Performance issues on self-hosted Enterprise edition

which versions are you using:

  • SonarQube Server Enterprise Edition v2025.5
  • Scanner: org.sonarsource.scanner.maven:sonar-maven-plugin:5.2.0.4988:sonar and sonarsource/sonarqube-scan-action@fd88b7d7ccbaefd23d8f36f73b59db7a3d246602
  • Additional plugins: * MuleSoft
  • how is SonarQube deployed: AWS Fargate (Docker), behind internal ALB
  • what are you trying to achieve:

We started observing performance degradation (takes significantly more time) on our sonarscans, then timeouts began as our connectivity checks showed about a random dropout of 10-20%, even though the scanners seem to eventually finish.

  • what have you tried so far to achieve this:

We checked network connectivity and access logs, addressed the issues and yet the dropouts persist. We increased overall provisioned CPU and RAM for the container, too, and calibrated the number of background workers to 5. I have a hypothesis that it could be due to the Elasticsearch instance inside the container and addressed a possible write amplification issue by increasing ES heap size with search JavaOpts, yet it doesn’t seem to improve the situation. We already use the mmap and related flags to the maximum that’s allowed in a container and are aware that this is not the ideal way to deploy SonarQube. The scans still follow through, but the connectivity drops are concerning to SLAs.

Could you tell me if there is a recent bug that deteriorated this phenomenon further? And what would you suggest me going forward?

Hi,

I’m not aware of anything relevant in this area. Can you add -X to your analysis command line and post the log, redacted as necessary, so we can see where analysis is slowing down?

 
Thx,
Ann

11:29:58.483 INFO  Scanner configuration file: /opt/hostedtoolcache/sonar-scanner-cli/7.2.0.5079/linux-x64/conf/sonar-scanner.properties

11:29:58.499 INFO  SonarScanner CLI 7.2.0.5079
11:30:00.451 INFO  Communicating with SonarQube Server 2025.5.0.113872
11:30:00.453 INFO  JRE provisioning: os[linux], arch[x86_64]
11:32:24.156 INFO  Starting SonarScanner Engine...
11:32:24.158 INFO  Java 17.0.13 Eclipse Adoptium (64-bit)
11:32:25.434 INFO  Load global settings
11:32:26.415 INFO  Load global settings (done) | time=981ms
11:32:26.431 INFO  Loading required plugins
11:32:26.432 INFO  Load plugins index
11:32:26.865 INFO  Load plugins index (done) | time=435ms
11:32:26.866 INFO  Load/download plugins
11:35:22.662 INFO  Load/download plugins (done) | time=175795ms
11:35:22.839 INFO  Loaded core extensions: developer-scanner, server-common
11:35:23.154 INFO  Process project properties
11:35:23.169 INFO  Process project properties (done) | time=14ms
11:35:23.181 INFO  Project key: <key>
11:35:23.182 INFO  Base dir: <path>
11:35:23.184 INFO  Working dir: <dir>

11:35:23.190 INFO  Load project settings for component key: <key>
11:35:23.363 INFO  Load project settings for component key:  (done) | time=172ms
11:35:23.393 INFO  Load project branches
11:35:23.565 INFO  Load project branches (done) | time=171ms
11:35:23.566 INFO  Load branch configuration
11:35:23.567 INFO  Detected branch/PR in 'GitHub Action'
11:35:23.568 INFO  Auto-configuring pull request
11:35:23.574 INFO  Load branch configuration (done) | time=9ms
11:35:23.593 INFO  Load quality profiles
11:35:23.935 INFO  Load quality profiles (done) | time=339ms
11:35:23.943 INFO  Auto-configuring with CI 'Github Actions'
11:35:23.973 INFO  Load active rules

11:35:26.848 INFO  Load active rules (done) | time=2873ms
11:35:26.853 INFO  Load analysis cache

11:35:27.012 INFO  Load analysis cache (404) | time=158ms
11:35:27.521 INFO  Preprocessing files...
11:35:27.662 INFO  2 languages detected in 18 preprocessed files (done) | time=138ms
11:35:27.664 INFO  0 files ignored because of inclusion/exclusion patterns
11:35:27.664 INFO  0 files ignored because of scm ignore settings
11:35:27.669 INFO  Loading plugins for detected languages
11:35:27.669 INFO  Load/download plugins
11:38:06.843 INFO  Load/download plugins (done) | time=159171ms
11:38:06.959 INFO  Load metrics repository
11:38:07.406 INFO  Load metrics repository (done) | time=448ms
11:38:07.533 INFO  Load project repositories
11:38:07.794 INFO  Load project repositories (done) | time=259ms


This is the log.

Hi,

This is only the first part of the log, and it doesn’t appear to be the debug log you would get if you had added -X to your analysis command as requested. Please post a full, debug analysis log, including the analysis command itself, redacted as necessary.

