EUC Weekly Digest – October 14, 2017

Last Modified: Nov 7, 2020 @ 6:34 am

Here are some EUC items I found interesting last week. For more immediate updates, follow me at http://twitter.com/cstalhood.

For a list of updates at carlstalhood.com, see the Detailed Change Log.

 

VDA

MCS

Provisioning Services

NetScaler

XenMobile

Citrix Cloud

VMware

Microsoft

Other

EUC Weekly Digest – October 7, 2017

Last Modified: Jan 7, 2022 @ 9:25 am

Here are some EUC items I found interesting last week. For more immediate updates, follow me at http://twitter.com/cstalhood.

For a list of updates at carlstalhood.com, see the Detailed Change Log.

 

Citrix

XenApp/XenDesktop

App Layering (Unidesk)

HDX

WEM/Profile Management

Provisioning Services

NetScaler

NetScaler MAS

NetScaler Gateway

NetScaler SD-WAN

XenMobile

VMware

Site Updates – September 2017

Last Modified: Sep 9, 2021 @ 12:12 pm

To trigger RSS Feed, Mailing List, etc., here is the September 2017 excerpt from the Detailed Change Log.

EUC Weekly Digest – September 30, 2017

Last Modified: Nov 7, 2020 @ 6:34 am

Here are some EUC items I found interesting last week. For more immediate updates, follow me at http://twitter.com/cstalhood.

For a list of updates at carlstalhood.com, see the Detailed Change Log.

 

XenApp/XenDesktop

VDA

App Layering (Unidesk)

Receiver

NetScaler

NetScaler MAS

XenMobile

Citrix Cloud

XenApp 6.5

VMware

Microsoft

Other

VMware vRealize Operations for Horizon 6.7.0

Last Modified: Nov 7, 2020 @ 6:34 am

Navigation

💡 = Recently Updated

Change Log

Planning

vRealize Operations for Horizon is composed of several components:

  • vRealize Operations Manager appliance – this is the same vROps appliance deployed for monitoring of vSphere infrastructures, and hence it can monitor the vSphere clusters that are hosting the Horizon Agents.
  • Horizon Adapter for vRealize Operations – this is a .pak file installed on a vROps appliance. The Horizon Adapter receives data from one or more Broker Agents.
    • Broker Agent is installed on top of a Horizon Collection Server in each Horizon pod. The Broker Agent collects information from Horizon Connection Servers (e.g. events database), and feeds the data to the Horizon Adapter running on a vRealize Operations Manager appliance. The Broker Agent can also collect data from Unified Access Gateway, and App Volumes.
  • vROps Dashboards, Reports, and Alerts for Horizon – these display the information collected by the Horizon Adapter. Installation of the Horizon Adapter .pak file automatically imports the Dashboards, Reports, and Alerts.

The Horizon Adapter and Broker Agent should be the same version.

The vROps Horizon monitoring solution components have different versions:

vRealize Operations Manager 6.6 and newer has a new HTML5 user interface that looks quite different from vRealize Operations Manager 6.5 and older, thus necessitating a new post. See the post vRealize Operations for Horizon 6.4 for the older vROps user interface, and older Horizon Adapters.

vRealize Operations for Horizon comes with two licenses:

  • vRealize Operations Manager Enterprise license – enables vSphere monitoring for Horizon workloads. The license does not entitle vSphere monitoring of non-Horizon workloads.
  • vRealize Operations for Horizon Adapter license – enables the Horizon Adapter to collect data from the Horizon Broker Agent for a specific number of Horizon Agent machines. The Horizon 7 Enterprise License can also be used to license the Adapter.

VMware Blog Post Introducing the vRealize Operations Sizing Tool and https://vropssizer.vmware.com/sizing-wizard/choose-installation.

VMware 2093783 vRealize Operations Manager Sizing Guidelines:

Links to descriptions of new features in vRealize Operations Manager 6.6 and newerfupgra:

If you have Log Insight, there’s also a Content Pack for Horizon View. See VMware Blog Post Horizon View Content pack for vRealize Log Insight

Deploy New vROps Appliance

If you are upgrading an existing vROps appliance, skip ahead to the Patch/Upgrade Appliance section.

For new installations of vROps, download the following:

  1. See VMware’s Product Interoperability Matrix to determine which combinations of vROPs and Horizon Adapter are compatible with your version of Horizon. Also see the 6.7.1 Adapter Release Notes.
    • 6.7.1 Adapter supports VMware Horizon 7.7 or later
    • 6.7.1 Adapter requires vRealize Operations Manager 8.0 or later
    • 6.7.1 Adapter supports VMware App Volumes 2.14.8 to 2.18
    • 6.7.1 Adapter supports VMware Unified Access Gateway 3.6 and later
  2. If vRealize Operations Manager for Horizon 6.7.1, then download vRealize Operations Manager 8.0 from the vRealize Operations Manager for Horizon 6.7.0 download page.
  3. If vRealize Operations Manager for Horizon 6.6.0, download vRealize Operations Manager 7.5 – Appliance installation.
  4. If vROps 7.0, go to the VMware vRealize Operations Manager 7.0.0 download page and download the security patch. It’s the top entry named vRealize Operations Manager – Virtual Appliance Security Patch and dated 2018-12-18.

To deploy a new vROps appliance:

  1. In vSphere Web Client, navigate to a Cluster, right-click it, and click Deploy OVF Template.
  2. In the Select an OVF template page, select Local file, browse to the vRealize Operations Manager .ova file, and click Next.



  3. In the Select a name and folder page, give the VM a name, and click Next.
  4. In the Select a compute resource page, select a cluster, and click Next.
  5. In the Review details page, click Next.


  6. In the License Agreements page, check the box next to I accept all license agreements, and then click Next.
  7. In the Configuration page, select a size, and then click Next.
  8. In the Select Storage page, select Thin Provision, select a datastore, and then click Next.
  9. In the Select networks page, select a port group, and click Next.
  10. In the Customize template page:
    1. Select a time zone.
    2. Enter the IP address information for the appliance.

  11. Then click Next.
  12. In the Ready to Complete page, click Finish.


Create vROps Cluster

If you are upgrading an existing vROps appliance, skip ahead to the Patch/Upgrade Appliance section.

  1. Power on the new vROps virtual appliance.
  2. Wait for the appliance to start.

  3. Use a browser to go to https://IPAddress/admin. If you see a Service unavailable message, wait a couple minutes and try again.
  4. On the bottom of the page, click New Installation.
  5. In the Getting Started page, click Next.

  6. In the Set Administrator Password page, enter a password based on the listed requirements. Click Next.

  7. In the Choose Certificate page, you can upload a PEM certificate.

    1. The Certificate file must have .pem extension. It will not accept any other extension.
    2. Make sure the certificate file has both the certificate and keyfile combined into a single file.
    3. If there are intermediate Certificate Authorities, add them to the PEM file. CA certificates go below the server certificate.
  8. Click Next when done.
  9. In the Deployment Settings page:
    1. Enter a name for the master node.
    2. Enter a NTP Server Address, and click Add.
  10. Then click Next.

  11. In vRealize Operations Manager 8.0 and newer, you can optionally select an Availability Mode. Click Next.
  12. In the Add Nodes page, you can optionally add Remote Collector nodes. Click Next when done.

