Improving Business Deliveries for Micro-Services-Based Systems Using CI/CD and Jenkins

Jump To References Section

Authors

  • School of Computer Science, University of Petroleum & Energy Studies, Dehradun ,IN
  • School of Computer Science, University of Petroleum & Energy Studies, Dehradun ,IN
  • School of Computer Science, University of Petroleum & Energy Studies, Dehradun ,IN
  • Graphic Era Hill University, Dehradun ,IN
  • Manipal University Jaipur, Jaipur ,IN

DOI:

https://doi.org/10.18311/jmmf/2023/33936

Keywords:

Version Control System, Git, Subversion, Micro-Service, Kubernetes, Container, Jenkins, Spring Boot, Monolithic, CI/CD.

Abstract

Micro-services architecture has changed the paradigm of software designing and software development behaviour as they are lightweight, easy adoptable, faster to be built and deploy at business servers. The nature of today’s market changes so abruptly that the software industry faces problems or impediments to hit the market demand due to complex, large, monolith clumsy applications which are complex to be broken easily and eventually fails to hit time-to-market approach. In this work, a novel migration approach has been proposed to improve the business deliveries and cover time-to-market approach by using advanced Continuous Integration and Continuous Delivery process and sophisticated Devops and cloud tools like Jenkins, Git and Amazon cloud which has micro-services deployed in the containerization form. Finally, a model and a robust system has been investigated and proposed in terms of decomposition, testing, security, performance, inter service communication, persistence, transaction management aspects. The whole analysis revolved around to propose a novel approach to how to reduce the build and deployment time and make the end business product available to end customer in a faster and rapid way.

Downloads

Download data is not yet available.

Metrics

Metrics Loading ...

Downloads

Published

2023-06-01

How to Cite

Singh, V., Singh, A., Aggarwal, A., Aggarwal, S., & Chaudhary, H. (2023). Improving Business Deliveries for Micro-Services-Based Systems Using CI/CD and Jenkins. Journal of Mines, Metals and Fuels, 71(4), 545–551. https://doi.org/10.18311/jmmf/2023/33936

Issue

Section

Articles

 

References

Goyal M.K. et al. (2012): QoS based trust management model for Cloud IaaS. In: 2nd Inter. Conf. on PDGC, pp. 843-847.

Kumar A., Krishan G. et al. (2016): Design and Analysis of Lightweight Trust Mechanism for Secret Data using Lightweight Cryptographic Primitives in MANETs. Inter. Jour. of N/w Security; 18 (1): 1-18.

V. Singh, A. Singh, A. Aggarwal and S. Aggarwal (2021): Dev-Ops based migration aspects from Legacy Version Control System to Advanced Distributed VCS for deploying Micro-services. In: 2021 IEEE International Conference on Computation System and Information Technology for Sustainable Solutions (CSITSS), pp.1-5.

Kumar A., Krishan G. et al. (2015): A Novel Trusted Hierarchy Construction for RFID-Sensor Based Secure Mobile Ad Hoc NETworks (MANETs) using Error Correcting Codes (ECCs). Electronics Tele. Research Instt. Journal 2015, 37 (1):186-196.

Kumar Adarsh et al. (2013): Outlier Detection and Treatment for Lightweight Mobile Ad Hoc Networks. Lect. Notes of the Instt.for Comp. Sc., Social Info.& Tele. Engg, 115, pp 750-763.

Kumar A, Aggarwal A, Charu. (2012): Efficient Hierarchical Threshold Symmetric Group Key Management Protocol for Mobile Ad Hoc Networks. In: Parashar et al. (eds) Contem. Computing, Commu. in Computer and Infor. Sc., 306, pp. 335-346.

Kumar A, Krishan G, and Aggarwal A. (2017): A Novel Lightweight Key Management Scheme for RFID-Sensor integrated Hierarchical MANET based on Internet of Things. Inter. Jour. of Adv. Intel. Paradigms; 9 (2-3): 220-245.

Aggarwal Alok, Singh Vinay and Kumar Narendra. (2022): A Rapid Transition from Subversion to Git: Time, Space, Branching, Merging, Offline Commits & Offline builds and Repository Aspects. Recent Advances in Computer Science and Communications, 15(5).