 
Thx,
Ann

14:22:52.737 INFO  Scanner configuration file: /opt/sonar-scanner/conf/sonar-scanner.properties
14:22:52.740 INFO  Project root configuration file: NONE
14:22:52.749 INFO  SonarScanner CLI 8.0.1.6346
14:22:52.751 DEBUG Java 21.0.9 Amazon.com Inc. (64-bit)
14:22:52.753 INFO  Linux 6.6.87.2-microsoft-standard-WSL2 amd64
14:22:52.754 DEBUG SONAR_SCANNER_OPTS=-Dsonar.projectKey={key}
14:22:52.783 DEBUG uname -m returned 'x86_64'
14:22:52.785 DEBUG Using JVM default truststore: /usr/lib/jvm/java-21-amazon-corretto.x86_64/lib/security/cacerts
14:22:52.785 DEBUG Download cache base directory: /opt/sonar-scanner/.sonar/cache
14:22:52.785 DEBUG Create: /opt/sonar-scanner/.sonar/cache/_tmp
14:22:52.856 DEBUG Loading OS trusted SSL certificates...
14:22:52.856 DEBUG This operation might be slow or even get stuck. You can skip it by passing the scanner property 'sonar.scanner.skipSystemTruststore=true'
14:22:53.065 DEBUG Loaded [143] system trusted certificates
14:22:53.323 DEBUG Loaded truststore from '/usr/lib/jvm/java-21-amazon-corretto.x86_64/lib/security/cacerts' containing 143 certificates
14:22:53.610 INFO  Communicating with SonarQube Server 2025.5.0.113872
14:22:53.611 INFO  JRE provisioning: os[linux], arch[x86_64]
14:22:53.633 DEBUG <-- 200 https://{url}/api/v2/analysis/jres?os=linux&arch=x86_64 (22ms)
14:22:55.469 DEBUG <-- 200 https://{url}/api/v2/analysis/jres/239eae93-1efe-4b56-8446-b431dfcdf828 (1802ms)
14:22:55.532 DEBUG Create: /opt/sonar-scanner/.sonar/cache/4086cc7cb2d9e7810141f255063caad10a8a018db5e6b47fa5394c506ab65bff
14:22:56.138 DEBUG Executing: /opt/sonar-scanner/.sonar/cache/4086cc7cb2d9e7810141f255063caad10a8a018db5e6b47fa5394c506ab65bff/OpenJDK17U-jre_x64_linux_hotspot_17.0.13_11.tar.gz_extracted/jdk-17.0.13+11-jre/bin/java --version
14:22:56.169 DEBUG openjdk 17.0.13 2024-10-15
14:22:56.169 DEBUG OpenJDK Runtime Environment Temurin-17.0.13+11 (build 17.0.13+11)
14:22:56.169 DEBUG OpenJDK 64-Bit Server VM Temurin-17.0.13+11 (build 17.0.13+11, mixed mode, sharing)
14:22:56.187 DEBUG <-- 200 https://{url}/api/v2/analysis/engine (15ms)
14:23:06.782 DEBUG <-- 200 https://{url}/api/v2/analysis/engine (10593ms)
14:23:06.881 DEBUG Create: /opt/sonar-scanner/.sonar/cache/3f4cc6dca26dc5d4e5df6041952ed13597307b39190a7d537a5b7fcdeeeaab8c
14:23:06.884 DEBUG Work directory: /tmp/.scannerwork
14:23:06.890 DEBUG Executing: /opt/sonar-scanner/.sonar/cache/4086cc7cb2d9e7810141f255063caad10a8a018db5e6b47fa5394c506ab65bff/OpenJDK17U-jre_x64_linux_hotspot_17.0.13_11.tar.gz_extracted/jdk-17.0.13+11-jre/bin/java -Dorg.bouncycastle.pkcs12.ignore_useless_passwd=true -jar /opt/sonar-scanner/.sonar/cache/3f4cc6dca26dc5d4e5df6041952ed13597307b39190a7d537a5b7fcdeeeaab8c/scanner-enterprise-2025.5.0.113872-all.jar
14:23:07.094 INFO  Starting SonarScanner Engine...
14:23:07.095 INFO  Java 17.0.13 Eclipse Adoptium (64-bit)
14:23:07.218 DEBUG Enterprise 2025.5.0.113872
14:23:07.311 DEBUG Sonar User Home: /opt/sonar-scanner/.sonar
14:23:07.361 DEBUG Loading OS trusted SSL certificates...
14:23:07.361 DEBUG This operation might be slow or even get stuck. You can skip it by passing the scanner property 'sonar.scanner.skipSystemTruststore=true'
14:23:07.612 DEBUG Loaded [1001] system trusted certificates
14:23:07.723 DEBUG Loaded truststore from '/usr/lib/jvm/java-21-amazon-corretto.x86_64/lib/security/cacerts' containing 143 certificates
14:23:07.830 INFO  Load global settings
14:23:08.165 DEBUG <-- 200 https://{url}/api/settings/values.protobuf (327ms, unknown-length body)
14:23:08.184 INFO  Load global settings (done) | time=355ms
14:23:08.188 DEBUG Create : /opt/sonar-scanner/.sonar/_tmp
14:23:08.189 DEBUG User cache: /opt/sonar-scanner/.sonar/cache
14:23:08.193 INFO  Loading required plugins
14:23:08.193 INFO  Load plugins index
14:23:08.212 DEBUG <-- 200 https://{url}/api/plugins/installed (18ms, unknown-length body)
14:23:08.219 INFO  Load plugins index (done) | time=25ms
14:23:08.219 INFO  Load/download plugins
14:23:08.220 DEBUG Download plugin 'cayc' to '/opt/sonar-scanner/.sonar/_tmp/fileCache12132345534421947415.tmp'
14:23:08.237 DEBUG <-- 200 https://{url}/api/plugins/download?plugin=cayc (15ms, unknown-length body)
14:23:08.373 DEBUG Download plugin 'iac' to '/opt/sonar-scanner/.sonar/_tmp/fileCache9527729426723584481.tmp'
14:23:08.389 DEBUG <-- 200 https://{url}/api/plugins/download?plugin=iac (15ms, unknown-length body)
14:23:09.509 DEBUG Download plugin 'iacenterprise' to '/opt/sonar-scanner/.sonar/_tmp/fileCache2951803569656528682.tmp'
14:23:09.530 DEBUG <-- 200 https://{url}/api/plugins/download?plugin=iacenterprise (19ms, unknown-length body)
14:23:09.595 DEBUG Download plugin 'jacoco' to '/opt/sonar-scanner/.sonar/_tmp/fileCache7056223101487361797.tmp'
14:23:09.612 DEBUG <-- 200 https://{url}/api/plugins/download?plugin=jacoco (16ms, unknown-length body)
14:23:09.614 DEBUG Download plugin 'mulevalidationsonarqubepluginmule' to '/opt/sonar-scanner/.sonar/_tmp/fileCache7755339179118840826.tmp'
14:23:09.630 DEBUG <-- 200 https://{url}/api/plugins/download?plugin=mulevalidationsonarqubepluginmule (15ms, unknown-length body)
14:23:09.940 DEBUG Download plugin 'textenterprise' to '/opt/sonar-scanner/.sonar/_tmp/fileCache12020003830680143317.tmp'
14:23:09.956 DEBUG <-- 200 https://{url}/api/plugins/download?plugin=textenterprise (15ms, unknown-length body)
14:23:10.245 INFO  Load/download plugins (done) | time=2027ms
14:23:10.246 DEBUG Plugins not loaded because they are optional: [abap, sonarapex, architecture, architecturejavascriptfrontend, architecturejavafrontend, csharpenterprise, cpp, cfamilydependencies, cobol, dart, dbd, dbdjavafrontend, dbdpythonfrontend, flex, go, web, jcl, javasymbolicexecution, java, javascript, kotlin, php, pli, plsql, python, rpg, ruby, rust, sonarscala, jasmin, swift, tsql, vbnetenterprise, vb, security, securitycsharpfrontend, securitygofrontend, securityjsfrontend, securityjavafrontend, securitykotlinfrontend, securityphpfrontend, securitypythonfrontend, securityvbnetfrontend, xml]
14:23:10.346 DEBUG Plugins loaded:
14:23:10.347 DEBUG   * Text Code Quality and Security 2.29.0.8107 (textenterprise)
14:23:10.347 DEBUG   * Clean as You Code 2.4.0.2018 (cayc)
14:23:10.347 DEBUG   * JaCoCo 1.3.0.1538 (jacoco)
14:23:10.347 DEBUG   * IaC Code Quality and Security 1.50.0.16452 (iacenterprise)
14:23:10.347 DEBUG   * IaC Code Quality and Security 1.50.0.16452 (iac)
14:23:10.347 DEBUG   * MulePlugin 1.0.9 (mulevalidationsonarqubepluginmule)
14:23:10.384 INFO  Loaded core extensions: developer-scanner, server-common
14:23:10.393 DEBUG Installed core extension: developer-scanner
14:23:10.393 DEBUG Installed core extension: server-common
14:23:10.432 DEBUG Configuring Mule Plugin
14:23:10.454 DEBUG register org.eclipse.jgit.util.FS$FileStoreAttributes$$Lambda$390/0x000071642034a678@16872c4d with shutdown hook
14:23:10.579 INFO  Process project properties
14:23:10.580 INFO  Process project properties (done) | time=0ms
14:23:10.591 INFO  Project key: <key>
14:23:10.591 INFO  Base dir: /usr/src
14:23:10.592 INFO  Working dir: /tmp/.scannerwork
14:23:10.592 DEBUG Project global encoding: UTF-8, default locale: en
14:23:10.599 INFO  Load project settings for component key: '<key>'
