docker network create jenkins
The procedures on this page are for new installations of Jenkins on a single/local machine.
Jenkins is typically run as a standalone application in its own process with the built-in Java servlet container/application server (Jetty).
Jenkins can also be run as a servlet in different Java servlet containers such as Apache Tomcat or GlassFish. However, instructions for setting up these types of installations are beyond the scope of this page.
Note: Although this page focuses on local installations of Jenkins, this content can also be used to help set up Jenkins in production environments.
Minimum hardware requirements:
256 MB of RAM
1 GB of drive space (although 10 GB is a recommended minimum if running Jenkins as a Docker container)
Recommended hardware configuration for a small team:
1 GB+ of RAM
50 GB+ of drive space
Comprehensive hardware recommendations:
Hardware: see the Hardware Recommendations page
Software requirements:
Java: see the Java Requirements page
Web browser: see the Web Browser Compatibility page
For Windows operating system: Windows Support Policy
This section describes how to install/run Jenkins on different platforms and operating systems.
Docker is a platform for running applications in an isolated environment called a "container" (or Docker container). Applications like Jenkins can be downloaded as read-only "images" (or Docker images), each of which is run in Docker as a container. A Docker container is in effect a "running instance" of a Docker image. From this perspective, an image is stored permanently more or less (i.e. insofar as image updates are published), whereas containers are stored temporarily. Read more about these concepts in the Docker documentation’s Getting Started, Part 1: Orientation and setup page.
Docker’s fundamental platform and container design means that a single Docker image (for any given application like Jenkins) can be run on any supported operating system (macOS, Linux and Windows) or cloud service (AWS and Azure) which is also running Docker.
To install Docker on your operating system, visit the Docker store website and click the Docker Community Edition box which is suitable for your operating system or cloud service. Follow the installation instructions on their website.
Jenkins can also run on Docker Enterprise Edition, which you can access through Docker EE on the Docker store website.
|
If you are installing Docker on a Linux-based operating system, ensure you configure Docker so it can be managed as a non-root user. Read more about this in Docker’s Post-installation steps for Linux page of their documentation. This page also contains information about how to configure Docker to start on boot. |
There are several Docker images of Jenkins available.
The recommended Docker image to use is the
jenkinsci/blueocean image
(from the Docker Hub repository). This image
contains the current Long-Term Support (LTS) release of Jenkins
(which is production-ready) bundled with all Blue Ocean plugins and features.
This means that you do not need to install the Blue Ocean plugins separately.
|
A new There are also other Jenkins Docker images you can use (accessible through
|
Open up a terminal window.
Create a bridge network in
Docker using the following
docker network create
command:
docker network create jenkins
Create the following volumes to
share the Docker client TLS certificates needed to connect to the Docker
daemon and persist the Jenkins data using
the following
docker volume create
commands:
docker volume create jenkins-docker-certs
docker volume create jenkins-data
In order to execute Docker commands inside Jenkins nodes, download and run
the docker:dind Docker image using the following
docker container run
command:
docker container run \
--name jenkins-docker \(1)
--rm \(2)
--detach \(3)
--privileged \(4)
--network jenkins \(5)
--network-alias docker \(6)
--env DOCKER_TLS_CERTDIR=/certs \(7)
--volume jenkins-docker-certs:/certs/client \(8)
--volume jenkins-data:/var/jenkins_home \(9)
--publish 2376:2376 \(10)
docker:dind(11)
| 1 | ( Optional ) Specifies the Docker container name to use for running the image. By default, Docker will generate a unique name for the container. |
| 2 | ( Optional ) Automatically removes the Docker container (the instance of
the Docker image) when it is shut down. This contains the Docker image cache
used by Docker when invoked from the jenkinsci/blueocean container described
below. |
| 3 | ( Optional ) Runs the Docker container in the background. This instance
can be stopped later by running docker container stop jenkins-docker and
started again with docker container start jenkins-docker. See
docker container
for more container management commands. |
| 4 | Running Docker in Docker currently requires privileged access to function properly. This requirement may be relaxed with newer Linux kernel versions. |
| 5 | This corresponds with the network created in the earlier step. |
| 6 | Makes the Docker in Docker container available as the hostname docker
within the jenkins network. |
| 7 | Enables the use of TLS in the Docker server. Due to the use of a privileged container, this is recommended, though it requires the use of the shared volume described below. This environment variable controls the root directory where Docker TLS certificates are managed. |
| 8 | Maps the /certs/client directory inside the container to
a Docker volume named jenkins-docker-certs as created above. |
| 9 | Maps the /var/jenkins_home directory inside the container to the Docker
volume named jenkins-data as created above. This will allow for other Docker
containers controlled by this Docker container’s Docker daemon to mount data
