SonarQube - The Complete Guide

Table of contents
- What is SonarQube?
- SonarQube Prerequisites (Hardware & Software)
- How to install SonarQube(Linux/Ubuntu)?
- Installation of SonarQube in Windows
- Global SonarQube Configuration (sonar-scanner.properties)
- SonarQube Integration with Maven
- SonarQube Integration with dotNet
- SonarQube Integration with Angular
- Why to run tests for SonarQube in Maven, .NET, and Angular projects?
- What is Production Code Analysis?
What is SonarQube?
SonarQube is an open-source platform developed by SonarSource used for continuous inspection of code quality. It performs static code analysis to detect bugs, vulnerabilities, and code smells in multiple programming languages. SonarQube integrates with CI/CD pipelines to ensure clean, maintainable, and secure code.
Why do we use SonarQube?
Code Quality Assurance: Identifies bugs, code smells, and security vulnerabilities.
Continuous Integration: Integrates with CI/CD pipelines for automatic code analysis.
Multi-language Support: Supports over 25 programming languages like Java, JavaScript, C#, Python, etc.
Technical Debt Management: Provides metrics to track and reduce technical debt.
Security Analysis: Detects security issues and suggests remediations.
Customizable Rules: Allows teams to customize rules and quality profiles as per project needs.
Alternatives to SonarQube
CodeClimate: Focuses on maintainability and test coverage.
Codacy: Provides static analysis, security checks, and code reviews.
Checkmarx: Emphasizes security vulnerabilities detection.
Fortify: Enterprise-level static and dynamic security testing.
Veracode: Advanced application security testing platform.
SonarQube Editions and Their Differences
Community Edition (Free):
Supports static code analysis for 15+ languages.
Basic security checks.
No commercial support.
Developer Edition:
Adds vulnerability detection.
Branch analysis.
Adds more language support.
Enterprise Edition:
Portfolio and governance management.
Reports and dashboards.
Advanced security checks.
Data Center Edition:
Designed for large-scale enterprises.
High availability and horizontal scalability.
Benefits of SonarQube
Improved Code Quality: Provides real-time feedback and guidance.
Enhanced Security: Identifies security vulnerabilities early in development.
Automation: Seamless CI/CD integration ensures continuous inspection.
Actionable Insights: Offers metrics and trends to manage technical debt.
Scalability: Supports multiple languages and large projects.
Customizable: Adapts rules and quality gates to project needs.
Key Concepts DevOps People Should Know About SonarQube
Quality Gates: Define the pass/fail criteria for code quality checks.
Quality Profiles: Set rules for specific languages.
Technical Debt: Tracks the effort needed to fix issues.
Metrics: Provides insights into code complexity, duplication, and security.
Integration: Works with Jenkins, GitLab, GitHub Actions, Azure DevOps, etc.
Reports: Generates reports for audits and compliance.
**SonarQube Server 10.8 | Official Documentation**
SonarQube Prerequisites (Hardware & Software)
Hardware Requirements:
Small scale (up to 100K LOC): 2 cores, 4 GB RAM, 10 GB disk space
Medium scale (100K–500K LOC): 4 cores, 8 GB RAM, 20 GB disk space
Large scale (500K+ LOC): 8+ cores, 16+ GB RAM, 50+ GB disk space
Disk: SSD recommended
Software Requirements:
Java 17 (OpenJDK or Oracle JDK)
Database:
PostgreSQL (10 or later) — recommended
Microsoft SQL Server (2016 or later)
Oracle (12c or later) — paid
H2 database (default, for testing only — not for production)
OS Compatibility:
Linux: Ubuntu, CentOS, Red Hat (64-bit)
Windows: Windows Server 2019 or later (64-bit)
macOS: Monterey or later (for dev use only)
Network Requirements:
Port 9000 (for SonarQube's web interface)
Ensure firewall allows traffic on port 9000
Additional Tools for CI/CD:
Git (version control)
Build tools:
Maven (Java projects)
.NET SDK (C# projects)
Node.js/npm (JavaScript/Angular projects)
How to install SonarQube(Linux/Ubuntu)?
