Install and Configure Seeker Jenkins Plugin
The Seeker Jenkins plugin facilitates the integration of security testing in CI/CD processes by enabling an additional build step. This build step will cause a build failure upon detection of any critical or high vulnerability and generate a Seeker security report.
To install the plugin, perform the following steps:
-
Download the Jenkins plugin file by navigating to
<Seeker host>:<port>/rest/ui/installers/integrations/jenkins
. - Log on to your Jenkins instance as an administrator.
- Go to .
-
Upload the downloaded plugin file
SeekerJenkinsPlugin.hpi
to Jenkins.
To configure the plugin, you need an access token for Seeker APIs. For
instructions, see Configure Access Tokens.
- Go to Seeker Configuration. , and scroll to
- Enter Seeker Base URL and Access Token that you have generated.
- In the Jenkins dashboard, click your .
- Click .
-
Enter the following properties:
Property Description Project Keys A comma-separated list of project keys, for example:default,projectA,projectB. Fail on Detection Select a detection type on which the build should fail. For example, A verified vulnerability (Critical/High) is detected. Report Format Select a format for generating a vulnerability report. - Add and configure any number of additional build steps, as required for different projects and/or vulnerability detections.
- Click Save.