Skip to content
kifarunix.com
  • Home
  • Blog
    • HowTos
    • Containers
    • Security
    • Networking
    • Storage
    • Virtualization
    • Monitoring
  • About Us
  • Contact Us

Zero Trust

Top 15 Emerging Technology in Cybersecurity

Top 15 Emerging Technology in Cybersecurity

The need for cybersecurity is at an all-time high as the global corporate environment moves to cloud data storage and online management. With greater internet

Latest Posts

Automate Windows Server Patching with Ansible AWX: Step-by-Step

How to Use RHEL 10 Lightspeed AI to Simplify Linux Administration Tasks

How to Install RHEL 10 on VirtualBox

How to Upgrade OpenShift Cluster: Seamless Steps for Success

Why Docker Hardened Images Are a Game-Changer for Software Supply Chain Security

Automate Tasks in OpenShift with Kubernetes Jobs and Cron Jobs: A Practical Guide

Containers

Monitor Docker Swarm Node Metrics using Grafana

How to Deploy an Application in a Docker Swarm Cluster

Kubernetes Resource Optimization with Vertical Pod Autoscaler (VPA)

Deploy a Single Node ELK Stack Cluster on Docker Containers

Step-by-Step: Provisioning Kubernetes Persistent Volumes with CephFS CSI Driver

Disaster Recovery in Kubernetes: etcd Backup and Restore with etcdctl and etcdutl

Security

Install and Configure Tripwire Security Monitoring tool on CentOS 8

Setup IPSec Site-to-Site VPN Tunnel on pfSense

Install sysPass Password Manager on Ubuntu 22.04/Ubuntu 20.04

How to Install and Use ClamAV Antivirus on Ubuntu 18.04

Integrate Portainer with OpenLDAP for Authentication

How to Install and Setup GRR clients on Ubuntu 18.04/Debian 9

Monitoring

Add Hosts to Zabbix Server for Monitoring

Install Cortex on Ubuntu 22.04/Ubuntu 20.04

How to Integrate TheHive with MISP

Full Automation of Nagios Monitoring Setup with Ansible

How to Check Docker Container RAM and CPU Usage

Install and Configure Prometheus on Fedora 29/Fedora 28

© 2025 kifarunix.com

Home Advertise with us Privacy Policy