Stay organized with collections
Save and categorize content based on your preferences.
This page describes how to connect Jira Data Center to Agentspace, syncing on-premises Jira data with Agentspace
After you set up your data source and import data the first time, you can choose how often the data store syncs with that source.
Before you begin
Before setting up your connection, do the following:
Verify that you have the Jira System administrators permission to fetch the Access Control List (ACL) information.
If you have set up issue security in Jira, install the Permission Accessor for Jira Data Center plugin. This plugin introduces REST endpoints that enable Google Agentspace to fetch space permissions, content restrictions, and licensed users' email addresses details to apply the correct permissions for the search experience in Google Agentspace.
Make sure that you have the following details:
Service attachment (Required for private destination type only): Configure a service attachment for secure data transfer.
Username and password: Obtain valid credentials for authentication from your Jira administrator.
Domain URL: For a private destination type, specify the URL of the Jira Data Center instance.
Optional: Base domain name: Provide the base domain name for the Jira instance.
Optional: Destination port: Identify the port used for communication with the Jira Data Center.
Use the following configuration guidelines to establish connections with Private Service Connect (PSC). Adjust or add resources as needed. Make sure the PSC service attachment is properly configured to connect to the private instance and meets the requirements for a published service.
Configure network settings:
Place the PSC service attachment and load balancer in different subnets within the same Virtual Private Cloud network.
The backend system must remain closed to the public network for security reasons. However, verify it can accept traffic from the following sources:
For proxy-based/HTTP(s) load balancers (L4 proxy ILB, L7 ILB), configure the backend to accept requests from the proxy subnet in the Virtual Private Cloud network.
Allow traffic from the PSC service attachment subnet to the internal load balancer (ILB) subnet.
Make sure that the ILB can send traffic to the backend.
Permit health check probes to reach the backend.
Egress rules: Enable egress traffic by default, unless specific deny rules apply.
Additional considerations: Make sure to keep all the components, including the PSC service attachment and load balancer, in the same region.
Generate a service attachment
Use the following steps to generate a service attachment:
Decide endpoint type: Select Public or Private endpoint.
For Public endpoint: If the Jira Data Center Destination type is Public, you are not required to create the setup for service attachment. Instead, you can use your public URL in the Domain URL field of the Google Cloud console.
For Private endpoint:
Use PSC to enable connections from private instances to Google Cloud.
Create a Virtual Private Cloud network and required subnets.
Create a Virtual Machine (VM) instance and install the backend service.
Optional: Set up a health check probe to monitor backend health.
Add a load balancer to route traffic to the VM or backend.
Define firewall rules to allow traffic between the PSC endpoint and the backend.
On the Select a data source page, scroll or search for Jira data center to connect your third-party source.
Enter your authentication information and click Continue.
From the Destination type drop-down list, select Public or Private.
For Public destination type, you are not required to create the setup for service attachment. Instead, you can use your public URL in the Domain URL field of the Google Cloud console.
For Private destination type, enter all the required information:
For instance with the Domain URL:
Service attachment: Enter your service attachment.
Optional: Base domain name: Enter your base domain.
Domain URL: Enter your domain URL.
Optional: Destination port: Enter your destination port.
For instance without Domain URL:
Service attachment: Enter your service attachment.
Optional: Destination port: Enter your destination port.
Click Continue.
Optional: Advanced options: Select and enable Proxy settings and SSL settings, if required.
Under the Entities to sync, select all the required entities to sync and click Continue.
Select a region for your data connector and enter a name for your data connector.
Select a synchronization frequency.
For Private destination type, after you submit the details for the connector, VAIS sends a connection request to your PSC. Navigate to your connector to see a message to allowlist a projectId in the PSC. The connector remains in the Error state until you allow the connection in PSC. When you accept the connection request, the connector moves to the Active state during the next sync run. If you configure your PSC to accept all connections, the connector automatically moves to the Active state after creation.
For Public destination type, the connector automatically enters the Active state after submission.
To verify the state of the data store and the ingestion activity, do the following:
Navigate to the connector in the data store list and monitor its state until it changes to Active.
After the connector state changes to Active, click the required entity and confirm that all selected entities are ingested.
The data store state transitions from Creating to Running when synchronization begins and changes to Active once ingestion completes, indicating that the data store is set up. Depending on the size of your data, ingestion can take several hours.