  13. In the Ready to Complete page, click Finish.

Start Cluster

  1. From the https://IPAddress/admin page, click the button labelled Start vRealize Operations Manager.

  2. Click Yes. This will take several minutes.

  3. Log into the appliance using the admin account.
  4. On the Welcome page, click Next.
  5. In the Accept EULA page, check the box next to I accept the terms, and click Next.
  6. In the Enter Product License Key page, enter the vRealize Operations Manager for Horizon license key, click Validate License Key, and click Next. Note: there is a separate license for the Horizon Adapter that will be entered later.
  7. In the Customer Experience Improvement Program page, make a choice, and click Next.
  8. In the Ready to Complete page, click Finish.

Patch/Upgrade vROps Appliance

Download Patch

To patch a vROps appliance, download the latest patch from the vROps download page.

The vROps security patch for vROps Manager 6.7 or vROps Manager 7.0 is required for Horizon Adapter 6.6.0. There is no security patch for vROps 7.5.

  1. Go to the VMware vRealize Operations Manager 7.0.0 download page or VMware vRealize Operations Manager 6.7.0 download page.
  2. Download the security patch. It’s the top entry named vRealize Operations Manager – Virtual Appliance Security Patch and dated 2018-12-18. You’ll install this after vROps is upgraded.

Download Version Upgrade

If you are upgrading vROps from an older version, download the following:

  1. Go to the VMware vRealize Operations 8.0 download page, VMware vRealize Operations Manager 7.5 download page, VMware vRealize Operations Manager 7.0.0 download page, or VMware vRealize Operations Manager 6.7.0 download page.
  2. Download the Upgrade Assessment Tool.


  3. For vRealize Operations Manager 7.5 and older, download the Virtual Application Operating System upgrade. You’ll install this patch first. vRealize Operations Manager 8.0 no longer has a separate download for Operating System upgrade.

  4. Download the Virtual Appliance upgrade. You’ll install this after you upgrade the operating system.


  5. For vROps 7.0, download the security patch. It’s the top entry named vRealize Operations Manager – Virtual Appliance Security Patch and dated 2018-12-18. You’ll install this patch after vROps is upgraded.

Install Patch or Upgrade vROps

Do the following to upgrade the vROps appliance or install a patch. You might have to perform this procedure several times to complete the upgrade. Also see Brandon Lee Upgrade to VMware vRealize Operations Manager 7.5.

  1. Use a browser to go to https://vROpsIP/admin, and login as admin.
  2. On the left, switch to the Software Update page.
  3. On the right, click Install a Software Update.
  4. Click Browse and browse to an upgrade or Security Patch .pak file downloaded from vmware.com.
  5. If you are upgrading from an older version of vROps, then you must upgrade install several .pak files in a specific order:
    1. Start with the Upgrade Assessment Tool, which is the file named APUAT.


    2. For vRealize Operations Manager 7.5 and older, upgrade the operating system, which is the file with VA-OS in the name. This step is not needed in vRealize Operations Manager 8.0 and newer.

    3. Then upgrade the vROps virtual appliance by installing the .pak file with VA in the name but without OS in the name.


    4. Finally, for vROps 7.0, install the security patch.
  6. If you are not upgrading the vROps version, and if vROps Manager 6.7 or 7.0, then simply install the Security Patch.

  7. Click Upload. Uploading and staging will take a bit of time.
    • Upgrading to 8.0 – separate OS upgrade is no longer needed:

    • Upgrading to 7.5:

    • Upgrading to 7.0:
  8. Click Next.
    • Upgrading to 8.0 – separate OS upgrade is no longer needed:

    • Upgrading to 7.5:


    • Upgrading to 7.0:
  9. In the End User License Agreement page, check the box next to I accept the terms, and click Next.
  10. In the Update Information page, click Next.
    • Upgrading to 8.0:

    • Upgrading to 7.5:


  11. In the Install Software Update page, click Install.
  12. The installation will take a while.
  13. If you installed the Upgrade Assessment Tool:
    1. On the left, click Support.
    2. On the right, switch to the tab named Support Bundles.
    3. Click the Download button for the bundle.
    4. Extract the downloaded .zip file.
    5. Go to apuat-data\report and double-click index.html.
    6. For more info, see VMware 57283 Using the Upgrade Assessment Tool for vRealize Operations Manager 7.5.
  14. Some upgrades or patches require a reboot.
  15. After rebooting and logging in again, the Software Update page shows that the update has been completed.


  16. vROps 7.0 and newer might warn you to set Password Recovery Settings on the Administrator Settings page.
  17. Click Install a Software Update again to install more .pak files as described earlier in this section.
  18. After upgrading vROps, install the security patch.

Configure vSphere Adapter

vRealize Operations Manager 8.0 and newer

  1. Login to the appliance at https://vROps_IP/ui. This is the ui path instead of the admin path.
  2. After logging in, at the top, click Administration.
  3. On the left, expand Solutions and click Cloud Accounts.
  4. On the right, click Add Account.
  5. In the Account Types page, click vCenter.
  6. Give the Cloud Account a name.
  7. In the Connect Information section, enter the address of the vCenter Server.
  8. Next to the Credential field, click the plus icon.
  9. Enter vCenter credentials and click OK.
  10. Click Test Connection.
  11. Click Accept to accept the certificate.
  12. Click OK when prompted that Test connection successful.
  13. Next to the Action Credentials field, click the plus icon.
  14. Enter vCenter credentials, and then click OK.
  15. You can optionally click Define Monitoring Goals.
  16. At the top of the page is a tab named vSAN where you can provide alternate vSAN credentials.
  17. The tab named Service Discovery requires the latest version of VMware Tools (e.g. 11.0.1).
  18. Click Add when done.

vRealize Operations Manager 7.5 and older

  1. Login to the appliance at https://vROps_IP/ui. This is the ui path instead of the admin path.
  2. Go to Administration > Solutions.
  3. Highlight the VMware vSphere Solution.
  4. On the bottom half of the window, highlight the vCenter Adapter, and then click the Configure icon on the toolbar.
  5. In the Display Name field, enter a name for the vCenter adapter.
  6. In the vCenter Server field, enter the address of the vCenter server.
  7. Click the green plus icon to add a Credential.
  8. In the Manage Credential window:
    1. Give the credential a name.
    2. Enter credentials for the vCenter server.
    3. Click OK.
  9. Back in the Manage Solution window, click the Test Connection link.

    1. In the Review and Accept Certificate window, click Accept to accept the certificate.
    2. In the Info window, click OK to acknowledge that the test was successful.
  10. Back in the Manage Solution window, on the bottom right, click Save Settings.

    1. In the Info window, click OK to acknowledge that the adapter instance was successfully saved.
  11. Click Close to close the Manage Solution window.
  12. Note: it takes four weeks for vRealize Operations Manager to determine dynamic thresholds.

Active Directory Authentication

  1. In the vRealize Operations Manager console, in the top of the page, click Administration.
  2. On the left, expand Access, and click Authentication Sources.
  3. On the right, click the green plus icon.
  4. In the Source Display Name field, enter a display name. This name will appear on the logon page as shown below.
  5. From the Source Type drop-down, select Active Directory.
  6. In the Domain/Subdomain field, enter the DNS name of your Active Directory domain.
  7. Enter credentials of a LDAP bind service account.
  8. Check the box next to Use SSL/TLS.
  9. On the bottom of the window, click Test.

