Skip to content
kifarunix.com
  • Home
  • Blog
    • HowTos
    • Containers
    • Security
    • Networking
    • Storage
    • Virtualization
    • Monitoring
  • About Us
  • Contact Us

Database activity monitoring

6 Tools That Can Help Protect Your Sensitive Business Information

6 Tools That Can Help Protect Your Sensitive Business Information

How do you protect your business information? The answer to that question can be a difficult one, but it’s important because the amount of sensitive

Latest Posts

Why Docker Hardened Images Are a Game-Changer for Software Supply Chain Security

Automate Tasks in OpenShift with Kubernetes Jobs and Cron Jobs: A Practical Guide

How to Setup Multinode Elasticsearch 9 Cluster

Install Filebeat 9 on Ubuntu/Debian

Install Logstash 9 on Ubuntu/Debian

Install ELK Stack 9.x on Ubuntu 24.04

Containers

Monitor Docker Swarm Service Metrics using Grafana

Deploy Ceph Storage Cluster in Kubernetes using Rook

Kubernetes Ingress Explained: How to Manage External Access to Your Services

Deploy ELK Stack 8 Cluster on Docker Containers

Setup Kubernetes Cluster on Ubuntu 22.04/20.04

Gracefully Remove Worker Node from Kubernetes Cluster

Security

Creating Custom Nessus Scan Policy Templates

How to Install RKHunter (RootKit Hunter) On Ubuntu 18.04

Install WireGuard VPN Client on Rocky Linux/Ubuntu/Debian

How to Enable Basic Authentication on ELK Stack

Intercept Malicious File Upload with ModSecurity and ClamAV

Install and Setup Squid Proxy on Debian 11/10

Monitoring

Process ModSecurity Logs using Wazuh

Monitor SSL/TLS Certificate Expiry with Prometheus and Grafana

Install Zabbix Agent on FreeBSD 12

Configure NXLog to Forward System Logs to Rsyslog Server on Ubuntu

Install ModSecurity with Apache on Ubuntu 22.04

Install Filebeat on Fedora 30/Fedora 29/CentOS 7

© 2025 kifarunix.com

Home Advertise with us Privacy Policy