Archive for 5월, 2018

article/ at master · hatsari/article · GitHub


article/ at master · hatsari/article · GitHub


Usage – Ansible-CMDB


Usage – Ansible-CMDB

jenkins – change user id to include dot(.) char


add init.groovy.d/init.groovy

// SECURITY-786 change user id to include dot(.) char // default : /^[\w-]+$^[\w-\.]+$/

notice : hudson.model.HudsonPrivateSecurityRealm.ID_REGEX (X)


지메일을 오프라인으로 사용하는 법 – ITWorld Korea


지메일을 오프라인으로 사용하는 법 – ITWorld Korea

Continuous Delivery with Kubernetes the Hard Way


Continuous Delivery with Kubernetes the Hard Way

k8s and site mesh utube


Kubernetes for the Spring Developer


Kubernetes for the Spring Developer

When using tags in Jenkins Pipeline


When using tags in Jenkins Pipeline
// Jenkins Blog

One common pattern for automated releases I have seen and used relies on Git tags as the catalyst for a release process. The immutable nature of releases and the immutable nature of tags can definitely go hand in hand, but up until few months ago Jenkins Pipeline was not able to trigger effectively off of Git tags.

In this post I want to briefly share how to use tags to drive behaviors in Jenkins Pipeline. Consider the following contrived Jenkinsfile, which contains the three basic stages of Build, Test, and Deploy:

pipeline { agent any stages { stage('Build') { steps { sh 'make package' } } stage('Test') { steps { sh 'make check' } } stage('Deploy') { when { tag "release-*" } steps { echo 'Deploying only because this commit is tagged...' sh 'make deploy' } } } }

Of particular note is the when condition on the “Deploy” stage which is applying the tag criteria. This means the stage would only execute when the Pipeline has been triggered from a tag in Git matching the release-* Ant-style wildcard.

In practice, this means that all pull requests, and branch-based Pipeline Runs result in the stage being skipped:

Not Deployed!

When I push a release-1.0 tag, the Pipeline will then be triggerd and run the “Deploy” stage:


Out of the box, Pipelines won’t trigger off of the presence of tags, which means that a Multibranch Pipeline must have a configuration update to know that it must Discover Tags.


From the configuration screen of a Multibranch Pipeline (or GitHub Organization Folder), Discovering tags can be enabled by adding the appropriate “Behavior” to the Branch Source configuration:

Configuring the Multibranch Pipeline

CloudBees for ServiceNow | CloudBees


CloudBees for ServiceNow | CloudBees

kubernetes 에서 Pod 균등 분배하기 — Steemit


kubernetes 에서 Pod 균등 분배하기 — Steemit