Heads Up :
The post you are writing will appear in a public forum. Please ensure all content is appropriate for public consumption. Review the employee guidelines for the community here.
It is best practice to avoid storing your secrets (e.g., passwords and shared keys) in plain text, either on NSO or on the device. In NSO, we support multiple encrypted data types that are encrypted using a local key. Similarly, many devices such as ...
Hello!
As some of you might know, policies and policy engines have become a little bit of a hot topic in the automation world.
NSO has some built-in capabilities for policies (/policy in the data-model), but I wanted to show how straight-forward ...
There is a lot of discussion around CICD with NSO, and how to implement automatic testing. This was indeed a hot topic at the NSO Developer Days.Everyone is different, but to help people getting started I created a CICD howto guide: https://github.co...
I got into a little discussion about jinja templates the other day and ended up putting together a little example that I thought might be of interest to others. Note that the approach demonstrated here is a little bit fragile, it depends on the way t...
Well, you can do some things, but perhaps not all the things you want. The netconf protocol part is sort of opaque to you, but you can fail individual transactions, potentially based on their content. There is also a limit to what kind of errors you...