    1. In the Review and Accept Certificate window, check the box next to Accept this certificate, and click OK.
    2. In the Info window, click OK to acknowledge that the test was successful.
  10. Click OK to close the Add Source for User and Group Import window.
  11. On the left, click Access > Access Control.
  12. On the right, switch to the User Groups tab.
  13. In the toolbar, click the Import Group icon.
  14. In the Import User Groups page, ensure your Active Directory source is selected, enter your Horizon Administrators group name, click Search, and then select the group. Click Next.
  15. On the Roles and Objects page, from the Select Role drop-down, select Administrator.
  16. Check the box next to Assign this role to the group.
  17. Check the box next to Allow access to all objects in the system. Click Finish.
  18. Click Yes when warned about access to all Objects in the system.
  19. On the top right, click the person icon, and click Log Out.
  20. Change the drop-down to the Active Directory source, and login as an Active Directory account.

Session Timeout

  1. The vRealize Operations web page defaults to 30 minutes timeout. To change it, go to Administration > Management > Global Settings.
  2. In the row labelled Session Timeout, click the pencil icon.
  3. The maximum value for Session Timeout is 34560. Click Save.

Alerting

  1. In vRealize Operations console, go to Administration > Outbound Settings.
  2. On the right, click the green plus icon.
  3. From the Plugin Type drop-down, select Standard Email Plugin.
  4. Give the Instance a name.
  5. Enter the SMTP information
  6. On the bottom, click Test.

    1. In the Test Connection window, click OK to acknowledge that the test was successful.
  7. Then click Save to close the Add/Edit Outbound Instance window.
  8. You can then go to Alerts > Alert Settings > Notification Settings, and create notifications.
  9. Give the notification rule a name.
  10. For Method, select the Standard Email Plugin, and the outbound instance you created earlier.
  11. Enter Recipients.
  12. Select Triggers and Criticality. Click Save.

Install Horizon Adapter PAK File on vROps

Download the vROps for Horizon components for both new installs and upgrades:

  1. From the vRealize Operations for Horizon 6.7.1 download page, or from the vRealize Operations for Horizon 6.6.0 download page, download the vRealize Operations for Horizon Adapter.

  2. On the same page, also download the vRealize Operations for Horizon Broker Agent 64-Bit.

To install or upgrade the Horizon Adapter:

  1. Login to the vRealize Operations appliance web page (/ui path).
  2. Go to Administration > Solutions > Repository.

  3. On the right, scroll down, and then click Add/Upgrade or click Add a Management Pack.

  4. In the Select Solution page, click Browse.
  5. Browse to the Horizon Adapter .pak file and select it.

  6. Back in the Add Solution wizard, click Upload.

  7. After upload is complete, click Next.

  8. In the End User License Agreement page, check the box next to I accept the terms, and click Next.
  9. The Install page appears and installation begins automatically.
  10. After it’s done installing, in the Install page, click Finish.
  11. If you have NVIDIA GPUs, also install the NVIDIA Virtual GPU Management Pack for vRealize Operations.

Horizon Adapter Licensing

  1. In the vRealize Operations web page, go to Administration > Management > Licensing.
  2. On the right, click the green plus icon.
  3. In the Select product or solution drop-down, select VMware Horizon.
  4. Enter the vROps for Horizon license key, and click Validate. Note: you enter the Adapter key (or Horizon 7 Enterprise key), not the vRealize Operations Manager key.
  5. Click Save to close the Add License window.
  6. You might have to add objects to the License Groups as detailed at Associate Horizon Objects with Your vRealize Operations for Horizon License Key at VMware Docs.

Configure Horizon Adapter

Here are some guidelines regarding the Horizon Adapter:

  • You can only have one Horizon adapter per vRealize Operations appliance.
  • Each adapter can handle up to 10,000 virtual desktops.
  • Multiple Horizon pods can point to a single Adapter.

vRealize Operations Manager 8.0 and newer

Do the following to create and configure a Horizon Adapter:

  1. At the top of the page, click the tab named Administration.
  2. On the left, expand Solutions, and click Other Accounts.
  3. On the right, click the button labelled Add Account.
  4. In the Account Types page, click the button named Horizon Adapter.
  5. Give the Account a Name.
  6. Give the Adapter ID a name.
  7. Next to the Credential field, click the plus icon.
  8. Enter a Credential name.
  9. Enter a new secret key. You’ll enter this key later when installing the Broker Agent.
  10. Click OK.
  11. Click Test Connection.
  12. Click OK when prompted that test connection successful.
  13. At the bottom of the page, click Add.

vRealize Operations Manager 7.5 and older

Do the following to create and configure a Horizon Adapter:

  1. In vRealize Operations Manager, go back to Administration > Solutions > Configuration.
  2. On the right, in the top half, highlight the VMware Horizon solution.
  3. On the bottom right, highlight the Horizon Adapter and click the Configure icon.
  4. On the top part, highlight the Horizon Adapter.
  5. On the bottom, give the adapter a Display Name, and an Adapter ID.
  6. Click the green plus icon to add a credential.

    1. Give the credential a name.
    2. Enter a new password (shared key), and click OK to close the Manage Credential window. You’ll use this password later when configuring the Broker Agent.
  7. Back in the Manage Solution window, click Test Connection.

    1. In the Info window, click OK to acknowledge that the test was successful.
  8. On the bottom right, click Save Settings.

    1. In the Info window, click OK.
  9. Then click Close to close the Manage Solution window.

Enable SSH

If vROps 7.0 and newer:

  1. Point your browser to the /admin path at the vROps address.
  2. In the System Status page, in the row containing a node, on the far right is a slider to enable SSH.


  3. SSH to the appliance and login as admin.
  4. When you su to the root account, the initial root password is blank (not defined) and you’ll be prompted to enter a new root password.

If vROps Manager 6.7 or older, see VMware Knowledgebase article – Enabling SSH access in vRealize Operations Manager 6.0.x (2100515):

  1. Connect to the vRealize Operations Manager virtual machine console.
  2. Press Alt+F1, and login as root.
    Note: By default there is no root password configured. Just press <Enter>, and you’ll be prompted to enter a root password.
  3. Start the SSH service by running the command:
    service sshd start
  4. To configure SSH to start automatically run this command:
    chkconfig sshd on

Install Horizon Broker Agent

Only install the Broker Agent on one Horizon Connection Server in each pod.

  1. Log in to one Horizon Connection Server in your Horizon pod.
  2. Run the downloaded VMware-v4vbrokeragent-x86_64-6.7.1-15585151 or VMware-v4vbrokeragent-x86_64-6.6.0.exe.

  3. In the Welcome to the VMware vRealize Operations for Horizon Broker Agent Setup Wizard page, click Next.

  4. In the End-User License Agreement page, check the box next to I accept the terms in the License Agreement, and click Next.
  5. In the Ready to install the Broker Agent page, click Install.
  6. In the Completed the VMware vRealize Operations for Horizon Broker Agent Setup Wizard page, click Finish.

