Archive
#XenDesktop 7.1 on #Hyper-V Pilot Guide! – #Citrix
This is a great PoC guide, some thing I would have done differently in detail but overall great work!
You’ve heard of XenDesktop 7.1, experienced a demo and worked through the Reviewer’s Guide. Now where do you turn when you’re ready for a PoC, pilot and preparations for a full-scale rollout?
Here on the Citrix Readiness and Enablement Team, we’re always looking for ways to empower our customers to be successful on their projects. To this end, we’ve taken one of our most popular hands-on lab guides used to train hundreds of internal and external students and reworked it for consumption by the masses. The XenDesktop 7.1 on Hyper-V Pilot Guide can be download fromhttps://citrix.sharefile.com/d/scaa256260df4ab3b. In this guide we cover the following topics with step-by-step instructions and screenshots:
– Configuring System Center Virtual Machine Manager and Installing the Agent
– Setting Up SQL Server Mirroring for a XenDesktop site
– Setting up the XenDesktop Site
– Joining a Controller to an Existing Site
– Configuring StoreFront and Installing Certificates
– Configuring NetScaler for StoreFront Load Balancing
– Installing the VDA Software on Desktop and Server VMs
– Creating Catalogs of Machine for Desktops and Servers
– Creating Delivery Groups for Desktops and Servers
– Delivering Installed and App-V Applications
– Provisioning Services Configuration and Optimizations
– Using the XenDesktop Setup Wizard
– Setting up Remote Access with NetScaler and StoreFront
– Internal and External Connectivity Scenarios
– Load Evaluator Policies
– Monitoring with Director
– Exploring Configuration Logging
– Exploring Delegated Administration
– Working with PowerShell
And much more!
Take a look through the document and let us know your thoughts…
IMPORTANT: This guide is designed to be used as a reference for building PoC and/or pilot environments. Production environments should always be…
Continue reading here!
//Richard
#Citrix #ShareFile StorageZone controller 2.2 released – #BYOD
If you haven’t seen this then have a look at what 2.2 now has to offer!
- StorageZones for ShareFile Data — You can store ShareFile data in either Windows Azure cloud storage or a private single-tenant storage system that you maintain. You specify a storage option when you configure StorageZones for ShareFile Data.
What’s new
StorageZones Controller 2.2 provides the following enhancements:
Support for Windows Azure storage containers — If you have a Windows Azure account, you can use an Azure storage container for your private data storage instead of a locally-maintained share.
To get started create a new zone and choose the Azure option when you configure StorageZones for ShareFile Data.
Connectors to SharePoint root-level sites — You can now create a StorageZones Connector for a SharePoint root-level site or site collection, enabling users to navigate all of the subsites and document libraries in the site. To provide more limited access, you can continue to create connectors to individual SharePoint document libraries.
Connectors to user home drives based on Active Directory — You can now create a Connector for network file shares that reliably points to user home drives. To create a connector for user home drives, set the UNC path to the variable %homedrive%. StorageZones Controller will then create connectors based on the user home folder path property in Active Directory.
Installation on non-English operating systems — You can install the English version of StorageZones Controller on the following operating system versions: French, German, Japanese, Simplified Chinese, and Spanish.
Read more here!
//Richard
Under the Covers of a Distributed Virtual Computing Platform – Built For Scale and Agility – via @dlink7, #Nutanix
I must say that Dwayne did a great job with this blog post series!! It goes into expelling the Nutanix Distributed File System (NDFS) that I must say is the most amazing enterprise product out there if you need a truly scalable and agile Compute and Storage platform! I advise you to read this series!!
Under the Covers of a Distributed Virtual Computing Platform – Part 1: Built For Scale and Agility
Lots of talk in the industry about how had software defined storage first and who was using what components. I don’t want to go down that rat hole since it’s all marketing and it won’t help you at the end of the day to enable your business. I want to really get into the nitty gritty of the Nutanix Distributed Files System(NDFS). NDFS has been in production for over a year and half with good success, take read of the article on the Wall Street Journal.
Below are core services and components that make NDFS tick. There are actually over 13 services, for example our replication is distributed across all the nodes to provide speed and low impact on the system. The replication service is called Cerebro which we will get to in this series.
This isn’t some home grown science experiment, the engineers that wrote the code come from Google, Facebook, Yahoo where this components where invented. It’s important to realize that all components are replaceable or future proofed if you will. The services\libraries provide the API’s so as newest innovations happen in the community, Nutanix is positioned to take advantage.
