Forums

Articles
Create
cancel
Showing results for 
Search instead for 
Did you mean: 

Unstable Egress IPs from Bitbucket Pipelines Causing RDS Failures

Yahia Mohamed
I'm New Here
I'm New Here
Those new to the Atlassian Community have posted less than three times. Give them a warm welcome!
December 3, 2025

I’m facing an issue where Bitbucket Pipelines cannot reliably connect to my AWS RDS instance when using 1× or 2× runner sizes, even though my RDS security group contains all official Atlassian outgoing IPv4 ranges.

The same pipeline works 100% of the time when using:

 

options: size: 4x cloud: true

This strongly indicates that smaller/local runners may be using non-documented or dynamic egress IPs, causing random connection timeouts.

Could you please confirm:

  1. Do 1×/2× runners use additional or dynamic IPs not listed in the official documentation?

  2. Is there any guarantee that non-cloud runners use only the documented IP ranges?

  3. Is using cloud: true the only supported method to get static egress IPs?

  4. what shoild i do if i want to use 2x or default 1x with our integration tests on private RDS

1 answer

0 votes
Ben
Atlassian Team
Atlassian Team members are employees working across the company in a wide variety of roles.
December 15, 2025

Hi Yahia,

For your information, we have updated our 1x/2x size option builds to operate from a new, broader IP range.

For teams who need their builds to run from a more restricted set of IP addresses, we recommend using the atlassian-ip-ranges configuration available with our 4x/8x steps. This option provides enhanced security by limiting the IP addresses to a smaller, more manageable list. You can find more details about this configuration here. This configuration does not need to apply to all steps in a pipeline, just the steps that access secure resources.

Please Note: Opting for larger step sizes (4x/8x) may impact billing. We encourage you to review the relevant documentation on step sizes here to understand these implications fully.

As you're using 1x/2x step size - you can view the complete list of IP addresses used by the 1x/2x steps in this JSON format. This list can be explicitly filtered for EC2 or S3 resources located in us-east-1 and us-west-2. We do not recommend or support adding these IP addresses into your firewall configuration.

Important Note: Relying solely on IP-based firewalls for securing your infrastructure is not recommended. Instead, consider implementing secure authentication methods for any services exposed to Bitbucket Pipelines, such as using OpenID Connect (OIDC).

Alternatively, you may consider utilizing Bitbucket's pipeline runners. Runners enable you to execute builds in Pipelines on your own infrastructure. Additionally, as your runner is hosted on your own infrastructure, you will have greater flexibility regarding the list of IP addresses to permit.

Cheers!

- Ben (Bitbucket Cloud Support)

 

Suggest an answer

Log in or Sign up to answer
DEPLOYMENT TYPE
CLOUD
TAGS
AUG Leaders

Atlassian Community Events