from Jenkins. |
| 10 | ( Optional ) Exposes the Docker daemon port on the host machine. This is
useful for executing docker commands on the host machine to control this
inner Docker daemon. |
| 11 | The docker:dind image itself. This image can be downloaded before running
by using the command: docker image pull docker:dind. |
Note: If copying and pasting the command snippet above does not work, try copying and pasting this annotation-free version here:
docker container run --name jenkins-docker --rm --detach \
--privileged --network jenkins --network-alias docker \
--env DOCKER_TLS_CERTDIR=/certs \
--volume jenkins-docker-certs:/certs/client \
--volume jenkins-data:/var/jenkins_home \
--publish 2376:2376 docker:dind
Download the jenkinsci/blueocean image and run it as a container in Docker
using the following
docker container run
command:
docker container run \
--name jenkins-blueocean \(1)
--rm \(2)
--detach \(3)
--network jenkins \(4)
--env DOCKER_HOST=tcp://docker:2376 \(5)
--env DOCKER_CERT_PATH=/certs/client \
--env DOCKER_TLS_VERIFY=1 \
--publish 8080:8080 \(6)
--publish 50000:50000 \(7)
--volume jenkins-data:/var/jenkins_home \(8)
--volume jenkins-docker-certs:/certs/client:ro \(9)
jenkinsci/blueocean(10)
| 1 | ( Optional ) Specifies the Docker container name for this instance of
the jenkinsci/blueocean Docker image. This makes it simpler to reference
by subsequent docker container commands. |
| 2 | ( Optional ) Automatically removes the Docker container (which is the
instantiation of the jenkinsci/blueocean image below) when it is shut down.
This keeps things tidy if you need to quit Jenkins. |
| 3 | ( Optional ) Runs the jenkinsci/blueocean container in the background
(i.e. "detached" mode) and outputs the container ID. If you do not specify this
option, then the running Docker log for this container is output in the terminal
window. |
| 4 | Connects this container to the jenkins network defined in the earlier
step. This makes the Docker daemon from the previous step available to this
Jenkins container through the hostname docker. |
| 5 | Specifies the environment variables used by docker, docker-compose, and
other Docker tools to connect to the Docker daemon from the previous step. |
| 6 | Maps (i.e. "publishes") port 8080 of the jenkinsci/blueocean container to
port 8080 on the host machine. The first number represents the port on the host
while the last represents the container’s port. Therefore, if you specified -p
49000:8080 for this option, you would be accessing Jenkins on your host machine
through port 49000. |
| 7 | ( Optional ) Maps port 50000 of the jenkinsci/blueocean container to
port 50000 on the host machine. This is only necessary if you have set up one or
more JNLP-based Jenkins agents on other machines, which in turn interact with
the jenkinsci/blueocean container (acting as the "master" Jenkins server, or
simply "Jenkins master"). JNLP-based Jenkins agents communicate with the Jenkins
master through TCP port 50000 by default. You can change this port number on
your Jenkins master through the Configure Global Security
page. If you were to change your Jenkins master’s TCP port for JNLP agents
value to 51000 (for example), then you would need to re-run Jenkins (via this
docker run … command) and specify this "publish" option with something like
--publish 52000:51000, where the last value matches this changed value on the
Jenkins master and the first value is the port number on the Jenkins master’s
host machine through which the JNLP-based Jenkins agents communicate (to the
Jenkins master) - i.e. 52000.
Note that WebSocket agents in Jenkins 2.217 do not need this configuration. |
| 8 | Maps the /var/jenkins_home directory in the container to the Docker
volume with the name
jenkins-data. Instead of mapping the /var/jenkins_home directory to a Docker
volume, you could also map this directory to one on your machine’s local file
system. For example, specifying the option--volume $HOME/jenkins:/var/jenkins_home would map the container’s
/var/jenkins_home directory to the jenkins subdirectory within the $HOME
directory on your local machine, which would typically be
/Users/<your-username>/jenkins or /home/<your-username>/jenkins.
Note that if you change the source volume or directory for this, the volume
from the docker:dind container above needs to be updated to match this. |
| 9 | Maps the /certs/client directory to the previously created
jenkins-docker-certs volume. This makes the client TLS certificates needed
to connect to the Docker daemon available in the path specified by the
DOCKER_CERT_PATH environment variable. |
| 10 | The jenkinsci/blueocean Docker image itself. If this image has not already
been downloaded, then this docker container run command will automatically download the
image for you. Furthermore, if any updates to this image were published since
you last ran this command, then running this command again will automatically
download these published image updates for you.Note: This Docker image could also be downloaded (or updated) independently using the docker image pull
command:docker image pull jenkinsci/blueocean |
Note: If copying and pasting the command snippet above does not work, try copying and pasting this annotation-free version here:
docker container run --name jenkins-blueocean --rm --detach \
--network jenkins --env DOCKER_HOST=tcp://docker:2376 \
--env DOCKER_CERT_PATH=/certs/client --env DOCKER_TLS_VERIFY=1 \
--volume jenkins-data:/var/jenkins_home \
--volume jenkins-docker-certs:/certs/client:ro \
--publish 8080:8080 --publish 50000:50000 jenkinsci/blueocean
Proceed to the Post-installation setup wizard.
