEL OS Upgrades using Ansible infra.leapp Playbooks

Technology powers the expansion of online casinos

Upgrade RHEL 9 to RHEL 10 using LEAPP Tool

Upgrade RHEL 8 to RHEL 9 using LEAPP with Satellite Server Integration

Enable RHEL 10 Repositories in Red Hat Satellite: A Step-by-Step Guide

How to Disable Weak SSH Algorithms on RHEL 8/9/10 (SHA-1 HMACs, SHA-1 Kex, CBC, 3DES)

Containers

Monitor Docker Swarm Node Metrics using Grafana

Install Fedora CoreOS on KVM Using an ISO File: A Step-by-Step Guide

Kubernetes User Management: Creating Users, Groups and Service Accounts

How to Install Docker Resource Usage Extension

Working Guide: Deploy AWX on Kubernetes Cluster with AWX Operator

Understanding OpenShift Security Context Constraints: The Complete Guide

Security

Windows Server Security Essentials from Experienced System Administrators

Install and Setup DVWA on CentOS 8

Install and Setup DVWA on Rocky Linux 8

Install and Setup GVM 20.08 on Ubuntu 20.04

Install and Setup Velociraptor on Ubuntu 18.04

Detecting Malicious Files with Wazuh and VirusTotal

Monitoring

Install Nagios Server on CentOS 9 Stream

Compile and Install Zabbix Agent on FreeBSD 12

Add Hosts to Zabbix Server for Monitoring

How to Configure SNMP version 3 on Debian 9

Install and Configure Zabbix 4.0 from Source on Fedora 29/Fedora 28/CentOS 7

Configure Filebeat 8 to Write Logs to Specific Data Stream

© 2025 kifarunix.com

Home Advertise with us Privacy Policy