Skip to content
kifarunix.com
  • Home
  • Blog
    • HowTos
    • Containers
    • Security
    • Networking
    • Storage
    • Virtualization
    • Monitoring
  • About Us
  • Contact Us

Database activity monitoring

6 Tools That Can Help Protect Your Sensitive Business Information

6 Tools That Can Help Protect Your Sensitive Business Information

How do you protect your business information? The answer to that question can be a difficult one, but it’s important because the amount of sensitive

Latest Posts

Upgrade RHEL 8 to RHEL 9 using LEAPP with Satellite Server Integration

Enable RHEL 10 Repositories in Red Hat Satellite: A Step-by-Step Guide

How to Disable Weak SSH Algorithms on RHEL 8/9/10 (SHA-1 HMACs, SHA-1 Kex, CBC, 3DES)

Integrate OpenShift with Active Directory for Authentication

Install and Set Up Active Directory on Windows Server 2025 with LDAPS

How to Join RHEL 8/9/10 to Windows AD with SSSD

Containers

Serverless Computing with Linux on AWS Lambda

How to Deploy WordPress as a Docker Container

Deploy WordPress using Docker Compose

How to Use Secrets in Kubernetes Applications

Install Portainer Extension on Docker Desktop

Step-by-Step: Provisioning Kubernetes Persistent Volumes with CephFS CSI Driver

Security

Install and Configure Snort 3 NIDS on Ubuntu 20.04

Install reNgine on Ubuntu 20.04|Ubuntu 18.04

Install Fleet Osquery Manager on Oracle Linux

Install and setup GVM 20.08 on Debian 10

How to Install and Configure Maltrail on Ubuntu 18.04

Install Passbolt on Debian 12

Monitoring

Install and Configure Prometheus on CentOS 8

Integrate Osquery Manager with ELK Stack

Configure NXLog to Forward System Logs to Rsyslog Server on Ubuntu

Install OpenNMS Network Monitoring tool on Ubuntu 20.04

Install OSSEC Agent on CentOS 8

Fix AlienVault HIDS Events Displaying 0.0.0.0 as IP Address

© 2025 kifarunix.com

Home Advertise with us Privacy Policy