The Jenkins project provides a Linux container image, not a Windows container image.
Be sure that your Docker for Windows installation is configured to run Linux Containers rather than Windows Containers.
See the Docker documentation for instructions to switch to Linux containers.
Once configured to run Linux Containers, the steps are:
Open up a command prompt window.
Create a bridge network in
Docker using the following
docker network create
command:
docker network create jenkins
Create the following volumes to
share the Docker client TLS certificates needed to connect to the Docker
daemon and persist the Jenkins data using the following
docker volume create
commands:
docker volume create jenkins-docker-certs
docker volume create jenkins-data
In order to execute Docker commands inside Jenkins nodes, download and run
the docker:dind Docker image using the following
docker container run
command:
docker container run --name jenkins-docker --rm --detach ^
--privileged --network jenkins --network-alias docker ^
--env DOCKER_TLS_CERTDIR=/certs ^
--volume jenkins-docker-certs:/certs/client ^
--volume jenkins-data:/var/jenkins_home ^
docker:dind
Download the jenkinsci/blueocean image and run it as a container in Docker
using the following
docker container run
command:
docker container run --name jenkins-blueocean --rm --detach ^
--network jenkins --env DOCKER_HOST=tcp://docker:2376 ^
--env DOCKER_CERT_PATH=/certs/client --env DOCKER_TLS_VERIFY=1 ^
--volume jenkins-data:/var/jenkins_home ^
--volume jenkins-docker-certs:/certs/client:ro ^
--publish 8080:8080 --publish 50000:50000 jenkinsci/blueocean
For an explanation of each of these options, refer to the macOS and Linux instructions above.
Proceed to the Post-installation setup wizard.
If you have some experience with Docker and you wish or need to access the
jenkinsci/blueocean container through a terminal/command prompt using the
docker container exec
command, you can add an option like --name jenkins-blueocean (with the
docker container run
above), which would give the jenkinsci/blueocean container the name
"jenkins-blueocean".
This means you could access the container (through a separate terminal/command
prompt window) with a docker container exec command like:
docker container exec -it jenkins-blueocean bash
There is a possibility you may need to access the Jenkins console log, for instance, when Unlocking Jenkins as part of the Post-installation setup wizard.
If you did not specify the detached mode option --detach with the
docker container run … command
above, then the Jenkins
console log is easily accessible through the terminal/command prompt window from
which you ran this Docker command.
Otherwise, you can access the Jenkins console log through the
Docker logs of
the jenkinsci/blueocean container using the following command:
docker container logs <docker-container-name>
Your <docker-container-name> can be obtained using the
docker container ls
command. If you specified the
--name jenkins-blueocean option in the docker container run … command above (see
also
Accessing the Jenkins/Blue
Ocean Docker container), you can simply use the docker container logs command:
docker container logs jenkins-blueocean
There is a possibility you may need to access the Jenkins home directory, for
instance, to check the details of a Jenkins build in the workspace
subdirectory.
If you mapped the Jenkins home directory (/var/jenkins_home) to one on your
machine’s local file system (i.e. in the docker container run … command
above), then you can access the
contents of this directory through your machine’s usual terminal/command prompt.
Otherwise, if you specified the --volume jenkins-data:/var/jenkins_home option in
the docker container run … command, you can access the contents of the Jenkins home
directory through the jenkinsci/blueocean container’s terminal/command prompt
using the
docker container exec
command:
docker container exec -it <docker-container-name> bash
As mentioned above,
your <docker-container-name> can be obtained using the
docker container ls
command. If you specified the
--name jenkins-blueocean option in the docker container run …
command above (see also
Accessing the Jenkins/Blue
Ocean Docker container), you can simply use the docker container exec command:
docker container exec -it jenkins-blueocean bash
The Web application ARchive (WAR) file version of Jenkins can be installed on any operating system or platform that supports Java.
To download and run the WAR file version of Jenkins:
Download the latest stable Jenkins WAR file to an appropriate directory on your machine.
Open up a terminal/command prompt window to the download directory.
Run the command java -jar jenkins.war.
Browse to http://localhost:8080 and wait until the Unlock Jenkins page
appears.
Continue on with the Post-installation setup wizard below.
Notes:
Unlike downloading and running Jenkins with Blue Ocean in Docker (above), this process does not automatically install the Blue Ocean features, which would need to installed separately via the Manage Jenkins > Manage Plugins page in Jenkins. Read more about the specifics for installing Blue Ocean on the Getting started with Blue Ocean page.
