Skip to main content
The Jira Data Center (DC) connector enables you to index and search content from your self-hosted Jira Data Center instance within Glean. The connector provides secure, permission-respecting access to issues, projects, and related metadata. The connector strictly mirrors Jira’s own Role-Based Access Control (RBAC), ensuring that project and issue-level permissions are enforced in Glean search results. This allows users to find critical incidents and project data quickly without compromising security.

Supported objects

ObjectsDescription
ProjectsAll Jira projects accessible to the service account.
Issues & CommentsAll issues and their associated comments within accessible projects.
IdentityUsers, groups, and group memberships required for permission mapping.
ActivityView events and update events (via webhook) to keep the index current.

Supported API endpoints

PurposeEndpointPermission
Get users from groupgroup/memberJira Administrators
Find groupsgroups/picker
Get issueissues
Get issue security level membersissue security schemes_members
Get projectprojects
Get project issue security schemeprojects/issuesecuritylevelschemeAdminister Projects
Get project permission schemeprojects/permissionschemeAdminister Projects
Get project role for projectprojects/rolesAdminister Projects
Search for issues using JQLsearch
Get request typesservicedesk/projectKey:s/requesttype
Get request type fieldsservicedesk/projectKey:s/requesttype/field
Search for filtersfilter/search
Get filterfilters
List projectsproject
Get user groupsuser
Register a webhookBefore Jira DC 10: webhooks/1.0/webhook After Jira DC 10: jira-webhook/1.0/webhooksJira Administrators
Configure a webhook URL to send Update eventsconfigure
Get issue security schemes for older Jira DC versions/issue_security_scheme_members

Limitations

  • Unsupported objects: Dashboards and filters are not supported due to API limitations in Jira Data Center.
  • Access: The connector cannot index content that the service account cannot access (e.g., restricted issues or projects).
  • Advanced permissions: The connector does not support advanced permission scenarios like user-custom-fields and group-custom-fields in issue security.
  • Authentication: OAuth is supported but not through the standard self-serve flow; basic authentication (username/password) is the default.

Crawling and activity strategy

Glean uses a mixed strategy of periodic crawls and real-time event updates to maintain data freshness.
Crawl TypeFrequencyWebhook requiredNotes
Content (Issues, Projects)Configurable (Default: Full every 7 days, Incremental every 3 hours)YesIncremental crawls capture changes since the last crawl.
Identity (Users, Groups)HourlyNoCaptures user/group membership changes.
View ActivityReal-timeYes (Requires Glean activity plugin)Provides highly personalized search results based on user views.

API rate limit configuration

  • The API rate is set to 10 Queries Per Second (QPS) by default.
  • For reasonable data freshness on larger Jira instances, Glean recommends configuring the rate to at least 10 QPS.
  • You can increase this rate in the connector setup page, balancing the need for freshness against your Jira Data Center instance’s capacity.

Requirements

Proper setup in both Jira and Glean is essential for secure and reliable operation.

Technical Requirements

  • Jira version: Jira Data Center (self-hosted) instance, version 8.0.0 or higher.
  • Network: Network connectivity must be established between Glean and your Jira DC instance. (Glean instance IPs must be allowlisted in your firewall.)
  • Glean Plugin: The Glean activity plugin must be installed in Jira (see table below for version compatibility).
    Jira DC versionRequired plugin version
    < 9.0.0≤ 1.6.1
    ≥ 9.0.0 and < 10.0.01.7.0
    ≥ 10.0.0≥ 2.0.0

Service account and permissions

  • Jira Data Center (DC) utilizes three key permission types relevant to connector access: two global permissions (Jira System Administrators and Jira Administrators) and one project permission (Administer Projects).
  • The Glean service account needs at least the Jira Administrators global permission. The built-in jira-administrators group grants both global permissions by default.
  • You must create a dedicated service account in Jira for the connector. The required permissions depend on your chosen setup path:
Privilege LevelRequired GroupPermissions/Scopes
Recommended Setup (Admin)Add service account to the jira-administrators group.Grants the Jira Administrators global permission by default, which simplifies setup by enabling automatic webhook and plugin configuration.
Minimum Required (Non-Admin Path)Browse Issues for all projects to be indexed, and Browse users and groups global permission.Provides the essential read access required for the crawler to function without full admin privileges.

