This agent is offline because Jenkins failed to launch the agent process on it.
Each section covers the upgrade from the previous LTS release, the section on 2.346.1 covers the upgrade from 2.332.4.
install-plugins.sh
removedThe install-plugins.sh
script in the Docker image of the controller has been deprecated for over 18 months.
It has been replaced in the Docker image with a script that directs the user to use the plugin installation manager tool.
The plugin installation manager tool is available in the image as jenkins-plugin-cli
.
The plugin installation manager tool provides more information about the plugins they are downloading, such as available updates and security warnings.
The plugin installation manager tool handles Jenkins version requirements and dependency management better than the install-plugins.sh
script did.
See the plugin installation manager documentation for more details.
Scalable vector graphics images are used in Jenkins instead of the GIF and PNG images that were used previously. SVG images provide a better user experience and improve the Jenkins user experience.
The GIF and PNG images have been removed from Jenkins core.
Ensure all your plugins are the most recent release before updating core, otherwise images may be missing. Check for new plugin versions immediately after the core update and install available updates.
The Java Native Runtime (JNR) library has been removed from Jenkins core. Users of PAM Authentication must upgrade to at least version 1.7. Users of CloudBees File Leak Detector must upgrade to at least version 1.7.
Users of Maven Repository Scheduled Cleanup do not have a compatible upgrade. They should remove the plugin.
In previous versions of Jenkins, a self-signed certificate was used if no HTTPS keystore was specified when processing HTTPS inside the Jenkins java process. This feature has been removed.
If HTTPS or HTTP/2 is being processed directly by the Jenkins java process, an HTTPS keystore must be configured by adding the --httpsKeyStore=path/to/keystore
and --httpsKeyStorePassword=keystorePassword
arguments.
This change does not affect HTTPS processing that is performed in reverse proxies like Nginx and Apache HTTP Server.
See HTTPS with an existing certificate and HTTPS certificates with Windows for more information on creating a key store.
Jenkins now rejects connections from agents with unsupported Remoting versions. When an agent with a Remoting version older than 3.14 connects to the Jenkins controller, the agent connection is rejected. The agent status page will show the message:
This agent is offline because Jenkins failed to launch the agent process on it.
Agents with unsupported Remoting versions can be allowed to connect to the controller by setting the hudson.slaves.SlaveComputer.allowUnsupportedRemotingVersions
system property to true.
Administrators that want more information about agent versions can install the Version Node Monitors plugin. It displays the remoting version of the connected agent in the "Nodes" page and can be configured to require matching Remoting versions, matching Java versions, and more.
Alpine Linux is not a GNU/Linux distribution; unlike GNU/Linux distributions, Alpine uses musl and BusyBox instead of the more commonly used GNU C Library and GNU Core Utilities. Previous versions of Java required the GNU C Library; therefore, the Jenkins project previously delivered Alpine images with the GNU C Library. Recent versions of Eclipse Temurin for Alpine do not require the GNU C Library; therefore, the Jenkins project has removed the now-unused GNU C Library from its Alpine images.
Users who run jobs on the controller, which is not recommended, may experience issues if they were running binaries linked against the GNU C Library. In particular, the use of a Global Tool Configuration (e.g., Node.js or Java) downloading binaries linked against the GNU C Library will result in errors like the following on the controller:
env: 'node': No such file or directory
The recommended solutions are, in order of preference:
Do not run jobs on the controller’s built-in node (recommended); instead, run them on an agent.
If you must run jobs on the controller and want to use generic third-party binaries that require the GNU C Library, use the Debian or Debian Slim Docker images rather than the Alpine image.
If you must run jobs on the controller and want to keep using the Alpine Docker image, build a custom Docker image that extends from the official Alpine Docker image, then either (a) install the packages you want from Alpine’s repositories with apk(1)
or (b) install the GNU C Library and use Global Tool Configuration to download and run binaries linked against the GNU C Library.