Jira Service Management
The Jira Service Management connector lets you connect to Jira Service Management and perform insert, delete, update, and read operations.
Before you begin
Before using the Jira Service Management connector, do the following tasks:
- In your Google Cloud project:
- Ensure that network connectivity is set up. For information about network patterns, see Network connectivity.
- Grant the roles/connectors.admin IAM role to the user configuring the connector.
- Grant the following IAM roles to the service account that you want to use for the connector:
roles/secretmanager.viewer
roles/secretmanager.secretAccessor
A service account is a special type of Google account intended to represent a non-human user that needs to authenticate and be authorized to access data in Google APIs. If you don't have a service account, you must create a service account. For more information, see Creating a service account.
- Enable the following services:
secretmanager.googleapis.com
(Secret Manager API)connectors.googleapis.com
(Connectors API)
To understand how to enable services, see Enabling services.
If these services or permissions have not been enabled for your project previously, you are prompted to enable them when configuring the connector.
Configure the connector
Configuring the connector requires you to create a connection to your data source (backend system). A connection is specific to a data source. It means that if you have many data sources, you must create a separate connection for each data source. To create a connection, do the following steps:
- In the Cloud console, go to the Integration Connectors > Connections page and then select or create a Google Cloud project.
- Click + CREATE NEW to open the Create Connection page.
- In the Location section, choose the location for the connection.
- Region: Select a location from the drop-down list.
For the list of all the supported regions, see Locations.
- Click NEXT.
- Region: Select a location from the drop-down list.
- In the Connection Details section, complete the following:
- Connector: Select Jira Service Management from the drop down list of available Connectors.
- Connector version: Select the Connector version from the drop down list of available versions.
- In the Connection Name field, enter a name for the Connection instance.
Connection names must meet the following criteria:
- Connection names can use letters, numbers, or hyphens.
- Letters must be lower-case.
- Connection names must begin with a letter and end with a letter or number.
- Connection names cannot exceed 49 characters.
- Optionally, enter a Description for the connection instance.
- Optionally, enable Cloud logging,
and then select a log level. By default, the log level is set to
Error
. - Service Account: Select a service account that has the required roles.
- Enter a Service Desk Id of the authenticated user. By default we get the first Id returned from an extra call to get all service desks. You can get the ServiceDeskId by executing a list query to the ServiceDesks entity.
- Enter Verbosity Level for connection, varies from 1-5. Higher verbosity level will log all the communication details (request,response & ssl certificates).
- Optionally, configure the Connection node settings:
- Minimum number of nodes: Enter the minimum number of connection nodes.
- Maximum number of nodes: Enter the maximum number of connection nodes.
A node is a unit (or replica) of a connection that processes transactions. More nodes are required to process more transactions for a connection and conversely, fewer nodes are required to process fewer transactions. To understand how the nodes affect your connector pricing, see Pricing for connection nodes. If you don't enter any values, by default the minimum nodes are set to 2 (for better availability) and the maximum nodes are set to 50.
- Use proxy: Select this checkbox to configure a proxy server for the connection and configure the following values:
-
Proxy Auth Scheme: Select the authentication type to authenticate with the proxy server. The following authentication types are supported:
- Basic: Basic HTTP authentication.
- Digest: Digest HTTP authentication.
- Proxy User: A user name to be used to authenticate with the proxy server.
- Proxy Password: The Secret manager secret of the user's password.
-
Proxy SSL Type: The SSL type to use when connecting to the proxy server. The following authentication types are supported:
- Auto: Default setting. If the URL is an HTTPS URL, then the Tunnel option is used. If the URL is an HTTP URL, then the NEVER option is used.
- Always: The connection is always SSL enabled.
- Never: The connection is not SSL enabled.
- Tunnel: The connection is through a tunneling proxy. The proxy server opens a connection to the remote host and traffic flows back and forth through the proxy.
- In the Proxy Server section, enter details of the proxy server.
- Click + Add destination.
- Select a Destination Type.
- Host address: Specify the hostname or IP address of the destination.
If you want to establish a private connection to your backend system, do the following:
- Create a PSC service attachment.
- Create an endpoint attachment and then enter the details of the endpoint attachment in the Host address field.
- Host address: Specify the hostname or IP address of the destination.
- Optionally, click + ADD LABEL to add a label to the Connection in the form of a key/value pair.
- Click NEXT.
- In the Destinations section, enter details of the remote host (backend system) you want to connect to.
- Destination Type: Select a Destination Type.
- Select Host address from the list to specify the hostname or IP address of the destination.
- If you want to establish a private connection to your backend systems, select Endpoint attachment from the list, and then select the required endpoint attachment from the Endpoint Attachment list.
If you want to establish a public connection to your backend systems with additional security, you can consider configuring static outbound IP addresses for your connections, and then configure your firewall rules to allowlist only the specific static IP addresses.
To enter additional destinations, click +ADD DESTINATION.
