Integration Access Levels

Sleuth relies on third-party integrations to track deployments. These applications ask for elevated privileges including, often, write access, enabling Sleuth to add webhooks and automate deployment data collection.

All access is completely revocable. Sleuth will never use it for any purpose other than supporting deployments data and collecting deployment data.

AppDynamics

Read metrics.

AWS CloudWatch

Read metrics.

Azure DevOps

Read-only for content, work items, and identity; write for webhooks, commit status, and pipeline execution.

Bitbucket

Write access for webhook installation and commit statuses.

Bitbucket Pipelines

Write access forexecuting pipelines.

Blameless

Read incidents.

Bugsnag

Read error counts.

Buildkite

Read-only access to organizations, pipelines, builds, and users.

CircleCI

Write access for executing pipelines.

Datadog

Read metrics and publish events.

FireHydrant

Read incidents.

GitHub / GitHub Enterprise

Read-only access to content, issues, teams, metadata, pull requests, and actions;write for commit status and action execution.

GitLab

Write access for webhook installation and commit statuses.

Honeybadger

Read error counts.

Jenkins

Write access for executing pipelines.

Jira Cloud / Datacenter

Read issues, optionally edit and transition.

LaunchDarkly

Write access for webhook installation.

Linear

Read issues.

New Relic

Read metrics.

Opsgenie

Read incidents.

PagerDuty

Read incidents, optionally write.

Rollbar

Write access for project token creation.

Rootly

Read incidents.

Sentry

Read error counts and publish releases.

ServiceNow

Read incidents.

Shortcut

Read issues.

Slack

Read-only access to content, issues, teams, metadata, pull requests, and actions;write for commit status and action execution.

Splunk Observability Cloud / SignalFX

Read metrics.

StatusPage

Read status updates.
If you discover a security vulnerability please contact us.
Read our disclosure policy.
REPORT A VULNERABILITY