14:23:10.625 DEBUG <-- 200 https://{url}/api/settings/values.protobuf?component=<key> (25ms, unknown-length body)
14:23:10.626 INFO  Load project settings for component key: '<key>' (done) | time=27ms
14:23:10.644 INFO  Load project branches
14:23:10.663 DEBUG <-- 200 https://{url}/api/project_branches/list?project=<key> (18ms, unknown-length body)
14:23:10.670 INFO  Load project branches (done) | time=27ms
14:23:10.671 INFO  Load branch configuration
14:23:10.674 INFO  Load branch configuration (done) | time=2ms
14:23:10.680 DEBUG Creating module hierarchy
14:23:10.680 DEBUG   Init module '<key>'
14:23:10.681 DEBUG     Base dir: /usr/src
14:23:10.681 DEBUG     Working dir: /tmp/.scannerwork
14:23:10.681 DEBUG     Module global encoding: UTF-8, default locale: en
14:23:10.686 INFO  Load quality profiles
14:23:10.736 DEBUG <-- 200 https://{url}/api/qualityprofiles/search.protobuf?project=<key> (49ms, 4934-byte body)
14:23:10.753 INFO  Load quality profiles (done) | time=67ms
14:23:10.800 INFO  Load active rules
14:23:10.988 DEBUG <-- 200 https://{url}/api/v2/analysis/active_rules?projectKey=<key> (186ms, unknown-length body)
14:23:11.104 INFO  Load active rules (done) | time=304ms
14:23:11.109 INFO  Load analysis cache
14:23:11.125 DEBUG <-- 404 https://{url}/api/analysis_cache/get?project=<key> (16ms, unknown-length body)
14:23:11.126 INFO  Load analysis cache (404) | time=17ms
14:23:11.150 DEBUG <-- 200 https://{url}/api/languages/list (13ms, unknown-length body)
14:23:11.321 DEBUG <-- 200 https://{url}/api/features/list (158ms, unknown-length body)
14:23:11.336 DEBUG Declared patterns of language Kubernetes were converted to sonar.lang.patterns.kubernetes : 
14:23:11.337 DEBUG Declared patterns of language CSS were converted to sonar.lang.patterns.css : **/*.css,**/*.less,**/*.scss,**/*.sass
14:23:11.337 DEBUG Declared patterns of language Scala were converted to sonar.lang.patterns.scala : **/*.scala
14:23:11.337 DEBUG Declared patterns of language JSP were converted to sonar.lang.patterns.jsp : **/*.jsp,**/*.jspf,**/*.jspx
14:23:11.337 DEBUG Declared patterns of language JavaScript were converted to sonar.lang.patterns.js : **/*.js,**/*.jsx,**/*.cjs,**/*.mjs,**/*.vue
14:23:11.337 DEBUG Declared patterns of language Python were converted to sonar.lang.patterns.py : **/*.py
14:23:11.337 DEBUG Declared patterns of language Ansible were converted to sonar.lang.patterns.ansible : 
14:23:11.337 DEBUG Declared patterns of language Apex were converted to sonar.lang.patterns.apex : **/*.cls,**/*.trigger
14:23:11.337 DEBUG Declared patterns of language Docker were converted to sonar.lang.patterns.docker : **/Dockerfile,**/*.dockerfile
14:23:11.338 DEBUG Declared patterns of language PL/SQL were converted to sonar.lang.patterns.plsql : **/*.sql,**/*.pks,**/*.pkb
14:23:11.338 DEBUG Declared patterns of language Dart were converted to sonar.lang.patterns.dart : **/*.dart
14:23:11.338 DEBUG Declared patterns of language Rust were converted to sonar.lang.patterns.rust : **/*.rs
14:23:11.338 DEBUG Declared patterns of language JCL were converted to sonar.lang.patterns.jcl : **/*.jcl
14:23:11.338 DEBUG Declared patterns of language Mule were converted to sonar.lang.patterns.mule : **/*.-
14:23:11.338 DEBUG Declared patterns of language Java were converted to sonar.lang.patterns.java : **/*.java,**/*.jav
14:23:11.338 DEBUG Declared patterns of language HTML were converted to sonar.lang.patterns.web : **/*.html,**/*.xhtml,**/*.cshtml,**/*.vbhtml,**/*.aspx,**/*.ascx,**/*.rhtml,**/*.erb,**/*.shtm,**/*.shtml,**/*.cmp,**/*.twig
14:23:11.339 DEBUG Declared patterns of language Flex were converted to sonar.lang.patterns.flex : **/*.as
14:23:11.339 DEBUG Declared patterns of language XML were converted to sonar.lang.patterns.xml : **/*.xsd,**/*.xsl,**/*.config
14:23:11.339 DEBUG Declared patterns of language JSON were converted to sonar.lang.patterns.json : **/*.json
14:23:11.340 DEBUG Declared patterns of language IPython Notebooks were converted to sonar.lang.patterns.ipynb : **/*.ipynb
14:23:11.340 DEBUG Declared patterns of language Text were converted to sonar.lang.patterns.text : 
14:23:11.340 DEBUG Declared patterns of language VB.NET were converted to sonar.lang.patterns.vbnet : **/*.vb
14:23:11.340 DEBUG Declared patterns of language CloudFormation were converted to sonar.lang.patterns.cloudformation : 
14:23:11.341 DEBUG Declared patterns of language Swift were converted to sonar.lang.patterns.swift : **/*.swift
14:23:11.341 DEBUG Declared patterns of language YAML were converted to sonar.lang.patterns.yaml : **/*.yaml,**/*.yml
14:23:11.341 DEBUG Declared patterns of language C++ were converted to sonar.lang.patterns.cpp : **/*.cc,**/*.cpp,**/*.cxx,**/*.c++,**/*.hh,**/*.hpp,**/*.hxx,**/*.h++,**/*.ipp,**/*.ixx,**/*.mxx,**/*.cppm,**/*.ccm,**/*.cxxm,**/*.c++m
14:23:11.341 DEBUG Declared patterns of language C were converted to sonar.lang.patterns.c : **/*.c,**/*.h
14:23:11.341 DEBUG Declared patterns of language Go were converted to sonar.lang.patterns.go : **/*.go
14:23:11.341 DEBUG Declared patterns of language Kotlin were converted to sonar.lang.patterns.kotlin : **/*.kt,**/*.kts
14:23:11.341 DEBUG Declared patterns of language RPG were converted to sonar.lang.patterns.rpg : **/*.rpg,**/*.rpgle,**/*.sqlrpgle,**/*.rpg,**/*.rpgle,**/*.sqlrpgle
14:23:11.341 DEBUG Declared patterns of language PL/I were converted to sonar.lang.patterns.pli : **/*.pli
14:23:11.341 DEBUG Declared patterns of language T-SQL were converted to sonar.lang.patterns.tsql : **/*.tsql
14:23:11.341 DEBUG Declared patterns of language Vb were converted to sonar.lang.patterns.vb : **/*.bas,**/*.frm,**/*.ctl
14:23:11.342 DEBUG Declared patterns of language Secrets were converted to sonar.lang.patterns.secrets : 
14:23:11.342 DEBUG Declared patterns of language Ruby were converted to sonar.lang.patterns.ruby : **/*.rb
14:23:11.342 DEBUG Declared patterns of language C# were converted to sonar.lang.patterns.cs : **/*.cs,**/*.razor
14:23:11.343 DEBUG Declared patterns of language COBOL were converted to sonar.lang.patterns.cobol : 
14:23:11.343 DEBUG Declared patterns of language PHP were converted to sonar.lang.patterns.php : **/*.php,**/*.php3,**/*.php4,**/*.php5,**/*.phtml,**/*.inc
14:23:11.343 DEBUG Declared patterns of language Terraform were converted to sonar.lang.patterns.terraform : **/*.tf
14:23:11.343 DEBUG Declared patterns of language Azure Resource Manager were converted to sonar.lang.patterns.azureresourcemanager : **/*.bicep
14:23:11.343 DEBUG Declared patterns of language ABAP were converted to sonar.lang.patterns.abap : **/*.abap,**/*.ab4,**/*.flow,**/*.asprog
14:23:11.344 DEBUG Declared patterns of language GitHub Actions were converted to sonar.lang.patterns.githubactions : 
14:23:11.344 DEBUG Declared patterns of language Objective-C were converted to sonar.lang.patterns.objc : **/*.m
14:23:11.344 DEBUG Declared patterns of language TypeScript were converted to sonar.lang.patterns.ts : **/*.ts,**/*.tsx,**/*.cts,**/*.mts
14:23:11.350 INFO  Preprocessing files...
14:23:11.384 DEBUG loading config FileBasedConfig[/tmp/jgit/config]
14:23:11.385 DEBUG readpipe [/usr/bin/git, --version],/usr/bin
14:23:11.392 DEBUG readpipe may return 'git version 2.50.1'
14:23:11.393 DEBUG remaining output:

14:23:11.393 DEBUG readpipe [/usr/bin/git, config, --system, --show-origin, --list, -z],/usr/bin
14:23:11.395 DEBUG readpipe may return 'null'
14:23:11.395 DEBUG remaining output:

14:23:11.405 DEBUG readpipe rc=128
14:23:11.405 DEBUG Exception caught during execution of command '[/usr/bin/git, config, --system, --show-origin, --list, -z]' in '/usr/bin', return code '128', error message 'fatal: unable to read config file '/etc/gitconfig': No such file or directory
'
14:23:11.405 DEBUG loading config FileBasedConfig[/tmp/git/config]
14:23:11.405 DEBUG loading config UserConfigFile[/home/scanner-cli/.gitconfig]
14:23:11.630 DEBUG 28 non excluded files in this Git repository
14:23:11.643 DEBUG File '/usr/src/.git/COMMIT_EDITMSG' is excluded by the scm ignore settings.
14:23:11.646 DEBUG File '/usr/src/.git/config' is excluded by the scm ignore settings.
14:23:11.648 DEBUG File '/usr/src/.git/description' is excluded by the scm ignore settings.
14:23:11.650 DEBUG File '/usr/src/.git/HEAD' is excluded by the scm ignore settings.
14:23:11.654 DEBUG File '/usr/src/.git/hooks/applypatch-msg.sample' is excluded by the scm ignore settings.
14:23:11.655 DEBUG File '/usr/src/.git/hooks/commit-msg.sample' is excluded by the scm ignore settings.
14:23:11.657 DEBUG File '/usr/src/.git/hooks/fsmonitor-watchman.sample' is excluded by the scm ignore settings.
14:23:11.659 DEBUG File '/usr/src/.git/hooks/post-update.sample' is excluded by the scm ignore settings.
14:23:11.661 DEBUG File '/usr/src/.git/hooks/pre-applypatch.sample' is excluded by the scm ignore settings.
14:23:11.663 DEBUG File '/usr/src/.git/hooks/pre-commit.sample' is excluded by the scm ignore settings.
14:23:11.666 DEBUG File '/usr/src/.git/hooks/pre-merge-commit.sample' is excluded by the scm ignore settings.
14:23:11.669 DEBUG File '/usr/src/.git/hooks/pre-push.sample' is excluded by the scm ignore settings.
14:23:11.671 DEBUG File '/usr/src/.git/hooks/pre-rebase.sample' is excluded by the scm ignore settings.
14:23:11.673 DEBUG File '/usr/src/.git/hooks/pre-receive.sample' is excluded by the scm ignore settings.
14:23:11.674 DEBUG File '/usr/src/.git/hooks/prepare-commit-msg.sample' is excluded by the scm ignore settings.
14:23:11.676 DEBUG File '/usr/src/.git/hooks/push-to-checkout.sample' is excluded by the scm ignore settings.
14:23:11.678 DEBUG File '/usr/src/.git/hooks/sendemail-validate.sample' is excluded by the scm ignore settings.
14:23:11.679 DEBUG File '/usr/src/.git/hooks/update.sample' is excluded by the scm ignore settings.
14:23:11.682 DEBUG File '/usr/src/.git/index' is excluded by the scm ignore settings.
14:23:11.685 DEBUG File '/usr/src/.git/info/exclude' is excluded by the scm ignore settings.
14:23:11.689 DEBUG File '/usr/src/.git/logs/HEAD' is excluded by the scm ignore settings.
14:23:11.694 DEBUG File '/usr/src/.git/logs/refs/heads/main' is excluded by the scm ignore settings.
14:23:11.696 DEBUG File '/usr/src/.git/logs/refs/heads/test-cicd' is excluded by the scm ignore settings.
14:23:11.713 DEBUG File '/usr/src/.git/logs/refs/remotes/origin/HEAD' is excluded by the scm ignore settings.
14:23:11.724 DEBUG File '/usr/src/.git/logs/refs/remotes/origin/test-cicd' is excluded by the scm ignore settings.
14:23:11.759 DEBUG File '/usr/src/.git/objects/2a/896ff22384533aea7213da06dd39047be9fb17' is excluded by the scm ignore settings.
14:23:11.768 DEBUG File '/usr/src/.git/objects/2a/fa526785fe9b8613aa2ac5187a9a865ebd2a87' is excluded by the scm ignore settings.
14:23:11.780 DEBUG File '/usr/src/.git/objects/32/00f6754ec510f766947943634a3510eac9ffc0' is excluded by the scm ignore settings.
14:23:11.791 DEBUG File '/usr/src/.git/objects/59/326faa5ac160971f4f3c8d42de24ed0f516ab7' is excluded by the scm ignore settings.
14:23:11.803 DEBUG File '/usr/src/.git/objects/79/03f184845be0335e5f81feb3dc88da904abadb' is excluded by the scm ignore settings.
14:23:11.812 DEBUG File '/usr/src/.git/objects/ae/d4e8dc23d2ed80b42b6c6a2e38d470ce552a18' is excluded by the scm ignore settings.
14:23:11.823 DEBUG File '/usr/src/.git/objects/be/de3a6dced9337a006515b511fd0613cf248232' is excluded by the scm ignore settings.
14:23:11.837 DEBUG File '/usr/src/.git/objects/c2/c24f95eaaabae6c9e9b45bfbb973bdfaf2acf0' is excluded by the scm ignore settings.
14:23:11.846 DEBUG File '/usr/src/.git/objects/e8/a79513bd98c428f75afe6a9917a697f7bffb80' is excluded by the scm ignore settings.
14:23:11.856 DEBUG File '/usr/src/.git/objects/eb/ecd735c8d722db63edfc393ba4fcc0fcc5ac10' is excluded by the scm ignore settings.
14:23:11.866 DEBUG File '/usr/src/.git/objects/ef/f3bbcb48289a3e9bba0552183fcae4c59b28a2' is excluded by the scm ignore settings.
14:23:11.879 DEBUG File '/usr/src/.git/objects/pack/pack-b4d2403385b3909be75b8f1df20f8ee70555b801.idx' is excluded by the scm ignore settings.
14:23:11.885 DEBUG File '/usr/src/.git/objects/pack/pack-b4d2403385b3909be75b8f1df20f8ee70555b801.pack' is excluded by the scm ignore settings.
14:23:11.892 DEBUG File '/usr/src/.git/objects/pack/pack-b4d2403385b3909be75b8f1df20f8ee70555b801.rev' is excluded by the scm ignore settings.
14:23:11.901 DEBUG File '/usr/src/.git/packed-refs' is excluded by the scm ignore settings.
14:23:11.924 DEBUG File '/usr/src/.git/refs/heads/main' is excluded by the scm ignore settings.
14:23:11.930 DEBUG File '/usr/src/.git/refs/heads/test-cicd' is excluded by the scm ignore settings.
14:23:11.944 DEBUG File '/usr/src/.git/refs/remotes/origin/HEAD' is excluded by the scm ignore settings.
14:23:11.951 DEBUG File '/usr/src/.git/refs/remotes/origin/test-cicd' is excluded by the scm ignore settings.
14:23:12.077 DEBUG File '/usr/src/.mule/project.json' is excluded by the scm ignore settings.
14:23:12.079 DEBUG File '/usr/src/err.log' is excluded by the scm ignore settings.
14:23:12.184 INFO  2 languages detected in 28 preprocessed files (done) | time=834ms
14:23:12.184 INFO  46 files ignored because of scm ignore settings
14:23:12.186 INFO  Loading plugins for detected languages
14:23:12.186 DEBUG Detected languages: [json, yaml]
14:23:12.186 INFO  Load/download plugins
14:23:12.186 DEBUG Download plugin 'javascript' to '/opt/sonar-scanner/.sonar/_tmp/fileCache8369826660488457165.tmp'
14:23:12.200 DEBUG <-- 200 https://{url}/api/plugins/download?plugin=javascript (14ms, unknown-length body)
14:23:17.730 DEBUG Download plugin 'security' to '/opt/sonar-scanner/.sonar/_tmp/fileCache7969041898787960117.tmp'
14:23:17.750 DEBUG <-- 200 https://{url}/api/plugins/download?plugin=security (19ms, unknown-length body)
14:23:18.362 DEBUG Download plugin 'securityjsfrontend' to '/opt/sonar-scanner/.sonar/_tmp/fileCache14807510372096120394.tmp'
14:23:18.376 DEBUG <-- 200 https://{url}/api/plugins/download?plugin=securityjsfrontend (13ms, unknown-length body)
14:23:18.387 INFO  Load/download plugins (done) | time=6201ms
14:23:18.387 DEBUG Optional language-specific plugins not loaded: [abap, sonarapex, architecture, architecturejavascriptfrontend, architecturejavafrontend, csharpenterprise, cpp, cfamilydependencies, cobol, dart, dbd, dbdjavafrontend, dbdpythonfrontend, flex, go, web, jcl, javasymbolicexecution, java, kotlin, php, pli, plsql, python, rpg, ruby, rust, sonarscala, jasmin, swift, tsql, vbnetenterprise, vb, securitycsharpfrontend, securitygofrontend, securityjavafrontend, securitykotlinfrontend, securityphpfrontend, securitypythonfrontend, securityvbnetfrontend, xml]
14:23:18.440 DEBUG Plugins loaded:
14:23:18.441 DEBUG   * Vulnerability Analysis 11.10.0.40378 (security)
14:23:18.441 DEBUG   * Vulnerability Rules for JS 11.10.0.40378 (securityjsfrontend)
14:23:18.441 DEBUG   * JavaScript/TypeScript/CSS Code Quality and Security 11.4.0.34681 (javascript)
14:23:18.515 INFO  Load metrics repository