You can change the port by specifying the --httpPort option when you run the
java -jar jenkins.war command. For example, to make Jenkins accessible
through port 9090, then run Jenkins using the command:
java -jar jenkins.war --httpPort=9090
Jenkins installers are available for several Linux distributions.
On Debian and Debian-based distributions like Ubuntu you can install Jenkins through apt.
A LTS (Long-Term Support) release is chosen every 12 weeks from the stream of regular releases as the stable release for that time period.
It can be installed from the debian-stable apt repository.
wget -q -O - https://pkg.jenkins.io/debian-stable/jenkins.io.key | sudo apt-key add -
sudo sh -c 'echo deb https://pkg.jenkins.io/debian-stable binary/ > \
/etc/apt/sources.list.d/jenkins.list'
sudo apt-get update
sudo apt-get install jenkins
A new release is produced weekly to deliver bug fixes and features to users and plugin developers.
It can be installed from the debian apt repository.
wget -q -O - https://pkg.jenkins.io/debian/jenkins.io.key | sudo apt-key add -
sudo sh -c 'echo deb https://pkg.jenkins.io/debian binary/ > \
/etc/apt/sources.list.d/jenkins.list'
sudo apt-get update
sudo apt-get install jenkins
|
If an error is reported, “jenkins : Depends: daemon but it is not installable”, add the "universe" apt repository of community maintained free and open source software for Ubuntu by executing this command after
|
This package installation will:
Setup Jenkins as a daemon launched on start. See /etc/init.d/jenkins for more details.
Create a ‘jenkins’ user to run this service.
Direct console log output to the file /var/log/jenkins/jenkins.log. Check this file if you are troubleshooting Jenkins.
Populate /etc/default/jenkins with configuration parameters for the launch, e.g JENKINS_HOME
Set Jenkins to listen on port 8080. Access this port with your browser to start configuration.
|
If your |
Jenkins requires Java in order to run, yet certain distributions don’t include this by default and some Java versions are incompatible with Jenkins.
There are multiple Java implementations which you can use. OpenJDK is the most popular one at the moment, we will use it in this guide.
To install the Open Java Development Kit (OpenJDK) run the following:
Update the repositories
sudo apt update
search of all available packages:
sudo apt search openjdk
Pick one option and install it:
sudo apt install openjdk-8-jdk
Confirm installation:
sudo apt install openjdk-8-jdk
checking installation:
java -version
the result must be something like:
openjdk version "1.8.0_252" OpenJDK Runtime Environment (build 1.8.0_252-8u252-b09-1ubuntu1-b09) OpenJDK 64-Bit Server VM (build 25.252-b09, mixed mode)
|
Why use |
You can install Jenkins through dnf. You need to add the Jenkins repository from the Jenkins website to the package manager first.
A LTS (Long-Term Support) release is chosen every 12 weeks from the stream of regular releases as the stable release for that time period.
It can be installed from the redhat-stable yum repository.
sudo wget -O /etc/yum.repos.d/jenkins.repo \
https://pkg.jenkins.io/redhat-stable/jenkins.repo
sudo rpm --import https://pkg.jenkins.io/redhat-stable/jenkins.io.key
sudo dnf upgrade
sudo dnf install jenkins java-devel
A new release is produced weekly to deliver bug fixes and features to users and plugin developers.
It can be installed from the redhat yum repository.
sudo wget -O /etc/yum.repos.d/jenkins.repo \
http://pkg.jenkins-ci.org/redhat/jenkins.repo
sudo rpm --import https://jenkins-ci.org/redhat/jenkins-ci.org.key
sudo dnf upgrade
sudo dnf install jenkins java-devel
You can start the Jenkins service with the command:
sudo systemctl start jenkins
You can check the status of the Jenkins service using the command:
sudo systemctl status jenkins
If everything has been set up correctly, you should see an output like this:
Loaded: loaded (/etc/rc.d/init.d/jenkins; generated)
Active: active (running) since Tue 2018-11-13 16:19:01 +03; 4min 57s ago
|
If you have a firewall installed, you must add Jenkins as an exception.
You must change
|
You can install Jenkins through yum on Red Hat Enterprise Linux, CentOS, and other Red Hat based distributions.
You need to choose either the Jenkins Long Term Support release or the Jenkins weekly release.
A LTS (Long-Term Support) release is chosen every 12 weeks from the stream of regular releases as the stable release for that time period.
It can be installed from the redhat-stable yum repository.
sudo wget -O /etc/yum.repos.d/jenkins.repo \
https://pkg.jenkins.io/redhat-stable/jenkins.repo
sudo rpm --import https://pkg.jenkins.io/redhat-stable/jenkins.io.key
sudo yum upgrade
sudo yum install jenkins java-1.8.0-openjdk-devel
A new release is produced weekly to deliver bug fixes and features to users and plugin developers.
