Automatic analysis
On this page
SonarQube Cloud can automatically analyze your code simply by reading it from your repository, without the need to configure a CI-based analysis.
When you first import a project that is compatible with automatic analysis, the first analysis behaves differently from subsequent analyses. On the first analysis not only will the main branch be analyzed, but, also the most recently active pull requests, up to a maximum of five. After that, automatic analysis will trigger a new analysis on each push to the default branch and on each push to any pull request branch.
Prerequisites
Currently, automatic analysis has the following limitations:
- It is only available for GitHub repositories.
- Branch analysis (analysis of non-pull request branches other than the main branch) is not supported.
- Multiple projects bound to a single repository (the monorepo strategy) are not supported.
- Code coverage information is not supported.
- Import of external rule engine reports is not supported.
Analyzing Gradle files
If you are analyzing Gradle files, your Gradle build file must be located in the root of your repository in order to be detected by the scanner because SonarScanner checks for the presence of a `pom.xml`, `build.gradle`, or `build.gradle.kts` file.
If your Gradle build file is located in sub-directory, you have to use CI-based analysis instead. For more information, see Analyzing multi-project builds.
Supported languages
Automatic analysis is available for all languages that SonarQube Cloud supports.
However, it does not support Objective-C and there is no plan to support it.
For Java, there are some known limitations. See the dedicated sections below for the details.
Automatic analysis now also supports Azure Resource Manager and its two formats, JSON and Bicep.
Activating automatic analysis
For new projects:
- After importing a project from GitHub, SonarQube Cloud will automatically check whether your project is eligible for automatic analysis. This should take a few seconds.
- SonarQube Cloud will deem a project eligible for automatic analysis only if fewer than 20% of the lines of code in the project are in a non-compatible language.
- For a Java project to be eligible, the amount of Java code cannot exceed 10MB.
- SonarQube Cloud will reject a project for automatic analysis if it contains a
sonar-project.properties
file (see Presence of a properties file).
- If your project is eligible, SonarQube Cloud will automatically trigger the first analysis. On this first analysis, the system will analyze the main branch of the project and the five most recently active pull requests. All you have to do is wait for the analysis to finish.
- If your project is not compatible, SonarQube Cloud will suggest other analysis methods such as using a CI tool.
- You can force automatic analysis on an initially non-eligible project. However, doing this is not recommended as it will typically not provide useful information. To force automatic analysis, do one of the following:
- From your project’s homepage, click the Force Automatic Analysis button.
- From your project’s Administration > Analysis Method page, turn on Automatic Analysis.
For existing projects:
- Go to your project’s Administration > Analysis Method page and turn on Automatic Analysis.
- The Analysis Method page will display a compatibility check, so you are aware of our recommendations for your specific project.
Presence of a properties file
If you import a project that already contains a sonar-project.properties
file, SonarQube Cloud will deem the project ineligible for automatic analysis. You can still force automatic analysis if you choose. The reason for this limitation is that the presence of a sonar-project.properties
in a newly imported project usually means that the customer is migrating from SonarQube Server and probably wishes to continue with the same CI-based configuration as they were using on that platform, particularly since automatic analysis does not offer all of the same features as CI-based analysis.
Analysis Method Indicator
If a project uses automatic analysis, then in the Project Overview > Information under Last analysis method the system will display Analyzed by SonarQube Cloud:
Conflict with CI-based Analysis
Automatic analysis is not intended to be used in conjunction with CI-based analysis.
If you do enable automatic analysis, you must ensure that you do not have any CI-based analyses configured. If you do then these CI-based analyses will fail and cause a failure in your build process.
Similarly, if you wish to use a CI-based analysis on a project, you must ensure that automatic analysis is disabled for that project.
This is done to prevent duplicate analyses from being sent to SonarQube Cloud that would cause problems in your project activity reports.
Deactivating automatic analysis
Go to your project’s Administration > Analysis Method page and unselect Enabled for this project.
From the same page, you can then follow one of our tutorials for configuring SonarQube Cloud analyses with another method.