Setup instructions

Perform the following steps to connect your Jira DC instance to Glean:

1. Prepare credentials and service account

Perform the following steps in Jira:

Step 1: Create a service account

  1. Sign in to Jira as an administrator.
  2. Navigate to User Management.
  3. Create a new user by entering a username, email, and password. This will serve as the Glean service account.

Step 2: Assign administrative permissions

  1. Click Edit Groups for the service account.
  2. Add the service account to the jira-administrators group. This permission is required for the Glean Crawler to function and for automatic webhook setup.
  3. For Issue Security: To ensure the service account can crawl issues that have an issue security level attached, add the service account to all relevant issue security levels.

Step 3: Install the Glean activity extension

  1. Install the Glean activity extension from the Atlassian Marketplace.
  2. Follow the installation instructions provided on the Marketplace page.

2. Configure connector settings

Navigate to the Jira Data Center connector setup page in the Glean Admin Console and provide the following details:

Step 4: Provide instance and access details

  1. Base URL: Enter the server’s base URL (e.g., https://jira.mydomain.com). Ensure you include the correct protocol (http or https) and exclude any trailing slash.
  2. Additional domains: Enter all supplementary URLs for your Jira instance as a comma-separated list (e.g., domain1.com,domain2.com). Do not include the base URL.
  3. Product access group(s): Enter the group(s) containing all Jira users (e.g., jira-software-users) as a comma-separated list.
  4. API calls per second: Enter the number of API calls per second supported by your Jira instance.

Step 5: Enter service account credentials

  1. Service account username: Enter the username of the service account created in Step 1.
  2. Service account password: Enter the password of the service account created in Step 1.
    • (Note: Ensure you enter the correct username, as it may differ from the email address.)

Step 6: Configure network and webhook

  1. Local/VPC hosting: If your Jira instance is hosted within your VPC and is not internet-exposed:
    • Enter the server’s Hostname and IP address in the Server Host and Server IP fields.
  2. Network/SSL configuration: If you plan to resolve the hostname using a nameserver or update an SSL certificate, configure them under Settings → Networking Management. In this case, you do not need to specify the Server IP.
  3. Glean extension confirmation: Check the Activity Extension installed checkbox.

Step 7: Finalize setup

Click Save to complete the configuration. Because the service account is in the jira-administrators group, Glean will automatically set up the webhook and configure the extension after installation.

FAQs

This can occur for several reasons. Confirm the following:
  • Confirm the protocol is included along with the domain for Base URL
  • Confirm Queries per second (QPS) value is entered as a small, non-blank value - 10 can be used if you are unsure what to set
  • Confirm your Glean instance IPs have been added to the allowlist within Jira DC. Contact Glean Support to retrieve your instance’s NAT IP and public proxy external IP.
  • Ensure that traffic is allowed across your network for your instance’s NAT IP and public proxy external IP.
This status is expected for up to 15 minutes. If this status persists for more than 15 minutes, contact Glean Support for further assistance.

Troubleshooting and advanced notes

  • Network and IP allowlisting: If your Jira DC instance is behind a firewall, allowlist Glean’s public proxy external IP/private proxy IP and NAT IP to ensure crawls and health checks succeed.
  • Issue security enforcement: For proper Issue Security enforcement, ensure the latest compatible Glean activity plugin is installed and that the related configuration for enforcing issue security is enabled in Glean.
  • Non-admin setup path: The non-admin path is supported but requires manual configuration of webhooks and plugin endpoints by the Jira Administrator. This path is slower and requires coordination between the Jira team and the Glean team.
Last updated: November 2025