- Click NEXT.
- Destination Type: Select a Destination Type.
-
In the Authentication section, enter the authentication details.
- Select an Authentication type and enter the relevant details.
The following authentication types are supported by the Jira Service Management connection:
- OAuth2.0
- Basic
- APIToken
- Click NEXT.
To understand how to configure these authentication types, see Configure authentication.
- Select an Authentication type and enter the relevant details.
- Review: Review your connection and authentication details.
- Click Create.
Configure authentication
Enter the details based on the authentication you want to use.
-
OAuth2.0
- Client ID: Client ID as provided by your external application.
- Scopes: Permission scopes. The
offline_access
scope must be used with the Jira Service Management connector. To understand how the scopes work and to view all the available scopes for Jira Service Management, see Scopes. - Client secret: Select the Secret Manager secret. You must have created the Secret Manager secret before configuring this authorization.
- Secret version: Secret Manager secret version for client secret.
For the
Authorization code
authentication type, after creating the connection, you must perform a few additional steps for configuring authentication. For more information, see Additional steps after connection creation. -
Basic
- Username: The Jira Service Management user account used to authenticate.
- Password: The password associated with the account.
-
APIToken
- Username: The Jira Service Management username used to create the API token.
- API Token: The password for the username will be an API token. Select the Secret Manager Secret containing the API Token associated with the Jira Cloud username.
Additional steps after connection creation
If you selected OAuth 2.0 - Authorization code
for
authentication, you must do the following additional steps after creating the connection:
- In the Connections page,
locate the newly created connection.
Notice that the Status for the new connector will be Authorization required.
- Click Authorization required.
This shows the Edit authorization pane.
- Copy the Redirect URI value to your external application.
- Verify the authorization details.
- Click Authorize.
If the authorization is successful, the connection status will be set to Active in the Connections page.
Re-authorization for authorization code
If you are using Authorization code
authentication type and have made any cofiguration changes in your Jira Service Management application,
you must re-authorize your Jira Service Management connection. To re-authorize a connection, perform the following steps:
- Click on the required connection in the Connections page.
This opens the connection details page.
- Click Edit to edit the connection details.
- Verify the OAuth 2.0 - Authorization code details in the Authentication section.
If required, make the necessary changes.
- Click Save. This takes you to the connection details page.
- Click Edit authorization in the Authentication section. This shows the Authorize pane.
- Click Authorize.
If the authorization is successful, the connection status will be set to Active in the Connections page.
Entities, operations, and actions
All the Integration Connectors provide a layer of abstraction for the objects of the connected application. You can access an application's objects only through this abstraction. The abstraction is exposed to you as entities, operations, and actions.
- Entity: An entity can be thought of as an object, or a collection of properties, in the
connected application or service. The definition of an entity differs from a connector to a
connector. For example, in a database connector, tables are the entities, in a
file server connector, folders are the entities, and in a messaging system connector,
queues are the entities.
However, it is possible that a connector doesn't support or have any entities, in which case the
Entities
list will be empty. - Operation: An operation is the activity that you can perform on an entity. You can perform
any of the following operations on an entity:
Selecting an entity from the available list, generates a list of operations available for the entity. For a detailed description of the operations, see the Connectors task's entity operations. However, if a connector doesn't support any of the entity operations, such unsupported operations aren't listed in the
Operations
list. - Action: An action is a first class function that is made available to the integration
through the connector interface. An action lets you make changes to an entity or entities, and
vary from connector to connector. Normally, an action will have some input parameters, and an output
parameter. However, it is possible
that a connector doesn't support any action, in which case the
Actions
list will be empty.
System limitations
The Jira Service Management connector can process 15 transaction per second, per node, and throttles any transactions beyond this limit. By default, Integration Connectors allocates 2 nodes (for better availability) for a connection.
For information on the limits applicable to Integration Connectors, see Limits.
Actions
The Jira Service Managmenet connector provides actions, such as AddAttachment, AttachTemporaryFile and CreateCustomer. To understand how to configure the actions, see Action examples.
Action examples
This section describes how to perform some of the actions in this connector.
Example - Attach a temporary file
This example attaches a temporary file and provides an attachment ID that you use to add an attachment.
- In the
Configure connector task
dialog, clickActions
. - Select the
AttachTemporaryFile
action, and then click Done. - In the Task Input section of the Connectors task, click
connectorInputPayload
and then enter a value similar to the following in theDefault Value
field:{ "Content": "test to create 1 temporaryid" }
If the action is successful, your
connector task's connectorOutputPayload
response
parameter will have a value similar to the following:
[{ "TemporaryAttachmentId": "3ef17ee7-3877-4ac6-b586-481cb2121ef8", "FileName": "16324233309516250343.connector.txt" }]
Example - Add an attachment
This example attaches the temoporary file to the Request ID provided in the input payload.