14:23:18.537 DEBUG <-- 200 https://{url}/api/metrics/search?ps=500&p=1 (22ms, unknown-length body)
14:23:18.544 INFO  Load metrics repository (done) | time=29ms
14:23:18.561 DEBUG SonarJasmin not installed. Using SonarSecurity for JS/TS taint rules.
14:23:18.636 INFO  Load project repositories
14:23:18.665 DEBUG <-- 200 https://{url}/batch/project.protobuf?key=<key> (28ms, 1028-byte body)
14:23:18.768 INFO  Load project repositories (done) | time=133ms
14:23:18.776 DEBUG Available languages:
14:23:18.776 DEBUG   * JavaScript => "js"
14:23:18.777 DEBUG   * TypeScript => "ts"
14:23:18.777 DEBUG   * CSS => "css"
14:23:18.777 DEBUG   * Secrets => "secrets"
14:23:18.777 DEBUG   * Text => "text"
14:23:18.777 DEBUG   * Ansible => "ansible"
14:23:18.777 DEBUG   * GitHub Actions => "githubactions"
14:23:18.777 DEBUG   * Terraform => "terraform"
14:23:18.777 DEBUG   * CloudFormation => "cloudformation"
14:23:18.777 DEBUG   * Kubernetes => "kubernetes"
14:23:18.777 DEBUG   * Docker => "docker"
14:23:18.777 DEBUG   * Azure Resource Manager => "azureresourcemanager"
14:23:18.777 DEBUG   * YAML => "yaml"
14:23:18.777 DEBUG   * JSON => "json"
14:23:18.778 DEBUG   * Mule => "mule"
14:23:18.778 INFO  Indexing files...
14:23:18.779 INFO  Project configuration:
14:23:18.797 DEBUG '.github/workflows/ci.yml' indexed with language 'yaml'
14:23:18.810 DEBUG '.github/workflows/default.yml' indexed with language 'yaml'
14:23:18.818 DEBUG '.github/workflows/develop.yml' indexed with language 'yaml'
14:23:18.826 DEBUG '.github/workflows/feature-deploy-temp-to-dev.yml' indexed with language 'yaml'
14:23:18.831 DEBUG '.github/workflows/feature.yml' indexed with language 'yaml'
14:23:18.835 DEBUG '.github/workflows/hotfix.yml' indexed with language 'yaml'
14:23:18.839 DEBUG '.github/workflows/quality.yml' indexed with language 'yaml'
14:23:18.842 DEBUG '.github/workflows/release.yml' indexed with language 'yaml'
14:23:18.849 DEBUG '.github/workflows/schedule-reset-develop.yml' indexed with language 'yaml'
14:23:18.850 DEBUG '.gitignore' indexed with no language
14:23:18.853 DEBUG 'mule-artifact.json' indexed with language 'json'
14:23:18.855 DEBUG 'pom.xml' indexed with no language
14:23:18.857 DEBUG 'README.md' indexed with no language
14:23:18.862 DEBUG 'src/main/mule/global.xml' indexed with no language
14:23:18.871 DEBUG 'src/main/mule/health.xml' indexed with no language
14:23:18.879 DEBUG 'src/main/mule/implementation/documents.xml' indexed with no language
14:23:18.884 DEBUG 'src/main/mule/init.xml' indexed with no language
14:23:18.890 DEBUG 'src/main/mule/interface.xml' indexed with no language
14:23:18.896 DEBUG 'src/main/resources/errorHandler/error-properties.yaml' indexed with language 'yaml'
14:23:18.901 DEBUG 'src/main/resources/log4j2.xml' indexed with no language
14:23:18.908 DEBUG 'src/main/resources/props/dev-secure.properties' indexed with no language
14:23:18.912 DEBUG 'src/main/resources/props/dev.properties' indexed with no language
14:23:18.918 DEBUG 'src/main/resources/props/global.properties' indexed with no language
14:23:18.923 DEBUG 'src/main/resources/props/prd-secure.properties' indexed with no language
14:23:18.927 DEBUG 'src/main/resources/props/prd.properties' indexed with no language
14:23:18.936 DEBUG 'src/main/resources/props/qa-secure.properties' indexed with no language
14:23:18.942 DEBUG 'src/main/resources/props/qa.properties' indexed with no language
14:23:18.948 DEBUG 'src/test/resources/log4j2-test.xml' indexed with no language
14:23:18.949 INFO  28 files indexed (done) | time=171ms
14:23:18.950 INFO  Quality profile for json: Sonar way
14:23:18.950 INFO  Quality profile for yaml: Sonar way
14:23:18.950 INFO  ------------- Run sensors on module <key>  
14:23:18.954 DEBUG Configuring Mule Plugin
14:23:19.284 DEBUG Added 392 checks for language='ts', repository='typescript'
14:23:19.286 DEBUG Added 15 checks for language='ts', repository='tssecurity'
14:23:19.288 DEBUG Added 379 checks for language='js', repository='javascript'
14:23:19.289 DEBUG Added 15 checks for language='js', repository='jssecurity'
14:23:19.292 DEBUG No registered JsAnalysisConsumer.
14:23:19.307 DEBUG 'Import external issues report' skipped because of missing configuration requirements.
Accessed configuration:
- sonar.externalIssuesReportPaths: <empty>
14:23:19.309 DEBUG 'IaC Terraform Sensor' skipped because there is no related file in current project
14:23:19.309 DEBUG 'IaC TFLint report Sensor' skipped because there is no related file in current project
14:23:19.310 DEBUG 'com.mulesoft.services.tools.sonarqube.sensor.MuleSensor' skipped because there is no related file in current project
14:23:19.311 DEBUG 'Compute the coverage of the applications' skipped because there is no related file in current project
14:23:19.313 DEBUG 'Generic Test Executions Report' skipped because of missing configuration requirements.
Accessed configuration:
- sonar.testExecutionReportPaths: <empty>
- sonar.externalIssuesReportPaths: <empty>
14:23:19.313 DEBUG 'JavaScript/TypeScript analysis' skipped because there is no related file in current project
14:23:19.313 DEBUG 'JavaScript inside HTML analysis' skipped because there is no related file in current project
14:23:19.313 DEBUG 'JavaScript/TypeScript Coverage' skipped because there is no related file in current project
14:23:19.313 DEBUG 'Import of TSLint issues' skipped because of missing configuration requirements.
Accessed configuration:
- sonar.typescript.tslint.reportPaths: <empty>
- sonar.testExecutionReportPaths: <empty>
- sonar.externalIssuesReportPaths: <empty>
14:23:19.313 DEBUG 'CSS Metrics' skipped because there is no related file in current project
14:23:19.314 DEBUG 'Import of stylelint issues' skipped because of missing configuration requirements.
Accessed configuration:
- sonar.typescript.tslint.reportPaths: <empty>
- sonar.testExecutionReportPaths: <empty>
- sonar.css.stylelint.reportPaths: <empty>
- sonar.externalIssuesReportPaths: <empty>
14:23:19.314 DEBUG Sensors : JaCoCo XML Report Importer -> IaC Ansible Sensor -> IaC ansible-lint report Sensor -> IaC GitHub Actions Sensor -> IaC CloudFormation Sensor -> IaC cfn-lint report Sensor -> IaC Kubernetes Sensor -> IaC Docker Sensor -> IaC hadolint report Sensor -> IaC Azure Resource Manager Sensor -> Java Config Sensor -> Compute size of configuration file -> Compute number of unit test cases -> IaC YAML Sensor -> IaC JSON Sensor -> Serverless configuration file sensor -> AWS SAM template file sensor -> AWS SAM Inline template file sensor -> EnterpriseTextAndSecretsSensor -> JavaScript inside YAML analysis -> CSS Rules -> JavaSecuritySensor -> CSharpSecuritySensor -> VbNetSecuritySensor -> PhpSecuritySensor -> PythonSecuritySensor -> JsSecuritySensor -> KotlinSecuritySensor -> GoSecuritySensor
14:23:19.314 INFO  Sensor JaCoCo XML Report Importer [jacoco]
14:23:19.315 INFO  'sonar.coverage.jacoco.xmlReportPaths' is not defined. Using default locations: target/site/jacoco/jacoco.xml,target/site/jacoco-it/jacoco.xml,build/reports/jacoco/test/jacocoTestReport.xml
14:23:19.317 INFO  No report imported, no coverage information will be imported by JaCoCo XML Report Importer
14:23:19.317 INFO  Sensor JaCoCo XML Report Importer [jacoco] (done) | time=3ms
14:23:19.317 INFO  Sensor IaC Ansible Sensor [iacenterprise]
14:23:19.339 DEBUG 'src/main/resources/errorHandler/error-properties.yaml' generated metadata with charset 'UTF-8'
14:23:19.368 DEBUG 'mule-artifact.json' generated metadata with charset 'UTF-8'
14:23:19.381 INFO  There are no files to be analyzed for the Ansible language
14:23:19.382 INFO  Sensor IaC Ansible Sensor [iacenterprise] (done) | time=64ms
