Secure Cloud Bursting (Part 3): How to Deploy a Jenkins Slave to a Secure Cloud
As a big proponent of agile development and efficiency, our Networking Team Lead knew there was a way to eliminate cost inefficiencies in our infrastructure build. He engineered a secure cloud bursting process, using Pertino, Jenkins and Docker, to maximize these cost efficiencies while minimizing infrastructure complexity. Part three of a four part blog series explains the third step in this process—how to deploy a Jenkins Slave to a secure cloud.
Secure Cloud Bursting (Part 2): How to Build a Jenkins Slave and Attach it to the Master
When our Networking Team Lead found out we were paying for unused build capacity every month, he couldn't rest until he figured out a way to eliminate the cost inefficiencies. In the process, he discovered a way to securely cloud burst using Pertino along with Jenkins and Docker, reducing our infrastructure complexity and spend. Part two of this four part series on secure cloud bursting explains how to build a Jenkins Slave and attach it to the Master.
Secure Cloud Bursting (Part 1): How to Build a Jenkins Master
How much of your public cloud build infrastructure sits unused? For software companies like us, this number could be as high as 60%. What a waste of money! A new generation of elastic cloud-based networks, in conjunction with Jenkins, allows organizations to reduce cost and infrastructure complexity via secure cloud bursting across multiple providers. Learn how you can do this at your organization over a series of blog posts. Here's the first.