we have installed Enterprise Edition v2025.6.1 on our testserver.
I tested the new sandboxing feature because it sounds very interesting.
Now I have several questions/proposals:
We often update our own Quality Profiles together with a Sonarqube update. How does the sandboxing feature behave in this situation? Does it also move issues caused by our QP update to the sandbox? Or which issues in detail are shown in the sandbox?
Is it possible to also use the sandboxing feature if we do an update of our Quality Profiles independent from a Sonar update? This would be of very high value for us. Because if we do ruleset updates we also want to give the teams the opportunity to not be directly blocked by new issues and have some time to fix them before we might remove them from the sandbox again. For us this is the same usecase.
I already noticed that on creation of new branches the sandboxing feature is not working. (If the first scan after an update creates a new branch - based on an already existing branch) This should be fixed from my point of view.
The sandbox is intended to isolate new issues raised after a server upgrade, both from new rules and from updated rules. So I suspect the algorithm won’t be smart enough to distinguish between new issues raised after upgrade from rules that were previously in the profile and new issues raised after upgrade from rules that just got moved into the profile. So if you get your timing right, I believe the issues from rules you add to your profile would be sandboxed as well. And this would be worth testing.
I’ll flag this for the PMs.
I think this scenario is beyond the expected scope of the feature.
The sandbox is intended to isolate new issues raised after a server upgrade, both from new rules and from updated rules. So I suspect the algorithm won’t be smart enough to distinguish between new issues raised after upgrade from rules that were previously in the profile and new issues raised after upgrade from rules that just got moved into the profile. So if you get your timing right, I believe the issues from rules you add to your profile would be sandboxed as well. And this would be worth testing.
Unfortunately it does not work as you expected. I tested it again. If I enable additional rules or update the severity of rules, these changes are not put into the sandbox. And this makes the feature essentially useless for us. We would need to have all issues in the sandbox. Otherwise developers would still be blocked by the appearance of the new issues.
I think this scenario is beyond the expected scope of the feature.
I think it should not be beyond the scope and I will try to explain. We create a new branch for each iteration. So the situation might be the following in an example project:
The team is working on iteration 10. There is branch DEV-10. Now we have a Sonar update. Next scan on DEV-10 will put the issues into the sandbox. Next day we might start with iteration 11. The first scan for iteration 11 will create branch DEV-11, based on DEV-10. In this branch the issues are not in the sandbox anymore and we are directly blocked. This is no exotic edge case but how we are working every day, so we would need that to be able to use the sandboxing feature at all. Otherwise it would just confuse everyone, if different branches handle the issues in a different way.
unfortunately I cannot do it the other way round easily. In my company I am just a normal user and have admin rights on the projects that belong to my area. I am no global Sonar admin. We have a team that runs the sonar servers and we have a prod server and a test server. These servers are used for the whole company.
On the testserver our admin team has now already done the update so I would have to ask them to either revert this or create a special additional server where we can try to test this scenario together. But this would be some effort. I will anyhow ask them if they see a possibility to support me in this topic.
Even if it would work if it is done in the other order, this would not help much, because we usually do our ruleset update based on new or updated rules from the sonar update. Of course we cannot update our ruleset to use new rules introduced by a sonar update before that update is done…