Networking Unplugged

Perspectives on cloud networking and SMB IT

Posted August 14, 2014
Categories Best Practices
Comments 0 Comments

Secure Cloud Bursting (Part 3): How to Deploy a Jenkins Slave to a Secure Cloud

As a big proponent of agile development and efficiency, our Networking Team Lead knew there was a way to eliminate cost inefficiencies in our infrastructure build. He engineered a secure cloud bursting process, using Pertino, Jenkins and Docker, to maximize these cost efficiencies while minimizing infrastructure complexity. Part three of a four part blog series explains the third step in this process—how to deploy a Jenkins Slave to a secure cloud.

Read more

Posted July 29, 2014
Comments 0 Comments

Secure Cloud Bursting (Part 2): How to Build a Jenkins Slave and Attach it to the Master

When our Networking Team Lead found out we were paying for unused build capacity every month, he couldn't rest until he figured out a way to eliminate the cost inefficiencies. In the process, he discovered a way to securely cloud burst using Pertino along with Jenkins and Docker, reducing our infrastructure complexity and spend. Part two of this four part series on secure cloud bursting explains how to build a Jenkins Slave and attach it to the Master.

Read more

Posted July 18, 2014
Categories Best Practices
Comments 0 Comments

Secure Cloud Bursting (Part 1): How to Build a Jenkins Master

How much of your public cloud build infrastructure sits unused? For software companies like us, this number could be as high as 60%. What a waste of money! A new generation of elastic cloud-based networks, in conjunction with Jenkins, allows organizations to reduce cost and infrastructure complexity via secure cloud bursting across multiple providers. Learn how you can do this at your organization over a series of blog posts. Here's the first.

Read more