Skip to content

Troubleshooting GitLab for Jira Cloud app administration

DETAILS: Tier: Free, Premium, Ultimate Offering: Self-managed

When administering the GitLab for Jira Cloud app, you might encounter the following issues.

For user documentation, see GitLab for Jira Cloud app.

message displayed when already signed in

You might get the following message prompting you to sign in to when you're already signed in:

You need to sign in or sign up before continuing.

The GitLab for Jira Cloud app uses an iframe to add groups on the settings page. Some browsers block cross-site cookies, which can lead to this issue.

To resolve this issue, set up OAuth authentication.

Manual installation fails

You might get one of the following errors if you've installed the GitLab for Jira Cloud app from the official marketplace listing and replaced it with manual installation:

The app "" could not be installed as a local app as it has previously been installed from Atlassian Marketplace
The app host returned HTTP response code 401 when we tried to contact it during installation. Please try again later or contact the app vendor.

To resolve this issue, disable the Jira Connect Proxy URL setting.

  • In GitLab 15.7:

    1. Open a Rails console.
    2. Execute ApplicationSetting.current_without_cache.update(jira_connect_proxy_url: nil).
  • In GitLab 15.8 and later:

    1. On the left sidebar, at the bottom, select Admin Area.
    2. On the left sidebar, select Settings > General.
    3. Expand GitLab for Jira App.
    4. Clear the Jira Connect Proxy URL text box.
    5. Select Save changes.

If the issue persists, verify that your self-managed GitLab instance can connect to to get the public key from Atlassian. To test connectivity, run the following command:

# A `404 Not Found` is expected because you're not passing a token
curl --head ""

Data sync fails with Invalid JWT

If the GitLab for Jira Cloud app continuously fails to sync data from a self-managed GitLab instance, a secret token might be outdated. Atlassian can send new secret tokens to GitLab. If GitLab fails to process or store these tokens, an Invalid JWT error occurs.

To resolve this issue on your self-managed GitLab instance:

Depending on how you installed the app, you might want to check the following:

  1. In Jira, on the top bar, select Apps > Manage your apps.
  2. Expand GitLab for Jira (
  3. Select Get started.
  4. Select Change GitLab version.
  5. Select (SaaS), then select Save.
  6. Select Change GitLab version again.
  7. Select GitLab (self-managed), then select Next.
  8. Select all checkboxes, then select Next.
  9. Enter your GitLab instance URL, then select Save.

If this method does not work, submit a support ticket if you're a Premium or Ultimate customer. Provide your GitLab instance URL and Jira URL. GitLab Support can try to run the following scripts to resolve the issue:

# Check if can connect to the self-managed instance
checker ="", 443)

# Returns `true` if successful

# Returns an error if the check fails
# Locate the installation record for the self-managed instance
installation = JiraConnectInstallation.find_by_instance_url("")

# Try to send the token again from to the self-managed instance
ProxyLifecycleEventService.execute(installation, :installed, installation.instance_url)

Failed to update the GitLab instance

When you set up the GitLab for Jira Cloud app, you might get a Failed to update the GitLab instance error after you enter your self-managed instance URL.

To resolve this issue, ensure all prerequisites for your installation method have been met:

If you have configured a Jira Connect Proxy URL and the problem persists after checking the prerequisites, review Debugging Jira Connect Proxy issues.

If you're using GitLab 15.8 and earlier and have previously enabled both the jira_connect_oauth_self_managed and the jira_connect_oauth feature flags, you must disable the jira_connect_oauth_self_managed flag due to a known issue. To check for these flags:

  1. Open a Rails console.

  2. Execute the following code:

    # Check if both feature flags are enabled.
    # If the flags are enabled, these commands return `true`.
    # If both flags are enabled, disable the `jira_connect_oauth_self_managed` flag.

Debugging Jira Connect Proxy issues

If you set Jira Connect Proxy URL to when you set up your instance, you can:

  • Inspect the network traffic in your browser's development tools.
  • Reproduce the Failed to update the GitLab instance error for more information.

You should see a GET request to

This request should return a 200 OK, but it might return a 422 Unprocessable Entity if there was a problem. You can check the response body for the error.

If you cannot resolve the issue and you're a GitLab customer, contact GitLab Support for assistance. Provide GitLab Support with:

  • Your self-managed instance URL.
  • Your username.
  • Optional. The X-Request-Id response header for the failed GET request to
  • Optional. A HAR file you've processed with harcleaner that captures the issue.

GitLab Support can then investigate the issue in the server logs.

GitLab Support

NOTE: These steps can only be completed by GitLab Support.

In Kibana, the logs should be filtered for json.meta.caller_id: JiraConnect::InstallationsController#update and NOT json.status: 200. If you have been provided the X-Request-Id value, you can use that against json.correlation_id to narrow down the results.

Each GET request to the Jira Connect Proxy URL generates two log entries.

For the first log:

  • json.status is 422 Unprocessable Entity.
  • json.params.value should match the self-managed GitLab URL [[FILTERED], {"instance_url"=>""}].

For the second log, you might have one of the following scenarios:

  • Scenario 1:

    • json.message, json.jira_status_code, and json.jira_body are present.
    • json.message is Proxy lifecycle event received error response or similar.
    • json.jira_status_code and json.jira_body might contain the response received from the self-managed instance or a proxy in front of the instance.
    • If json.jira_status_code is 401 Unauthorized and json.jira_body is empty:
      • Jira Connect Proxy URL might not be set to

      • If a reverse proxy is in front of your self-managed instance, the Host header sent to the self-managed instance might not match the reverse proxy FQDN. Check the Workhorse logs on the self-managed instance:

        grep /-/jira_connect/events/installed /var/log/gitlab/gitlab-workhorse/current

        The output might contain the following:

          "host":"", // The host should match the reverse proxy FQDN entered into the GitLab for Jira Cloud app
          "remote_ip":"", // This IP should be within the IP range
  • Scenario 2:

    • json.exception.class and json.exception.message are present.
    • json.exception.class and json.exception.message contain whether an issue occurred while contacting the self-managed instance.

Failed to link group

When you link a group, you might get the following error:

Failed to link group. Please try again.

A 403 Forbidden is returned if the user information cannot be fetched from Jira because of insufficient permissions.

To resolve this issue, ensure the Jira user that installs and configures the app meets certain requirements.

Failed to load Jira Connect Application ID

When you sign in to the GitLab for Jira Cloud app after you point the app to your self-managed instance, you might get the following error:

Failed to load Jira Connect Application ID. Please try again.

When you check the browser console, you might also see the following message:

Cross-Origin Request Blocked: The Same Origin Policy disallows reading the remote resource at (Reason: CORS header 'Access-Control-Allow-Origin' missing). Status code: 403.

To resolve this issue:

  1. Ensure /-/jira_connect/oauth_application_id is publicly accessible and returns a JSON response:

    curl --include ""
  2. If you installed the app from the official Atlassian Marketplace listing, ensure Jira Connect Proxy URL is set to without leading slashes.