Welcome to the slightly chaotic but manageable world of running Jenkins on AWS with a Bitnami image. If you want a CI CD server that does actual work without falling over, this guide walks you through the essentials with a sarcastic wink and practical steps. Expect security tips and a tiny amount of drama.
Gather this stuff before you go poking the cloud with a stick.
In the AWS Marketplace find the official Bitnami Jenkins image. Pick an instance size that fits your build needs. Small teams often begin with a t3 small and move up later when the builds get jealous of each other.
Create or reuse an EC2 key pair for SSH. Make a security group that opens port 22 for admin access and port 8080 for the Jenkins web UI. If the Bitnami image serves HTTP on port 80 add that too, but try not to make everything public like an open mic night.
Start the instance and wait a minute or two for cloud init tasks to finish. Record the public IP or public DNS for remote access. If you want the IP to persist attach an Elastic IP, otherwise enjoy surprises when you reboot.
SSH into the server with your key. Replace PUBLIC_IP with your instance address and mykey pem with your key file.
ssh -i mykey.pem bitnami@PUBLIC_IP
Find the initial Jenkins password in the Bitnami credentials file or the Jenkins secrets folder. For example run this command on the server.
sudo cat /opt/bitnami/jenkins/jenkins_home/secrets/initialAdminPassword
Open the web UI at the public IP on port 8080 and paste the initial password when asked. Unlock Jenkins, accept the suggested plugins to get a sensible default, and create your first admin user. Yes it is kind of magical and yes you should write the password down properly this time.
For build artifacts and to avoid losing configuration when you terminate an instance attach an EBS volume. The quick workflow is attach the volume, format it if needed, mount it under a path like /mnt/jenkins, then move Jenkins data into that volume and update fstab for persistence.
sudo mkfs -t ext4 /dev/xvdf
sudo mkdir -p /mnt/jenkins
sudo mount /dev/xvdf /mnt/jenkins
sudo chown -R bitnami:bitnami /mnt/jenkins
Public HTTP on 8080 is fine for experiments but not for anything you want to tell people about. Use Certbot to get a certificate and configure the bundled web server or a reverse proxy to terminate HTTPS. You will need a domain that points to the instance or to a load balancer in front of it.
Bitnami makes a fast path to running Jenkins on EC2 and this setup gets you from zero to CI in one tidy session. You handled SSH keys and security groups like a pro or at least like someone who reads instructions. Next steps are configuring pipelines, securing secrets, and deciding which build job gets promoted to favorite.
I know how you can get Azure Certified, Google Cloud Certified and AWS Certified. It's a cool certification exam simulator site called certificationexams.pro. Check it out, and tell them Cameron sent ya!
This is a dedicated watch page for a single video.