Step 1: Update the System
sudo apt update
sudo apt upgrade
Step 2: Install Java (OpenJDK 17) (If not already installed)
sudo apt install openjdk-17-jdk
java -version
Step 3: Create a SonarQube User
Create a non-root user to run SonarQube securely:
sudo adduser --system --no-create-home --group --disabled-login sonarqube
Step 4: Download and Install SonarQube
1. Go to /opt — the standard directory for optional software:
cd /opt
2. Download the SonarQube Community Edition:
wget https://binaries.sonarsource.com/Distribution/sonarqube/sonarqube-10.3.0.82913.zip
OR Download Manually from here => SonarQube Download | Community Build | Sonar
3. Install unzip if not installed:
sudo apt install unzip
4. Unzip the SonarQube package:
sudo unzip sonarqube-10.3.0.82913.zip
5. Rename the directory for simplicity:
sudo mv sonarqube-10.3.0.82913 sonarqube
6. Set the correct permissions:
sudo chown -R sonarqube:sonarqube /opt/sonarqube
Step 5: Configure SonarQube
Edit the SonarQube configuration file:
sudo nano /opt/sonarqube/conf/sonar.properties
For now, we’ll use the built-in H2 database (default for testing). You can configure PostgreSQL later if needed.
Ensure the following line is enabled for web access: sonar.web.port=9000
Step 6: Set Up SonarQube as a Service
Create a new systemd service file:
sudo nano /etc/systemd/system/sonarqube.service
Add the following configuration:
[Unit]
Description=SonarQube service
After=syslog.target network.target
[Service]
Type=forking
User=sonarqube
Group=sonarqube
ExecStart=/opt/sonarqube/bin/linux-x86-64/sonar.sh start
ExecStop=/opt/sonarqube/bin/linux-x86-64/sonar.sh stop
LimitNOFILE=65536
Restart=always
[Install]
WantedBy=multi-user.target
Reload the systemd configuration:
sudo systemctl daemon-reload
Step 7: Adjust System Limits
SonarQube requires higher limits for file descriptors and virtual memory:
1. Update kernel limits temporarily:
sudo sysctl -w vm.max_map_count=524288
sudo sysctl -w fs.file-max=131072
2. Persist the settings by adding them to /etc/sysctl.conf:
sudo nano /etc/sysctl.conf
Add these lines:
vm.max_map_count=524288
fs.file-max=131072
Apply the changes:
sudo sysctl --system
Step 8: Start SonarQube
Enable SonarQube to start at boot:
sudo systemctl enable sonarqube
Start the SonarQube service:
sudo systemctl start sonarqube
Check the service status:
sudo systemctl status sonarqube
Step 9: Access SonarQube
By default, SonarQube runs on port 9000.
Open your browser and go to:
http://your-server-ip:9000
Default credentials:
Username: admin
Password: admin
You’ll be prompted to change the password on the first login.
Installation of SonarQube in Windows
Step 1: Prerequisites
Install Java 17
- SonarQube requires Java 17 (OpenJDK or Oracle JDK).
Download OpenJDK 17 from Adoptium.
Install it and set up the environment variables:
Set JAVA_HOME:
setx JAVA_HOME "C:\Program Files\Java\jdk-17"
Add Java to PATH:
setx PATH "%PATH%;%JAVA_HOME%\bin"
Verify installation: java -version
- (Optional) Install PostgreSQL
SonarQube comes with an embedded H2 database, but for production use, we should use PostgreSQL.
Download PostgreSQL from here.
Create a database for SonarQube:
CREATE DATABASE sonarqube;
CREATE USER sonar WITH PASSWORD 'sonar';
ALTER ROLE sonar SET client_encoding TO 'utf8';
ALTER ROLE sonar SET default_transaction_isolation TO 'read committed';
ALTER ROLE sonar SET timezone TO 'UTC';
GRANT ALL PRIVILEGES ON DATABASE sonarqube TO sonar;
Step 2: Download SonarQube
Go to the SonarQube Downloads Page.
