icon/x Created with Sketch.

Splunk Cookie Policy

We use our own and third-party cookies to provide you with a great online experience. We also use these cookies to improve our products and services, support our marketing campaigns, and advertise to you on our website and other websites. Some cookies may continue to collect information after you have left our website. Learn more (including how to update your settings) here.
Accept Cookie Policy

Accept License Agreements

This app is provided by a third party and your right to use the app is in accordance with the license provided by that third-party licensor. Splunk is not responsible for any third-party apps and does not provide any warranty or support. If you have any questions, complaints or claims with respect to this app, please contact the licensor directly.

Thank You

Downloading BitBucket Add-On
SHA256 checksum (bitbucket-add-on_110.tgz) ebc061c38dc680154b24014a304e2bddba26f7039b0fa25ea57f7c33cb1bfa31 SHA256 checksum (bitbucket-add-on_100.tgz) 3e05cab0d36c64171e64f7f16926f913762648ed6ca2aec6f87746ebfaec9d11
To install your download
For instructions specific to your download, click the Details tab after closing this window.

Flag As Inappropriate

BitBucket Add-On

Splunk AppInspect Passed
Admins: Please read about Splunk Enterprise 8.0 and the Python 2.7 end-of-life changes and impact on apps and upgradeshere.
As we look to eliminate our data silos across our delivery pipeline, a huge amount of useful data is held in version control software such as BitBucket. This add-on is intended to extract some of this information from BitBucket and bring it straight into Splunk. Allowing you to alert on any unexpected events and to marry it up with any ongoing issues or challenges. As well as analyse the health of your IT operations as soon as a change has been committed and pushed through.

N.B Please make sure you follow all the installation instructions in the details page


BitBucket Add-On for Splunk

This add-on enables you to ingest your BitBucket data into Splunk to enhance your monitoring capabilities throughout your DevOps process.

Available Data

There are 4 different sourcetypes captured using this add-on. These are:
• Repository Information
• Commits
• Commit File Change Summary
• Pull Requests

All these data sets are captured and stored in JSON form, with the add-on collecting information and storing it in Splunk against the updated date.


The security method used for this is the 3-LO method available with the BitBucket API. The API requires navigating the repositories against a user account, therefore it would be advised (although not necessary) to setup a separate splunk user in BitBucket as a first step. Instructions for setting up the integration are as follows:
1. Navigate to your account settings > OAuth
2. Select the option to Add consumer
3. Fill in your desired fields, please ensure to enter a value for Callback URL. This can be your own website, https://www.splunk.com, https://example.com. The only requirement is the address is a https address.
4. The following permissions are required
a. Repositories – Read
b. Pull Requests – Read
5. Save your new consumer. You should be supplied with a key and secret. N.B you may need to navigate to the OAuth setting screen again and expand the row containing your newly created consumer
6. Open a new browser and navigate to https://bitbucket.org/site/oauth2/authorize?client_id=YOUR_CONSUMER_KEY&response_type=code
7. You may be asked to authorise access before completing your redirection to your callback url.
8. Once you have navigated to your callback url, your auth code will be available in your browser within your url address (e.g. setting the callback url to https://www.splunk.com will produce the following url when it’s called: https://www.splunk.com/?code=YOUR_CODE_HERE. Make a note of this code as you will need it shortly!
9. Open Splunk and go to the bitbucket add-on
10. Open the configuration tab and enter your bitbucket api address in the Base URL input. If it is already correct, ensure this is confirmed by pressing save. It would also be advisable to set the logging level to DEBUG for the initial setup to confirm that everything is running as expected. This can be changed at anypoint.
11. Go to the inputs tab > Create New Input and fill in all fields.
12. The add-on should now be running as expected.

Release Notes

Version 1.1.0
Oct. 9, 2019

Bugfix for duplicate data
New field aliases for DevSplunkOps

Version 1.0.0
July 10, 2019


Subscribe Share

AppInspect Tooling

Splunk AppInspect evaluates Splunk apps against a set of Splunk-defined criteria to assess the validity and security of an app package and components.

Are you a developer?

As a Splunkbase app developer, you will have access to all Splunk development resources and receive a 10GB license to build an app that will help solve use cases for customers all over the world. Splunkbase has 1000+ apps and add-ons from Splunk, our partners and our community. Find an app or add-on for most any data source and user need, or simply create your own with help from our developer portal.

Follow Us:
© 2005-2020 Splunk Inc. All rights reserved.
Splunk®, Splunk>®, Listen to Your Data®, The Engine for Machine Data®, Hunk®, Splunk Cloud™, Splunk Light™, SPL™ and Splunk MINT™ are trademarks and registered trademarks of Splunk Inc. in the United States and other countries. All other brand names, product names, or trademarks belong to their respective owners.