Configure Horizon Broker Agent

  1. The Configuration tool will appear immediately after installation. Or launch vRealize Operations for Horizon Broker Agent Settings from the Start Menu.
  2. In the Pair Adapter page, enter the IP address of the vRealize Operations appliance, enter 3091 for the port, enter the adapter password (configured earlier), and click Pair.
  3. After broker pairing is successful, click Next. If this doesn’t work, make sure the firewall ports are opened on the vRealize Operations appliance.
  4. In the Connection Server page, enter credentials for Horizon View, and click Test.
  5. Then click Next.
  6. In the Event DB and Desktop Pool page, enter the SQL credentials to access the Events database, and click Test.
  7. Then click Next.
  8. In the Configure App Volumes page, enter the App Volumes info, and click Test. Click the plus icon to add it to the list. Then click Next.
  9. In the Monitor Unified Access Gateway page, enter an appliance name, enter the UAG IP, enter 9443 as the port, enter the admin credentials, and click Test.
  10. Click the plus icon to add the Unified Access Gateway appliance to the list. Then click Next.
  11. In the Intervals and Timeouts page, click Next.
  12. In the Logging page, click Next.
  13. In the Broker Agent Service page, click Start. Then click Next.
  14. In the Ready to Complete page, click Finish.
  15. In the vRealize Operations web console (/ui), from the Dashboards page, you can view the Horizon Adapter Self Health dashboard to verify that the adapter and broker agent are functional.

Use vROps for Horizon

Cameron Fore at Location analysis using vROPs for Horizon explains how to create Custom Groups per branch location and report (super metric) average latency for each location.

Cameron Fore at How to leverage Historic User Reporting in vROPs for Horizon 6.5 provides a dashboard to show Horizon User History.

Related Pages

EUC Weekly Digest – September 23, 2017

Last Modified: Nov 7, 2020 @ 6:34 am

Here are some EUC items I found interesting last week. For more immediate updates, follow me at http://twitter.com/cstalhood.

For a list of updates at carlstalhood.com, see the Detailed Change Log.

 

XenApp/XenDesktop

VDA

App Layering (Unidesk)

WEM/Profile Management

StoreFront

Receiver

NetScaler

XenMobile

Citrix Cloud

VMware

Other

EUC Weekly Digest – September 16, 2017

Last Modified: Nov 7, 2020 @ 6:34 am

Here are some EUC items I found interesting last week. For more immediate updates, follow me at http://twitter.com/cstalhood.

For a list of updates at carlstalhood.com, see the Detailed Change Log.

 

XenApp/XenDesktop

App Layering (Unidesk)

HDX

WEM/Profile Management

NetScaler

XenMobile

XenServer

VMware

EUC Weekly Digest – September 9, 2017

Last Modified: Nov 7, 2020 @ 6:34 am

Here are some EUC items I found interesting last week. For more immediate updates, follow me at http://twitter.com/cstalhood.

For a list of updates at carlstalhood.com, see the Detailed Change Log.

 

XenApp/XenDesktop

App Layering (Unidesk)

StoreFront

NetScaler

NetScaler MAS

NetScaler Gateway

XenMobile

ShareFile

Other

NetScaler SDX 12 / Citrix ADC SDX 12.1

Last Modified: Dec 21, 2018 @ 5:49 pm

Navigation

Change Log

  • 2018 Dec 21 – updated screenshots for SDX 12.1
  • 2018 Mar 20 – updated upgrade instructions for 12.0 build 57
  • 2018 Mar 20 – in Provision VPX section, added Crypto Units info

Overview

Citrix CTX226732 Introduction to Citrix NetScaler SDX.

Citrix ADC SDX is normal Citrix ADC hardware, but runs XenServer hypervisor, and several virtual machines that are listed below:

  • Service VM (aka Management Service, aka SVM) – every SDX comes with this Virtual Machine. This VM enables the SDX Administrator to create additional VMs on XenServer. It’s analogous to vCenter, except each SDX has its own SVM.
    • It’s not possible to build this VM yourself. If it something happens to it, your only choice is to do a factory reset on the physical appliance, which deletes all local virtual machines, and recreates the Service VM.
    • Each Service VM only manages the VMs on the local SDX. Each SDX has its own Service VM. To manage multiple SDXs, use Citrix Application Delivery Management (ADM).
    • XenServer on SDX is a special build. Do not attempt to directly upgrade XenServer, patch XenServer, configure XenServer, etc. Instead, all upgrades and configurations should be performed by the Service VM.
  • Citrix ADC VPX Instances – you create one or more Citrix ADC instances on top of XenServer.
    • The number of Citrix ADC instances you can create is limited by your SDX license. Most models let you buy more instances.
    • The physical resources (CPU, Memory, NICs, SSL Chips, FIPS HSM) of the SDX are partitioned to the different instances.
    • The amount of bandwidth (throughput) available to the VPX instances depends on your license. For example, the 14040 SDX license gives you 40 Gbps of throughput, which is partitioned across the instances.
    • The Citrix ADC instances are created from a normal XenServer .xva template.
    • Each VPX has its own NSIP. Once the VPX is provisioned, you connect to the NSIP, and configure it like a normal Citrix ADC .

If the top left of the window says SDX, then you are logged into the Management Service (aka Service VM, aka SVM). If it says VPX, then you are logged into an instance.

High Availability – Citrix ADC SDX does not have any High Availability capability at the XenServer or SVM layer. In other words, every SDX is completely standalone. To achieve HA, you create Citrix ADC VPX instances on two separate SDXs, and pair the VPX instances in the normal fashion. See Citrix ADC High Availability.

Why Citrix ADC VPX on top of SDX instead of normal hypervisors?

  • VPX on SDX gets physical access to SSL chips. These SSL ASICs are not available on normal hypervisors. SSL Chips provide significantly higher SSL throughput than normal hypervisors.
  • VPX on SDX gets SR-IOV access to the Network interfaces. This enables full 40 Gbps throughput to a single VM.
  • The SDX NICs can filter VLANs to different instances, thus ensuring that VPX instances cannot cross security boundaries by adding the wrong VLANs.
  • Some SDXs have Hardware Security Modules (HSM) for FIPS compliance. The VPXs on SDX can utilize this hardware security resource.

SDX Networking

  • Management port – Every SDX has a 0/1 port.
    • The SVM and XenServer management IP are on this NIC.
    • You need a minimum of two IPs on a management network connected to the 0/1 port.
    • SVM and XenServer cannot use any of the data ports for management.
  • LOM port – Every SDX has a Lights Out Management (LOM) port.
    • The LOM port gives you out-of-band console access to XenServer. Once you’re on XenServer, you can use Xen commands to see the SVM console, and/or VPX consoles.
  • Data ports – The remaining interfaces can be aggregated into port channels. Port channels are configured at XenServer, and not from inside the VPXs. Use the Service VM to create channels, and then connect the VPXs to the channels.
  • VPX networking – When VPXs are created, you specify which physical ports to connect the virtual machine to.
    • If you want the VPX NSIP to be on the same subnet as SVM and XenServer, then connect the VPX to 0/1.
    • Connect the VPX to one or more LA/x interfaces (port channels).
    • Once the VPX is created, log into it, and create VLAN objects in the normal fashion. VLAN tagging is handled by the VPX, not XenServer.
    • On SVM, when creating the VPX instance, you can specify a list of allowed VLANs. The VPX administrator is only allowed to add VLANs that are in this list.
  • SVM to NSIP – SVM must be able to communicate with every VPX NSIP. If VPX NSIP is on a different subnet than SVM, then ensure that routing/firewall allows this connection.