Download the Community Edition (Free).
Extract the ZIP file to a directory like: C:\SonarQube\
Step 3: Configure SonarQube (Optional)(Skip if using the default H2 database)
If you want to connect to PostgreSQL:
Open this file: C:\SonarQube\conf\sonar.properties
Update the PostgreSQL settings:
sonar.jdbc.username=sonar
sonar.jdbc.password=sonar
sonar.jdbc.url=jdbc:postgresql://localhost:5432/sonarqube
Change the default port (if needed):
sonar.web.port=9000
Step 4: Start SonarQube
- Open Command Prompt as Administrator.
Navigate to the bin directory:cd C:\SonarQube\bin\windows-x86-64
Start SonarQube (without installing it as a service):StartSonar.bat
**Wait for the log to show:
**SonarQube is up
Access SonarQube in your browser:
http://localhost:9000
Login credentials:
Username: admin
Password: admin
Step 5: Stop SonarQube
To stop the SonarQube instance, either:
Close the terminal running the StartSonar.bat.
Or press Ctrl + C in the terminal.
Step 6: Install SonarScanner (Optional – For Analyzing Projects)
To analyze a project using SonarQube, install SonarScanner:
- Download SonarScanner from here.
Extract the ZIP file to:C:\SonarScanner\
Set environment variables:
setx SONAR_SCANNER_HOME "C:\SonarScanner\bin"
setx PATH "%PATH%;%SONAR_SCANNER_HOME%"
Verify installation:sonar-scanner -h
Step 7: Run a Sample Code Analysis
In your project directory, create a file named sonar-project.properties:
sonar.projectKey=my_project
sonar.host.url=http://localhost:9000
sonar.login=admin
sonar.password=admin
sonar.sources=.
Run the scanner:
sonar-scanner
View the results in SonarQube’s UI: http://localhost:9000
Step 8: Run SonarQube as a Windows Service (Optional)
If you want SonarQube to run automatically on startup:
Instead of Wrapper.exe, we need to use the SonarService.bat script:
Open Command Prompt as Administrator.
Navigate to your SonarQube bin folder:
cd C:\SonarQube\bin\windows-x86-64
Install SonarQube as a service:SonarService.bat install
Start the service:net start SonarQube
If there's an error, check the logs in C:\SonarQube\logs\sonar.log.
Verify the service
Check if SonarQube is running:sc query SonarQube
Or use the Task Manager → Services tab → Look for SonarQube.
(Optional) Auto-start the service
If you want SonarQube to start automatically with Windows:
Open Services (services.msc).
Find SonarQube → Right-click → Properties.
Set Startup type to Automatic.
Click Apply → OK.
Troubleshooting
Port 9000 already in use:
Change the port in sonar.properties:sonar.web.port=9001
Java errors:
**Ensure you’ve installed Java 17 and set the correct JAVA_HOME:java -version
echo %JAVA_HOME%
Memory issues (max virtual memory error):
Run this in Admin Command Prompt:wmic computersystem set AutomaticManagedPagefile=True
Global SonarQube Configuration (sonar-scanner.properties)
Apart from project-level configs, there’s a global config file used by SonarScanner called sonar-scanner.properties.
Where to find it (Location):
Linux: /etc/sonar-scanner/sonar-scanner.properties
Windows: C:\sonar-scanner\conf\sonar-scanner.properties
Inside Docker: /opt/sonar-scanner/conf/sonar-scanner.properties
What does it do?
Stores default configs for all projects, so you don’t have to repeat them in each sonar-project.properties file.
Useful for setting the default SonarQube server URL, authentication token, etc.
