Storage Management Best Practices: Part 1 – Components In Motion

New in Nexus Repository 3.26, users now have an effective way to migrate components between two or more Nexus Repository instances with the Import/Export feature. This latest release delivers Nexus Repository Import and Export tasks with full support of all eight formats (Raw, Maven, NuGet, npm, Rubygems, Yum, Docker, and PyPI). Import/Export is available for Nexus Repository Pro users.

Storage management in Nexus Repository Manager is an important topic when scaling development throughput for any organization or team. How specific software components take up storage space, physical relocation of these components within Nexus Repository Manager, and understanding best practices for optimizing available storage once components are no longer needed are the three main areas of operations for running an efficient, scalable repository. 

This is the first part of a new guided “Storage Management Best Practices” series. Diving deeper into Import/Export capabilities, we will be focusing on relocation and moving components within Nexus Repository Manager in this publication. 

Modern Supply Chains and Repository Management

Organizations are working hard to keep up with faster rates of component creation from CI/CD and increased sizes of components from the shift in containerized deployments (e.g. multiple GB of new docker components being created every day). Managing repository content at the blob store level is important for storage, but what about the ability to move repository components between Nexus Repository Manager instances? These new supply chain trends leading to increased throughput of repository content makes it critical for teams to understand how to keep their repository components organized. Especially, when organizations have several different repository manager instances in several different business units/departments. 

Listed below are the three main use cases for Nexus Repository Pro customers when moving components using Import/Export:

*** This is a Security Bloggers Network syndicated blog from Sonatype Blog authored by Brent Kostak. Read the original post at: