×
Apr 29, 2023 · jenkins dashboard is showing Oops! A problem occurred while processing the request. Logging ID=996d95f6-3d19-4809-aa7d-205b780e941c; what did ...
Missing: standard | Show results with:standard
Access to URLs provided by the security realm (to ... SCM plugins commonly do this to let SCM ... ​/ can be treated for logging purposes as if this prefix wasn't ...
Missing: standard | Show results with:standard
Jenkins supports custom log appenders using standard java.util.logging configuration options. Syslog logger, non-Jenkins implementation. Task logs (Not started).
Nov 2, 2023 · I'll try to find some additional logging level to show more information, but your idea about returning true sounds good. uilianries (Uilian ...
Missing: standard | Show results with:standard
Audit Trail. Used by 3.42% of instances. Released: 5 months ago. administrative-monitor · logging · Authentication and User Management. Keep a log of who ...
Jul 9, 2014 · All logging is done at the INFO level. Version 0.3 (September 25, 2008). More logging. Version 0.2 (September 19, 2008). Adding search support ...
Jan 18, 2024 · Plain text logging of sensitive configuration variables. Affects version 0.7-alpha and earlier. Secrets in system log messages not masked.
Aug 4, 2016 · Improved logging; JENKINS-8259 Provided "no synchronisation" radio in system configuration page, allowing to disable scm synchronisation ...
Missing: standard | Show results with:standard
All logging messages will still be visible in the messages view of the warnings plugin. scm : String (optional). Specify the key of your repository (substring ...
Missing: standard | Show results with:standard
The trait only enable logging of failed/aborted builds by default. Select this option to include logging of successful builds as well. sudoUser : String ...
The #1 solution for observability, telemetry & security. "Holy grail for log management" Aggregate, process, enrich and analyze logs...
Leverage Mayhem's dynamic SBOM solution for accelerated compliance and heightened defense.
Identify and manage software supply chain risks end-to-end from development to deployment.