Skip to main content

Jenkins Agent Service via Systemd

·232 words·2 mins
System-Administration Linux Windows
Table of Contents

First is of course to build a user to run the jenkins agent. Having an agent run as root or the regular user account is just asking for serious trouble, as any job that is run could contain malicious intent if the source repositories aren’t monitored closely. This user should have their own home directory, so that the Jenkins agent jar and working directories can be kept safely isolated there. However, don’t give a password, so that no one can login in externally directly to them, as in some cases you may give them some sudo access to certain directories, such as to docker.

$ useradd -m jenkins-runner

Now, create an entry in /etc/systemd/system directory to create a systemctl service that outlines it’s properties, such that it can be maniuplated like any other service. Be sure to add the user to run the service as.

Description=Jenkins Runner

ExecStart=/usr/bin/java -jar /home/jenkins-runner/agent.jar -jnlpUrl <url>/slave-agent.jnlp -secret <key> -workDir "/home/jenkins-runner/jenkins"


After, call systemctl daemon-reload to find the new service file, then using the typical commands of start/stop/enable/disable will act accordingly for the service.

Give non-sudo access to docker

How to allow use of docker a non-privileged user?

Best case is to use/create the docker group that has automatic non-sudo access to docker itself.

$ groupadd docker
$ gpasswd -a jenkins-runner docker
# Refresh user groups
$ newgrp docker