Cloud Build 프로듀서 네트워크가 비공개 저장소로 연결을 유지보수하는 VM에 할당하는 데 사용할 수 있는 VPC의 내부 IP 범위를 할당합니다.
Cloud Build에서 VPC 네트워크를 사용하려면 프리픽스 길이가 /23 이하여야 합니다(예: /22 또는 /21). 각 서비스 연결은 프리픽스 길이가 /24인 IP 범위를 신청하려고 하므로 이는 최소한 트리거와 작업자 풀 모두를 수용하기 위함입니다.
클래스 없는 도메인 간 라우팅(CIDR) 라우팅 표기법을 사용하여 STARTING_IP/SUBNET_PREFIX_SIZE 형식으로 범위를 지정할 수 있습니다. 예를 들어 192.0.2.0/24의 프리픽스 길이는 24입니다. IP 범위의 처음 24비트는 서브넷 마스크(192.0.2.0)로 사용되고 가능한 호스트 주소 범위는 192.0.2.0에서 192.0.2.255까지입니다.
VPC 네트워크와 Google Cloud 간에 VPC 네트워크 비공개 연결을 설정합니다. 자세한 내용은 비공개 연결 만들기를 참조하세요.
Bitbucket 서버 인스턴스에 DNS가 구성되어 있으면 DNS 영역을 수동으로 Google 서비스 제공업체에 피어링해야 합니다. 자세한 내용은 서비스 제작자와 비공개 DNS 영역 공유를 참조하세요.
[선택사항] Cloud 프로젝트에서 비공개 연결을 만들지 않으려면 공유 VPC를 설정하면 됩니다. 그러면 프로젝트가 조직에 속한 경우 Cloud 프로젝트에서 이 네트워크를 대신 사용합니다. 공유 VPC가 네트워크에 계속 피어링되어 있어야 합니다.
[[["이해하기 쉬움","easyToUnderstand","thumb-up"],["문제가 해결됨","solvedMyProblem","thumb-up"],["기타","otherUp","thumb-up"]],[["이해하기 어려움","hardToUnderstand","thumb-down"],["잘못된 정보 또는 샘플 코드","incorrectInformationOrSampleCode","thumb-down"],["필요한 정보/샘플이 없음","missingTheInformationSamplesINeed","thumb-down"],["번역 문제","translationIssue","thumb-down"],["기타","otherDown","thumb-down"]],["최종 업데이트: 2025-09-04(UTC)"],[[["\u003cp\u003eCloud Build triggers can be set up to initiate builds from Bitbucket Server repositories in response to events like commit pushes or pull requests.\u003c/p\u003e\n"],["\u003cp\u003eFor Bitbucket Server instances within a private network, a private connection between the VPC network and the service producer network is required.\u003c/p\u003e\n"],["\u003cp\u003eBuilding in a private network necessitates the use of a private pool, which needs to be created if not already present.\u003c/p\u003e\n"],["\u003cp\u003eCreating a private connection involves setting up a VPC network, allocating internal and named IP ranges, and establishing the connection between your VPC and Google Cloud.\u003c/p\u003e\n"],["\u003cp\u003eBitbucket Server triggers can be established by connecting a Bitbucket Server host, connecting the repository, and then creating the trigger.\u003c/p\u003e\n"]]],[],null,["# Build repositories from Bitbucket Server in a private network\n\nCloud Build enables you to create triggers to build from\nrepositories hosted on [Bitbucket Server](https://confluence.atlassian.com/bitbucketserver/bitbucket-data-center-and-server-documentation-776639749.html), allowing you to execute builds\nin response to events such as commit pushes or pull requests associated with your Bitbucket Server repository.\n\nThis page explains how you can enable trigger functionality on a\nBitbucket Server instance if your instance is hosted in a private network.\n\nBefore you begin\n----------------\n\n-\n\n\n Enable the Cloud Build, Secret Manager, Compute Engine, and Service Networking APIs.\n\n\n [Enable the APIs](https://console.cloud.google.com/flows/enableapi?apiid=cloudbuild.googleapis.com,secretmanager.googleapis.com,compute.googleapis.com,servicenetworking.googleapis.com&redirect=https://cloud.google.com/build/docs/automating-builds/bitbucket/build-repos-from-bitbucket-server-private-network)\n\n\u003c!-- --\u003e\n\n- If you have not created a private pool, follow the instructions in [Create and manage private pools](/build/docs/private-pools/create-manage-private-pools) to create a private pool. You will need a private pool to build in a private network.\n\nBuilding repositories from Bitbucket Server in a private network\n----------------------------------------------------------------\n\nIf your Bitbucket Server instance is hosted in a private network\nand not reachable over a public internet connection,\nyou must create a private connection between\nyour VPC\nnetwork and the [service producer network](/../vpc/docs/private-services-access#service_producer_network). You\nalso need a [private pool](/build/docs/private-pools/private-pools-overview) to build in a private network.