All the services mentioned above run on multiple nodes in cluster a master-less fashion to provide availability. The nodes talk over 10 GbE and are able to scale in a linear fashion. There is no performance degradation as you add nodes. Other vendors have to use InfiniBand because they don’t share the metadata cross all of the nodes. Those vendors end up putting a full copy of the metadata on each node, this eventually will cause them to hit a performance cliff and the scaling stops. Each Nutanix node acts a storage controller allowing you to do things like have a datastore of 10,000 VM’s without any performance impact… continue reading part 1 here.
Under the Covers of a Distributed Virtual Computing Platform – Part 2: ZZ Top
In case you missed Part 1 – Part 1: Built For Scale and Agility
No it’s not Billy Gibbons, Dusty Hill, or drummer Frank Beard. It’s Zeus and Zookeeper providing the strong blues that allow the Nutanix Distributed File System to maintain it’s configuration across the entire cluster. Read more…
True Scale Out Shared Nothing Architecture – #Compute, #Storage, #Nutanix via @josh_odgers
This is yet another great blog post by Josh! Great work and keep it up! 😉
I love this statement:
I think this really highlights what VMware and players like Google, Facebook & Twitter have been saying for a long time, scaling out not up, and shared nothing architecture is the way of the future.
At VMware vForum Sydney this week I presented “Taking vSphere to the next level with converged infrastructure”.
Firstly, I wanted to thank everyone who attended the session, it was a great turnout and during the Q&A there were a ton of great questions.
I got a lot of feedback at the session and when meeting people at vForum about how the Nutanix scale out shared nothing architecture tolerates failures.
I thought I would summarize this capability as I believe its quite impressive and should put everyone’s mind at ease when moving to this kind of architecture.
So lets take a look at a 5 node Nutanix cluster, and for this example, we have one running VM. The VM has all its data locally, represented by the “A” , “B” and “C” and this data is also distributed across the Nutanix cluster to provide data protection / resiliency etc.
So, what happens when an ESXi host failure, which results in the Nutanix Controller VM (CVM) going offline and the storage which is locally connected to the Nutanix CVM being unavailable?
Firstly, VMware HA restarts the VM onto another ESXi host in the vSphere Cluster and it runs as normal, accessing data both locally where it is available (in this case, the “A” data is local) and remotely (if required) to get data “B” and “C”.
Secondly, when data which is not local (in this example “B” and “C”) is accessed via other Nutanix CVMs in the cluster, it will be “localized” onto the host where the VM resides for faster future access.
It is importaint to note, if data which is not local is not accessed by the VM, it will remain remote, as there is no benefit in relocating it and this reduces the workload on the network and cluster.
The end result is the VM restarts the same as it would using traditional storage, then the Nutanix cluster “curator” detects if any data only has one copy, and replicates the required data throughout the cluster to ensure full resiliency.
The cluster will then look like a fully functioning 4 node cluster as show below.
The process of repairing the cluster from a failure is commonly incorrectly compared to a RAID pack rebuild. With a raid rebuild, a small number of disks, say 8, are under heavy load re striping data across a hot spare or a replacement drive. During this time the performance of everything on the RAID pack is significantly impacted.
With Nutanix, the data is distributed across the entire cluster, which even with a 5 node cluster will be at least 20 SATA drives, but with all data being written to SSD then sequentially offloaded to SATA.
The impact of this process is much less than a RAID…
Continue reading here!
//Richard
How to: #Citrix #XenMobile 8.5 MAM upgrade! Part 2 – #StoreFront, #AppController, #NetScaler
Hi again!
If you haven’t read Part 1 then I highly recommend doing so prior to going directly to the upgrade that we’re covering in this post!
Prepare for a journey in this post about Citrix StoreFront upgrade, uninstallation, console and how messy it could be! NOT all the time, sometimes it “just works”! 😉
My little NetScaler is already upgraded to 10.1 so unfortunately I couldn’t take you on that journey as well, so we’ll start with the StoreFront upgrade from 1.2 to 2.0 in this post. These are the steps that we need to cover as highlighted in the migration guide that seems very short and straight forward:
Upgrade StoreFront 1.2 to 2.0.
- Logon to the StoreFront server console.
- Upgrade StoreFront by running the StoreFront 2.0 installer as an administrator.
- When the upgrade is completed, open StoreFront administration snap-in, remove CloudGateway controller from each store as this will be moved in the migration solution.
