This is an archived version of the documentation for SonarQube version 6.7 LTS.
See Documentation for current functionality
Support for Microsoft SQLServer 2012 is dropped
SONAR-9763Getting issue details...
On Oracle the database columns to be dropped are now marked as UNUSED and are not physically dropped anymore. To reclaim disk space, Oracle administrators have to manually drop these unused columns. SQL request is
ALTER TABLE foo DROP UNUSED COLUMNS. The concerned tables are listed in the table
Non-hierarchical project structure no longer supported
Prior to 6.6, the only constraint was to have a hierarchical file hierarchy inside each modules. To be precise, it means all files part of a module were required to be physical children of the module base directory. There was no check that modules themselves were nested under their parent module (and ultimately root project) base directory.
Can't run as root
It has always been a bad idea to run SonarQube as root, but with the upgrade in this version of ElasticSearch, it is no longer possible. If you try to run SonarQube as root, the ElasticSearch startup will fail and the SonarQube instance will shut back down.
Additional OS-level settings for Linux
If you're running on Linux, you must now ensure that:
- vm.max_map_count is greater or equal to 262144
- fs.file-max is greater or equal to 65536
- the user running SonarQube can open at least 65536 file descriptors
- the user running SonarQube can open at least 2048 threads
You can see the values with the following commands :
You can set them dynamically for the current session by running the following commands as root:
To set these values more permanently, you must update either /etc/sysctl.d/99-sonarqube.conf (or /etc/sysctl.conf as you wish) to reflect these values.
If the user running SonarQube (sonarqube in this example) does not have the permission to have at least 65536 open descriptors, you must insert this line in /etc/limits.d/99-sonarqube.conf (or /etc/limits.conf as you wish) :
You can get more detail in the Elasticsearch documentation.
By default, Elasticsearch uses seccomp filter. On most distributions this feature is activated in the kernel, however on distribution like Red Hat Linux 6 this feature is deactivated. If you are using a distribution without this feature and you cannot upgrade to a newer version with seccomp activated, you have to explicitly deactivate this security layer by updating sonar.search.javaAdditionalOpts in sonar.properties :
You can check if seccomp is available on your kernel with :
If your kernel has seccomp, you will see :
For more detail, see the Elasticsearch documentation.