We use SonarQube for testing and quality assurance. We use this in banks for testing.
We also use SonarQube for security static testing.
We use SonarQube for testing and quality assurance. We use this in banks for testing.
We also use SonarQube for security static testing.
It provides the security that is required from a solution for financial businesses.
SonarQube is used for static testing, not for dynamic. We found a solution with dynamic testing, and are looking to find a solution that can be used for both types of testing.
I would like to see software included that can be used with Waterfall projects.
We try to primarily use open-source solutions. The organization tries not to spend money for the moment. Many clients do not want to pay for solutions during this time, especially in the case of products that are expensive.
We have partnered with B2B American to help with the purchasing of the license.
We have just been approved to purchase SonarQube Developer Edition.
We have a license with 125,000 lines of code. We did not purchase a lot of lines but it is specific to our code environment.
It's an open-source solution.
We are currently evaluating other solutions that are open-source. The company is trying to reduce the amount of money spent on solutions.
We are looking for the newest technologies but the biggest stopper for us is money.
For the units of architecture, we have tried to find the newest technology that would benefit the manifest of their orientation.
It has been very difficult. Last year many projects stopped.
I would rate SonarQube a six out of ten.
We use SonarQube to scan our security protection.
It is a very good tool for analysis and security vulnerability checking.
The scanning part could be improved in SonarQube. We have used Coverity for scanning, and we have the critical issues reported by Coverity. When we used SonarQube for scanning and looked at the results, it seems that some of them have incorrect input. This part can be improved for C and C++ languages.
I have been using this solution for a couple of weeks.
It is stable.
We haven't evaluated its scalability.
I just use our internal IT to get support for SonarQube. That is enough for me.
We were previously using Coverity. We used it for three years or so.
We just use the Enterprise SonarQube instance provided by our company.
I would recommend this solution. I would rate SonarQube an eight out of ten.
The primary use case of this solution is for static code analysis, and benchmarking our code standards according to our preferences.
Our builds process through SonarQube and if it passes the required set of requirements we have set, it will then go through to production.
The most valuable features are the segregation containment and the suspension of product services. Also, the library that SonarQube covers is good.
The library could have more languages that are supported. It would be helpful.
There are a few clauses that are specific to our organization, and it needs to improve. It's the reason that were are evaluating other solutions. It creates the ability for the person who releases the authorized release, which is not good. We would like to be able to expand on our work.
MicroFocus, as an example, would be helping us with that area or creating a dependency tree of the code from where it deployed and branching it into your entire code base. This would be something that is very helpful and has helped in identifying the gaps.
It would be great to have a dependency tree with each line of your code based on an OS top ten plugin that needs to be scanned. For example, a line or branch of code used in a particular site that needs to be branched into my entire codebase, and direct integration with Jira in order to assign that particular root to a developer would be really good.
Automated patching for my library, variable audience, and support for the client in the CICD pipeline is all done with a set of different tools, but it would be nice to have it like a one-stop-shop.
I would like to see improvements in defining the quality sets of rules and the quality to ensure code with low-performance does not end up in production. We would also need the ability to edit those rules.
I have been using SonarQube for approximately two years.
The stability is good.
The branch advanced analysis pull request declarations, they are good and highly valuable, but they are not part of the free edition. They are only available as part of the licensed one.
Currently, we have 1.2 to 1.5 million lines of code. Certainly, if that increases, so would the costs expediently.
We have 50 developers' licenses.
There is quite a bit of maintenance that is needed. We have a couple of people from our operations team to do the maintaining.
It is integrated with our CICD department and is being used extensively.
We do have plans to increase the usage of SonarQube.
We have used open-source origins of the tools.
PCI is an open-source solution that we used before, and we used Snyk as well.
The initial setup is straightforward.
We did not use a vendor team, it was done by us.
The developer edition is based on cost per lines of code.
Now we are looking for a more mature solution and evaluating other products. We want a complete code analysis platform that is more mature.
We will either go with the paid Developer active license or solutions such as Checkmarx or MicroFocus.
The community edition is quite informative for engineers. The actual code analysis is not conducted on the GitLab flow, but the build pipeline would show the core quantity steps which is part of the criteria.
The trial gives you a way to implement the POC and check if it can be integrated with your own stack. Once the trial expires, you can continue with the same setup for getting the license.
I would rate this solution a six out of ten.
We use it to check the code quality, and the code review to find out the vulnerabilities about the central codes like simplifications and codes. We also use it for security management.
The most valuable feature is the security hotspot feature that identifies where your code is prone to have security issues.
It also gives you a very good highlight of what's changed, and what has to be changed in the future.
Apart from that, there are many other good features as it's a code analytics platform. It also has a dashboard reporting feature, which is very good. I also like the ease of its integration with Jenkins.
Another valuable feature is the time snapshot that it provides for the code. It provides the code quality, the lagging, and the training features like what already has gone wrong and what is likely to go wrong. It's a very good feature for a project to have a dashboard where the users can find everything about their project at a single glance.
There are various standards that are followed. Awareness is a must.
Product awareness is something that I would recommend. If the users are not aware of how to use the product, they won't understand the features.
I have been using SonarQube for three years.
It is quite stable. There are no kind of issues that we face on SonarQube. It's just about the awareness where the users are not aware of a feature and that's where we need to jump in and explain some of the features about how it works.
It's definitely easy to scale.
We do contact them based on the project team requirement. We contact them if they have to set up any specific kind of portfolio application and such application et cetera, internal.
Their support is good. They respond quickly. The response time is very good. They answer the queries within 24 to 48 hours. That's a plus for them. It's a very costly product, so we use the enterprise-level product. It does consume a lot of license cost for that.