- Open NetScaler Gateway Properties and for each gateway defined and change the version field in settings from 9.x to 10.0.x or later.
- Test the configuration by logging on through web browser or Citrix Receiver.
- Verify if the users are able to login and authenticate to StoreFront defined stores configured.
Is it this easy?
Ok, I’ve downloaded the 2.0 installer, and I’m logged on to the server.
Before we even start the upgrade there are things that could go wrong in removal or upgrades of StoreFront. And one that I’ve seen cause a lot of headache for a lot of people out there is that they have the Windows Firewall service disabled. Though the installation and removal wants to delete or add these rules the installation will fail unless this service is running. As you can see in this picture below you see the FW rule added in StoreFront 1.2:
So let’s verify that the Windows FW service is started, and it is!
I’ll now start the installation by double-clicking the StoreFront 2.0 installer!
What is this popup that came directly after starting the installer?
Wait, ok so you guys at Citrix couldn’t ask me whether you could do this for me? My plan is to upgrade, so please just add a little step in your upgrade program that does this for me… change request #1 for the next SF release and it’s upgrade process! Verify pre-requisites or deal with them!
#Citrix Knowledge Center Top 10 – March 2013
Citrix Support is focused on ensuring Customer and Partner satisfaction with our products.
One of our initiatives is to increase the ability of our Partners and Customers to leverage self-service avenues via our Knowledge Center.
Find below the Citrix Knowledge Center Top 10 for March 2013.
Top 10 Technical Articles
Article Number | Article Title |
---|---|
CTX129229 | Recommended Hotfixes for XenApp 6.0 and Later on Windows Server 2008 R2 |
CTX129082 | Application Launch Fails with Web Interface using Internet Explorer 9 |
CTX804493 | Users Prompted to Download ICA File, Launch.ica, Instead of Launching the Connection |
CTX132875 | Citrix Receiver Error 2320 |
CTX105793 | Error: Cannot connect to the Citrix server. Protocol Driver Error |
CTX127030 | Citrix Guidelines for Antivirus Software Configuration |
CTX115637 | Citrix Multi-Monitor Configuration Settings and Reference |
CTX133997 | Citrix Receiver 3.x – Issues Fixed in This Release |
CTX325140 | Manually and Safely Removing Files after Uninstalling the Receiver for Windows |
CTX101644 | Seamless Configuration Settings |
Top 10 Whitepapers
Article Number | Article Title |
---|---|
CTX131577 | XenApp 6.x (Windows 2008 R2) – Optimization Guide |
CTX132799 | XenDesktop and XenApp Best Practices |
CTX101997 | Citrix Secure Gateway Secure Ticket Authority Frequently Asked Questions |
CTX136546 | Citrix Virtual Desktop Handbook 5.x |
CTX136547 | StoreFront Planning Guide |
CTX133185 | Citrix CloudGateway Express 2.0 – Implementation Guide |
CTX129761 | XenApp Planning Guide – Virtualization Best Practices |
CTX134081 | Planning Guide – Citrix XenApp and XenDesktop Policies |
CTX130888 | Technical Guide for Upgrading/Migrating to XenApp 6.5 |
CTX122978 | XenServer: Understanding Snapshots |
Top 10 Hotfixes
Article Number | Article Title |
---|---|
CTX136714 | Hotfix XS61E016 – For XenServer 6.1.0 |
CTX132122 | Hotfix Rollup Pack 1 for Citrix XenApp 6.5 for Microsoft Windows Server 2008 R2 |
CTX126653 | Citrix Online Plug-in 12.1.44 for Windows with Internet Explorer 9 Support |
CTX136483 | Hotfix XS61E014 – For XenServer 6.1.0 |
CTX133882 | Hotfix Rollup Pack 2 for Citrix XenApp 6 for Microsoft Windows Server 2008 R2 |
CTX133066 | 12.3 Online Plug-In – Issues Fixed in This Release |
CTX136253 | Hotfix XS61E010 – For XenServer 6.1.0 |
CTX136482 | Hotfix XS61E013 – For XenServer 6.1.0 |
CTX136085 | Hotfix XA650R01W2K8R2X64061 – For Citrix XenApp 6.5 |
CTX136674 | Hotfix XS61E012 – For XenServer 6.1.0 |
Top 10 Presentations
Article Number | Article Title |
---|---|
CTX135521 | TechEdge Barcelona 2012 PowerPoint and Video Presentations – Reference List |
CTX129669 | TechEdge 2011 – Overview of XenServer Distributed Virtual Switch/Controller |
CTX121090 | Planning and implementing a Provisioning Server high availability (HA) solution |
CTX133375 | TechEdge 2012 PowerPoint and Video Presentations – Reference List |
CTX135356 | TechEdge Barcelona 2012 – Understanding and Troubleshooting ICA Session Initialisation |
