- System requirements
- Profiler architecture
- Profiler installation
- Uninstall profiler
- Running the profiler
- Profiler activation
- Welcome screen
- Start profiling
- IDE integration
- Java server integration wizard
- Attach profiler to a running application
- Remote profiling
- AWS SSM
- Direct connect
- SSH access
- Connection broker
- Profiling in Docker container
- Profiling in Docker container using port forwarding
- Profiling in Docker container using YourKit Connection Broker
- Profiling in Amazon EC2 instance
- Enabling profiling manually
- Agent startup options
- Connect to profiled application
- Profiling overhead
- Snapshots
- Solving performance problems
- CPU profiling
- Thread profiling
- Virtual threads support
- Object allocation profiling
- Memory profiling
- Monitor profiling
- Exception profiling
- Telemetry
- Probes: monitor events of various kinds
- Inspections: automatic recognition of typical problems
- Automatically trigger actions on event
- Automatic deobfuscation
- Summary
- Filters
- Profiler command line
- Export of profiling results to external formats
- Profiler Java API
- Profiler HTTP API
- Settings
- Troubleshooting and FAQ
SSH access
Profiler uses SSH to log into the remote machine and find all running Java applications. Both applications running with and without the profiler agent can be found and profiled. If necessary, the profiler will upload the agent to the remote machine and attach it to your application.
Advantages
- Ideal for situations when you have SSH access to the host and want to profile Java application which runs without a profiler agent.
- No need to configure firewalls and expose ports.
- Ability to profile applications started without the profiler agent using attach.
Prerequisites
-
Remote host must permit SSH port forwarding.
Make sure that
AllowTcpForwarding yes
is set in remote OpenSSH server config, usually at/etc/ssh/sshd_config
on Linux. - The remote user must have a home directory, and it must be writable. The profiler uploads the necessary files to the user's home directory on the remote host. If the home directory is missing or not writable, remote profiling via SSH will fail.
Authentication methods
For authentication on the remote host you can use plain password, SSH private key or SSH agent authentication methods.