We used Fortify, it is also another tool for static code analysis. The security team used to use that, but not in our team because ours was a newly assembled team for the work.
The initial setup is simple. It's basically an orchestration platform on which I manage around 400 SonarQube incentives.
It's a mass production environment. I'm currently managing around 400 plus teams who are using the product. We are trying to migrate it onto Kubernetes.
The setup takes around five to ten minutes as I have created automation.
It requires maintenance on the platform side, but not on the SonarQube side. Because there is a DB cleanup automatically inbuilt in Sonar, it does not require much to maintain within SonarQube itself.
It eats up a lot of memory. For a stack it's around 2.5GB. We use it on a daily basis.
Everything is included in the standard licensing.
Awareness about how to use the product is important. It's a very good product for developers because it gives you timely notifications about where the tool has gone wrong or what could go wrong in the future. That's popular for developers. It's very good for the stats about the product for architects
The metrics are how the budgeting should be done et cetera. These are the things that they can find out from the dashboard based on the lines of codes.
In the next release, I would like to have notifications because now, it is a bit difficult. I think that's a feature which we could add there and it would benefit the users as well. For every full request, they should be able to see their bugs or vulnerability directly on the surface.
I would rate it an eight out of ten.
Our primary use case is to analyze source code for software bugs, technical debt, vulnerabilities, and test coverage. It provides an automated gated procedure to ensure that engineers are able to deliver great, secure code to production.
We plug this process into our process right from the start enabling the IDE integrations so that engineers can scan their code before submission. Following on from that we run the scans on every change that has been submitted for review.
This way we ensure that no core/fundamental issues are added to our codebases.
It has helped many of the organizations that I have worked at to improve overall security, quality, and test confidence within the codebases. It also provides this in a speed efficient way. Engineers now feel much more proud of their solution as they gain confidence from these scans and their results.
Engineers have also learned from the results and have improved themselves as engineers. This will help them with their careers.
We are also able to get reports on our suite and generate a quality rating for ourselves utilizing this data and more.
By far the quality gate controls. Without this, there would be no way to really utilize the power of this tool. We are able to automatically ensure that no code is delivered to production when it contains severe bugs or vulnerabilities.
The tight integration to source control also helps us to keep the engineers in the loop with any follow-up actions for issues reported.
Finally, the historical trend analysis gives us great insight into how we are improving based on our decisions, which are now driven by clear data.
It should keep up with newer technologies. As this is primarily open-source, it does require updates from the community. As such, there is sometimes a delay for new technologies to be covered by this too.
Particularly around the languages that the webpages state they support. The big benefit of Sonar is that it handles so many different languages, problems, and static analysis in one place.
When that one place has a low coverage for the most basic rules (OWASP top 10 for example) it starts to lose its value add.
I have been using SonarQube for five years.
Good, I have not really had many issues with it. No major ones either.
It all depends on where/how you are hosting it. The tool itself scales well.
I have used Checkmarx and also tried a demo of Veracode.
Checkmarx was far too heavy-handed and only handled security concerns for a VERY large price tag.
Veracode is very good, however, the price vs a free solution was a deciding factor in many cases.
It's very straightforward for a SaaS setup.
For a self-hosted setup, it is documented well and fairly easy.
We implemented in-house.
SonarQube will incur hosting costs. There are SaaS options available at competitive prices too.
Self-hosting SonarQube is subject to its open-source licenses documented on their website.
We also evaluated Checkmarx, Veracode and open source solutions specific to each programming language.
Security analysis is a MUST.
The tool helps us to monitor and manage violations. It manages the bugs and security violations.
SonarQube needs to improve its ease of use, integration with third-party platforms, and scalability.
I have been using the product for five years.
I rate the tool's stability a six out of ten.
My company has 150 users for SonarQube.
The tool's deployment is complex.
The tool's pricing is reasonable.
I rate the overall product a seven out of ten and would recommend it to others.
We used SonarQube for secure code review.
The solution's user interface is very user-friendly. The solution also provides good efficiency.
It would be a great add-on if SonarQube could update its database for vulnerabilities or plugging parts.
I rate the solution a seven out of ten for stability.
I rate the solution a nine out of ten for scalability.
On a scale from one to ten, where one is difficult and ten is easy, I rate the solution's initial setup an eight out of ten.
It takes around one hour to deploy SonarQube.
SonarQube is a fairly affordable solution for a larger scale if you have a specific role or specific department for secure code. We didn't pay for SonarQube. We used a free version of the solution because we had a small amount of code.
We used SonarQube for one project. To improve code quality, we do vulnerability assessment. We have an R&D department, and we collaborate with other teams to do any work related to secure code.
SonarQube simplified our code review process. Since we are new to secure code review, we mostly use freely available or impactful applications. That's why our R&D team suggested using SonarQube.
We use SonarQube to find vulnerabilities in the application code. The code is related to the application used by our client. We find vulnerabilities in their application, and we suggest solutions.
We have experienced challenges related to the client-side code. Sometimes, the server faces downtime, and our R&D team knows how to resolve such errors. It is easy to maintain the solution.
Overall, I rate the solution a nine out of ten.
The solution provides continuous code analysis which has improved the quality of our code. It can raise alarms on vulnerabilities with immediate reports on the dashboard. Few things are false positives and we can customize the rules.
The solution needs to improve its customization and flexibility.
I have been using the solution for ten days.
I would rate the product's stability an eight out of ten.
We have received instant replies from the support but not actual answers. We contacted support regarding upgrading the edition.
The tool's setup is not complex. Our engineers were not experienced and they took time to implement the product.
The tool is simple and I would rate it an eight out of ten.