14:23:19.382 INFO  Sensor IaC ansible-lint report Sensor [iacenterprise]
14:23:19.384 INFO  Sensor IaC ansible-lint report Sensor [iacenterprise] (done) | time=3ms
14:23:19.384 INFO  Sensor IaC GitHub Actions Sensor [iacenterprise]
14:23:19.384 DEBUG Sensor IaC GitHub Actions Sensor is allowed to analyze hidden files
14:23:19.394 INFO  9 source files to be analyzed
14:23:19.402 DEBUG '.github/workflows/ci.yml' generated metadata with charset 'UTF-8'
14:23:19.464 DEBUG '.github/workflows/default.yml' generated metadata with charset 'UTF-8'
14:23:19.484 DEBUG '.github/workflows/schedule-reset-develop.yml' generated metadata with charset 'UTF-8'
14:23:19.496 DEBUG '.github/workflows/develop.yml' generated metadata with charset 'UTF-8'
14:23:19.511 DEBUG '.github/workflows/quality.yml' generated metadata with charset 'UTF-8'
14:23:19.524 DEBUG '.github/workflows/hotfix.yml' generated metadata with charset 'UTF-8'
14:23:19.537 DEBUG '.github/workflows/feature.yml' generated metadata with charset 'UTF-8'
14:23:19.549 DEBUG '.github/workflows/release.yml' generated metadata with charset 'UTF-8'
14:23:19.568 DEBUG '.github/workflows/feature-deploy-temp-to-dev.yml' generated metadata with charset 'UTF-8'
14:23:19.577 INFO  9/9 source files have been analyzed
14:23:19.578 INFO  Sensor IaC GitHub Actions Sensor [iacenterprise] (done) | time=194ms
14:23:19.578 INFO  Sensor IaC CloudFormation Sensor [iac]
14:23:19.589 INFO  There are no files to be analyzed for the CloudFormation language
14:23:19.589 INFO  Sensor IaC CloudFormation Sensor [iac] (done) | time=11ms
14:23:19.590 INFO  Sensor IaC cfn-lint report Sensor [iac]
14:23:19.590 INFO  Sensor IaC cfn-lint report Sensor [iac] (done) | time=1ms
14:23:19.591 INFO  Sensor IaC Kubernetes Sensor [iac]
14:23:19.593 DEBUG Checking conditions for enabling Helm analysis; Activated Helm analysis:true, Helm supported for this platform:true
14:23:19.593 DEBUG Initializing Helm processor
14:23:19.593 DEBUG Preparing Helm analysis for platform: linux-amd64
14:23:19.661 INFO  There are no files to be analyzed for the Kubernetes language
14:23:19.661 INFO  Sensor IaC Kubernetes Sensor [iac] (done) | time=70ms
14:23:19.661 INFO  Sensor IaC Docker Sensor [iac]
14:23:19.662 INFO  There are no files to be analyzed for the Docker language
14:23:19.662 INFO  Sensor IaC Docker Sensor [iac] (done) | time=1ms
14:23:19.662 INFO  Sensor IaC hadolint report Sensor [iac]
14:23:19.662 INFO  Sensor IaC hadolint report Sensor [iac] (done) | time=1ms
14:23:19.662 INFO  Sensor IaC Azure Resource Manager Sensor [iac]
14:23:19.668 INFO  There are no files to be analyzed for the Azure Resource Manager language
14:23:19.669 INFO  Sensor IaC Azure Resource Manager Sensor [iac] (done) | time=6ms
14:23:19.669 INFO  Sensor Java Config Sensor [iac]
14:23:19.670 INFO  There are no files to be analyzed for the Java language
14:23:19.670 INFO  Sensor Java Config Sensor [iac] (done) | time=2ms
14:23:19.670 INFO  Sensor Compute size of configuration file [mulevalidationsonarqubepluginmule]
14:23:19.670 DEBUG Executing Mule Sensor on file:prd.properties
14:23:19.670 DEBUG Executing Mule Sensor on file:documents.xml
14:23:19.671 DEBUG Executing Mule Sensor on file:dev.properties
14:23:19.671 DEBUG Executing Mule Sensor on file:pom.xml
14:23:19.671 DEBUG Executing Mule Sensor on file:global.properties
14:23:19.671 DEBUG Executing Mule Sensor on file:log4j2-test.xml
14:23:19.671 DEBUG Executing Mule Sensor on file:init.xml
14:23:19.671 DEBUG Executing Mule Sensor on file:interface.xml
14:23:19.671 DEBUG Executing Mule Sensor on file:error-properties.yaml
14:23:19.671 DEBUG Executing Mule Sensor on file:global.xml
14:23:19.671 DEBUG Executing Mule Sensor on file:dev-secure.properties
14:23:19.671 DEBUG Executing Mule Sensor on file:qa-secure.properties
14:23:19.671 DEBUG Executing Mule Sensor on file:log4j2.xml
14:23:19.671 DEBUG Executing Mule Sensor on file:README.md
14:23:19.671 DEBUG Executing Mule Sensor on file:prd-secure.properties
14:23:19.671 DEBUG Executing Mule Sensor on file:mule-artifact.json
14:23:19.671 DEBUG Executing Mule Sensor on file:qa.properties
14:23:19.671 DEBUG Executing Mule Sensor on file:health.xml
14:23:19.671 INFO  Sensor Compute size of configuration file [mulevalidationsonarqubepluginmule] (done) | time=0ms
14:23:19.671 INFO  Sensor Compute number of unit test cases [mulevalidationsonarqubepluginmule]
14:23:19.672 DEBUG Executing Mule Sensor on file:prd.properties
14:23:19.672 DEBUG Executing Mule Sensor on file:documents.xml
14:23:19.672 DEBUG Executing Mule Sensor on file:dev.properties
14:23:19.672 DEBUG Executing Mule Sensor on file:pom.xml
14:23:19.672 DEBUG Executing Mule Sensor on file:global.properties
14:23:19.672 DEBUG Executing Mule Sensor on file:log4j2-test.xml
14:23:19.672 DEBUG Executing Mule Sensor on file:init.xml
14:23:19.672 DEBUG Executing Mule Sensor on file:interface.xml
14:23:19.672 DEBUG Executing Mule Sensor on file:error-properties.yaml
14:23:19.673 DEBUG Executing Mule Sensor on file:global.xml
14:23:19.673 DEBUG Executing Mule Sensor on file:dev-secure.properties
14:23:19.673 DEBUG Executing Mule Sensor on file:qa-secure.properties
14:23:19.673 DEBUG Executing Mule Sensor on file:log4j2.xml
14:23:19.673 DEBUG Executing Mule Sensor on file:README.md
14:23:19.673 DEBUG Executing Mule Sensor on file:prd-secure.properties
14:23:19.673 DEBUG Executing Mule Sensor on file:mule-artifact.json
14:23:19.673 DEBUG Executing Mule Sensor on file:qa.properties
14:23:19.674 DEBUG Executing Mule Sensor on file:health.xml
14:23:19.674 INFO  Sensor Compute number of unit test cases [mulevalidationsonarqubepluginmule] (done) | time=0ms
14:23:19.674 INFO  Sensor IaC YAML Sensor [iacenterprise]
14:23:19.674 DEBUG Sensor for language "YAML" is disabled
14:23:19.674 INFO  Sensor IaC YAML Sensor [iacenterprise] (done) | time=0ms
14:23:19.674 INFO  Sensor IaC JSON Sensor [iacenterprise]
14:23:19.674 DEBUG Sensor for language "JSON" is disabled
14:23:19.674 INFO  Sensor IaC JSON Sensor [iacenterprise] (done) | time=0ms
14:23:19.674 INFO  Sensor Serverless configuration file sensor [security]
14:23:19.674 INFO  0 Serverless function entries were found in the project
14:23:19.674 INFO  0 Serverless function handlers were kept as entrypoints
14:23:19.674 INFO  Sensor Serverless configuration file sensor [security] (done) | time=2ms
14:23:19.674 INFO  Sensor AWS SAM template file sensor [security]
14:23:19.684 DEBUG 0 SAM template configuration files were found in the project. 0 SAM function entries were found in total. 0 were kept as potential entrypoints.
14:23:19.684 INFO  Sensor AWS SAM template file sensor [security] (done) | time=11ms
14:23:19.685 INFO  Sensor AWS SAM Inline template file sensor [security]
14:23:19.692 DEBUG 0 SAM Inline template configuration files were found in the project. 0 SAM Inline function entries were found in total. 0 were kept as potential entrypoints.
14:23:19.692 INFO  Sensor AWS SAM Inline template file sensor [security] (done) | time=7ms
14:23:19.692 INFO  Sensor EnterpriseTextAndSecretsSensor [textenterprise]
14:23:19.692 DEBUG Sensor EnterpriseTextAndSecretsSensor is allowed to analyze hidden files
14:23:19.697 INFO  Available processors: 6
14:23:19.697 INFO  Using 6 threads for analysis.
14:23:19.698 DEBUG Initializing SecretsStateContainer with specification loader.
14:23:20.015 INFO  The property "sonar.tests" is not set. To improve the analysis accuracy, we categorize a file as a test file if any of the following is true:
  * The filename starts with "test"
  * The filename contains "test." or "tests."
  * Any directory in the file path is named: "doc", "docs", "test" or "tests"
  * Any directory in the file path has a name ending in "test" or "tests"

