×
It includes instructions for setting up Blue Ocean on your Jenkins instance, how to access the Blue Ocean UI, and returning to the Jenkins classic UI. Blue ...
Missing: control/ | Show results with:control/
Manage Jenkins » System » Global Pipeline Libraries as many libraries as necessary can be configured. Add a Global Pipeline Library. Since these libraries will ...
Click your name on the top right corner on every page, then click "Configure" to see your API token. (The URL $root/me/configure is a good shortcut.) You can ...
Missing: control/ | Show results with:control/
This throws an exception if the user accessing this URL doesn't have Administer permission. If the administrator configured no security mechanism, the ...
Missing: book/ | Show results with:book/
User Content · Note that these files are not subject to any access controls beyond requiring Overall/Read access. · See Git userContent plugin for how to manage ...
Missing: permissions/ | Show results with:permissions/
Cross-Site Request Forgery (CSRF or XSRF) is a type of security vulnerability in web applications. Without protection from CSRF, a Jenkins user or ...
Missing: permissions/ | Show results with:permissions/
Kubernetes (K8s) is an open-source system for automating deployment, scaling, and management of containerized applications. A Kubernetes cluster adds a new ...
Agents manage the task execution on behalf of the Jenkins controller by using executors. An agent is a small (170KB single jar) Java client process that ...
Missing: permissions/ | Show results with:permissions/
Random: The TCP port is chosen at random to avoid collisions on the Jenkins controller. The downside to randomized ports is that they are chosen during the ...
Prerequisites · Creating a key pair · Creating a security group · Launching an Amazon EC2 instance · Installing and configuring Jenkins. Connecting to your Linux ...
Missing: book/ | Show results with:book/