LOM IP Configuration

There are two ways to set the IP address of the Lights Out Module (LOM):

  • ipmitool from the Citrix ADC SDX XenServer command line
    • For MPX, you can run ipmitool from the BSD shell.
  • Crossover Ethernet cable from a laptop with an IP address in the 192.168.1.0 network.

Ipmitool Method:

  1. For SDX, SSH to the XenServer IP address (not the Service VM IP).
    • For MPX, SSH to the Citrix ADC NSIP.
  2. Default XenServer credentials are root/nsroot.
    1. Default MPX credentials are nsroot/nsroot.
  3. If MPX, run shell. XenServer is already in the shell.
  4. Run the following:
    ipmitool lan set 1 ipaddr x.x.x.x
    ipmitool lan set 1 netmask 255.255.255.0
    ipmitool lan set 1 defgw ipaddr x.x.x.x

  5. You should now be able to connect to the LOM using a browser.

Laptop method:

  1. Configure a laptop with static IP address 192.168.1.10 and connect it to the Lights Out Module port.
  2. In a Web browser, type the IP address of the LOM port. For initial configuration, type the LOM port’s default address: http://192.168.1.3
  3. In the User Name and Password boxes, type the administrator credentials. The default username and password are nsroot/nsroot.
  4. In the Menu bar, click Configuration, and then click Network.
  5. Under Options, click Network, and type values for the following parameters:
    1. IP Address—The IP address of the LOM port.
    2. Subnet Mask—The mask used to define the subnet of the LOM port.
    3. Default Gateway—The IP address of the router that connects the appliance to the network.
  6. Click Save.
  7. Disconnect the laptop, and instead connect a cable from a switch to the Lights Out Module.

LOM Firmware Upgrade

The LOM firmware at https://www.citrix.com/downloads/netscaler-adc/components/lom-firmware-upgrade differs depending on the hardware platform. The LOM firmware for the 8000 series is different than the 11000 series and the 14000 series. Do not mix them up.

SDX 12.0 build 57 and newer automatically upgrade the LOM firmware when you upgrade the SDX firmware.

Citrix ADC MPX has a new method for updating LOM as detailed at CTX218264 How to Upgrade the LOM Firmware on Any NetScaler MPX Platform

For SDX firmware older than 12.0 build 57, update the LOM firmware separately:

  1. Determine which firmware level you are currently running. You can point your browser to the LOM and login to the see the firmware level. Or you can run ipmitool mc info from the XenServer shell.
  2. If your LOM firmware is older than 3.0.2, follow the instructions at http://support.citrix.com/article/CTX137970 to upgrade the firmware.
  3. If your LOM firmware is version 3.02 or later, follow the instructions at http://support.citrix.com/article/CTX140270 to upgrade the firmware. This procedure is shown below.
  4. Now that the firmware is version 3.0.2 or later, you can upgrade to 3.39. Click the Maintenance menu and then click Firmware Update.
  5. On the right, click Enter Update Mode.
  6. Click OK when prompted to enter update mode.
  7. Click Choose File, and browse to the extracted bin file.
  8. After the file is uploaded, click Upload Firmware.
  9. Click Start Upgrade.
  10. The Upgrade progress will be displayed.
  11. After upgrade is complete, click OK to acknowledge the 1 minute message.
  12. The LOM will reboot.
  13. After the reboot, login and notice that the LOM firmware is now 3.39.

SDX IP Configuration

Default IP for Management Service is 192.168.100.1/16 bound to interface 0/1. Use a laptop with crossover cable to reconfigure the IP. Point your browser to http://192.168.100.1. Default login is nsroot/nsroot.

Default IP for XenServer is 192.168.100.2/16. Default login is root/nsroot.

  • There should be no need to connect to XenServer directly. Instead, all XenServer configuration (e.g. create new VM) is performed through the Management Service (SVM).
  • When you set the SVM’s IP Address, there is also a field to also set the XenServer IP address. XenServer IP and Management Service IP must be on the same subnet.

To change the XenServer IP, make the change through the SVM as detailed below:

  1. Point a browser to http://192.168.100.1, and login as nsroot/nsroot.
  2. When you first login to the SDX Management Service, the Welcome! Wizard appears. Click the first row for Management Network.
  3. Configure the IP addresses.
    1. Appliance Management IP = SVM (Management Service). This is the IP you’ll normally use to manage SDX.
    2. Application supportability IP = XenServer. You’ll almost never connect to this IP.
    3. The bottom has an Additional DNS checkbox that lets you enter more DNS servers.
    4. You can change the nsroot password at this time, or change it later after LDAP is configured.
  4. Click Done.
  5. Click the System Settings box.
  6. Enter a Host Name.
  7. Select the time zone, and click Continue.
  8. Click the Licenses box.
  9. Click Add License File.
  10. Allocate Citrix ADC SDX licenses normally.
    1. The SDX license defines the number of instances you can create.
    2. It also defines the amount of throughput available to the instances.
    3. The SDX license is allocated to ANY, which means you can use the same license on all SDX hardware, assuming all of them are purchased with the same license model.
  11. Click Browse to upload the license file. After uploading, click Finish and it should apply automatically.
  12. Or you can click Apply Licenses.
  13. Then click Continue.

Another way to change the Management Service IP address is through the serial port. This is actually the XenServer Dom0 console. Once logged in to XenServer, run ssh 169.254.0.10 to access the Management Service virtual machine. Then follow instructions at http://support.citrix.com/article/CTX130496 to change the IP.

The console of the Management Service virtual machine can be reached by running the following command in the XenServer Dom0 shell (SSH or console):

xe vm-list params=name-label,dom-id name-label="Management Service VM"

Then run /usr/lib64/xen/bin/xenconsole <dom-id>

SDX Platform Software Bundle

If your Citrix ADC SDX is not version 11 or newer, and if your Citrix ADC SDX is running 10.5 build 57 or later, then do the following:

  1. Go to Management Service > Software Images, and upload the Single Bundle for 12.0 or 12.1. The single bundle is around 1.5 GB.
  2. On the left, click System.
  3. On the right, click Upgrade Management Service. Select the Single Bundle upgrade file you already uploaded.
  4. Management Service will upgrade and reboot. A few minutes after that, XenServer will be upgraded. Be patient as there’s no notification that the box will reboot again.

Starting with SDX 11.0, all updates are bundled together and installed at once.

  1. Make sure your Management Service (SVM) is running SDX 10.5 build 57 or newer.
  2. Download the latest SDX Platform Software bundle from Downloads > Citrix ADC > Release 12.1 (or 12.0) > Service Delivery Appliances.

  3. Login to the SDX Management Service, and go to Configuration > System.
  4. On the right, in the right column, click Upgrade Appliance.
  5. Browse to the build-sdx-12.1.tgz software bundle, and click OK.
  6. It should show you the estimated installation time.
  7. Check boxes next to the instances that need configs saved.
  8. Click Upgrade.
  9. Click Yes to continue with the upgrade.
  10. The Management Service displays installation progress. It will take a while.
  11. Once the upgrade is complete, click Login.

  12. If you click the Configuration tab, the Information page will be displayed showing the version of XenServer, Management Service (Build), etc.