14:23:20.044 DEBUG Initializing ChecksContainer with checks and trie construction.
14:23:20.055 DEBUG ChecksContainer initialized successfully with 15 checks without pre-filter and trie containing 431 patterns.
14:23:20.056 INFO  Start fetching files for the text and secrets analysis
14:23:20.059 DEBUG Read the "git --version" stdout in thread "pool-7-thread-1"
14:23:20.060 DEBUG git --version returned: git version 2.50.1
14:23:20.061 INFO  Using Git CLI to retrieve untracked files
14:23:20.062 DEBUG Read the "git -C /usr/src status --untracked-files=all --porcelain" stdout in thread "pool-7-thread-1"
14:23:20.357 INFO  Retrieving language associated files and files included via "sonar.text.inclusions" that are tracked by git
14:23:20.359 INFO  Starting the text and secrets analysis
14:23:20.360 INFO  19 source files to be analyzed for the text and secrets analysis
14:23:20.371 DEBUG 'src/main/resources/props/prd.properties' generated metadata with charset 'UTF-8'
14:23:20.383 DEBUG 'src/main/resources/props/global.properties' generated metadata with charset 'UTF-8'
14:23:20.388 DEBUG 'src/main/resources/props/dev.properties' generated metadata with charset 'UTF-8'
14:23:20.394 DEBUG '.gitignore' generated metadata with charset 'UTF-8'
14:23:20.416 DEBUG 'src/main/resources/props/dev-secure.properties' generated metadata with charset 'UTF-8'
14:23:20.426 DEBUG 'src/main/resources/props/prd-secure.properties' generated metadata with charset 'UTF-8'
14:23:20.432 DEBUG 'src/main/resources/props/qa-secure.properties' generated metadata with charset 'UTF-8'
14:23:20.444 DEBUG 'src/main/resources/props/qa.properties' generated metadata with charset 'UTF-8'
14:23:20.482 INFO  19/19 source files have been analyzed for the text and secrets analysis
14:23:20.482 DEBUG Analyzed files for the text and secrets analysis: 19
14:23:20.485 INFO  Start fetching files for the binary file analysis
14:23:20.485 INFO  There are no files to be analyzed for the binary file analysis
14:23:20.486 INFO  Sensor EnterpriseTextAndSecretsSensor [textenterprise] (done) | time=794ms
14:23:20.486 INFO  Sensor JavaScript inside YAML analysis [javascript]
14:23:20.512 INFO  No input files found for analysis
14:23:20.512 INFO  Hit the cache for 0 out of 0
14:23:20.513 INFO  Miss the cache for 0 out of 0
14:23:20.513 INFO  Sensor JavaScript inside YAML analysis [javascript] (done) | time=27ms
14:23:20.513 INFO  Sensor CSS Rules [javascript]
14:23:20.513 INFO  No CSS, PHP, HTML or VueJS files are found in the project. CSS analysis is skipped.
14:23:20.513 INFO  Sensor CSS Rules [javascript] (done) | time=0ms
14:23:20.513 INFO  Sensor JavaSecuritySensor [security]
14:23:20.516 INFO  29 taint analysis rules enabled.
14:23:20.517 DEBUG Enabled taint analysis rules: S2076, S2078, S2083, S2091, S2631, S3649, S5131, S5135, S5144, S5145, S5146, S5147, S5334, S5496, S5883, S6096, S6173, S6287, S6350, S6384, S6390, S6398, S6399, S6547, S6549, S7044, S7518, S7606, S7610
14:23:20.517 DEBUG Load type hierarchy and UCFGs: Starting
14:23:20.517 DEBUG Load type hierarchy: Starting
14:23:20.517 DEBUG Reading type hierarchy from: /tmp/.scannerwork/ucfg2/java
14:23:20.517 DEBUG Read 0 type definitions
14:23:20.518 DEBUG Load type hierarchy: Time spent was 00:00:00.000
14:23:20.518 DEBUG Load UCFGs: Starting
14:23:20.518 DEBUG Reading UCFGs from: /tmp/.scannerwork/ucfg2/java
14:23:20.518 DEBUG UCFG directory does not exist, no UCFGs will be loaded.
14:23:20.518 DEBUG Load UCFGs: Time spent was 00:00:00.000
14:23:20.519 DEBUG Load type hierarchy and UCFGs: Time spent was 00:00:00.001
14:23:20.519 INFO  No UCFGs have been included for analysis.
14:23:20.520 DEBUG java security sensor: Time spent was 00:00:00.005
14:23:20.521 INFO  java security sensor: Begin: 2026-01-27T14:23:20.515039594Z, End: 2026-01-27T14:23:20.520643085Z, Duration: 00:00:00.005
  Load type hierarchy and UCFGs: Begin: 2026-01-27T14:23:20.517306269Z, End: 2026-01-27T14:23:20.518836302Z, Duration: 00:00:00.001
    Load type hierarchy: Begin: 2026-01-27T14:23:20.517380259Z, End: 2026-01-27T14:23:20.518154798Z, Duration: 00:00:00.000
    Load UCFGs: Begin: 2026-01-27T14:23:20.518517570Z, End: 2026-01-27T14:23:20.518668321Z, Duration: 00:00:00.000
14:23:20.521 INFO  java security sensor peak memory: 84 MB
14:23:20.521 DEBUG Debug information:
14:23:20.521 INFO  Sensor JavaSecuritySensor [security] (done) | time=8ms
14:23:20.522 INFO  Sensor CSharpSecuritySensor [security]
14:23:20.522 INFO  27 taint analysis rules enabled.
14:23:20.522 DEBUG Enabled taint analysis rules: S2076, S2078, S2083, S2091, S2631, S3649, S5131, S5135, S5144, S5145, S5146, S5147, S5334, S5883, S6096, S6173, S6287, S6350, S6399, S6547, S6549, S6639, S6641, S6680, S6776, S7044, S7714
14:23:20.522 DEBUG Load type hierarchy and UCFGs: Starting
14:23:20.522 DEBUG Load type hierarchy: Starting
14:23:20.522 DEBUG Reading type hierarchy from: /tmp/ucfg2/cs
14:23:20.522 DEBUG Read 0 type definitions
14:23:20.522 DEBUG Load type hierarchy: Time spent was 00:00:00.000
14:23:20.523 DEBUG Load UCFGs: Starting
14:23:20.523 DEBUG Reading UCFGs from: /tmp/ucfg2/cs
14:23:20.523 DEBUG UCFG directory does not exist, no UCFGs will be loaded.
14:23:20.523 DEBUG Load UCFGs: Time spent was 00:00:00.000
14:23:20.523 DEBUG Load type hierarchy and UCFGs: Time spent was 00:00:00.000
14:23:20.523 INFO  No UCFGs have been included for analysis.
14:23:20.523 DEBUG csharp security sensor: Time spent was 00:00:00.001
14:23:20.524 INFO  csharp security sensor: Begin: 2026-01-27T14:23:20.522106257Z, End: 2026-01-27T14:23:20.523718132Z, Duration: 00:00:00.001
  Load type hierarchy and UCFGs: Begin: 2026-01-27T14:23:20.522416563Z, End: 2026-01-27T14:23:20.522747775Z, Duration: 00:00:00.000
    Load type hierarchy: Begin: 2026-01-27T14:23:20.522426280Z, End: 2026-01-27T14:23:20.522550271Z, Duration: 00:00:00.000
    Load UCFGs: Begin: 2026-01-27T14:23:20.522645930Z, End: 2026-01-27T14:23:20.522683983Z, Duration: 00:00:00.000
14:23:20.524 INFO  csharp security sensor peak memory: 84 MB
14:23:20.524 DEBUG Debug information:
14:23:20.524 INFO  Sensor CSharpSecuritySensor [security] (done) | time=3ms
14:23:20.525 INFO  Sensor VbNetSecuritySensor [security]
14:23:20.525 INFO  25 taint analysis rules enabled.
14:23:20.525 DEBUG Enabled taint analysis rules: S2076, S2078, S2083, S2091, S2631, S3649, S5135, S5144, S5145, S5146, S5147, S5334, S5883, S6096, S6173, S6287, S6350, S6399, S6547, S6549, S6639, S6641, S6680, S6776, S7044
14:23:20.525 DEBUG Load type hierarchy and UCFGs: Starting
14:23:20.525 DEBUG Load type hierarchy: Starting
14:23:20.525 DEBUG Reading type hierarchy from: /tmp/ucfg2/vbnet
14:23:20.525 DEBUG Read 0 type definitions
14:23:20.525 DEBUG Load type hierarchy: Time spent was 00:00:00.000
14:23:20.525 DEBUG Load UCFGs: Starting
14:23:20.525 DEBUG Reading UCFGs from: /tmp/ucfg2/vbnet
14:23:20.525 DEBUG UCFG directory does not exist, no UCFGs will be loaded.
14:23:20.525 DEBUG Load UCFGs: Time spent was 00:00:00.000
14:23:20.525 DEBUG Load type hierarchy and UCFGs: Time spent was 00:00:00.000
14:23:20.525 INFO  No UCFGs have been included for analysis.
14:23:20.525 DEBUG vbnet security sensor: Time spent was 00:00:00.000
14:23:20.526 INFO  vbnet security sensor: Begin: 2026-01-27T14:23:20.524493925Z, End: 2026-01-27T14:23:20.525407416Z, Duration: 00:00:00.000
  Load type hierarchy and UCFGs: Begin: 2026-01-27T14:23:20.524756776Z, End: 2026-01-27T14:23:20.525092758Z, Duration: 00:00:00.000
    Load type hierarchy: Begin: 2026-01-27T14:23:20.524766393Z, End: 2026-01-27T14:23:20.524862516Z, Duration: 00:00:00.000
    Load UCFGs: Begin: 2026-01-27T14:23:20.524958094Z, End: 2026-01-27T14:23:20.524996133Z, Duration: 00:00:00.000
14:23:20.526 INFO  vbnet security sensor peak memory: 84 MB
14:23:20.526 DEBUG Debug information:
14:23:20.526 INFO  Sensor VbNetSecuritySensor [security] (done) | time=1ms
14:23:20.526 INFO  Sensor PhpSecuritySensor [security]
14:23:20.526 INFO  18 taint analysis rules enabled.
14:23:20.526 DEBUG Enabled taint analysis rules: S2076, S2078, S2083, S2091, S2631, S3649, S5131, S5135, S5144, S5145, S5146, S5334, S5335, S5883, S6173, S6287, S6350, S7044
14:23:20.527 DEBUG Load type hierarchy and UCFGs: Starting
14:23:20.527 DEBUG Load type hierarchy: Starting
14:23:20.527 DEBUG Reading type hierarchy from: /tmp/.scannerwork/ucfg2/php
14:23:20.527 DEBUG Read 0 type definitions
14:23:20.527 DEBUG Load type hierarchy: Time spent was 00:00:00.000
14:23:20.527 DEBUG Load UCFGs: Starting
14:23:20.527 DEBUG Reading UCFGs from: /tmp/.scannerwork/ucfg2/php
14:23:20.527 DEBUG UCFG directory does not exist, no UCFGs will be loaded.
14:23:20.527 DEBUG Load UCFGs: Time spent was 00:00:00.000
14:23:20.527 DEBUG Load type hierarchy and UCFGs: Time spent was 00:00:00.000
14:23:20.527 INFO  No UCFGs have been included for analysis.
14:23:20.527 DEBUG php security sensor: Time spent was 00:00:00.000
14:23:20.527 INFO  php security sensor: Begin: 2026-01-27T14:23:20.526147586Z, End: 2026-01-27T14:23:20.526810323Z, Duration: 00:00:00.000
  Load type hierarchy and UCFGs: Begin: 2026-01-27T14:23:20.526291396Z, End: 2026-01-27T14:23:20.526553672Z, Duration: 00:00:00.000
    Load type hierarchy: Begin: 2026-01-27T14:23:20.526301165Z, End: 2026-01-27T14:23:20.526371682Z, Duration: 00:00:00.000
    Load UCFGs: Begin: 2026-01-27T14:23:20.526452471Z, End: 2026-01-27T14:23:20.526486038Z, Duration: 00:00:00.000
14:23:20.527 INFO  php security sensor peak memory: 84 MB
14:23:20.527 DEBUG Debug information:
14:23:20.528 INFO  Sensor PhpSecuritySensor [security] (done) | time=1ms
14:23:20.528 INFO  Sensor PythonSecuritySensor [security]
14:23:20.528 INFO  21 taint analysis rules enabled.
14:23:20.528 DEBUG Enabled taint analysis rules: S2076, S2078, S2083, S2091, S2631, S3649, S5131, S5135, S5144, S5145, S5146, S5147, S5334, S5496, S6287, S6350, S6639, S6680, S6776, S6839, S7044
14:23:20.528 DEBUG Load type hierarchy and UCFGs: Starting
14:23:20.528 DEBUG Load type hierarchy: Starting
14:23:20.528 DEBUG Reading type hierarchy from: /tmp/.scannerwork/ucfg2/python