Example:
# SonarQube server URL
sonar.host.url=http://localhost:9000
# Authentication token
sonar.token=your_sonar_token
# Default project settings
sonar.sourceEncoding=UTF-8
sonar.language=java
How to use it:
- If you have this global config set up, you can run the scanner without specifying these options each time:
sonar-scanner
The scanner will automatically pull configs from the global file.
SonarQube Integration with Maven
Prerequisites
SonarQube Server running (local installation, Docker, or cloud-hosted)
SonarQube Token (generate in SonarQube under User > My Account > Security)
Maven installed (3.x or higher)
Java JDK installed (8 or higher)
Using Maven with SonarQube Plugin
Step 1: Add SonarQube Plugin to pom.xml
Add the following to your pom.xml:
<properties>
<sonar.host.url>http://localhost:9000</sonar.host.url>
<sonar.login>YOUR_SONARQUBE_TOKEN</sonar.login>
</properties>
<build>
<plugins>
<plugin>
<groupId>org.sonarsource.scanner.maven</groupId>
<artifactId>sonar-maven-plugin</artifactId>
<version>3.9.1.2184</version>
</plugin>
</plugins>
</build>
<properties>
<!-- SonarQube Properties -->
<!-- SonarQube server URL -->
<sonar.host.url>http://localhost:9000</sonar.host.url>
<!-- Your SonarQube token -->
<sonar.login>your-generated-token</sonar.login>
<!-- Unique project key -->
<sonar.projectKey>your-project-key</sonar.projectKey>
<!-- Project display name -->
<sonar.projectName>Your Project Name</sonar.projectName>
<!-- Optional: Project version -->
<sonar.projectVersion>1.0</sonar.projectVersion>
<!-- Optional: Source encoding -->
<sonar.sourceEncoding>UTF-8</sonar.sourceEncoding>
</properties>
Step 2: Run Analysis
Run the following command in the project root:
mvn clean verify sonar:sonar
Using SonarScanner CLI (Multi-Language Project)
- Install SonarScanner CLI:
# For Linux/macOS
brew install sonar-scanner
# For Windows
choco install sonar-scanner
We can also download manually → SonarScanner CLI
Create sonar-project.properties:
sonar.projectKey=PROJECT_KEY
sonar.projectName=PROJECT_NAME
sonar.host.url=http://localhost:9000
sonar.login=YOUR_SONARQUBE_TOKEN
sonar.sources=src
sonar.exclusions=**/test/**, /target/
Run Analysis:
sonar-scanner
Use SonarScanner CLI only if:
You have a multi-language project
Your build process doesn’t use Maven
You want more control over the scan process
Jenkins Integration
Install SonarQube Scanner Plugin in Jenkins
Configure SonarQube Server in Jenkins (Manage Jenkins > Configure System)
Add SonarQube Analysis Step in your pipeline:
pipeline {
agent any
stages {
stage('Build') {
steps {
sh 'mvn clean package'
}
}
stage('SonarQube Analysis') {
steps {
withSonarQubeEnv('SonarQube_Server') {
sh 'mvn sonar:sonar'
}
}
}
}
}
GitHub Actions
Create a Workflow File (.github/workflows/sonar.yml):
name: SonarQube Analysis on: [push] jobs: sonarqube: runs-on: ubuntu-latest steps: - uses: actions/checkout@v3 - name: Set up JDK uses: actions/setup-java@v3 with: java-version: '17' distribution: 'temurin' - name: Run SonarQube Analysis run: | mvn clean verify sonar:sonar \ -Dsonar.host.url=${{ secrets.SONAR_HOST }} \ -Dsonar.login=${{ secrets.SONAR_TOKEN }}
- Add Secrets SONAR_TOKEN and SONAR_HOST in GitHub repository settings.
