Java agent for Glassfish server

Downloading the agent

  1. Download the agent tar file from the following link.
curl --header "PRIVATE-TOKEN: $TOKEN " --output ""
  1. Copy the tar to the server where Glassfish is deployed and untar the file.
  2. Delete the tomcat plugin from the agent/plugins directory tomcat-7.x-8.x-plugin-8.5.0.jar.

Configuring the agent

Update the following parameters in the agent.config file in the agent.

  • agent.service_name= APPLICATION_NAME
  • agent.force_tls= true
  • collector.backend_service = URL
  • agent.authentication = TOKEN_FROM_UI

Configuring on a Glassfish Server

  1. Add the following entries in the domain.xml file of Glassfish server.
  2. Make changes in the default and domain1 configurations. It should also be made if you have additional domains configured. The path to the domain.xml file is GLASSFISH_HOME/domain/domain1/config.
  • -javaagent:/path/to/agent/sixthsense-agent.jar
  • -Xbootclasspath/a:path/to/agent/plugins
  • -Daj.weaving.loadersNotToSkip=ALL
  • -Xverify:none
  1. Update the following entry in the domain.xml file. Replace with the correct path information in the following configuration.
  1. Modify the file and append the packages. Example: We have appended the org.apache.skywalking.* entry to the list of boot delegation classes.
org.osgi.framework.bootdelegation=${eclipselink.bootdelegation}, \
org.netbeans.lib.profiler, org.netbeans.lib.profiler.*, \

Importing the SixthSense root certificate

SixthSense provides standard root certificates and should be available in most operating system key-stores by default.

However, if Glassfish server is using a separate key-store, perform the following procedure.

  1. Open the SixthSense backend URL in the browser. The URL is also used in Step 4 of the Agent deployment section (your tenant backend URL)
Percentile Response Time
  1. Click the lock 🔒 icon in the address bar.
  2. Download the root certificate. In chrome, you can simply drag the Gold colored certificate icon to a directory.
  3. Copy the ISRG Root X1.cer file to the server where Glassfish is deployed.
  4. Import the root certificate using the following commands.
# Copy the cert file to a temporary keystore.
keytool -import -trustcacerts -alias root -file ISRG_Root_X1.cer -keystore mykeystore.jks
# Import the certificate to the keystore used by Glassfish server.
keytool -importkeystore -srckeystore mykeystore.jks -destkeystore /path/to/glassfish5/glassfish/domains/domain1/config/cacerts.jks


For any projects in the plugins or support requests, kindly affix the server.log and the agent.log files.