Next steps
To attach your data store to an app, create an app and select your data store
following the steps in Create a search app.
To preview how your search results appear after your app is set up, see Get
search results.
[[["Easy to understand","easyToUnderstand","thumb-up"],["Solved my problem","solvedMyProblem","thumb-up"],["Other","otherUp","thumb-up"]],[["Hard to understand","hardToUnderstand","thumb-down"],["Incorrect information or sample code","incorrectInformationOrSampleCode","thumb-down"],["Missing the information/samples I need","missingTheInformationSamplesINeed","thumb-down"],["Other","otherDown","thumb-down"]],["Last updated 2025-09-03 UTC."],[],[],null,["# Connect Jira Data Center On-premises\n\n\u003cbr /\u003e\n\n| **Preview:** You must be on the allowlist to use this connector.\n\n\u003cbr /\u003e\n\nThis page describes how to connect Jira Data Center to Agentspace, syncing on-premises Jira data with Agentspace\n\nAfter you set up your data source and import data the first time, you can choose how often the data store syncs with that source.\n| **Note:** After you connect Jira Data Center to your app, Google strongly recommends that you enable Knowledge Graph to significantly improve search quality for your users. To use this feature, your app must also have a People data source configured. For more information, see [Knowledge Graph: Powering intelligent and context-aware search](/agentspace/docs/use-knowledge-graph-search).\n\nBefore you begin\n----------------\n\nBefore setting up your connection, do the following:\n\n1. Verify that you have the `Jira System administrators` permission to fetch the Access Control List (ACL) information.\n2. If you have set up issue security in Jira, [install the Permission Accessor for Jira Data Center plugin](https://marketplace.atlassian.com/apps/1237927/permission-accessor-for-jira-data-center?hosting=datacenter&tab=installation). This plugin introduces REST endpoints that enable Google Agentspace to fetch space permissions, content restrictions, and licensed users' email addresses details to apply the correct permissions for the search experience in Google Agentspace.\n3. Make sure that you have the following details:\n\n - **Service attachment (Required for private destination type only)**: Configure a service attachment for secure data transfer.\n - **Username and password**: Obtain valid credentials for authentication from your Jira administrator.\n - **Domain URL**: For a private destination type, specify the URL of the Jira Data Center instance.\n - Optional: **Base domain name**: Provide the base domain name for the Jira instance.\n - Optional: **Destination port**: Identify the port used for communication with the Jira Data Center.\n4. Use the following configuration guidelines to establish connections with Private Service Connect (PSC). Adjust or add resources as needed. Make sure the PSC service attachment is properly configured to connect to the private instance and meets the requirements for a published service.\n\n 1. Configure network settings:\n\n 1. Place the PSC service attachment and load balancer in different subnets within the same Virtual Private Cloud network.\n\n 2. The backend system must remain closed to the public network for security reasons. However, verify it can accept traffic from the following sources:\n\n - For proxy-based/HTTP(s) load balancers (L4 proxy ILB, L7 ILB), configure the backend to accept requests from the proxy subnet in the Virtual Private Cloud network.\n\n - For more information, see the [Proxy-only subnets for Envoy-based load balancers](/load-balancing/docs/proxy-only-subnets) documentation.\n\n 2. Adjust firewall rules:\n\n 1. Ingress rules:\n\n - Allow traffic from the PSC service attachment subnet to the internal load balancer (ILB) subnet.\n - Make sure that the ILB can send traffic to the backend.\n - Permit health check probes to reach the backend.\n 2. Egress rules: Enable egress traffic by default, unless specific deny rules apply.\n\n5. Additional considerations: Make sure to keep all the components, including the PSC service attachment and load balancer, in the same region.\n\nGenerate a service attachment\n-----------------------------\n\nUse the following steps to generate a service attachment:\n\n1. **Decide endpoint type** : Select **Public** or **Private** endpoint.\n\n2. For **Public** endpoint: If the Jira Data Center **Destination type** is **Public** , you are not required to create the setup for service attachment. Instead, you can use your public URL in the **Domain URL** field of the Google Cloud console.\n\n3. For **Private** endpoint:\n\n 1. Use [PSC](/vpc/docs/private-service-connect) to enable connections from private instances to Google Cloud.\n 2. Create a Virtual Private Cloud network and required subnets.\n 3. Create a Virtual Machine (VM) instance and install the backend service.