Key Notes to Remember
Exclude Test Files:
Usesonar.exclusions=**/test/**
to exclude test files.Coverage Reports:
Use tools like JaCoCo for code coverage:
<plugin>
<groupId>org.jacoco</groupId>
<artifactId>jacoco-maven-plugin</artifactId>
<version>0.8.8</version>
<executions>
<execution>
<goals>
<goal>prepare-agent</goal>
</goals>
</execution>
<execution>
<id>report</id>
<phase>prepare-package</phase>
<goals>
<goal>report</goal>
</goals>
</execution>
</executions>
</plugin>
Multi-Module Projects:
Use sonar.modules in sonar-project.properties for multi-module projects.
Maven projects
No need for sonar-project.properties
SonarQube picks up configurations directly from the POM file (pom.xml)
Why no sonar-project.properties?
Maven uses the SonarQube plugin to read project metadata (name, version, sources, tests) directly from pom.xml.
Multi-module SonarQube analysis in Maven.
Before SonarQube 6.6: We could use sonar.modules in sonar-project.properties to handle multi-module projects.
After SonarQube 6.6: The sonar.modules property was deprecated — now, Maven's pom.xml handles multi-module projects natively.
Modern Approach: Multi-module Analysis Using Maven's POM (Post SonarQube 6.6)
If using Maven 3+ and SonarQube 6.6+ → Use Maven's native multi-module support (via pom.xml).
In a Maven multi-module project, the parent pom.xml defines submodules. SonarQube reads this directly.
Project structure:
/maven-project-root
│-- /module1
│ └── pom.xml
│-- /module2
│ └── pom.xml
└── pom.xml (parent POM)
Parent pom.xml:
<project>
<modelVersion>4.0.0</modelVersion>
<groupId>com.example</groupId>
<artifactId>my-maven-project</artifactId>
<version>1.0-SNAPSHOT>
<packaging>pom</packaging>
<modules>
<module>module1</module>
<module>module2</module>
</modules>
<build>
<plugins>
<plugin>
<groupId>org.sonarsource.scanner.maven</groupId>
<artifactId>sonar-maven-plugin</artifactId>
<version>3.10.0.2594</version>
</plugin>
</plugins>
</build>
</project>
Running SonarQube Analysis:
Run this in the root directory:
mvn clean verify sonar:sonar \
-Dsonar.projectKey=my-maven-project \
-Dsonar.host.url=http://localhost:9000 \
-Dsonar.token=your_sonar_token
SonarQube will automatically detect all submodules and show them in the UI.
Deprecated Approach: Using sonar-project.properties (Pre SonarQube 6.6)
If you have a non-Maven project or need manual control → Use sonar-project.properties (remember it’s deprecated).
If you still want to understand the older method for learning purposes, here’s how it worked:
In the root directory, create sonar-project.properties:
# Main project settings
sonar.projectKey=my-maven-project
sonar.projectName=My Maven Multi-Module Project
sonar.projectVersion=1.0
# Modules
sonar.modules=module1,module2
# Module 1
module1.sonar.projectName=Module 1
module1.sonar.sources=module1/src/main/java
module1.sonar.tests=module1/src/test/java
# Module 2
module2.sonar.projectName=Module 2
module2.sonar.sources=module2/src/main/java
module2.sonar.tests=module2/src/test/java
# SonarQube server
sonar.host.url=http://localhost:9000
sonar.token=your_sonar_token
Running the scanner: sonar-scanner
This would push results for module1 and module2 as sub projects under the main project.
