Introduction: In database administration, there may be situations where you need to temporarily prevent a user from accessing a MySQL server without deleting the account. This can be useful during security incidents, suspicious activity, employee offboarding, or maintenance tasks. Instead of removing the user completely, MySQL allows administrators to lock… Continue Reading How to Disable/Lock a MySQL User Account from CLI?

The objective of this module is to design and implement a dedicated Board Members page for the website. The page will clearly present each board member’s biography in an individual, well-structured, and readable format using WordPress. Requirements Functional Requirements Create a separate Board Members page. Rearrange the existing theme templates to… Continue Reading Board Members Module Design and Implementation

Introduction In modern containerized environments, centralized logging is essential for monitoring, troubleshooting, and maintaining application reliability. Kubernetes workloads generate logs across multiple pods and nodes, which makes log management challenging if logs remain distributed. To solve this, organizations often use the ELK Stack (Elasticsearch, Logstash, and Kibana) for centralized logging… Continue Reading Kubernetes ELK Logging Setup (Filebeat → Logstash → Kibana)

Introduction Monitoring critical system activities is essential for maintaining security, troubleshooting incidents, and ensuring compliance. Linux provides a powerful auditing framework called auditd that records system calls, file changes, command executions, and authentication activities. In this guide, we will walk through the steps to install auditd, configure auditing rules, and… Continue Reading Implementing Auditd for System Activity Monitoring in Linux Servers

Introduction As container images are built and pushed frequently, repositories can quickly accumulate multiple versions of artifacts. Over time, this leads to increased storage usage and unnecessary clutter. To manage this effectively, implementing a retention policy is essential. In Harbor, retention policies allow you to automatically remove older artifacts while… Continue Reading How to Configure a Retention Policy in Harbor