CTX135358 | TechEdge Barcelona 2012 – XenDesktop Advanced Troubleshooting |
CTX133374 | TechEdge 2012 – Monitoring your NetScaler Traffic with AppFlow |
CTX135361 | Troubleshooting Tools: How to Isolate and Resolve Issues in your XA and XD Env Rapidly |
CTX135360 | TechEdge Barcelona 2012 – Planning, Implementing and Troubleshooting PVS 6.x |
CTX135357 | TechEdge Barcelona 2012 – Implementing and Troubleshooting SF and Rec for Windows |
Top 10 Tools
Article Number | Article Title |
---|---|
CTX122536 | Citrix Quick Launch |
CTX135075 | Citrix Diagnostics Toolkit – 64bit Edition |
CTX130147 | Citrix Scout |
CTX111961 | CDFControl |
CTX106226 | Repair Clipboard Chain 2.0.1 |
CTX109374 | StressPrinters 1.3.2 for 32-bit and 64-bit Platforms |
CTX124406 | StressPrinters 1.3.2 for 32-bit and 64-bit Platforms |
CTX113472 | Citrix ICA File Creator |
CTX123278 | XDPing Tool |
Continue reading here!
//Richard
Demystifying Citrix Excalibur Architecture – via @kbaggerman
A great blog post by Kees Baggerman! 🙂
For all XenApp admins and consultants out there Project Avalon will bring a big change as we are used to having XenApp servers running on the (what seemed to be) everlasting Citrix Independent Management Architecture and we’re heading to Citrix FlexCast Management Architecture (already included in XenDesktop at this moment) and will be included in the Citrix Excalibur Architecture.
IMA
When looking up IMA in the eDocs you’ll find:
Independent Management Architecture (IMA) is the underlying architecture used in XenApp for configuring, monitoring, and operating all XenApp functions. The IMA data store stores all XenApp configurations.
Basically IMA exists to manage the XenApp or Presentation Server farms by enabling the communications between servers. As stated it transfers information about all XenApp functions like licenses, policies, sessions and server loads. All management tooling within these versions of Citrix’s PS/XA rely on this service for information.
According to Communication ports used by Citrix Technologies IMA uses the following ports:
Ports | Source | Prot. | Comment |
2512 | Common Citrix Communication Ports | TCP | Independent Management Architecture (IMA) |
2513 | Access Gateway 5.0 Controller administration | TCP | IMA-based Communication |
As we can see IMA uses 2512 (by default) to communicate with other servers and the Access Gateway Controller uses 2513 (by default) for IMA-based communication. The port IMA uses can be changed or queried via the commandline tool IMAPORT.
Brian Madden did a blogpost way back in 2007 but it’s definition of IMA is still current:
Independent Management Architecture is:
- A data store, which is a database for storing MetaFrame XP server configuration information, such as published applications, total licenses, load balancing configuration, MetaFrame XP security rights, and printer configuration.
- A protocol for transferring the ever-changing background information between MetaFrame XP servers, including server load, current users and connections, and licenses in use
FMA
With the introduction of XenDesktop we got a new architecture called Flexcast Management Architecture. This new architecture has got an agent-based setup where we can install the operating system including the basic applications that need to be installed and after that we can install an agent. This agent registers itself to a controller and is offered through StoreFront to the end user.
This will be delivered by two different types of agents, one to support Windows Server OS’s and one for Windows Desktop OS’s.
Andrew Wood did an article on Excalibur and used this diagram to explain the architecture:

- Receiver provides users with self-service access to published resources.
- StoreFront authenticates users to site(s) hosting resources and manages stores of desktops and applications that users access – Web Interface as a platform is essentially resting, but it will cease to be.
- Studio is a single management console that enables you to configure and manage your deployment, a dramatic reduction over the 23 consoles you could well have today. Studio provides various wizards to guide you through the process of setting up an environment, creating workloads to host applications and desktops, and assigning applications and desktops to users.
- Delivery Controller distributes applications and desktops, manages user access, and optimizes…
Continue reading here!
//Richard