SonarQube Integration with dotNet
Prerequisites
- SonarQube Server running (local installation, Docker, or cloud-hosted)
- SonarQube Token (generate in SonarQube under User > My Account > Security)
- .NET SDK installed (verify with
dotnet --version
) - SonarScanner for .NET installed (install globally using
dotnet tool install --global dotnet-sonarscanner
) - Java JDK installed (8 or higher, required for SonarQube)
- SonarQube Project Key (create a project in SonarQube to obtain the key)
- Build tool compatibility:
- For .NET Core/.NET 5+: Use
dotnet build
- For .NET Framework: Use
MSBuild.exe
andSonarScanner.MSBuild.exe
- For .NET Core/.NET 5+: Use
Let me know if you need a step-by-step guide for a specific CI/CD pipeline like Jenkins, Azure DevOps, or GitHub Actions! 🚀
SonarScanner for .NET (Recommended)
Step 1: Install the SonarScanner .NET Tool
dotnet tool install --global dotnet-sonarscanner
Step 2: Run Analysis
Start the Scanner (replace placeholders):
dotnet sonarscanner begin \
/k:"PROJECT_KEY" \
/d:sonar.host.url="http://localhost:9000" \
/d:sonar.login="YOUR_SONARQUBE_TOKEN" \
/d:sonar.cs.vscoveragexml.reportsPaths="**/*.coveragexml" \
/d:sonar.exclusions="**/bin/**/*, /obj//*, /TestResults//*"
Build the Project:
dotnet build
End the Scanner:
dotnet sonarscanner end /d:sonar.login="YOUR_SONARQUBE_TOKEN"
Example:
dotnet sonarscanner begin /k:"dotnet-two" /n:"dotnet-two" /v:"1.0" /d:sonar.host.url="http://localhost:9000" /d:sonar.login="squ_794c4612899f738bc0ee615549e850a8605dd67a" /d:sonar.sources="." /d:sonar.exclusions="**/bin/**/*, /obj//*, /TestResults//*" /d:sonar.cs.opencover.reportsPaths="**/coverage.opencover.xml"
dotnet build
dotnet test --collect:"XPlat Code Coverage"
dotnet sonarscanner end /d:sonar.login="squ_794c4612899f738bc0ee615549e850a8605dd67a"
Notes
There is No sonar-project.properties in .NET projects.
Why there is no sonar-project.properties?
.NET uses MSBuild or dotnet CLI tools, and SonarQube is integrated via the SonarScanner for .NET which uses its own configuration style.
Using the SonarQube.Analysis.xml
We can also configure SonarQube using the SonarQube.Analysis.xml file or pass properties via the CLI.**
Cons in CLI:** It requires specifying the token in every command (not secure if stored in scripts).
Create SonarQube.Analysis.xml file:
<?xml version="1.0"?>
<SonarQubeAnalysisProperties xmlns="http://schemas.sonarsource.org/2016/05/SonarQubeAnalysisProperties.xsd">
<Property Name="sonar.projectKey">my-dotnet-project</Property>
<Property Name="sonar.host.url">http://localhost:9000</Property>
<Property Name="sonar.token">your_sonar_token</Property>
</SonarQubeAnalysisProperties>
Run the commands (without passing parameters manually):
dotnet sonarscanner begin
dotnet build
dotnet sonarscanner end
Pros: Cleaner and more maintainable, More secure as it hides the token from command history, Useful for shared configurations across multiple projects.
Cons: Requires an additional configuration file.
Azure DevOps Integration
Install the SonarQube Extension from the Azure Marketplace.
Add Tasks to Pipeline (YAML example):
- task: SonarQubePrepare@5
inputs:
SonarQube: "SonarQube_Connection_Name"
scannerMode: "MSBuild"
projectKey: "PROJECT_KEY"
projectName: "PROJECT_NAME"
- task: DotNetCoreCLI@2
inputs:
command: "build"
- task: SonarQubeAnalyze@5
- task: SonarQubePublish@5
inputs:
pollingTimeoutSec: "300"
GitHub Actions
- Create a Workflow File (.github/workflows/sonar.yml):
name: SonarQube Analysis
on: [push]
jobs:
sonarqube:
runs-on: windows-latest
steps:
- uses: actions/checkout@v3
- name: Setup .NET
uses: actions/setup-dotnet@v3
with:
dotnet-version: 6.0.x
- name: Install SonarScanner
run: dotnet tool install --global dotnet-sonarscanner
- name: Run SonarQube Analysis
run: |
dotnet sonarscanner begin /k:"PROJECT_KEY" /d:sonar.login="${{ secrets.SONAR_TOKEN }}" /d:sonar.host.url="${{ secrets.SONAR_HOST }}"
dotnet build
dotnet sonarscanner end /d:sonar.login="${{ secrets.SONAR_TOKEN }}”
Add Secrets SONAR_TOKEN and SONAR_HOST in GitHub repository settings.
