How to 3X Your MuleSoft Development Speed using MCP Server — April 23, 2026

Falcon AI is here - World's only AI-powered MuleSoft DevSecOps tool.

Mule Code Analysis with Azure Dev Ops

Azure Dev Ops is one of the leading Dev Ops tools of choice for most organizations trying to cover the entire application life cycle. One of the key requirements for Dev Ops tools is to integrate and provide a way to maintain MuleSoft code quality and security for the applications going through the Dev Ops platform. In this article, we are going to cover the steps required to set up Azure Dev Ops to use MuleSoft code quality analysis using IZ Analyzer.   

Graphical user interface

Description automatically generated with medium confidence

Background:



MuleSoft is a key integration platform adopted by more and more organizations and importance of MuleSoft code quality is more important than ever. Check out https://medium.com/@chethanbabu.r/why-automated-code-quality-should-be-the-number-one-priority-for-mulesoft-applications-307bb16d4ae1 for understanding why MuleSoft code quality should be the number one priority for mule applications. Since we are looking to integrate MuleSoft code quality into Dev Ops and Azure Dev Ops is a key platform used, this article tries to show how to set up MuleSoft code quality for mule application end to end using Azure Dev Ops and IZ Analyzer.

Let’s get started!

Step 1: Install SonarQubeÔ extension in your Azure Dev Ops Organization



SonarQubeÔ provides an excellent plugin on Azure market place which makes it easier to integrate code analysis into any pipeline or build. You can find the plugin at https://marketplace.visualstudio.com/items?itemName=SonarSource.sonarqube

Mulesoft Code Review
Mulesoft static code analysis

When you click on the Get it free button, it will take you to the organization selection screen. And based on your access level, it lists the organizations available and you can install it into the organization that you have access to.

Once installed, you can find it under your organization settings -> Extensions to make sure that it’s properly installed.

Step 2: Create new Azure Dev Ops Project



If you already have a project that you want to use for this, please skip to the next step.

Create new Azure Dev Ops project under your organization. You can enter details as shown below to create a sample project which we will use to create azure dev-ops project.

Mulesoft Code Review
Mulesoft static code analysis

Step 3: Create a repository for Mule Project in Azure Dev Ops

If you are using and want to use non Azure repository (like Bitbucket or Github), you can skip to the next step.

We are going to import an existing Mule repository into Azure. Select import repository option under Repos -> File section of Azure dev ops as shown below.

Mulesoft Code Review
Mulesoft static code analysis

You enter the details of the source repository and connection details and select Import.

Mulesoft Code Review
Mulesoft static code analysis

Once the project is imported, we are ready to set up service connection to IZ Analyzer to perform code analysis.

Step 3: Generate Security token for Analyzer



Go to https://analyzer.integralzone.com/izabout

Click on Sign In on the top right of the navigation and select the way to login to Analyzer:

Mulesoft Code Review
Mulesoft static code analysis

Once logged in, click on your name (which is on the top right of the screen) and select My Account option.

Mulesoft Code Review
Mulesoft static code analysis

Select Security option under My Account and enter a name to generate a token like Azure Dev Ops Token. Click on Generate button.

Mulesoft Code Review
Mulesoft static code analysis

A security token should be generated and displayed. Copy the token – since it will be needed in Azure Dev Ops security connection set up later.

Mulesoft Code Review
Mulesoft static code analysis

Step 4: Create new Analyzer Project



If you already have an organization defined and you know the details, you can skip this step.

Click + on the top right of the home screen and select option to create organization. Enter a name for the organization and click Continue.

Mulesoft Code Review
Mulesoft static code analysis

Confirm the organization created with free subscription and select Create Organization.

Graphical user interface, text, application, Teams

Description automatically generated

In the generated organization, select option to analyze new project:

Mulesoft Code Review
Mulesoft static code analysis

Enter a unique project key and display name. Click Set up.

Mulesoft Code Review
Mulesoft static code analysis

Enter the security token generated in the previous step and click Continue

Graphical user interface, text, application, email

Description automatically generated

Select the project main language – either Mule or Other from the option list. It should show you the commands to use and the parameters already filled (for example sonar.organization, sonar.exclusions, etc). Use them in Azure Dev Ops pipeline next.

Mulesoft Code Review
Mulesoft static code analysis

Step 5: Create Service Connection to Analyzer



In Azure Dev Ops, go to project settings -> Service connections to create a new service connection to IZ Analyzer.

Mulesoft Code Review
Mulesoft static code analysis

Select SonarQube as the connection type. Click Next.

Mulesoft Code Review
Mulesoft static code analysis

Enter the values for new SonarQube service connection as shown below and click Save.

Mulesoft Code Review
Mulesoft static code analysis

The connection should now be saved and visible under Service connections section as shown below.

Mulesoft Code Review
Mulesoft static code analysis

Step 6: Create Azure Dev Ops pipelines



In Pipelines, select the option to create new pipeline.

Mulesoft Code Review
Mulesoft static code analysis

Select where your code is residing. Since it is in the same project, we are going to choose Azure Repos Git. If your code is residing elsewhere, please select the appropriate option and configure it.

Mulesoft Code Review
Mulesoft static code analysis

Select the repository which will be used in this pipeline. In our case, we are going to select the imported repository from above.

Mulesoft Code Review
Mulesoft static code analysis

Select the configuration type. You can choose either Maven or the Starter Pipeline. The template is just a placeholder and can be easily edited later.

Mulesoft Code Review
Mulesoft static code analysis

Delete all the unnecessary placeholder under steps section as shown below. Put the cursor below the steps section and click the Show assistant option on the panel to display assistants available. Find the Sonar tasks as shown below. Click on Prepare Analysis Configuration task.

