Installing the database
Install the SonarQube database according to the database engine used: MicrosoftSQL Server, Oracle, PostgreSQL
Several external database engines are supported. Check the respective Database.
Create an empty schema and a sonarqube user. Grant this sonarqube user permissions to create, update, and delete objects for this schema.
Microsoft SQL Server
Collation MUST be case-sensitive (CS) and accent-sensitive (AS).
READ_COMMITTED_SNAPSHOT MUST be set on the SonarQube database.
MS SQL database’s shared lock strategy may impact SonarQube runtime. Making sure that is_read_committed_snapshot_on is set to true to prevent SonarQube from facing potential deadlocks under heavy loads.
Example of query to check is_read_committed_snapshot_on:
SELECT is_read_committed_snapshot_on FROM sys.databases WHERE name='YourSonarQubeDatabase';Example of query to update is_read_committed_snapshot_on:
ALTER DATABASE YourSonarQubeDatabase SET READ_COMMITTED_SNAPSHOT ON WITH ROLLBACK IMMEDIATE;Encryption
If your Microsoft SQL Server doesn’t support encryption, you must add encrypt=false to the JDBC URL connection string.
If your Microsoft SQL Server requires encryption but you don’t want SonarQube to validate the certificate, you must add trustServerCertificate=true to the JDBC URL connection string.
Integrated security
To use integrated security:
Download the Microsoft SQL JDBC Auth 12.6.3 package and copy
mssql-jdbc_auth-12.6.3.x64.dllto a folder location set in the PATH environment variable on the SonarQube server host.If you’re running SonarQube as a Windows service, make sure the Windows account under which the service is running has permission to connect your SQL server.
Ensure that
sonar.jdbc.usernameorsonar.jdbc.passwordproperties are commented out or SonarQube will use SQL authentication.
sonar.jdbc.url=jdbc:sqlserver://localhost;databaseName=sonar;integratedSecurity=trueSQL authentication
To use SQL authentication, use the following connection string. Also, ensure that sonar.jdbc.username and sonar.jdbc.password are set appropriately:
sonar.jdbc.url=jdbc:sqlserver://localhost;databaseName=sonar
sonar.jdbc.username=sonarqube
sonar.jdbc.password=mypasswordOracle
If there are two SonarQube schemas on the same Oracle instance, especially if they are for two different versions, SonarQube gets confused and picks the first it finds. To avoid this issue:
Either privileges associated to the SonarQube Oracle user should be decreased.
Or a trigger should be defined on the Oracle side to automatically alter the SonarQube Oracle user session when establishing a new connection:
ALTER SESSION SET current_schema="MY_SONARQUBE_SCHEMA".
Oracle JDBC driver versions 12.1.0.1 and 12.1.0.2 have major bugs, and are not recommended for use with SonarQube (see more details).
Last updated
Was this helpful?