SonarScanner CLI (Legacy)
Install SonarScanner CLI:
# For Linux/macOS
brew install sonar-scanner
# For Windows
choco install sonar-scanner
Create sonar-project.properties:
sonar.projectKey=PROJECT_KEY
sonar.projectName=PROJECT_NAME
sonar.host.url=http://localhost:9000
sonar.login=YOUR_SONARQUBE_TOKEN
sonar.sources=.
sonar.exclusions=**/bin/**, /obj/, /TestResults/
Run Analysis: sonar-scanner
Key Notes
Exclude Test Projects: Use /d:sonar.exclusions="**/*Tests.cs" to ignore test files.
Coverage Reports: Integrate with coverlet or OpenCover for coverage data.
.NET Framework: Replace dotnet build with MSBuild.exe for .NET Framework projects.
Security: Store SonarQube tokens as secrets (never hardcoded).
Troubleshooting
Build Failures: Ensure dotnet build succeeds before analysis.
Authentication Issues: Validate the SonarQube token and server URL.
Logs: Check logs in .sonar or SonarQube.Analysis.xml.
SonarQube Integration with Angular
Prerequisites
SonarQube Server running.
SonarQube Token (generate in SonarQube under User > My Account > Security).
Node.js and npm installed.
Angular CLI installed (npm install -g @angular/cli).
Using SonarScanner CLI(Recommended)
Step 1: Install SonarScanner
npm install -g sonar-scanner
Step 2: Create sonar-project.properties
sonar.projectKey=PROJECT_KEY
sonar.projectName=PROJECT_NAME
sonar.projectVersion=1.0
sonar.host.url=http://localhost:9000
sonar.login=YOUR_SONARQUBE_TOKEN
sonar.sources=src
sonar.exclusions=**/node_modules/**, /dist/, /e2e/
sonar.tests=src
sonar.test.inclusions=**/*.spec.ts
sonar.language=ts
sonar.typescript.lcov.reportPaths=coverage/lcov.info
sonar.javascript.lcov.reportPaths=coverage/lcov.info
Step 3: Generate Coverage Report
Run tests with coverage:
ng test --code-coverage
Step 4: Run Analysis sonar-scanner
Note: Angular (JavaScript/TypeScript) projects
We can use sonar-project.properties.
Since Angular doesn’t have a "native" SonarQube plugin like Maven or .NET, SonarScanner CLI relies on this file.
Using Angular CLI Builder(Simple and Easy)
Install SonarQube Scanner:
npm install sonar-scanner --save-dev
Add Script to package.json:
"scripts": {
"sonar": "sonar-scanner"
}
Run Analysis:
npm run sonar
GitHub Actions
Create a Workflow File (.github/workflows/sonar.yml):
name: SonarQube Analysis
on: [push]
jobs:
sonarqube:
runs-on: ubuntu-latest
steps:
- uses: actions/checkout@v3
- name: Set up Node.js
uses: actions/setup-node@v3
with:
node-version: '16'
- name: Install dependencies
run: npm install
- name: Run tests with coverage
run: npm test -- --code-coverage
- name: Run SonarQube Analysis
run: |
npm install -g sonar-scanner
sonar-scanner \
-Dsonar.host.url=${{ secrets.SONAR_HOST }} \
-Dsonar.login=${{ secrets.SONAR_TOKEN }}
Add Secrets SONAR_TOKEN and SONAR_HOST in GitHub repository settings.
Jenkins Integration
Install SonarQube Scanner Plugin in Jenkins.
Configure SonarQube Server in Jenkins (Manage Jenkins > Configure System).