FIPS

If your SDX is a FIPS appliance, see Citrix Blog Post Meet Security Compliance and Be Scalable with NetScaler FIPS SDX for detailed HSM setup instructions:

  1. Zeroize the HSM
  2. Upgrade HSM firmware
  3. Create HSM partitions
  4. Create Citrix ADC instance and attach HSM partition:
    • Only one CPU core
  5. From inside Citrix ADC instance:
    1. Reset FIPS
    2. Initialize FIPS
    3. Create FIPS Key
    4. Create HA Pair and synchronize FIPS

DNS Servers

Older versions of SDX only let you enter one DNS server. To add more, do the following:

  1. In the Management Service, on the left, click System.
  2. On the right, click Network Configuration.
  3. On the bottom, there’s a checkbox for Additional DNS that lets you put in more DNS servers.
  4. Click OK when done.

Management Service NTP

  1. On the Configuration tab, in the navigation pane, expand System, and then click NTP Servers.
  2. To add a new NTP server, in the right pane, click Add.
  3. In the Create NTP Server dialog box, enter the NTP server name (e.g. pool.ntp.org), and click Create.
  4. Click Yes when prompted to restart NTP Synchronization.
  5. In the right pane, click NTP Synchronization.
  6. In the NTP Synchronization dialog box, select Enable NTP Sync. Click OK.
  7. Click Yes when asked to restart the Management Service. This only restarts the SVM. Other instances on the same box won’t be affected.

Licensing

If you haven’t already licensed your SDX, you can upload a license file to the SDX appliance.

  1. Login to http://mycitrix.com and go to Manage Licenses.
  2. In the New Licenses section, find a Citrix ADC SDX license, and allocate it. There is no need to specify a hostname. You can use the same license file on multiple SDX appliances.

  3. On the SDX Configuration tab, in the navigation pane, expand System, and then click Licenses.
  4. In the right pane, click Add License File.
  5. Click Browse and upload the allocated license file.
  6. Click Finish.
  7. If you refresh your browser, the number shown on the top left of the window will indicate your licensed model number.

Management Service Alerting

Syslog

  1. On the Configuration tab, expand System > Auditing, and click Syslog Servers.
  2. In the right pane, click the Add button.

    1. Enter a name for the Syslog server.
    2. Enter the IP address of the Syslog server.
    3. Change the Choose Log Level section to Custom, and select log levels.
  3. Click Create.
  4. On the right is Syslog Parameters.
  5. You can configure the Date Format and Time Zone. Click OK.

Mail Notification

  1. On the Configuration tab, expand System > Notifications, and click Email.
  2. In the right pane, on the Email Servers tab, click Add.
  3. Enter the DNS name of the mail server, and click Create.
  4. In the right pane, switch to the tab named Email Distribution List, and click Add.
  5. In the Create Email Distribution List page:
    1. Enter a name for the mail profile.
    2. Select the Email Server to use.
    3. Enter the destination email address (distribution list).
  6. Click Create.
  7. SDX 12.1 and newer has a Test button for the Distribution List.

System SNMP

  1. Go to System > SNMP.
  2. On the right, click Configure SNMP MIB.
  3. Enter asset information, and click OK. Your SNMP management software will read this information.
  4. Under the SNMP node, configure normal SNMP including: Trap Destinations, Managers, Alarms, etc.

  5. MIBs can be downloaded from the Downloads tab.

Instance SNMP

  1. The instances will send SNMP traps to the Service VM. To get alerted for these traps, in the Configuration page, in the navigation pane, expand Citrix ADC (or NetScaler), expand Events, and click Event Rules.
  2. On the right, click Add.

    1. Give the rule a name.
    2. Move the Major and Critical severities to the right.
    3. Scroll down.
    4. For the other sections, if you don’t configure anything then you will receive alerts for all of the devices, categories, and failure objects. If you configure any of them, then only the configured entities will be alerted.
    5. Scroll down.
    6. Click Save.
  3. Select an Email Distribution List, and click Done.

Management Service nsroot Password and AAA

Change nsroot password

  1. On the Configuration tab, in the navigation pane, expand System, expand User Administration, and then click Users.
  2. On the right, in the Users pane, right-click the nsroot user account, and then click Edit.
  3. In the Configure System User dialog box, check the box next to Change Password.
  4. In Password and Confirm Password, enter the password of your choice.
  5. Scroll down and click OK.

AAA Authentication

To enable LDAP authentication for the Service VM:

  1. Go to Configuration > System > Authentication > LDAP.
  2. In the right pane, click Add.
  3. This is configured identically to Citrix ADC.
    1. Enter a Load Balancing VIP for LDAP servers.
    2. Change the Security Type to SSL, and Port to 636.
    3. Scroll down.
    4. Note: if you want to Validate LDAP Certificate, then there are special instructions for installing the root certificate on the SVM. See Installing CA certificates to the SDX/SVM for LDAPS user authentication at Citrix Discussions for details.
    5. Enter the Base DN in LDAP format.
    6. Enter the bind account in UPN format, or Domain\Username format, or DN format.
    7. Check the box for Enable Change Password.
    8. Click Retrieve Attributes, and scroll down.
    9. For Server Logon Attribute, select sAMAccountName.
    10. For Group Attribute, select memberOf.
    11. For Sub Attribute Name, select CN.
    12. To prevent unauthorized users from logging in, configure a Search Filter as detailed in the LDAP post. Scroll down.
  4. Click Create.
  5. Expand System, expand User Administration, and click Groups.
  6. On the right, click Add.
  7. In the Create System Group page:
    1. Enter the case sensitive name of the Active Directory group.
    2. Check the box next to System Access.
    3. Configure the Session Timeout.
  8. Click Create.
  9. On the left, under System, click User Administration.
  10. On the right, click User Lockout Configuration.

    1. If desired, check the box next to Enable User Lockout, and configure the maximum logon attempts. Click OK.
  11. On the left, under System, click Authentication.
  12. On the right, click Authentication Configuration.

    1. Change the Server Type drop-down to EXTERNAL, and click Insert.
    2. Select the LDAP server you created earlier, and click OK.
    3. Make sure Enable fallback is enabled, and click OK.

SSL Certificate and Encryption

Replace SDX Management Service Certificate

To replace the Management Service certificate:

  1. PEM format: The certificate must be in PEM format. The Management Service does not provide any mechanism for converting a PFX file to PEM. You can convert from PFX to PEM by using the Import PKCS#12 task in a Citrix ADC instance.
  2. On the left, click System.
  3. On the right, in the left column, in the Set Up Appliance section, click Install SSL Certificate.
  4. Select the certificate and key files in PEM format. If the key file is encrypted, enter the password. Then click OK.
  5. The Management Service will restart. Only the SVM restarts; the Citrix ADC instances do not restart.


Force HTTPS to the Management Service

  1. Connect to the SVM using HTTPS. You can’t make this upcoming change if you are connected using HTTP.
  2. On the Configuration tab, click System.
  3. On the right, click Change System Settings.
  4. Check the box next to Secure Access Only, and click OK. This forces you to use HTTPS to connect to the Management Service.