\n 4. Optional: Set up a [health check](/load-balancing/docs/internal#health-checking) probe to monitor backend health.\n 5. Add a load balancer to route traffic to the VM or backend.\n 6. Define firewall rules to allow traffic between the PSC endpoint and the backend.\n 7. [Publish the endpoint](/vpc/docs/configure-private-service-connect-producer) by creating a PSC service attachment.\n\nCreate a Jira Data Center user and set up permissions\n-----------------------------------------------------\n\nTo enable Agentspace to obtain data from Jira, you need\nto create a new user and assign administrator permission to the user.\n\n1. Sign in as an administrator:\n\n 1. Go to your Atlassian domain site and open Jira Data Center instance.\n 2. Enter the administrator username and password.\n 3. Click **Log In**.\n2. Create a new user:\n\n When creating a data store, you must create a user with administrator privileges to obtain data from the third-party instance.\n 1. Click the settings icon.\n 2. Select **User management**.\n 3. Enter the administrator credentials, if prompted.\n 4. In the **Administration** page, click **Create user**.\n 5. Enter the email address, full name, username, and password.\n 6. Click **Create user**.\n3. Configure user permissions:\n\n 1. In the **Jira administration** page, navigate to the **Users and security** tab and click **Groups**.\n 2. Search for the `jira-administrators` group and add the newly created user to this group.\n\nCreate a Jira Data Center on-premises connector\n-----------------------------------------------\n\n### Console\n\n1. In the Google Cloud console, go to the **Agentspace** page.\n\n [Agentspace](https://console.cloud.google.com/gen-app-builder/)\n2. In the navigation menu, click **Data stores**.\n\n3. Click add **Create data store**.\n\n4. On the **Select a data source** page, scroll or search for **Jira data center** to connect your third-party source.\n\n5. Enter your authentication information and click **Continue**.\n\n6. From the **Destination type** drop-down list, select **Public** or **Private**.\n\n 1. For **Public** destination type, you are not required to create the setup for service attachment. Instead, you can use your public URL in the Domain URL field of the Google Cloud console.\n\n 2. For **Private** destination type, enter all the required information:\n\n 1. **For instance with the Domain URL** :\n - **Service attachment**: Enter your service attachment.\n - Optional: **Base domain name**: Enter your base domain.\n - **Domain URL**: Enter your domain URL.\n - Optional: **Destination port**: Enter your destination port.\n 2. **For instance without Domain URL** :\n - **Service attachment**: Enter your service attachment.\n - Optional: **Destination port**: Enter your destination port.\n7. Click **Continue**.\n\n8. Optional: **Advanced options** : Select and enable **Proxy settings** and **SSL settings**, if required.\n\n9. Under the **Entities to sync** , select all the required entities to sync and click **Continue**.\n\n10. Select a region for your data connector and enter a name for your data connector.\n\n11. Select a synchronization frequency.\n\nFor **Private** destination type, after you submit the details for the connector, VAIS sends a connection request to your PSC. Navigate to your connector to see a message to allowlist a `projectId` in the PSC. The connector remains in the **Error** state until you allow the connection in PSC. When you accept the connection request, the connector moves to the **Active** state during the next sync run. If you configure your PSC to accept all connections, the connector automatically moves to the **Active** state after creation.\n\nFor **Public** destination type, the connector automatically enters the **Active** state after submission.\nTo verify the state of the data store and the ingestion activity, do the following:\n\n1. Navigate to the connector in the data store list and monitor its state until it changes to **Active**.\n2. After the connector state changes to **Active** , click the required entity and confirm that all selected entities are ingested. The data store state transitions from **Creating** to **Running** when synchronization begins and changes to **Active** once ingestion completes, indicating that the data store is set up. Depending on the size of your data, ingestion can take several hours.\n\n\u003cbr /\u003e\n\nNext steps\n----------\n\n- To attach your data store to an app, create an app and select your data store\n following the steps in [Create a search app](/agentspace/docs/create-app).\n\n- To preview how your search results appear after your app is set up, see [Get\n search results](/agentspace/docs/preview-search-results).\n\n- To enable alerts for the data store, see [Configure alerts for third-party data stores](/agentspace/docs/configure-periodic-data-alerts)."]]