Home | Amazing | Today | Tags | Publishers | Years | Account | Search 
Beginning Jenkins Blue Ocean: Create Elegant Pipelines With Ease

Buy
Dive deep into Jenkins Blue Ocean and discover how easy creating a pipeline can be. You’ll see how Blue Ocean provides a better user experience when designing, running, and visualizing pipelines. This book shows you its intuitive user interface and its powerful pipeline editor and how this makes it a tool for everyone.

Beginning Jenkins Blue Ocean starts with an introduction to Blue Ocean, followed by a step-by-step guide on how to set it up. You’ll learn how to create a pipeline for every branch and pull request on your Git, GitHub, and GitLab repositories. You'll experience the improved pipeline visualization and log diagnosis features in Blue Ocean. 


Later you will go beyond the visual pipeline editor to learn the declarative syntax and gain better control over your pipelines. Then, you'll take a look at some tools to enable you to write pipeline code in the declarative syntax. You will also learn to extend delivery pipelines with Jenkins shared libraries.



What You Will Learn
  • Discover Jenkins Blue Ocean and how to use it
  • Create elegant pipelines using the visual pipeline editor
  • Work with the declarative pipeline syntax 
  •  
  • Use tools that help you write declarative pipeline code 
  • Extend pipelines with Jenkins shared libraries
  • Visualize pipelines from classic Jenkins in Blue Ocean
  • Configure and view test results in Blue Ocean
  • Accurately diagnose pipeline failures using improved pipeline visualization
  • Create multibranch pipeline projects for your Git, GitHub, and GitLab repositories


Who This Book Is For


Those new to Jenkins who are looking for an easy introduction. The book will also be useful for readers familiar with classic Jenkins and would like to learn Jenkins Blue Ocean.

(HTML tags aren't allowed.)

Data Mining and Machine Learning in Cybersecurity
Data Mining and Machine Learning in Cybersecurity

In the emerging era of Web 3.0, securing cyberspace has gradually evolved into a critical organizational and national research agenda inviting interest from a multidisciplinary scientific workforce. There are many avenues into this area, and, in recent research, machine-learning and data-mining techniques have been applied to design,...

Learning Red Hat Linux, 2nd Edition
Learning Red Hat Linux, 2nd Edition
The economics of the free software business has taken another football bounce with the release of O'Reilly's Learning Red Hat Linux, a guide to the most popular distribution of the freely redistributable operating system. The bounce is this: for the typical tech-book list price of $35, you get Bill McCarty's beginners' survey and...
Better Available Light Digital Photography, Second Edition: How to Make the Most of Your Night and Low-Light Shots
Better Available Light Digital Photography, Second Edition: How to Make the Most of Your Night and Low-Light Shots

When learning and refi ning their skills, most photographers progress through three distinct phases. The fi rst stage occurs immediately after they get their fi rst “good” camera and begin discovering the potential of the medium. During this time, novice shooters photographically explore their world with a high level of...


Synthetic Biology
Synthetic Biology

This book provides a comprehensive, up-to-date overview of the  opportunities and challenges of the complex field of synthetic biology, which combines various scientific disciplines. The emerging field of synthetic biology employs biotechnological approaches to  recreate and enhance basic biological structures, intracellular...

Naked Employee, The: How Technology Is Compromising Workplace Privacy
Naked Employee, The: How Technology Is Compromising Workplace Privacy

Most people would be startled to know the many ways in which their employers are capable of intruding on privacy. Huge technological advances are steadily shrinking workers’ personal space, and it’s up to individuals to know which parts of their daily lives may fall under the corporate magnifying glass.

Corporations have the...

Inside Cyber Warfare: Mapping the Cyber Underworld
Inside Cyber Warfare: Mapping the Cyber Underworld
I was recently invited to participate in a cyber security dinner discussion by a few members of a well-known Washington, DC, think tank. The idea was that we could enjoy a fine wine and a delicious meal while allowing our hosts to pick our brains about this “cyber warfare stuff.” It seems that the new...
©2019 LearnIT (support@pdfchm.net) - Privacy Policy