SSL Encrypt Management Service to Citrix ADC Communication

From http://support.citrix.com/article/CTX134973: Communication from the Management Service to the Citrix ADC VPX instances is HTTP by default. If you want to configure HTTPS access for the Citrix ADC VPX instances, then you have to secure the network traffic between the Management Service and Citrix ADC VPX instances. If you do not secure the network traffic from the Management Service configuration, then the Citrix ADC VPX Instance State appears as Out of Service and the Status shows Inventory from instance failed.

  1. Log on to the Management Service .
  2. On the Configuration tab, click System.
  3. On the right, click Change System Settings.
  4. Change the Communication with NetScaler Instance drop-down to https, as shown in the following screen shot:
  5. Run the following command on the Citrix ADC VPX instance, to change the Management Access (-gui) to SECUREONLY:
    set ns ip ipaddress -gui SECUREONLY
  6. Or in the Citrix ADC instance management GUI, go to Network > IPs, edit the NSIP, and then check the box next to Secure access only.

SDX/XenServer LACP Channels

For an overview of Citrix ADC SDX networking, see Citrix CTX226732 Introduction to Citrix NetScaler SDX

To use LACP, configure Channels in the Management Service, which creates them in XenServer. Then when provisioning an instance, connect it to the Channel.

  1. In the Management Service, on the Configuration tab, expand System, and click Channels.
  2. On the right, click Add.
  3. In the Create Channel page:
    1. Select a Channel ID.
    2. For Type, select LACP or STATIC. The other two options are for switch independent load balancing.
    3. In the Interfaces section, move the Channel Member interfaces to the right by clicking the right arrow.
    4. In the Settings section, for LACP you can select Long or Short, depending on switch configuration. Long is the default.
  4. Click Create when done.
  5. Click Yes when asked to proceed.
  6. The channel will then be created on XenServer.

VPX Instances – Provision

Admin profile

Admin profiles specify the nsroot user credentials for the instances. Management Service uses these nsroot credentials later when communicating with the instances to retrieve configuration data.

The default admin profile for an instance specifies a user name of nsroot, and the password is also nsroot. To specify a different nsroot password, create a new admin profile.

  • You can create a single admin profile that is used by all instances. To delegate administration, don’t give out the nsroot password to the instance administrators. One option is to enable LDAP inside the instance before granting access to a different department.
  • When creating an instance, there’s an option to create a non-nsroot account, which has almost the same permissions as nsroot, but leaves out some SDX specific features (e.g interfaces). This is another option for delegating administration to a different team.
  • Or you can create different admin profiles for different instances, which allows you to inform the different departments the nsroot password for their VPX instances.

Important: Do not change the password directly on the Citrix ADC VPX instance. If you do so, the instance becomes unreachable from the Management Service. To change a password, first create a new admin profile, and then modify the Citrix ADC instance, selecting this profile from the Admin Profile list.

  1. On the Configuration tab, in the navigation pane, expand Citrix ADC (or NetScaler), and then click Admin Profiles.
  2. In the Admin Profiles pane, click Add.
  3. In the Create Admin Profile dialog box, set the following parameters:
    • Profile Name*—Name of the admin profile.
    • User Name—User name used to log on to the Citrix ADC instances. The user name of the default profile is nsroot and cannot be changed.
    • Password*—The password used to log on to the Citrix ADC instance. Maximum length: 31 characters.
    • Confirm Password*—The password used to log on to the Citrix ADC instance.
    • Use global settings for NetScaler communication – you can uncheck this box and change the protocol to https.
  4. Click Create. The admin profile you created appears in the Admin Profiles pane.

Upload a Citrix ADC VPX .xva file

You must upload a Citrix ADC VPX .xva file to the SDX appliance before provisioning the Citrix ADC VPX instances. XVA files are only used when creating a new instance. Once the instance is created, use normal firmware upgrade procedures.

  1. Go to the Citrix ADC VPX download page.
  2. Download the Citrix ADC VPX for XenServer.
  3. After downloading, extract the .gz file (use 7-zip). You can’t upload the .gz file to SVM. You must extract it first.
  4. On the Configuration tab, in the navigation pane, expand Citrix ADC (or NetScaler), and then click Software Images.
  5. On the right, switch to the XVA Files tab, and then click Upload.
  6. In the Upload NetScaler Instance XVA dialog box, click Browse, and select the XVA image file that you want to upload. Click Upload.
  7. The XVA image file appears in the XVA Files pane after it is uploaded.

Provision a Citrix ADC instance

  1. On the SDX Management Service, go to the Dashboard page.
  2. On the bottom right, the System Resource Utilization pane shows you the amount of physical resources that are available for allocation.
  3. Click Core Allocation to see the number of cores available for assignment.

    1. In 12.0 build 57 and newer, click Crypto Capacity to see SSL capacity.
  4. On the Configuration tab, in the navigation pane, expand Citrix ADC (or NetScaler), and then click Instances.
  5. In the NetScaler Instances pane, click Add.
  6. In the Provision NetScaler section, enter a name for the instance.
  7. Enter the NSIP, mask, and Gateway.
  8. Nexthop to Management Service – If the instance’s NSIP is on a different subnet than the SVM IP, and if the instance’s default gateway is on a different network than the NSIP, then enter a next hop router address on the instance’s NSIP network, so the instance can respond to the SDX Management Service.
  9. In the XVA File field, you can Browse > Local to select an XVA file on your local machine that hasn’t been uploaded to SDX yet. Or you can Browse > Appliance, and select an XVA file that has already been uploaded to SDX.
  10. Select an Admin Profile created earlier. Or you can click the Add button or plus icon to create a new Admin Profile.
  11. Enter a Description. Scroll down.
  12. In the License Allocation section, change the Feature License to Platinum.
  13. For Throughput, partition your licensed bandwidth. If you are licensed for 40 Gbps, make sure the total of all VPX instances does not exceed that number.
  14. For Allocation Mode, Burstable is also an option. Fixed bandwidth can’t be shared with other instances. Burstable can be shared. See Bandwidth Metering in NetScaler SDX at Citrix Docs.
  15. If SDX 12.0 build 57 or newer, in the Crypto Allocation field, allocate at least one multiple of Asymmetric Crypto Units. Clicking the up arrow should increment in the correct multiple. See Managing Crypto Capacity at Citrix Docs. You can find the minimum by dividing the total Asymmetric Crypto Units by the Crypto Virtual Interfaces. Enter in a multiple of this result.

    1. On newer Citrix ADC hardware (e.g SDX 8900), you can also specif the Symmetric Crypto Units. Again, enter a multiple of the minimum.
    2. Citrix ADC SDX older than build 57 will instead ask for SSL Chips. Some SSL/TLS features require at least one chip.
  16. In the Resource Allocation section, consider changing the Total Memory to 4096.
  17. For CPU, for production instances, select one of the Dedicated options. Dev/Test instances can use Shared CPU. Then scroll down.
  18. In the Instance Administration section, you can optionally add an instance administrator. Enter a new local account that will be created on the VPX. This instance admin is in addition to the nsroot user. Note, networking functionality is not available to this account. Scroll down.

