All posts

The simplest way to make Looker TeamCity work like it should

You finish a build, open Looker to check analytics, and realize access tokens expired again. Half your team stalls waiting for approvals. It’s the classic DevOps facepalm, caused by disconnected identity logic between Looker and TeamCity. Looker is brilliant at surfacing business data but it expects consistent permissions from analytics users. TeamCity runs code and pipelines fast, yet it focuses on build automation, not identity sync. When you put them together, you want dashboards that update

Free White Paper

End-to-End Encryption + Sarbanes-Oxley (SOX) IT Controls: The Complete Guide

Architecture patterns, implementation strategies, and security best practices. Delivered to your inbox.

Free. No spam. Unsubscribe anytime.

You finish a build, open Looker to check analytics, and realize access tokens expired again. Half your team stalls waiting for approvals. It’s the classic DevOps facepalm, caused by disconnected identity logic between Looker and TeamCity.

Looker is brilliant at surfacing business data but it expects consistent permissions from analytics users. TeamCity runs code and pipelines fast, yet it focuses on build automation, not identity sync. When you put them together, you want dashboards that update from CI results, governed by the same roles that manage deployments. Looker TeamCity integration ties those worlds so your metrics know what your code just did.

Here’s the simple concept. Every build in TeamCity can trigger Looker actions through REST or webhook calls. That’s where identity should flow too. If your company uses Okta, Azure AD, or an OIDC-based identity provider, map those tokens inside TeamCity’s environment variables, not separate API secrets manually. Each execution inherits the right access level for Looker queries or metadata writes. The outcome: zero broken reports, and analysts see verified, recent build data.

You can tighten this workflow further with RBAC mapping. Assign Looker roles that mirror TeamCity project permissions, such as “dev,” “qa,” or “release.” Automate secret rotation with AWS Secrets Manager so tokens never sit unencrypted. When permissions change, rebuild triggers refresh the data source automatically. That stops the eerie lag between a user leaving your organization and still appearing in dashboard filters.

Quick answer: How do I connect Looker TeamCity securely?
Use TeamCity’s build parameters to store a temporary OIDC token that Looker trusts for API authentication. Rotate every few hours or after each pipeline run to keep compliance intact with SOC 2 and ISO standards.

Continue reading? Get the full guide.

End-to-End Encryption + Sarbanes-Oxley (SOX) IT Controls: Architecture Patterns & Best Practices

Free. No spam. Unsubscribe anytime.

Operations benefits:

  • Faster data updates from every deployment.
  • Security boundaries that follow your identity provider.
  • Fewer manual permissions to clean up.
  • Consistent audit trails between analytics and builds.
  • Reduced noise from false dashboard alerts.

Developers love this setup because it kills context-switching. No need to jump from CI logs to analytics portals for confirmation. The whole thing feels immediate. It’s real developer velocity, not just automation for the sake of automation.

Platforms like hoop.dev turn those access rules into guardrails that enforce policy automatically. They connect identity, environment, and data endpoints so integrations like Looker TeamCity remain safe without extra scripting or secret juggling.

With AI agents creeping into every pipeline, access rules matter more. If a copilot can trigger a build, it should inherit trusted identity scopes, not random tokens. Integrations built with structured identity become the defense line that keeps models from leaking data they should never see.

When Looker and TeamCity share a common identity flow, analytics stop being a report and become part of your CI output. It’s clean, fast, and auditable. That’s what working like it should really means.

See an Environment Agnostic Identity-Aware Proxy in action with hoop.dev. Deploy it, connect your identity provider, and watch it protect your endpoints everywhere—live in minutes.

Get started

See hoop.dev in action

One gateway for every database, container, and AI agent. Deploy in minutes.

Get a demoMore posts