On Linux systems
This section explains pre-installation steps on SonarQube Server host for the Community, Developer and Enterprise Editions on Linux systems.
Making sure FIPS is not enforced
SonarQube will not run on Linux hosts where FIPS (Federal Information Processing Standard) is enforced.
Configuring the host to comply with Elasticsearch
Because SonarQube uses an embedded Elasticsearch, make sure that your host configuration complies with the Elasticsearch production mode requirements and File Descriptors configuration.
Configuring the maximum number of open files and other limits
You must ensure that:
The maximum number of memory map areas a process may have (vm.max_map_count) is greater than or equal to 524288.
The maximum number of open file descriptors (fs.file-max) is greater than or equal to 131072.
The user running SonarQube can open at least 131072 file descriptors.
The user running SonarQube can open at least 8192 threads.
You must set these limits on the host system, whatever the installation type:
For a Docker installation: These settings will then apply to the Docker container.
For a Kubernetes deployment: Check also these guidelines.
To check and change these limits, login as the user used to run SonarQube and proceed as described below depending on the type of this user.
Enabling seccomp on the Linux kernel
By default, Elasticsearch uses the seccomp filter. Make sure you use a kernel with seccomp enabled.
To check that seccomp is available on your kernel, use:
$ grep SECCOMP /boot/config-$(uname -r)
If your kernel has seccomp, you’ll see the following:
CONFIG_HAVE_ARCH_SECCOMP_FILTER=y
CONFIG_SECCOMP_FILTER=y
CONFIG_SECCOMP=y
Managing SonarQube Server access to fonts
Generating executive reports requires that fonts be installed on the server hosting SonarQube.
If you use a Linux server, you should ensure that Fontconfig is installed on the server host.
If using an Oracle database
In case your SonarQube Server is running on Linux and you are using Oracle, the Oracle JDBC Driver may be blocked due to /dev/random
. See this Oracle article for more details about this problem.
To avoid it, you may want to add this JVM parameter to your SonarQube web server (sonar.web.javaOpts
) configuration:
-Djava.security.egd=file:///dev/urandom
Last updated
Was this helpful?