It can be installed from the redhat yum repository.
sudo wget -O /etc/yum.repos.d/jenkins.repo \
https://pkg.jenkins.io/redhat/jenkins.repo
sudo rpm --import https://pkg.jenkins.io/redhat/jenkins.io.key
sudo yum upgrade
sudo yum install jenkins java-1.8.0-openjdk-devel
You can start the Jenkins service with the command:
sudo systemctl start jenkins
You can check the status of the Jenkins service using the command:
sudo systemctl status jenkins
If everything has been set up correctly, you should see an output like this:
Loaded: loaded (/etc/rc.d/init.d/jenkins; generated)
Active: active (running) since Tue 2018-11-13 16:19:01 +03; 4min 57s ago
...
|
If you have a firewall installed, you must add Jenkins as an exception.
You must change
|
To install from the website, using the installer:
Open the package and follow the instructions
Jenkins can be installed on FreeBSD using the standard FreeBSD package manager, pkg.
|
Disclaimer: The FreeBSD project maintains the Jenkins packaging for FreeBSD. The Jenkins package for FreeBSD is NOT officially supported by the Jenkins project, but it is actively used by the FreeBSD project at https://ci.freebsd.org/ . |
A LTS (Long-Term Support) release is chosen every 12 weeks from the stream of regular releases as the stable release for that time period.
It can be installed from the FreeBSD pkg package manager.
# pkg install jenkins-lts
A new release is produced weekly to deliver bug fixes and features to users and plugin developers.
It can be installed from the FreeBSD pkg package manager.
# pkg install jenkins
The long term support package jenkins-lts and the weekly package installation jenkins will:
Configure Jenkins as a daemon which may optionally be launched on start. See /etc/rc.conf for more details
Create a ‘jenkins’ user to run the service
Direct console log output to the file /var/log/jenkins.log. Check this file when troubleshooting Jenkins
Set Jenkins to listen on port 8180 from the path /jenkins. Open http://localhost:8180/jenkins to login to Jenkins
You can start the Jenkins service with the command:
# service jenkins onestart
You can check the status of the Jenkins service using the command:
# service jenkins status
You can stop the Jenkins service with the command:
# service jenkins stop
Add the following to /etc/rc.conf to start Jenkins automatically on system boot:
jenkins_enable="YES"
Once Jenkins is enabled, it can be started with:
# service jenkins start
Other configuration values that can be set in /etc/rc.conf or in /etc/rc.conf.d/jenkins are described in /usr/local/etc/rc.d/jenkins.
Refer to the Jenkins page on the FreeBSD wiki for more information specific to Jenkins on FreeBSD.
On a system running OpenIndiana Hipster Jenkins can be installed in either the local or global zone using the Image Packaging System (IPS).
|
Disclaimer: This platform is NOT officially supported by the Jenkins team,
use it at your own risk. Packaging and integration described in this section
is maintained by the OpenIndiana Hipster team, bundling the generic |
For the common case of running the newest packaged weekly build as a standalone (Jetty) server, simply execute:
pkg install jenkins
svcadm enable jenkins
The common packaging integration for a standalone service will:
Create a jenkins user to run the service and to own the directory structures under /var/lib/jenkins.
Pull the OpenJDK8 and other packages required to execute Jenkins, including
the jenkins-core-weekly package with the latest jenkins.war.
| Long-Term Support (LTS) Jenkins releases currently do not support OpenZFS-based systems, so no packaging is provided at this time. |
Set up Jenkins as an SMF service instance (svc:/network/http:jenkins) which
can then be enabled with the svcadm command demonstrated above.
Set up Jenkins to listen on port 8080.
Configure the log output to be managed by SMF at /var/svc/log/network-http:jenkins.log.
Once Jenkins is running, consult the log
(/var/svc/log/network-http:jenkins.log) to retrieve the generated
administrator password for the initial set up of Jenkins, usually it will be
found at /var/lib/jenkins/home/secrets/initialAdminPassword. Then navigate to
localhost:8080 to complete configuration of the
Jenkins instance.
To change attributes of the service, such as environment variables like JENKINS_HOME
or the port number used for the Jetty web server, use the svccfg utility:
svccfg -s svc:/network/http:jenkins editprop
svcadm refresh svc:/network/http:jenkins
You can also refer to /lib/svc/manifest/network/jenkins-standalone.xml for more
details and comments about currently supported tunables of the SMF service.
Note that the jenkins user account created by the packaging is specially privileged
to allow binding to port numbers under 1024.
The current status of Jenkins-related packages available for the given release of OpenIndiana can be queried with:
pkg info -r '*jenkins*'
Upgrades to the package can be performed by updating the entire operating
environment with pkg update, or specifically for Jenkins core software with:
pkg update jenkins-core-weekly
|
Procedure for updating the package will restart the currently running Jenkins process. Make sure to prepare it for shutdown and finish all running jobs before updating, if needed. |
Generally it should suffice to install Java 8 and download the
jenkins.war and run it as a standalone process or under an application server
such as Apache Tomcat.
