×
Any time
  • Any time
  • Past hour
  • Past 24 hours
  • Past week
  • Past month
  • Past year
Verbatim
In this post I'll show how the new AWS Secrets Manager Credentials Provider plugin allows you to marshal your secrets into one place, and use them securely from ...
Tekton pipelines have a number of benefits: they are cloud native and designed from the ground up for kubernetes each Tekton Pipeline is fully declarative and ...
Welcome to Continuous Blog! Hello and welcome to "Continuous Blog", the official Hudson weblog! If you don't mind me saying so, I think its arrival is long ...
Introduction The Jenkins project is committed to delivering a world-class platform experience for end users and developers alike. At the core of this experience ...
Jenkins X uses Capabilities identified by the "Accelerate: The Science Behind Devops" Jenkins X is a reimagined CI/CD implementation for the Cloud which is ...
It's 2022, and the Jenkins project is approaching 18 years old, boasts over 1,800 plugins and over 1 million users around the world, and is widely considered ...
A remote code execution vulnerability has been identified in the Spring Framework. This vulnerability is identified as CVE-2022-22965. Spring officially reacted ...
Log from Jenkins Jobs to GitHub Pull Requests as Checks. You have a GitHub repo and a Jenkins server. The Jenkins server has jobs for running unit tests, ...
The Jenkins Blog · Automated Software Maintenance · Security updates for multiple Jenkins plugins · Continuous Integration for C/C++ Projects with Jenkins and ...
Introducing Jenkins Certification. This is a guest post by Francois Dechery, he works at CloudBees managing Customer Engagement/Support, Consulting and ...