You are on page 1of 16

Introduction

Objective
Installation and Configuration
Users Creation and Authorization
Automation Process
Conclusion
1

2015 WIPRO LTD | WWW.WIPRO.COM | CONFIDENTIAL

Objective
Jenkins is a powerful automation platform that makes it relatively
straightforward to automate build testing and integration, so we are going to
take a quick guided tour of Jenkinss in upcoming slides.

Key features:
Developer time is focused on work that matters Much of the work of
frequent integrations is handled by automated build and testing systems,
meaning developer time isn't wasted on large-scale error-ridden integrations.
Software quality is improved Any issues are detected and resolved
almost immediately, keeping software in a state where it can be safely
released at any time.
Faster Development Integration costs are reduced both because
serious integration issues are less likely and because much of the work of
integration is automated.
Security on your Jenkins machine may not be a large concernyou may
simply want to prevent unidentified users tampering with your build job
configurations.
2

2015 WIPRO LTD | WWW.WIPRO.COM | CONFIDENTIAL

Installation and Configuration


Jenkins latest version can be downloaded from the
https://jenkins-ci.org with respect to operating system of
machine.

Application port can be configured by changing


Jenkins.xml file.

2015 WIPRO LTD | WWW.WIPRO.COM | CONFIDENTIAL

Users Creation and Authorization


Users Creation

The easiest way to manage user accounts in Jenkins is to use Jenkinss internal user database. It is a
good option if you want to have users configuration and Management.

Users who need to log on to the Jenkins server can sign up and create an account for themselves,
and, depending on the security model chosen, an administrator can then decide what these users are
allowed to do.

2015 WIPRO LTD | WWW.WIPRO.COM | CONFIDENTIAL

Users Creation and Authorization

AuthorizationWho Can Do What

Once you have defined how to identify your users, you need to decide what they are allowed to do.
Matrix-based security is a more sophisticated approach, where different users are assigned different
rights, using a role-based approach.

Once you have your admin user ready, you can activate matrix-based security by selecting
Matrix-based security in the Authorization section of the main configuration global security
page.

2015 WIPRO LTD | WWW.WIPRO.COM | CONFIDENTIAL

Difference between Admin and User


Administrator

Limited Access

2015 WIPRO LTD | WWW.WIPRO.COM | CONFIDENTIAL

Automation Process
Jenkins offer different types of Integration projects management but Freestyle
jobs let you execute a shell or batch command, run Maven or Ant, and invoke
other jobs. They provide a convenient run-time environment for system scripts or
any other kind of activity not readily available with Jenkins or one of its plugins.
Jenkins comes preinstalled with plugins for CVS and Subversion. Other version
control systems are supported by plugins that you can download from the Manage
Plugins screen.
For Demo, Automation project has implemented as two projects ( Build and
Deploy) with batch script as specified in next sections without subversion.

Project can be created with New Item option in Menu.

2015 WIPRO LTD | WWW.WIPRO.COM | CONFIDENTIAL

Automation Process
Build Project Configuration

2015 WIPRO LTD | WWW.WIPRO.COM | CONFIDENTIAL

Automation Process
Build Job

2015 WIPRO LTD | WWW.WIPRO.COM | CONFIDENTIAL

Automation Process
BwDeploy Project Configuration

10

2015 WIPRO LTD | WWW.WIPRO.COM | CONFIDENTIAL

Automation Process
BwDeploy Job

11

2015 WIPRO LTD | WWW.WIPRO.COM | CONFIDENTIAL

Automation Process
Tibco Administrator

12

2015 WIPRO LTD | WWW.WIPRO.COM | CONFIDENTIAL

ANT Configuration

13

2015 WIPRO LTD | WWW.WIPRO.COM | CONFIDENTIAL

ANT Job Creation

14

2015 WIPRO LTD | WWW.WIPRO.COM | CONFIDENTIAL

Job Execution
Ant Job has created with following steps.
1.
2.
3.
4.

15

Clean of temporary and existing ears,xml.


Creating of ear with build ear command.
Export xml from build ear using appmanage command
Deploy using appmanage.

2015 WIPRO LTD | WWW.WIPRO.COM | CONFIDENTIAL

16

2015 WIPRO LTD | WWW.WIPRO.COM | CONFIDENTIAL

You might also like