Login Credentials
Default credential information is available on this page.
Jenkins Administrator Credentials
The default username and password for the Jenkins administrator are as follows:
- User:
admin - Password:
El4stic123
Change the Jenkins Administrator Credentials
In CloudOps for Kubernetes release 3.2.x or higher, the Jenkins administration username and password can be controlled by variables in your docker-compose.override.yml file.
- Variable
TF_VAR_jenkins_admin_usernamecan be used to modify the administration user's username. - Variable
TF_VAR_jenkins_admin_passwordcan be used to modify the administration user's password.
Follow the below procedure to update either the username or password:
- Identify a maintenance window during which no Jenkins jobs will be running to apply the change. The Jenkins server pod will be restarted when the change is applied, causing any running jobs to fail.
- Obtain the most recent copy of the
docker-compose.override.ymlfile for your CloudOps for Kubernetes cluster. - Modify one or both of the
TF_VAR_jenkins_admin_usernameandTF_VAR_jenkins_admin_passwordvariables. If the desired variable does not exist in your copy ofdocker-compose.override.yml, then you can add it. The values need to be specified in plain-text. - (Optional) Set variable
TF_VAR_rebuild_nodegroupstofalseto avoid unnecessary work. - Follow the procedure described in Updating Cluster Configuration to apply the change.
Jenkins Non-Administrator Credentials
In CloudOps for Kubernetes release 3.5.x or higher, additional Jenkins users with different levels of non-administrator privileges are available. The non-administrator accounts should be used by most users, depending on the level of job access they require. These accounts cannot reconfigure Jenkins in any way.
| Default User Name | Default Password | Description |
|---|---|---|
poweruser | Poweruser123 | Power User can view, run, and configure all jobs, and can read all build output |
developer | Developer123 | Developer User can view and run all jobs, and can read all build output |
viewer | Viewer123 | Viewer User can view all jobs, and can read all build output |
Change the Jenkins Non-Administrator Credentials
The usernames and passwords for Jenkins non-administrator users can be controlled by variables in your docker-compose.override.yml file.
| Username Variable | Password Variable |
|---|---|
TF_VAR_jenkins_poweruser_username | TF_VAR_jenkins_poweruser_password |
TF_VAR_jenkins_developer_username | TF_VAR_jenkins_developer_password |
TF_VAR_jenkins_viewer_username | TF_VAR_jenkins_viewer_password |
Follow the below procedure to update either the username or password:
- Identify a maintenance window during which no Jenkins jobs will be running to apply the change. The Jenkins server pod will be restarted when the change is applied, causing any running jobs to fail.
- Obtain the most recent copy of the
docker-compose.override.ymlfile for your CloudOps for Kubernetes cluster. - Modify one or both of the Username and Password variables found in the table above. If the desired variable does not exist in your copy of
docker-compose.override.yml, then you can add it. The values need to be specified in plain-text. - (Optional) Set variable
TF_VAR_rebuild_nodegroupstofalseto avoid unnecessary work. - Follow the procedure described in Updating Cluster Configuration to apply the change.
Jenkins Authorization Configuration
In CloudOps for Kubernetes release 3.6.0 or higher, the Jenkins authorization strategy configuration is sourced from an external file. This makes it easier to switch or customize authorization without modifying the out-of-the-box configuration files.
The authorization configuration file is selected by setting variable TF_VAR_jenkins_authorization_configuration_file in your docker-compose.override.yml file.
The following authorization configuration files are available out of the box:
default-role-based-authorization.yaml: the default configuration. This is equivalent to the previously provided matrix-based approach.default-matrix-authorization.yaml: the legacy matrix-based authorization strategy that was provided in release3.5.x.
Change the Jenkins Authorization Configuration
Follow the below procedure to update the authorization configuration:
- Identify a maintenance window during which no Jenkins jobs will be running to apply the change. The Jenkins server pod will be restarted when the change is applied, causing any running jobs to fail.
- Obtain the most recent copy of the
docker-compose.override.ymlfile for your CloudOps for Kubernetes cluster. - Set variable
TF_VAR_jenkins_authorization_configuration_fileto the authorization configuration file you want to use. If the variable does not exist in your copy ofdocker-compose.override.yml, then you can add it. - (Optional) Set variable
TF_VAR_rebuild_nodegroupstofalseto avoid unnecessary work. - Follow the procedure described in Updating Cluster Configuration to apply the change.
Use a Custom Authorization Configuration
You can create and use a custom authorization configuration file without modifying the out-of-the-box authorization files.
- Create a custom authorization configuration file suitable for Jenkins authorization strategy configuration-as-code. You can use
bootstrap/terraform/config/jenkins-authorization-config/default-role-based-authorization.yamlas a template. - Save the file under
bootstrap/terraform/config/jenkins-authorization-config/in your CloudOps for Kubernetes project. - Set variable
TF_VAR_jenkins_authorization_configuration_fileto your custom file name (for example,custom-authorization.yaml) in yourdocker-compose.override.ymlfile. - Follow the procedure described in Updating Cluster Configuration to apply the change.
Nexus Credentials
Nexus is the Maven artifact repository manager used in CloudOps for Kubernetes. The Nexus credentials are given below, and are as set in Sonatype’s official Nexus 2 Docker image:
- User:
admin - Password:
admin123