Some caveats apply:
Headless JVM and fonts: For OpenJDK builds on minimalized-footprint systems, there may be issues running the headless JVM, because Jenkins needs some fonts to render certain pages.
ZFS-related JVM crashes: When Jenkins runs on a system detected as a SunOS,
it tries to load integration for advanced ZFS features using the bundled
libzfs.jar which maps calls from Java to native libzfs.so routines
provided by the host OS. Unfortunately, that library was made for binary
utilities built and bundled by the OS along with it at the same time, and was
never intended as a stable interface exposed to consumers. As the forks of
Solaris legacy, including ZFS and later the OpenZFS initiative evolved, many
different binary function signatures were provided by different host
operating systems - and when Jenkins libzfs.jar invoked the wrong
signature, the whole JVM process crashed. A solution was proposed and
integrated in jenkins.war since weekly release 2.55 (and not yet in any LTS
to date) which enables the administrator to configure which function
signatures should be used for each function known to have different variants,
apply it to their application server initialization options and then run and
update the generic jenkins.war without further workarounds. See
the libzfs4j Git repository for
more details, including a script to try and "lock-pick" the configuration
needed for your particular distribution (in particular if your kernel updates
bring a new incompatible libzfs.so).
Also note that forks of the OpenZFS initiative may provide ZFS on various
BSD, Linux, and macOS distributions. Once Jenkins supports detecting ZFS
capabilities, rather than relying on the SunOS check, the above caveats for
ZFS integration with Jenkins should be considered.
After downloading, installing and running Jenkins using one of the procedures above, the post-installation setup wizard begins.
This setup wizard takes you through a few quick "one-off" steps to unlock Jenkins, customize it with plugins and create the first administrator user through which you can continue accessing Jenkins.
When you first access a new Jenkins instance, you are asked to unlock it using an automatically-generated password.
Browse to http://localhost:8080 (or whichever port you configured for
Jenkins when installing it) and wait until the Unlock Jenkins page appears.

From the Jenkins console log output, copy the automatically-generated alphanumeric password (between the 2 sets of asterisks).

Note:
The command: sudo cat /var/lib/jenkins/secrets/initialAdminPassword will print the password at console.
On the Unlock Jenkins page, paste this password into the Administrator
password field and click Continue.
Notes:
If you ran Jenkins in Docker in detached mode, you can access the Jenkins console log from the Docker logs (above).
The Jenkins console log indicates the location (in the Jenkins home directory) where this password can also be obtained. This password must be entered in the setup wizard on new Jenkins installations before you can access Jenkins’s main UI. This password also serves as the default admininstrator account’s password (with username "admin") if you happen to skip the subsequent user-creation step in the setup wizard.
After unlocking Jenkins, the Customize Jenkins page appears. Here you can install any number of useful plugins as part of your initial setup.
Click one of the two options shown:
Install suggested plugins - to install the recommended set of plugins, which are based on most common use cases.
Select plugins to install - to choose which set of plugins to initially install. When you first access the plugin selection page, the suggested plugins are selected by default.
| If you are not sure what plugins you need, choose Install suggested plugins. You can install (or remove) additional Jenkins plugins at a later point in time via the Manage Jenkins > Manage Plugins page in Jenkins. |
The setup wizard shows the progression of Jenkins being configured and your chosen set of Jenkins plugins being installed. This process may take a few minutes.
Finally, after customizing Jenkins with plugins, Jenkins asks you to create your first administrator user.
When the Create First Admin User page appears, specify the details for your administrator user in the respective fields and click Save and Finish.
When the Jenkins is ready page appears, click Start using Jenkins.
Notes:
This page may indicate Jenkins is almost ready! instead and if so, click Restart.
If the page does not automatically refresh after a minute, use your web browser to refresh the page manually.
If required, log in to Jenkins with the credentials of the user you just created and you are ready to start using Jenkins!
| From this point on, the Jenkins UI is only accessible by providing valid username and password credentials. |
This section describes how to install Jenkins on a machine that does not have an internet connection.
To install Jenkins itself, download the appropriate war file and transfer it to your machine.
Plugins are a different matter, due to dependency requirements.
The recommended approach is to use Plugin Installation Manager Tool.
If you want to transfer the individual plugins, you’ll need to retrieve all dependencies as well. There are several dependency retrieval scripts and tools on Github. For example:
install-plugins.sh - Bash script for managing plugins from the official Docker image for Jenkins
samrocketman/jenkins-bootstrap-shared - Java is required; packages Jenkins and plugins into an immutable package installer. Supported formats include: RPM, DEB, Docker. Can proxy Jenkins and plugins through Nexus or Artifactory since Gradle is used to assemble plugins.