Vinay Singh, Alok Aggarwal, Narendra Kumar, A. K. Saini. (2021): A Novel Approach for Pre-Validation, Auto Resiliency & Alert Notification for SVN To Git Migration Using Iot Devices. PalArch’s Journal of Arch. of Egypt/Egyptology, 17 (9): 7131 - 7145.

Kumar A., Krishan G., et al. (2014): Design and Analysis of Lightweight Trust Mechanism for Accessing Data in MANETs. KSII Trans. on Internet and Infor. Systems; 8 (3): 1119-1143.

V. Singh, A. Singh, A. Aggarwal and S. Aggarwal. (2021): A digital Transformation Approach for Event Driven Micro-services Architecture residing within Advanced vcs. In: 2021 International Conference on Disruptive Technologies for Multi-Disciplinary Research and Applications (CENTCON), pp. 100-105.

Kumar A, Krishan G, et al. (2014): Simulation and Analysis of Authentication Protocols for Mobile Internet of Things (MIoT). In: Proc. 3rd Inter. Conf. on PDGC, pp. 423-428.

Gupta P et al. Trust and reliability based scheduling algorithm for cloud IaaS. In: Lect. Notes in Elec. Engg. 2013, 150, pp.603-607.

Kumar A., Aggarwal A. (2012): Lightweight Cryptographic Primitives for Mobile Ad Hoc Networks. Recent Trends in Comp. Net. & Distributed Systems Security Comm. in Computer and Infor. Science; 335: 240-251.

Vinay Singh, Alok Aggarwal, Adarsh Kumar, and Shailendra Sanwal. (2019): The Transition from Centralized (Subversion) VCS to Decentralized (Git) VCS: A Holistic Approach. Journal of Electrical and Electronics Engineering, 12 (1):7-15.

Kumar A, Aggarwal A, and Charu. (2012): Performance analysis of MANET using elliptic curve cryptosystem. In: 14th Inter. Conf. on Adv. Comm. Tech. (ICACT), pp.201-206.

Goyal MK, Aggarwal A. (2012): Composing Signatures for Misuse Intrusion Detection System Using Genetic Algorithm in an Offline Environment. In: N. Meghanathan et al. (eds) Adv. in Compu. and Infor. Tech., Adv. in Intelligent Systems and Comp., 176, pp 151–157.

Adarsh Kumar et al. (2012): A complete, efficient and lightweight cryptography solution for resource constraints Mobile Ad-Hoc Networks. In; Proc. PDGC, pp. 854-860.

Sangeeta Mittal et al. (2012): Application of Bayesian Belief Networks for context extraction from wireless sensors data. In: 14th Inter. Conf. on Advanced Comm. Tech. (ICACT), pp. 410-415.

N. Chugh et al. (2016): Security aspects of a RFID-sensor integrated low-powered devices for Internet-of-Things. In: 4th Inter. Conf. on PDGC, pp. 759-763.

Singh T. et al. (2017): A novel approach for CPU utilization on a multicore paradigm using parallel quicksort. In: 3rd Inter. Conf. on Compu. Intelligence & Comm. Tech. (CICT), pp. 1-6.

Kumar A., Gopal K., and Aggarwal A. (2016): Simulation and Cost Analysis of Group Authentication Protocols. In: Inter. Conf. on Contemporary Computing, pp.1-7.

Chakradar M et al. (2021): A Non-invasive Approach to Identify Insulin Resistance with Triglycerides and HDL-c Ratio using Machine learning. Neural Processing Letters, 52 (3).

Mittal S. et al. (2012): Situation recognition in sensor based environments using concept lattices. In: Proc. Inter. Infor. Tech. Conf., pp.579-584.

Kumar A. and Aggarwal A. (2019): An Efficient Simulated Annealing based Constrained Optimization Approach for Outlier Detection Mechanism in RFID-Sensor Integrated MANET. Inter. Jour. of Computer Infor. Systems and Indus. Mgt. App; 11: 55-64.

V. Singh and A. Aggarwal. (2014): Performance analysis of middleware distributed and clustered systems (PAMS) concept in mobile communication devices using Android operating system. In: 2014 International Conference on Parallel, Distributed and Grid Computing, pp. 345-349.