Sleuth relies on third-party integrations to track deployments. These applications ask for elevated privileges including, often, write access, enabling Sleuth to add webhooks and automate deployment data collection.
All access is completely revocable. Sleuth will never use it for any purpose other than supporting deployments data and collecting deployment data.
AWS CloudWatch
Read metrics.
Azure DevOps
Read-only for content, work items, and identity; write for webhooks, commit status, and pipeline execution.
Bitbucket
Write access for webhook installation and commit statuses.
Bitbucket Pipelines
Write access forexecuting pipelines.
Bugsnag
Read error counts.
Buildkite
Read-only access to organizations, pipelines, builds, and users.
CircleCI
Write access for executing pipelines.
Datadog
Read metrics and publish events.
FireHydrant
Read incidents.
GitHub / GitHub Enterprise
Read-only access to content, issues, teams, metadata, pull requests, and actions;write for commit status and action execution.
GitLab
Write access for webhook installation and commit statuses.
Honeybadger
Read error counts.
Jenkins
Write access for executing pipelines.
Jira Cloud / Datacenter
Read issues, optionally edit and transition.
LaunchDarkly
Write access for webhook installation.
Read incidents, optionally write.
Rollbar
Write access for project token creation.
Sentry
Read error counts and publish releases.
ServiceNow
Read incidents.
Slack
Read-only access to content, issues, teams, metadata, pull requests, and actions;write for commit status and action execution.
Splunk Observability Cloud / SignalFX
Read metrics.
StatusPage
Read status updates.