Jenkins initialization can also be controlled by run time parameters passed as arguments. Command line arguments can adjust networking, security, monitoring, and other settings.
Jenkins networking configuration is generally controlled by command line arguments. The networking configuration areguments are:
| Command Line Parameter | Description |
|---|---|
|
Runs Jenkins listener on port $HTTP_PORT using standard http protocol.
The default is port 8080.
To disable (because you’re using https), use port |
|
Binds Jenkins to the IP address represented by $HTTP_HOST.
The default is 0.0.0.0 — i.e. listening on all available interfaces.
For example, to only listen for requests from localhost, you could use:
|
|
Uses HTTPS protocol on port $HTTPS_PORT. This option does not impact the root URL being generated within Jenkins logic (UI, JNLP files, etc.). It is defined by the Jenkins URL specified in the global configuration. |
|
Binds Jenkins to listen for HTTPS requests on the IP address represented by $HTTPS_HOST. |
|
Uses HTTP/2 protocol on port $HTTP_PORT. This option does not impact the root URL being generated within Jenkins logic (UI, JNLP files, etc.). It is defined by the Jenkins URL specified in the global configuration. |
|
Binds Jenkins to listen for HTTP/2 requests on the IP address represented by $HTTPS_HOST. |
|
Runs Jenkins to include the $PREFIX at the end of the URL. For example, set --prefix=/jenkins to make Jenkins accessible at http://myServer:8080/jenkins |
|
Runs Jenkins listener on port $AJP_PORT using standard AJP13 protocol.
The default is port 8009.
To disable (because you’re using https), use port |
|
Binds Jenkins to the IP address represented by $AJP_HOST. The default is 0.0.0.0 — i.e. listening on all available interfaces. |
|
Sets the http session timeout value to $SESSION_TIMEOUT minutes. Default to what webapp specifies, and then to 60 minutes |
Other Jenkins initialization configuration is also controlled by command line arguments. The miscellaneous configuration arguments are:
| Command Line Parameter | Description |
|---|---|
|
Assigns the password for user $USER. If Jenkins security is enabled, you must log in as a user who has an admin role to configure Jenkins. |
|
Assigns user $USER the admin role. The user can configure Jenkins even if security is enabled in Jenkins. See Securing Jenkins for more information. |
|
Jenkins passes all command line parameters to the Winstone servlet container. More information about Jenkins Winstone command line parameters is available from the Winstone Command Line Parameter Reference.
|
Be Careful with Command Line Parameters Jenkins ignores command line parameters it doesn’t understand instead of producing an error. Be careful when using command line parameters and make sure you have the correct spelling. For example, the parameter needed for defining the Jenkins administrative user is --argumentsRealm and not --argumentRealm.
|
Some Jenkins behaviors are configured with Java properties.
Java properties are set from the command line that started Jenkins.
Property assignments use the form -DsomeName=someValue to assign the value someValue to the property named someName.
For example, to assign the value true to a property testName, the command line argument would be -DtestName=true.
Refer to the detailed list of Jenkins properties for more information.
If you’re setting up Jenkins using the built-in Winstone server and want to use an existing certificate for HTTPS:
--httpPort=-1 \
--httpsPort=443 \
--httpsKeyStore=path/to/keystore \
--httpsKeyStorePassword=keystorePassword
The keystore should be in JKS format (as created by the JDK 'keytool')
and the keystore and target key must have the same password. (Placing
the keystore arguments after Jenkins-specific parameters does not seem
to work; either they are not forwarded to Winstone or Winstone ignores
them coming after unknown parameters. So, make sure they are adjacent to
the working --httpsPort argument.)
If your keystore contains multiple certificates (e.g. you are using CA signed certificate) Jenkins might end-up using a incorrect one. In this case you can convert the keystore to PEM and use following command line options:
--httpPort=-1 \
--httpsPort=443 \
--httpsCertificate=path/to/cert \
--httpsPrivateKey=path/to/privatekey
The HTTP/2 protocol allows web servers to reduce latency over encrypted connections by pipelining requests, multiplexing requests, and allowing servers to push in some cases before receiving a client request for the data. The Jetty server used by Jenkins supports HTTP/2 with the addition of the Application-Layer Protocol Negotiation (ALPN) TLS extension. The ALPN TLS extension is connected to the specific Jetty version and has specific requirements depending on the Java version.