14:23:20.528 DEBUG Read 0 type definitions
14:23:20.528 DEBUG Load type hierarchy: Time spent was 00:00:00.000
14:23:20.528 DEBUG Load UCFGs: Starting
14:23:20.528 DEBUG Reading UCFGs from: /tmp/.scannerwork/ucfg2/python
14:23:20.528 DEBUG UCFG directory does not exist, no UCFGs will be loaded.
14:23:20.528 DEBUG Load UCFGs: Time spent was 00:00:00.000
14:23:20.528 DEBUG Load type hierarchy and UCFGs: Time spent was 00:00:00.000
14:23:20.528 INFO  No UCFGs have been included for analysis.
14:23:20.528 DEBUG python security sensor: Time spent was 00:00:00.000
14:23:20.528 INFO  python security sensor: Begin: 2026-01-27T14:23:20.527483841Z, End: 2026-01-27T14:23:20.528226134Z, Duration: 00:00:00.000
  Load type hierarchy and UCFGs: Begin: 2026-01-27T14:23:20.527640146Z, End: 2026-01-27T14:23:20.528020045Z, Duration: 00:00:00.000
    Load type hierarchy: Begin: 2026-01-27T14:23:20.527704376Z, End: 2026-01-27T14:23:20.527805433Z, Duration: 00:00:00.000
    Load UCFGs: Begin: 2026-01-27T14:23:20.527915214Z, End: 2026-01-27T14:23:20.527953132Z, Duration: 00:00:00.000
14:23:20.529 INFO  python security sensor peak memory: 84 MB
14:23:20.529 DEBUG Debug information:
14:23:20.529 INFO  Sensor PythonSecuritySensor [security] (done) | time=1ms
14:23:20.529 INFO  Sensor JsSecuritySensor [security]
14:23:20.529 DEBUG SonarJasmin not installed. Using SonarSecurity for JS/TS taint rules.
14:23:20.529 INFO  15 taint analysis rules enabled.
14:23:20.529 DEBUG Enabled taint analysis rules: S2076, S2083, S2631, S3649, S5131, S5144, S5146, S5147, S5334, S5696, S5883, S6096, S6105, S6287, S6350
14:23:20.529 DEBUG Load type hierarchy and UCFGs: Starting
14:23:20.530 DEBUG Load type hierarchy: Starting
14:23:20.530 DEBUG Reading type hierarchy from: /tmp/.scannerwork/ucfg2/js
14:23:20.530 DEBUG Read 0 type definitions
14:23:20.530 DEBUG Load type hierarchy: Time spent was 00:00:00.000
14:23:20.530 DEBUG Load UCFGs: Starting
14:23:20.530 DEBUG Reading UCFGs from: /tmp/.scannerwork/ucfg2/js
14:23:20.530 DEBUG UCFG directory does not exist, no UCFGs will be loaded.
14:23:20.530 DEBUG Load UCFGs: Time spent was 00:00:00.000
14:23:20.530 DEBUG Load type hierarchy and UCFGs: Time spent was 00:00:00.000
14:23:20.530 INFO  No UCFGs have been included for analysis.
14:23:20.530 DEBUG js security sensor: Time spent was 00:00:00.000
14:23:20.531 INFO  js security sensor: Begin: 2026-01-27T14:23:20.529042226Z, End: 2026-01-27T14:23:20.529998406Z, Duration: 00:00:00.000
  Load type hierarchy and UCFGs: Begin: 2026-01-27T14:23:20.529520793Z, End: 2026-01-27T14:23:20.529789445Z, Duration: 00:00:00.000
    Load type hierarchy: Begin: 2026-01-27T14:23:20.529531965Z, End: 2026-01-27T14:23:20.529595159Z, Duration: 00:00:00.000
    Load UCFGs: Begin: 2026-01-27T14:23:20.529689433Z, End: 2026-01-27T14:23:20.529723850Z, Duration: 00:00:00.000
14:23:20.531 INFO  js security sensor peak memory: 84 MB
14:23:20.531 DEBUG Debug information:
14:23:20.531 INFO  Sensor JsSecuritySensor [security] (done) | time=2ms
14:23:20.531 INFO  Sensor KotlinSecuritySensor [security]
14:23:20.531 INFO  28 taint analysis rules enabled.
14:23:20.531 DEBUG Enabled taint analysis rules: S2076, S2078, S2083, S2091, S2631, S3649, S5131, S5135, S5144, S5145, S5146, S5147, S5334, S5496, S5883, S6096, S6173, S6287, S6350, S6384, S6390, S6398, S6399, S6547, S6549, S7044, S7606, S7610
14:23:20.531 DEBUG Load type hierarchy and UCFGs: Starting
14:23:20.531 DEBUG Load type hierarchy: Starting
14:23:20.531 DEBUG Reading type hierarchy from: /tmp/.scannerwork/ucfg2/kotlin
14:23:20.531 DEBUG Read 0 type definitions
14:23:20.531 DEBUG Load type hierarchy: Time spent was 00:00:00.000
14:23:20.531 DEBUG Load UCFGs: Starting
14:23:20.531 DEBUG Reading UCFGs from: /tmp/.scannerwork/ucfg2/kotlin
14:23:20.531 DEBUG UCFG directory does not exist, no UCFGs will be loaded.
14:23:20.531 DEBUG Load UCFGs: Time spent was 00:00:00.000
14:23:20.531 DEBUG Load type hierarchy and UCFGs: Time spent was 00:00:00.000
14:23:20.532 INFO  No UCFGs have been included for analysis.
14:23:20.532 DEBUG kotlin security sensor: Time spent was 00:00:00.000
14:23:20.532 INFO  kotlin security sensor: Begin: 2026-01-27T14:23:20.530667828Z, End: 2026-01-27T14:23:20.531329428Z, Duration: 00:00:00.000
  Load type hierarchy and UCFGs: Begin: 2026-01-27T14:23:20.530874575Z, End: 2026-01-27T14:23:20.531131096Z, Duration: 00:00:00.000
    Load type hierarchy: Begin: 2026-01-27T14:23:20.530884992Z, End: 2026-01-27T14:23:20.530944930Z, Duration: 00:00:00.000
    Load UCFGs: Begin: 2026-01-27T14:23:20.531031705Z, End: 2026-01-27T14:23:20.531064625Z, Duration: 00:00:00.000
14:23:20.532 INFO  kotlin security sensor peak memory: 84 MB
14:23:20.532 DEBUG Debug information:
14:23:20.532 INFO  Sensor KotlinSecuritySensor [security] (done) | time=1ms
14:23:20.532 INFO  Sensor GoSecuritySensor [security]
14:23:20.532 INFO  9 taint analysis rules enabled.
14:23:20.532 DEBUG Enabled taint analysis rules: S2076, S2083, S2091, S3649, S5144, S5145, S5146, S6096, S6350
14:23:20.532 DEBUG Load type hierarchy and UCFGs: Starting
14:23:20.532 DEBUG Load type hierarchy: Starting
14:23:20.533 DEBUG Reading type hierarchy from: /tmp/.scannerwork/ucfg2/go
14:23:20.533 DEBUG Read 0 type definitions
14:23:20.533 DEBUG Load type hierarchy: Time spent was 00:00:00.000
14:23:20.533 DEBUG Load UCFGs: Starting
14:23:20.533 DEBUG Reading UCFGs from: /tmp/.scannerwork/ucfg2/go
14:23:20.533 DEBUG UCFG directory does not exist, no UCFGs will be loaded.
14:23:20.533 DEBUG Load UCFGs: Time spent was 00:00:00.000
14:23:20.533 DEBUG Load type hierarchy and UCFGs: Time spent was 00:00:00.000
14:23:20.533 INFO  No UCFGs have been included for analysis.
14:23:20.533 DEBUG go security sensor: Time spent was 00:00:00.000
14:23:20.533 INFO  go security sensor: Begin: 2026-01-27T14:23:20.532024473Z, End: 2026-01-27T14:23:20.532603605Z, Duration: 00:00:00.000
  Load type hierarchy and UCFGs: Begin: 2026-01-27T14:23:20.532115336Z, End: 2026-01-27T14:23:20.532403118Z, Duration: 00:00:00.000
    Load type hierarchy: Begin: 2026-01-27T14:23:20.532124663Z, End: 2026-01-27T14:23:20.532183327Z, Duration: 00:00:00.000
    Load UCFGs: Begin: 2026-01-27T14:23:20.532271631Z, End: 2026-01-27T14:23:20.532310863Z, Duration: 00:00:00.000
14:23:20.533 INFO  go security sensor peak memory: 84 MB
14:23:20.533 DEBUG Debug information:
14:23:20.534 INFO  Sensor GoSecuritySensor [security] (done) | time=2ms
14:23:20.537 INFO  ------------- Run sensors on project
14:23:20.617 DEBUG 'Generic Coverage Report' skipped because of missing configuration requirements.
Accessed configuration:
- sonar.coverageReportPaths: <empty>
14:23:20.617 DEBUG 'Import external issues report from SARIF file.' skipped because of missing configuration requirements.
Accessed configuration:
- sonar.coverageReportPaths: <empty>
- sonar.sarifReportPaths: <empty>
14:23:20.617 DEBUG 'Java CPD Block Indexer' skipped because there is no related file in current project
14:23:20.617 DEBUG Sensors : Zero Coverage Sensor
14:23:20.617 INFO  Sensor Zero Coverage Sensor
14:23:20.619 INFO  Sensor Zero Coverage Sensor (done) | time=1ms
14:23:20.619 INFO  ------------- Gather SCA dependencies on project
14:23:20.620 INFO  Dependency analysis skipped
14:23:20.625 INFO  CPD Executor Calculating CPD for 0 files
14:23:20.625 INFO  CPD Executor CPD calculation finished (done) | time=0ms
14:23:20.814 INFO  Load New Code definition
14:23:20.834 DEBUG <-- 200 https://{url}/api/new_code_periods/show.protobuf?project=<key>&branch=main (19ms, 41-byte body)
14:23:20.836 INFO  Load New Code definition (done) | time=22ms
14:23:20.840 INFO  Analysis report generated in 210ms, dir size=374.9 kB
14:23:20.854 INFO  Analysis report compressed in 13ms, zip size=59.2 kB
14:23:20.854 INFO  Analysis report generated in /tmp/.scannerwork/scanner-report
14:23:20.854 DEBUG Upload report
14:23:20.905 DEBUG <-- 200 https://{url}/api/ce/submit?projectKey=<key> (48ms, 76-byte body)
14:23:20.907 INFO  Analysis report uploaded in 53ms
14:23:20.908 DEBUG Report metadata written to /tmp/.scannerwork/report-task.txt
14:23:20.908 INFO  ANALYSIS SUCCESSFUL, you can find the results at: https://{url}/dashboard?id=<key>
14:23:20.908 INFO  Note that you will be able to access the updated dashboard once the server has processed the submitted analysis report
14:23:20.908 INFO  More about the report processing at https://{url}/api/ce/task?id=0c4b2b29-3ba3-424b-9f9d-c59eec00e207
14:23:20.912 DEBUG Post-jobs : 
14:23:20.916 INFO  Analysis total time: 10.531 s
14:23:20.917 INFO  SonarScanner Engine completed successfully
14:23:20.918 DEBUG Cleanup org.eclipse.jgit.util.FS$FileStoreAttributes$$Lambda$390/0x000071642034a678@16872c4d during JVM shutdown
14:23:21.257 INFO  EXECUTION SUCCESS
14:23:21.257 INFO  Total time: 28.522s

This is probably more detailed. This needed to run from locally, but you can infer relative speed of individual steps.

Besides, I was more interested in understanding more about how the Elasticsearch instance works inside the container.

Hi,

I’m confused.

Is this the performance you’re complaining about? 28.5 seconds?

 
Ann

I was under the impression that SonarQube is aware that sonarscans take longer in GitHub Actions runs. The second run with -X could not be run on the production systems, rather, it was a local sonarscan as you can see by the operating system and tool version differences in the logs. You can still compare time spent in each step and tell me if it looks odd.

My main concern remains on Elasticsearch performance, as it could both be responsible for delays in fetching required plugins in a sonarscan and also triggering write amplification cascades when swarms of simultaneous sonarscans are started and finished. Is this a known phenomenon?

Hi,

This was not my initial understanding.

For this, please bump your server logging level (Administration → System → Log level) to DEBUG and provide the web.log and es.log generated during an analysis report processing. You’ll want to change the log level back to INFO immediately after, since those logs get big, fast.

 
Ann