This version of the SonarQube documentation is no longer maintained. It relates to a version of SonarQube that is not active.

See latest version
Start Free
10.5 | Server installation and setup | Perform pre-installation steps | On Linux systems

Pre-installation steps on Linux systems

On this page

Making sure FIPS is not enforced

SonarQube will not run on Linux hosts where FIPS (Federal Information Processing Standard) is enforced.

Configuring the host to comply with Elasticsearch

Because SonarQube uses an embedded Elasticsearch, make sure that your host configuration complies with the Elasticsearch production mode requirements and File Descriptors configuration.

Configuring the maximum number of open files and other limits

You must ensure that:

  • The maximum number of memory map areas a process may have (vm.max_map_count) is greater than or equal to 524288.
  • The maximum number of open file descriptors (fs.file-max) is greater than or equal to 131072.
  • The user running SonarQube can open at least 131072 file descriptors.
  • The user running SonarQube can open at least 8192 threads.

You must set these limits on the host system, whatever the installation type:

  • For a Docker installation: These settings will then apply to the Docker container.  
  • For a Kubernetes deployment: Check also these guidelines.  

To check and change these limits, login as the user used to run SonarQube and proceed as described below depending on the type of this user.

For a non-systemd user

1. Verify the values listed above with the following commands:

sysctl vm.max_map_count

sysctl fs.file-max

ulimit -n

ulimit -u

2. To change the max map count and the file-max, insert the following in  /etc/sysctl.d/99-sonarqube.conf (or in /etc/sysctl.conf if you use the default file (not recommended)). To apply the changes, run the corresponding Linux command.

 vm.max_map_count=524288
 fs.file-max=13107

3. To change the limits on the user running SonarQube, insert the following in /etc/security/limits.d/99-sonarqube.conf (or in /etc/security/limits.conf if you use the default file (not recommended)) where sonarqube is the user used to run SonarQube. To apply the changes, run the corresponding Linux command.

sonarqube   -   nofile   131072

sonarqube   -   nproc    8192
For a systemd user

Specify those limits inside your unit file in the section [Service] : 

[Service]

...

LimitNOFILE=131072

LimitNPROC=8192

...

Enabling seccomp on the Linux kernel

By default, Elasticsearch uses the seccomp filter. Make sure you use a kernel with seccomp enabled.

To check that seccomp is available on your kernel, use:

$ grep SECCOMP /boot/config-$(uname -r)

If your kernel has seccomp, you'll see the following:

CONFIG_HAVE_ARCH_SECCOMP_FILTER=y

CONFIG_SECCOMP_FILTER=y

CONFIG_SECCOMP=y

Managing SonarQube Server access to fonts

Generating executive reports requires that fonts be installed on the server hosting SonarQube. 

If you use a Linux server, you should ensure that Fontconfig is installed on the server host.

If using an Oracle database

In case your SonarQube Server is running on Linux and you are using Oracle, the Oracle JDBC Driver may be blocked due to /dev/random. See this Oracle article for more details about this problem.

To avoid it, you may want to add this JVM parameter to your SonarQube web server (sonar.web.javaOpts) configuration:

-Djava.security.egd=file:///dev/urandom

Was this page helpful?

© 2008-2024 SonarSource SA. All rights reserved. SONAR, SONARSOURCE, SONARQUBE, and CLEAN AS YOU CODE are trademarks of SonarSource SA.

Creative Commons License