Java 11, Java 8 update 252 and Java 8 versions after update 252 can run the ALPN TLS extension by installing the Jetty ALPN java server jar and passing it as a java command line argument. Steps to install the extension are:
Identify the Jetty version included in your Jenkins server by searching the Jenkins startup log for the string org.eclipse.jetty.server.Server#doStart. For example:
org.eclipse.jetty.server.Server#doStart: jetty-9.4.27.v20200227
Locate the Java version on the "System Information" page of "Manage Jenkins" to confirm it is Java 11 or 8u252 (or later)
Download the jetty-alpn-java-server with the version number matching the Jetty version bundled with your Jenkins version
Place the jetty-alpn-java-server.jar file in a directory accessible to the JVM
Add --extraLibFolder=/path/to/extra/lib/folder to the Java command line arguments that start Jenkins
java --extraLibFolder=/opt/java/jetty-alpn-java-server-9.4.27.v20200227.jar \
-jar target/jenkins.war \
--http2Port=9090
Java 8 update 242 and earlier can run the ALPN TLS extension by installing the Jetty ALPN boot library corresponding to the exact OpenJDK version you are using into the Java boot classpath. Steps to install the extension are:
Identify the Java version running your Jenkins server from the "Manage Jenkins" → "System Information" page
Find the boot library for your OpenJDK version
Download the matching alpn-boot.jar file to a directory accessible to the JVM
Add the alpn-boot.jar to the JVM boot classpath by adding -Xbootclasspath/p:/path/to/alpn-boot.jar to the Java command line arguments that start Jenkins
java -Xbootclasspath/p:/opt/java/alpn-boot-8.1.13.v20181017.jar \
-jar target/jenkins.war \
--http2Port=9090
These instructions use a stock Jenkins installation on Windows Server. The instructions assume a certificate signed by a Certificate Authority such as Digicert. If you are making your own certificate skip steps 3, 4, and 5.
This process utilizes Java’s keytool.
Use the Java keytool included with your Java installation.
Step 1: Create a new keystore on your server. This will place a 'keystore' file in your current directory.
C:\>keytool -genkeypair -keysize 2048 -keyalg RSA -alias jenkins -keystore keystore
Enter keystore password:
Re-enter new password:
What is your first and last name?
[Unknown]: server.example.com
What is the name of your organizational unit?
[Unknown]: A Unit
What is the name of your organization?
[Unknown]: A Company
What is the name of your City or Locality?
[Unknown]: A City
What is the name of your State or Province?
[Unknown]: A State
What is the two-letter country code for this unit?
[Unknown]: US
Is CN=server.example.com, OU=A Unit, O=A Company, L=A City, ST=A State, C=US correct?
[no]: yes
Enter key password for <jenkins>
(RETURN if same as keystore password):
Step 2: Verify the keystore was created (your fingerprint will vary)
C:\>keytool -list -keystore keystore
Enter keystore password:
Keystore type: JKS
Keystore provider: SUN
Your keystore contains 1 entry
jenkins, May 6, 2015, PrivateKeyEntry,
Certificate fingerprint (SHA1): AA:AA:AA:AA:AA:AA:AA:AA:AA:AA ...
Step 3: Create the certificate request. This will create a 'certreq.csr' file in your current directory.
C:\>keytool -certreq -alias jenkins -keyalg RSA ^
-file certreq.csr ^
-ext SAN=dns:server-name,dns:server-name.your.company.com ^
-keystore keystore
Enter keystore password:
Step 4: Use the contents of the certreq.csr file to generate a
certificate from your certificate provider. Request a SHA-1 certificate
(SHA-2 is untested but will likely work). If using DigiCert, download
the resulting certificate as Other format "a .p7b bundle of all the
certs in a .p7b file".
Step 5: Add the resulting .p7b into the keystore you created above.
C:\>keytool -import ^
-alias jenkins ^
-trustcacerts ^
-file response_from_digicert.p7b ^
-keystore keystore
Enter keystore password:
Certificate reply was installed in keystore
Step 6: Copy the 'keystore' file to your Jenkins secrets directory. On a stock installation, this will be at
C:\Program Files (x86)\Jenkins\secrets
Step 7: Modify the <arguments> section of your
C:\Program Files (x86)\Jenkins\jenkins.xml file to reflect the new
certificate. Note: This example disables http via --httpPort=-1 and
places the server on 8443 via --httpsPort=8443.
<arguments>
-Xrs
-Xmx256m
-Dhudson.lifecycle=hudson.lifecycle.WindowsServiceLifecycle
-jar "%BASE%\jenkins.war"
--httpPort=-1
--httpsPort=8443
--httpsKeyStore="%BASE%\secrets\keystore"
--httpsKeyStorePassword=your.password.here
</arguments>
Step 8: Restart the jenkins service to initialize the new configuration.
net stop jenkins
net start jenkins
Step 9: After 30-60 seconds, Jenkins will have completed the startup process and you should be able to access the website at https://server.example.com:8443. Verify the certificate looks good via your browser’s tools. If the service terminates immediately, there’s an error somewhere in your configuration. Useful error information can be found in:
C:\Program Files (x86)\Jenkins\jenkins.err.log
C:\Program Files (x86)\Jenkins\jenkins.out.log
Please submit your feedback about this page through this quick form.
Alternatively, if you don't wish to complete the quick form, you can simply indicate if you found this page helpful?
See existing feedback here.