- In the
Configure connector task
dialog, clickActions
. - Select the
AddAttachment
action, and then click Done. - In the Task Input section of the Connectors task, click
connectorInputPayload
and then enter a value similar to the following in theDefault Value
field:{ "AttachmentId": "3ef17ee7-3877-4ac6-b586-481cb2121ef8", "RequestId": "10032" }
If the action is successful, your
connector task's connectorOutputPayload
response
parameter will have a value similar to the following:
[{ "Success": "true", "filename": "16324233309516250343.connector.txt", }]
Example - Create a customer
This example creates a customer.
- In the
Configure connector task
dialog, clickActions
. - Select the
CreateCustomer
action, and then click Done. - In the Task Input section of the Connectors task, click
connectorInputPayload
and then enter a value similar to the following in theDefault Value
field:{ "Email": "something@something.com", "FullName": "Something" }
If the action is successful, your
connector task's connectorOutputPayload
response
parameter will have a value similar to the following:
[{ "Key": null, "AccountId": "qm:476582de-e968-4bc9-b0be-0349e8e3ec97:244dd7e4-0b49-4468-adac-561ab09bf2bb", "Name": null, "EmailAddress": "something@something.com", "DisplayName": "Something", "Active": "true", "Timezone": "Asia/Calcutta", "_links.jirarest": "https://google-team-zlre6yes.atlassian.net/rest/api/2/user?accountId=qm%3A476582de-e968-4bc9-b0be-0349e8e3ec97%3A244dd7e4-0b49-4468-adac-561ab09bf2bb", "_links.avatarurls.48x48": "https://avatar-management.services.atlassian.com/default/48", "_links.avatarurls.24x24": "https://avatar-management.services.atlassian.com/default/24", "_links.avatarurls.16x16": "https://avatar-management.services.atlassian.com/default/16", "_links.avatarurls.32x32": "https://avatar-management.services.atlassian.com/default/32", "_links.self": "https://google-team-zlre6yes.atlassian.net/rest/api/2/user?accountId=qm%3A476582de-e968-4bc9-b0be-0349e8e3ec97%3A244dd7e4-0b49-4468-adac-561ab09bf2bb" }]
Entity operation examples
Example - List all the Requests
This example lists all the requests in the Requests
entity.
- In the
Configure connector task
dialog, clickEntities
. - Select Requests from the
Entity
list. - Select the
LIST
operation, and then click Done.
Example - Get Requests from a specific Service Desk ID
This example gets the request with having the RequestKey as DP1-14 from the Requests
entity.
- In the
Configure connector task
dialog, clickEntities
. - Select
Requests
from theEntity
list. - Select the
LIST
operation, and then click Done. - In the Task Input section of the Connectors task, click filterClause and
then enter
RequestKey='DP1-14'
in the Default Value field.Here,
RequestKey
is the primary key value of theRequests
entity.
Example - Create a Request
This example creates a request in the Requests
entity.
- In the
Configure connector task
dialog, clickEntities
. - Select
Requests
from theEntity
list. - Select the
Create
operation, and then click Done. - In the Task Input section of the Connectors task, click
connectorInputPayload
and then enter a value similar to the following in theDefault Value
field:{, , ,) VALUES ('2', '1', '','test'); "RequestTypeId": "2", "ServiceDeskId": "1", "Summary": "test", "Description": "test" }
If the integration is successful, your connector task's
connectorOutputPayload
field will have a value similar to the following:{ "RequestId": "10032" }
Use terraform to create connections
You can use the Terraform resource to create a new connection.To learn how to apply or remove a Terraform configuration, see Basic Terraform commands.
To view a sample terraform template for connection creation, see sample template.
When creating this connection by using Terraform, you must set the following variables in your Terraform configuration file:
Parameter name | Data type | Required | Description |
---|---|---|---|
proxy_enabled | BOOLEAN | False | Select this checkbox to configure a proxy server for the connection. |
proxy_auth_scheme | ENUM | False | The authentication type to use to authenticate to the ProxyServer proxy. Supported values are: BASIC, DIGEST, NONE |
proxy_user | STRING | False | A user name to be used to authenticate to the ProxyServer proxy. |
proxy_password | SECRET | False | A password to be used to authenticate to the ProxyServer proxy. |
proxy_ssltype | ENUM | False | The SSL type to use when connecting to the ProxyServer proxy. Supported values are: AUTO, ALWAYS, NEVER, TUNNEL |
Use the Jira Service Management connection in an integration
After you create the connection, it becomes available in both Apigee Integration and Application Integration. You can use the connection in an integration through the Connectors task.
- To understand how to create and use the Connectors task in Apigee Integration, see Connectors task.
- To understand how to create and use the Connectors task in Application Integration, see Connectors task.
Get help from the Google Cloud community
You can post your questions and discuss this connector in the Google Cloud community at Cloud Forums.What's next
- Understand how to suspend and resume a connection.
- Understand how to monitor connector usage.
- Understand how to view connector logs.