NashTech Insights

Naincy Kumari

Posts by categories

Posts by tags

coding script

How can one identify Kubernetes API deprecations using Pluto?

Hello Readers!! We are again back with another exciting topic i.e. Pluto. As we all know kubernetes is a powerful container orchestration platform that continues to evolve rapidly. With each new release, Kubernetes introduces changes, deprecates certain features, and updates its API. Keeping track of these changes is essential for maintaining a healthy and secure …

How can one identify Kubernetes API deprecations using Pluto? Read More »

brown field and blue sky

How to use Nova to find outdated helm releases in your cluster

Hello Readers!!  We are again back here with an exciting topic i.e Nova. As we all know that Kubernetes has revolutionized container orchestration, and Helm, the package manager for Kubernetes, has become a go-to tool for managing application deployments. However, as your cluster and application portfolio grow, keeping track of outdated Helm releases can become …

How to use Nova to find outdated helm releases in your cluster Read More »

body of water and green field under blue sky photo

How to use Git-Crypt for managing secrets in Git Repositories

Hello Readers!! We are again back with an excited topic i.e how to use git-crypt for managing secrets in git repositories. In my previous blog we have seen what is git-crypt and its installation process. Basically Git-Crypt is an open-source, transparent data encryption tool designed specifically for Git repositories. It allows us to encrypt and …

How to use Git-Crypt for managing secrets in Git Repositories Read More »

data codes through eyeglasses

How to mask secrets in Jenkins

In today’s fast-paced development environments, continuous integration and continuous deployment (CI/CD) pipelines have become integral to the software development lifecycle. Jenkins, a popular automation server, plays a crucial role in orchestrating these pipelines. However, with the increasing importance of security, it’s essential to handle sensitive information, such as API keys, passwords, and tokens, with care. …

How to mask secrets in Jenkins Read More »

person using macbook pro on person s lap

How to monitor compute infrastructure with the Cloud Ops Agent

Hello Readers!! This blog will show how to monitor compute infrastructure with the cloud ops agent. As the complexity of cloud environments grows, it becomes increasingly important to have robust monitoring tools to ensure the infrastructure’s stability, security, and optimal performance. One such powerful tool is the Cloud Ops Agent, which offers comprehensive monitoring capabilities, …

How to monitor compute infrastructure with the Cloud Ops Agent Read More »

female engineer controlling flight simulator

How to send Jenkins Build NotificationS to Microsoft Teams Channel

Hello Readers! We are again back with a new exciting topic. In this blog, I will show you how to send Jenkins build notifications to Microsoft Teams channel. Continuous integration and delivery are crucial for ensuring high-quality software releases in today’s fast-paced software development environments. Jenkins, an open-source automation server, is widely used for automating …

How to send Jenkins Build NotificationS to Microsoft Teams Channel Read More »

Four Key Metrics

Hello Readers!! We are again back with an exciting topic i.e. Four Key Metrics. Through six years of research, the DevOps Research and Assessment (DORA) team has identified four key metrics that indicate software delivery performance.​ It provides a comprehensive view of DevOps performance and allows organizations to measure their progress over time.​ Four Key …

Four Key Metrics Read More »