Rocky Linux

Rocky Linux is a Linux distribution that is intended to be a downstream, complete binary-compatible release using the Red Hat Enterprise Linux operating system source code. The project’s aim is to provide a community-supported, production-grade enterprise operating system.

Subscribe to Rocky Linux
Get notified when new articles on Rocky Linux are published.
    All
  • 11 Results
    • Tutorial

      How To Install MySQL on Rocky Linux 8

      Introduction MySQL is an open-source database management system, commonly installed as part of the popular LEMP (Linux, Nginx, MySQL/MariaDB, PHP/Python/Perl) stack. It implements the relational model and Structured Q...
      2 months agoBy Mark Drake, Jamon CamissoDatabasesMySQLRocky LinuxRocky Linux 8
    • Tutorial

      How To Install MariaDB on Rocky Linux 8

      Introduction MariaDB is an open-source database management system, commonly used as an alternative for the MySQL portion of the popular LAMP (Linux, Apache, MySQL, PHP/Python/Perl) stack. It is intended to be a drop-i...
      2 months agoBy Brian Boucheron, Jamon CamissoDatabasesMariaDBMySQLRocky LinuxRocky Linux 8Interactive
    • Tutorial

      How To Install Java on CentOS, Rocky Linux, RHEL, and Fedora

      This tutorial will show you how to install Java on current versions of RPM-based Linux distributions: Red Hat Enterprise Linux, CentOS, Fedora, and Rocky Linux. Java is a popular programming language and software plat...
      2 months agoBy Alex Garnett, Mitchell AnicasRocky LinuxInteractiveJavaCentOSFedora
    • Tutorial

      How To Build A SIEM with Suricata and Elastic Stack on Rocky Linux 8

      The previous tutorials in this series guided you through installing, configuring, and running Suricata as an Intrusion Detection (IDS) and Intrusion Prevention (IPS) system. You also learned about Suricata rules and h...
      4 months agoBy Jamon CamissoRocky LinuxRocky Linux 8SecurityNetworkingFirewallElasticsearchSuricata
    • Tutorial

      How To Configure Suricata as an Intrusion Prevention System (IPS) on Rocky Linux 8

      In this tutorial you will learn how to configure Suricata’s built-in Intrusion Prevention System (IPS) mode on Rocky Linux 8. By default Suricata is configured to run as an Intrusion Detection System (IDS), which only...
      5 months agoBy Sammy SharkRocky LinuxRocky Linux 8SecurityNetworkingFirewallSuricata
    • Tutorial

      How To Install Suricata on Rocky Linux 8

      Suricata is a Network Security Monitoring (NSM) tool that uses sets of community created and user defined signatures (also referred to as rules) to examine and process network traffic. In this tutorial you will learn ...
      6 months agoBy Jamon CamissoRocky LinuxRocky Linux 8SecurityNetworkingSuricata
    • Tutorial

      How To Configure HAProxy Logging with Rsyslog on Rocky Linux 8 [Quickstart]

      By default on many Rocky Linux 8 installations, HAProxy is not configured to write its log output to a file. This quickstart tutorial will explain how to configure HAProxy logging with Rsyslog and SELinux rules by usi...
      6 months agoBy Jamon CamissoRocky LinuxRocky Linux 8HAProxyInteractiveLogging
    • Question

      Copy ssh keys between users Rocky linux 8

      I have setup a droplet and logged in as root, I have added a new user and want to copy the ssh key from root to new user is there a command to copy ssh keys between 2 different users on the same server? on ubuntu I us...
      1 answer7 months agoBy robertkeoghdoLinux BasicsGetting StartedSecuritySystem ToolsRocky LinuxRocky Linux 8
    • Tutorial

      How To Set Up WireGuard on Rocky Linux 8

      WireGuard is a lightweight Virtual Private Network (VPN) that supports IPv4 and IPv6 connections. A VPN allows you to traverse untrusted networks as if you were on a private network. It gives you the freedom to access...
      8 months agoBy Jamon CamissoRocky LinuxRocky Linux 8SecurityNetworkingVPNIPv6
    • Tutorial

      How To Set Up SSH Keys on Rocky Linux 8

      SSH, or secure shell, is an encrypted protocol used to administer and communicate with servers. When working with a Rocky Linux server, chances are you will spend most of your time in a terminal session connected to y...
      8 months agoBy Brian Boucheron, Jamon CamissoRocky LinuxRocky Linux 8Getting StartedLinux BasicsSecuritySystem Tools
    • Tutorial

      Initial Server Setup with Rocky Linux 8

      When you first create a new Rocky Linux 8 server, there are a few configuration steps that you should take early on as part of the basic setup. This will increase the security and usability of your server and will giv...
      8 months agoBy Brian Boucheron, Jamon CamissoRocky LinuxRocky Linux 8Linux BasicsGetting StartedInitial Server Setup