  19. In the Network Settings section, if the VPX NSIP is on the same network as the SDX SVM, then leave 0/1 selected, and deselect 0/2.
  20. Click Add to connect the VPX to more interfaces.
  21. If you have Port Channels, select one of the LA interfaces.
  22. If you configure any VLAN settings here, then XenServer filters the VLANs available to the VPX instance. Changing the VLAN filtering settings later probably requires a reboot. Click Add. Note: VLAN tagging is configured inside the instance, and not here.
  23. In the Management VLAN Settings section, do not configure anything in this section unless you need to tag the NSIP VLAN.
  24. Click Done.
  25. After a couple minutes the instance will be created. Look in the bottom right of Chrome to see the status.
  26. Click Close when it’s done booting.
  27. If you go to the Dashboard page…
  28. If you click an instance name, you can see how the instance is connected to the physical NICs.
  29. Back in Configuration > Citrix ADC > Instances, in your Instances list, click the blue IP address link to launch the VPX management console. Or, simply point your browser to the NSIP and login.
  30. Do the following at a minimum (instructions are in the NetScaler System Configuration article):
    1. Create Policy Based Route for the NSIP – System > Settings > Network > PBRs
    2. Add SNIPs for each VLAN – System > Network > IPs
    3. Add VLANs and bind to SNIPs – System > Network > VLANs
    4. Create Static Routes for internal networks – System > Network > Routes
    5. Change default gateway – System > Network > Routes > 0.0.0.0
    6. Create another instance on a different SDX, and High Availability pair them together – System > High Availability

VPX Instances – Manage

You may login to the VPX instance and configure everything normally. SDX also offers the ability to manage IP addresses, and SSL certificates, from SDX, rather than from inside the VPX instance. The SDX Management Service does not have the ability to create certificates, so it’s probably best to do that from within the VPX instance.

View the console of a Citrix ADC instance

  1. Connect to the SDX Management Service using https.
    1. Viewing the virtual machine console might not work unless you install a valid certificate for the SDX Management Service.
  2. In the Management Service, go to Configuration > Citrix ADC > Instances.
  3. On the right, right-click an instance, and click Console.
  4. The instance console then appears.
  5. Another option is to use the Lights Out Module, and the xl console command, as detailed at Citrix Blog Post SDX Remote Console Access of VIs.

Start, stop, delete, or restart a Citrix ADC instance

  1. On the Configuration tab, in the navigation pane, expand Citrix ADC (or NetScaler), and click Instances.
  2. On the right, in the Instances pane, right-click the Citrix ADC instance on which you want to perform the operation, and then click Start or Shut Down or Delete or Reboot.
  3. In the Confirm message box, click Yes.

Create a Subnet IP Address on a Citrix ADC Instance

  1. On the Configuration tab, in the navigation pane, click Citrix ADC.
  2. On the right, in the Citrix ADC Configuration pane, click Create IP.
  3. In the Create Citrix ADC IP dialog box, specify values for the following parameters.
    • IP Address* – Specify the IP address assigned as the SNIP address.
    • Netmask* – Specify the subnet mask associated with the SNIP address.
    • Type* – Specify the type of IP address. Possible values: SNIP.
    • Save Configuration* – Specify whether the configuration should be saved on the Citrix ADC . Default value is false.
    • Instance IP Address* – Specify the IP address of the Citrix ADC instance on which this SNIP will be created.
  4. Click Create.

Create a VLAN on a Citrix ADC instance

  1. Go to Citrix ADC > Instances.
  2. On the right, right-click an instance, and click VLAN Bindings.
  3. Click Add.
  4. Enter a VLAN ID, and select an interface.
  5. Check the box for Tagged if needed.
  6. Notice there’s no way to bind a SNIP to the VLAN. You do that inside the instance. Click Create.

Save the configuration of a Citrix ADC instance

  1. On the Configuration tab, in the navigation pane, click Citrix ADC.
  2. On the right, in the Citrix ADC pane, click Save Configuration.
  3. In the Save Configuration dialog box, in Instance IP Address, select the IP addresses of the Citrix ADC instances whose configuration you want to save.
  4. Click OK.

Change NSIP of VPX Instance

The best way to change the NSIP is to edit the instance. Go to Configuration > Citrix ADC > Instances, right-click an instance, and click Edit.

Then change the IPv4 Address at the top of the page. Click Done. SVM will push the configuration change to the instance.

If you change NSIP inside of VPX instead of Editing the Instance in the Management Service, see article CTX139206 How to Change NSIP of VPX Instance in SDX to adjust the XenServer settings.

Enable Call Home

  1. On the Configuration tab, in the navigation pane, click the Citrix ADC node.
  2. On the right, click Call Home.
  3. Enter an email address to receive communications regarding Citrix ADC Call Home.
  4. Check the box next to Enable Call Home.
  5. Click Add.
  6. Select the instances to enable Call Home by moving them to the right, and click OK.
  7. You can view the status of Call Home by expanding Citrix ADC, and clicking Call Home.
  8. The right pane indicates if it’s enabled or not. You can also configure Call Home from here.

VPX Instance – Firmware Upgrade

Upload Citrix ADC Firmware Build Files

To upgrade a VPX instance from the Management Service, first upload the firmware build file.

  1. Download the Citrix ADC firmware using the normal method. It’s in the Build section.
  2. On the SDX, in the Configuration tab, on the left, expand Citrix ADC (or NetScaler), and click Software Images.
  3. On the right, in the Software Images tab, click Upload.
  4. Browse to the build…tgz file, and click Open.

Upgrade Multiple NetScaler VPX Instances

You can upgrade multiple instances at the same time:

  1. To prevent any loss of the configuration running on the instance that you want to upgrade, save the configuration on the instance before you upgrade the instance.
  2. On the Configuration tab, in the navigation pane, expand Citrix ADC (or NetScaler), and click Instances.
  3. Right-click an instance, and click Upgrade.
  4. In the Upgrade Citrix ADC Instance dialog box, in Build File, select the Citrix ADC upgrade build file of the version you want to upgrade to. Click OK.
  5. Click Close when done.

Management Service Monitoring

  1. To view syslog, in the navigation pane, expand System, click Auditing, and then click Syslog Message in the right pane.
  2. To view the task log, in the navigation pane, expand Diagnostics, and then click Task Log.
  3. To view Management Service events, on the Configuration tab, in the expand System and click Events.
  4. Citrix ADC > Entities lets you see the various Load Balancing entities configured on the instances. You might have to click Poll Now to get them to show up.
  5. To view instance alerts, go to Citrix ADC > Events > All Events.
  6. There is also event reporting.

Management Service Backups

The SDX appliance automatically keeps three backups of the Management Service configuration that are taken daily at 12:30 am.

Backups in NetScaler SDX contain the following:

  • Single bundle image
  • NetScaler XVA image
  • NetScaler upgrade image
  • Management Service image
  • Management Service configuration
  • NetScaler SDX configuration
  • NetScaler configuration

You can go to Management Service > Backup Files to backup or restore the SDX appliance’s configuration. And you can download the backup files.

You can configure the number of retained backups by clicking System on the left, and then clicking Backup Policy in the right pane.

You can even transfer the backup files to an external system.

EUC Weekly Digest – September 2, 2017

Last Modified: Nov 7, 2020 @ 6:34 am

Here are some EUC items I found interesting last week. For more immediate updates, follow me at http://twitter.com/cstalhood.

For a list of updates at carlstalhood.com, see the Detailed Change Log.

 

XenApp/XenDesktop

VDA

App Layering (Unidesk)

HDX

NetScaler

NetScaler MAS

NetScaler Gateway

XenMobile

Citrix Cloud

VMware

Other