Add SonarQube Analysis Step in your pipeline:
pipeline {
agent any
stages {
stage('Build') {
steps {
sh 'npm install'
sh 'npm run build -- --prod'
}
}
stage('Test') {
steps {
sh 'npm test -- --code-coverage'
}
}
stage('SonarQube Analysis') {
steps {
withSonarQubeEnv('SonarQube_Server') {
sh 'sonar-scanner'
}
}
}
}
}
Key Notes
Exclude Files: Use sonar.exclusions to exclude node_modules, dist, and e2e.
Coverage Reports: Use ng test --code-coverage to generate lcov.info.
Linting: Integrate with TSLint or ESLint for static code analysis.
Troubleshooting
No Coverage Data: Ensure ng test --code-coverage is executed before analysis.
Authentication Issues: Validate the SonarQube token and server URL.
Logs: Check logs in .sonar or SonarQube.Analysis.xml.
Why to run tests for SonarQube in Maven, .NET, and Angular projects?
Running test cases is important because SonarQube uses test reports and coverage data to:
Measure code coverage: the percentage of code tested by unit tests.
Identify untested code paths: showing gaps in test coverage.
Ensure test quality: catching flaky tests or missing assertions.
However, SonarQube doesn’t run the tests itself — it relies on you to run the tests and generate reports. These reports are then uploaded to SonarQube for analysis.
Why exclude test folders/files (like /test/ or /target/)?
We exclude test files because:
Test files aren't part of the production code: They don’t contribute to the final build (like classes or components).
SonarQube focuses on the quality of the main codebase: It checks if the main (production) code is properly tested, not the tests themselves.
To avoid skewing metrics: Including test files could inflate metrics like "lines of code" and give false coverage percentages.
What happens if you don’t exclude test folders?
False positives: SonarQube might flag test mocks or helper functions as code smells or bugs, even though they are not production code.
Misleading coverage — It could show 100% coverage if your tests are included, giving a false sense of security.
What if we skip running tests altogether?
Without tests:
SonarQube will show 0% test coverage.
It may lower the quality gate score (if a minimum test coverage is required).
You lose critical insights about untested code paths.
With tests:
SonarQube calculates coverage and highlights untested areas.
It improves your code quality score by proving your code is well-tested.
You can enforce rules like "Code must have at least 80% coverage."
What is Production Code Analysis?
Production code analysis means scanning only the main source code (the code that goes into the final build or deployment) not tests, mocks, or temporary files — to check for:
Bugs — Errors that could cause runtime issues.
Code smells — Maintainability issues (like duplicated code, unused variables).
Vulnerabilities — Security flaws (like SQL injection or hard-coded passwords).
Technical debt — Estimation of effort needed to fix quality issues.
SonarQube focuses on production code because:
That’s the code your users interact with.
It ensures your app runs securely and efficiently.
Testing code (mocks, unit tests, etc.) isn’t part of what goes live.
How to perform Production Code Analysis:
Maven:
Ensure test files are excluded by defining the sonar.sources property:
# sonar-project.properties or in pom.xml
sonar.sources=src/main/java
sonar.exclusions=**/test/**, /target/
Then, run SonarQube without considering tests:
mvn clean verify sonar:sonar
.NET:
Exclude test projects or test folders in sonar-project.properties:
sonar.exclusions=**/Tests/*.cs, /test//*.cs
Angular:
Exclude test files in sonar-project.properties:
sonar.sources=src/app
sonar.exclusions=**/*.spec.ts, /test/, /dist/
Analyze:
sonar-scanner
Why is Production Code Analysis important?
Security — Finds security vulnerabilities in live code.
Performance — Highlights inefficient code.
Maintainability — Ensures clean, readable, and maintainable code.
Compliance — Helps you meet coding standards (like OWASP, CWE).
Thank You! That’s all by my side.
Subscribe to my newsletter
Read articles from Murtuza Rangwala directly inside your inbox. Subscribe to the newsletter, and don't miss out.
Written by

Murtuza Rangwala
Murtuza Rangwala
Learner.