Mulesoft Code Review
Mulesoft static code analysis

Enter analysis parameters as shown below:

Mulesoft Code Review
Mulesoft static code analysis

Add the Run code analysis and publish quality gate result tasks one after the other after the prepare task above.

Graphical user interface, text, application, Teams

Description automatically generated

Final generated pipeline should look like below (for Sonar Scanner/Other option):  

# Build your Mule project and run code analysis with IZ Analyzer.

trigger:
- master

pool:
  vmImage: ubuntu-latest

steps:
- task: SonarQubePrepare@4
  inputs:
    SonarQube: 'IZ Analyzer'
    scannerMode: 'CLI'
    configMode: 'manual'
    cliProjectKey: 'azure-devops-demo'
    cliProjectName: 'Azure Dev Ops Mule System API'
    cliSources: '.'
    extraProperties: |
      sonar.exclusions=target
      sonar.organization=azure-devops-demo

- task: SonarQubeAnalyze@4
- task: SonarQubePublish@4
  inputs:
    pollingTimeoutSec: '300'

Final generated pipeline should look like below (for Maven Option):  

# Build Mule project and publish analysis results to IZ Analyzer

trigger:
- master

pool:
  vmImage: ubuntu-latest

steps:
- task: SonarQubePrepare@4
  inputs:
    SonarQube: 'IZ Analyzer'
    scannerMode: 'Other'
    extraProperties: |
      sonar.exclusions=target
      sonar.organization=azure-devops-demo
      sonar.sources=.
      sonar.projectKey=azure-devops-demo
      sonar.projectName=Azure Dev Ops Mule System API
- task: Maven@3
  inputs:
    mavenPomFile: 'pom.xml'
    mavenOptions: '-Xmx3072m'
    javaHomeOption: 'JDKVersion'
    jdkVersionOption: '1.8'
    jdkArchitectureOption: 'x64'
    goals: 'sonar:sonar'

- task: SonarQubePublish@4
  inputs:
    pollingTimeoutSec: '300'

Once the pipeline configuration is completed, click the option to save and run the configuration.

Mulesoft Code Review
Mulesoft static code analysis

It should trigger the pipeline as shown below:

Mulesoft Code Review
Mulesoft static code analysis

Step 7: Review Pipeline and Code Quality



If you click on the job which is running, you can see the detailed logs like shown below:

Mulesoft Code Review
Mulesoft static code analysis

You can see the published sonar reports by visiting the extensions tab of the summary page of pipeline build.

Mulesoft Code Review
Mulesoft static code analysis

If you click the detailed SonarQube report option, it will take you the actual project analyzer page like below:

Mulesoft Code Review
Mulesoft static code analysis

You can get detailed analytics of the mule application from project statistics page:

Mulesoft Code Review
Mulesoft static code analysis

You can check out the remediation efforts and project portfolio information from the project analytics.

Mulesoft Code Review
Mulesoft static code analysis

Organizational analysis can be obtained through Organization dashboards:

Mulesoft Code Review
Mulesoft static code analysis

You can query and understand how different lines of business are working and how many projects are non compliant at a glance!

Mulesoft Code Review
Mulesoft static code analysis

Parting thoughts



Once the code analysis pipeline has been set up, the focus of the organizations should be on setting up more stringent security, compliance rules to check MuleSoft code quality and ensure reliability. As more things are templatized and stricter governance in place, setting up organization and project analytics will help understand the current organization state and to help optimize the MuleSoft code quality/governance further. Azure Dev Ops and IZ Analyzer can be

used to the fullest capability to deliver maximum benefits and help automate compliance/security reports. This should help organizations to optimize their processes further and to deliver business value.

Thanks for reading!

End Note

This Article featured IZ Analyzer, our MuleSoft Code analysis product.

Interested in learning more about IZ Analyzer?
Follow the link below to learn more:
https://integralzone.com/category/code-quality/

Interested in booking an exclusive demo of IZ Analyzer for your team?
Book using the link below:
https://integralzone.com/book-online-demo/

Have a Specific query on IZ Analyzer?
Follow the below link to contact us:
https://integralzone.com/contact/

Leave a Reply

Your email address will not be published. Required fields are marked *

Schedule a consultation to begin your 2-week free trial


Every MuleSoft Project Needs ‘Falcon Suite’.

Falcon Suite is world’s only enterprise-ready solution for high quality, secure and compliant MuleSoft implementation. Here is why you should try our 2-week free trial.

Automated Code Review

Enhance code quality with real-time, in-line scanning and correction, reducing manual review time.

Continuous Monitoring

Ensure ongoing system integrity with 24/7 monitoring and vulnerability resolution.

API Health Monitoring

Maintain uninterrupted API performance with real-time health checks and instant alerts.

Robust Security

Protect against data breaches with comprehensive security and compliance checks.

Schedule a consultation to begin your
2-week free trial

Schedule a consultation to begin your
2-week free trial

Every MuleSoft Project Needs ‘Falcon Suite’.

Falcon Suite is world’s only enterprise-ready solution for high quality, secure and compliant MuleSoft implementation. Here is why you should try our 2- week free trial.

Automated Code Review

Enhance code quality with real-time, in-line scanning and correction, reducing manual review time.

Continuous Monitoring

Ensure ongoing system integrity with 24/7 monitoring and vulnerability resolution.

API Health Monitoring

Maintain uninterrupted API performance with real-time health checks and instant alerts.

Robust Security

Protect against data breaches with comprehensive security and compliance checks.