\n\nTo create a Bitbucket Server trigger to build in a private network:\n\n1. Create a private connection between the VPC network\n and your service producer network by completing the following steps:\n\n 1. [Create a new VPC network](/../vpc/docs/create-modify-vpc-networks#create-custom-network) or [select an existing VPC network](https://console.cloud.google.com/networking/networks/list).\n\n | **Note:** You must configure your VPC network to have access to your Bitbucket Server instance in a private network.\n 2. [Allocate a named IP range in the VPC network](/vpc/docs/configure-private-services-access#allocating-range) for your peered network.\n\n 3. [Allocate an internal IP range in the VPC](/vpc/docs/configure-private-services-access#allocating-range) that the Cloud Build\n producer network can use to allocate to VMs maintaining a connection\n with private repositories.\n\n To use the VPC network with Cloud Build, your\n prefix length must be `/23` or lower, such as `/22` or `/21`. This is to\n accommodate, at a minimum, both your triggers and your worker pools,\n because each service connection tries to claim an IP range with a prefix\n length of `/24`.\n\n You can specify the range using the Classless Inter-Domain Routing (CIDR)\n routing notation in the format `STARTING_IP/SUBNET_PREFIX_SIZE`. For example,\n `192.0.2.0/24` has a prefix length of 24. The first 24 bits of the IP range\n are used as the subnet mask (`192.0.2.0`) while the possible hosts addresses\n range from `192.0.2.0` to `192.0.2.255`.\n | **Note:** The value of your prefix length must not exceed `/29`. If no value is specified for the range, a default value of `/24` is automatically assigned. If no value is specified for the prefix length, IP addresses are automatically assigned within the peered VPC network.\n 4. Establish a VPC network private connection between your VPC network and Google Cloud. To learn more, see [Creating a private connection](/../vpc/docs/configure-private-services-access#creating-connection).\n\n 5. If you have DNS configured for your Bitbucket Server instance, you need to manually peer your DNS zone to our service provider. To learn\n more, see the [Sharing private DNS zones with service producers](/../vpc/docs/configure-private-services-access#dns-peering).\n\n 6. \\[OPTIONAL\\] If you do not want to create a private connection from your Cloud project,\n you can set up a [Shared VPC](/../vpc/docs/provisioning-shared-vpc) and have your Cloud project use that network instead if your project is part of an organization. You will still need the Shared VPC to be peered to the network.\n\n2. Use [private pools](/build/docs/private-pools/private-pools-overview)\n to run your builds. If you have not created a private pool,\n see [create a new private pool](/build/docs/private-pools/create-manage-private-pools).\n\n3. [Connect a Bitbucket Server host](/build/docs/automating-builds/bitbucket/connect-host-bitbucket-server).\n\n4. [Connect a Bitbucket Server repository](/build/docs/automating-builds/bitbucket/connect-repo-bitbucket-server).\n\n5. [Create a Bitbucket Server trigger](/build/docs/automating-builds/bitbucket/build-repos-from-bitbucket-server)\n to build repositories hosted on a Bitbucket Server instance.\n\nYour Bitbucket Server trigger will now automatically invoke builds on\nyour Bitbucket Server instance based on your configuration. To learn how to run builds using a private pool, see [Running builds in a private pool](/build/docs/private-pools/run-builds-in-private-pool).\n\nWhat's next\n-----------\n\n- Learn how to [create and manage build triggers](/build/docs/automating-builds/create-manage-triggers).\n- Learn how to [perform blue/green deployments on Compute Engine](/build/docs/deploying-builds/deploy-compute-engine)."]]