As an organization admin, you can disable the automatic analysis for all new projects in your Enterprise plan organization.
Additional analysis configuration
You can add more configuration to your analyses by adding a .sonarcloud.properties
file to your repository’s default branch. Note that this is different from the sonar-project.properties
file used for CI-based analysis.
Below are the supported optional settings for the .sonarcloud.properties
file. Please note that wildcard patterns are not allowed. Read more about explicit settings and analysis scope.
Note that some of these settings can also be configured from the SonarQube Cloud UI. In your project’s Administration > General Settings > Analysis Scope > Files, you can define file exclusions and inclusions. If you have different options set on the UI and the .sonarcloud.properties
file, SonarQube Cloud will only take into account the one from the .sonarcloud.properties
file.
- This feature works for any project, public or private.
- It can be activated at no extra cost.
- If you were previously using the Automatic Analysis Beta, removing the
.sonarcloud.properties
file will no longer disable automatic analysis. It will only disable the additional configuration settings you might have defined in it. You will still have to disable automatic analysis from the SonarQube Cloud UI, in the Administration > Analysis Method page.
Automatic analysis for Java projects
Automatic analysis provides the quickest way to get your Java project up and running on SonarQube Cloud and see code analysis results fast.
To be eligible for automatic analysis, your Java project must:
- use either Maven or Gradle
- have less than 10MB in total amount of code
Automatic analysis for Java does have some limitations:
- XSS (Cross-Site Scripting) issues can’t be detected: to get the full power of Sonar analyzers, it’s required to switch to CI-based analysis.
- For Gradle-based projects, there are less security issues detected: to get the full power of Sonar analyzers, it’s required to switch to CI-based analysis.
- Rules that belong to this list are not supported because the results that they currently produce are not accurate enough (see the line with
JAVA_CHECKS_NOT_WORKING_FOR_AUTOSCAN
) - Not all properties are supported (see below).
Java automatic analysis does not support the following properties:
- sonar.sources
- sonar.tests
- sonar.inclusions
- sonar.test.inclusions
This is because we assume that your files will follow the standard directory layout that is expected by Maven and Gradle (**/src/main/**/*
and **/src/test/**/*
) for Java projects.
Automatic analysis for .NET projects
SonarQube Cloud automatic analysis now also supports .NET projects. .NET Framework, .NET Core, .NET 5 and .NET 6 projects can be analyzed but are subject to some limitations:
- Projects must contain at least 80% code in languages compatible with .NET. The amount of .NET code for automatic analysis is calculated by adding the sum of *.cs and *.vb files together.
- Projects must contain at least one XML file - *.csproj or *.vbproj. A combination of both file types is acceptable.
With these limitations in mind, the next step in your Java or .NET project onboarding is to set up CI-based analysis to get the most out SonarQube Cloud analysis. You can find more information on that here. In the meantime, the capabilities of automatic analysis will continue to evolve and improve.
Automatic analysis for C and C++ projects
There are no additional requirements for C and C++ projects, apart from the standard prerequisites for automatic analysis.
- C & C++ automatic analysis does not have any toolchain or project structural requirements.
- C & C++ can be analyzed in combination with all other supported languages (including Java and .NET.)
SonarQube Cloud automatic analysis for C and C++ is already available and ready to analyze. The quality of analysis is very similar to a CI-based analysis and, for most users, it is the only analysis you really need.
For other users, there are a few cases where a CI-based analysis remains a better option.
- If your project is so big that the analysis cannot be completed before the analysis times out, automatic analysis will fail.
- If you require faster analysis. You should run the analysis using self-hosted resources with an increased hardware capacity. It would also allow you to keep full control of the analysis cache if needed.
- If your project uses generated code that you want to analyze. For example, this can happen in some custom build systems.
- If you need control over the configuration of your code. For example, with automatic analysis, you cannot analyze a specific build variant. Automatic analysis uses a configuration that maximizes the amount of code analyzed and the OS and architecture used for this can differ from your own configuration.
- If your project is experiencing missing issues. In rare cases, automatic analysis can lead to such limitations.
Was this page helpful?