Citrix Systems 4.2 manual Converting a Hyper-V VM to a Template

Page 135

Converting a Hyper-V VM to a Template

#scp CentOS_6.2_x64 xenhost:/var/run/sr-mount/a9c5b8c8-536b-a193-a6dc-51af3e5ff799/

15.Log in to the Xenserver and create a VDI the same size as the image.

[root@xenhost ~]# cd /var/run/sr-mount/a9c5b8c8-536b-a193-a6dc-51af3e5ff799 [root@xenhost a9c5b8c8-536b-a193-a6dc-51af3e5ff799]# ls -lh CentOS_6.2_x64 -rw-r--r-- 1 root root 10G Mar 16 16:49 CentOS_6.2_x64

[root@xenhost a9c5b8c8-536b-a193-a6dc-51af3e5ff799]# xe vdi-create virtual-size=10GiB sr- uuid=a9c5b8c8-536b-a193-a6dc-51af3e5ff799 type=user name-label="Centos 6.2 x86_64" cad7317c-258b-4ef7-b207-cdf0283a7923

16. Import the image file into the VDI. This may take 10–20 minutes.

[root@xenhost a9c5b8c8-536b-a193-a6dc-51af3e5ff799]# xe vdi-import

filename=CentOS_6.2_x64 uuid=cad7317c-258b-4ef7-b207-cdf0283a7923

17.Locate a the VHD file. This is the file with the VDI’s UUID as its name. Compress it and upload it to your web server.

[root@xenhost a9c5b8c8-536b-a193-a6dc-51af3e5ff799]# bzip2 -c cad7317c-258b-4ef7-b207-

cdf0283a7923.vhd > CentOS_6.2_x64.vhd.bz2

[root@xenhost a9c5b8c8-536b-a193-a6dc-51af3e5ff799]# scp CentOS_6.2_x64.vhd.bz2

webserver:/var/www/html/templates/

13.12. Converting a Hyper-V VM to a Template

To convert a Hyper-V VM to a XenServer-compatible CloudPlatform template, you will need a standalone XenServer host with an attached NFS VHD SR. Use whatever XenServer version you are using with CloudPlatform, but use XenCenter 5.6 FP1 or SP2 (it is backwards compatible to 5.6). Additionally, it may help to have an attached NFS ISO SR.

For Linux VMs, you may need to do some preparation in Hyper-V before trying to get the VM to work in XenServer. Clone the VM and work on the clone if you still want to use the VM in Hyper-V. Uninstall Hyper-V Integration Components and check for any references to device names in /etc/fstab:

1.From the linux_ic/drivers/dist directory, run make uninstall (where "linux_ic" is the path to the copied Hyper-V Integration Components files).

2.Restore the original initrd from backup in /boot/ (the backup is named *.backup0).

3.Remove the "hdX=noprobe" entries from /boot/grub/menu.lst.

4.Check /etc/fstab for any partitions mounted by device name. Change those entries (if any) to mount by LABEL or UUID. You can get that information with the blkid command.

The next step is make sure the VM is not running in Hyper-V, then get the VHD into XenServer. There are two options for doing this.

Option one:

1.Import the VHD using XenCenter. In XenCenter, go to Tools>Virtual Appliance Tools>Disk Image Import.

2.Choose the VHD, then click Next.

125

Image 135
Contents Page Page Cloud Infrastructure Concepts User Services OverviewGetting More Information and Help ConceptsService Offerings Setting Up Networking for UsersSteps to Provisioning Your Cloud Infrastructure Working With Hosts 103 Working With Virtual MachinesWorking With Storage 129 Working with Templates 113Managing Networks and Traffic 147 Working with Usage 141Page System Reliability and High Availability 233 Tuning 249Troubleshooting 251 Working with System Virtual Machines 229Event Types 259 Alerts 261 Chapter Getting More Information and HelpAdditional Documentation Available Citrix Knowledge Center Contacting SupportPage Multiple Hypervisor Support What Is CloudPlatform?Concepts What Can CloudPlatform Do?Deployment Architecture Overview Cloud Infrastructure Overview Management Server OverviewMore Information Networking OverviewPage Page Cloud Infrastructure Concepts About RegionsAbout Zones Cloud Infrastructure Concepts About Pods About Clusters About Primary Storage About HostsAbout Physical Networks About Secondary StorageBasic Zone Network Traffic Types Basic Zone Guest IP Addresses Advanced Zone Network Traffic TypesAdvanced Zone Guest IP Addresses A zone that uses advanced networking Advanced Zone Public IP AddressesSystem Reserved IP Addresses All zonesPage Accounts, Users, and Domains AccountsHow to Use Dedicated Hosts Dedicating Resources to Accounts and DomainsBehavior of Dedicated Hosts, Clusters, Pods, and Zones Using an Ldap Server for User Authentication Configuring an Ldap ServerAdding an Ldap Server Trust Store Trust Store Password Example Ldap Configuration Commands Removing an Ldap ConfigurationSearch Base Query Filter Active DirectoryApacheDS Search User Bind DN SSL Keystore Path and PasswordPage User Services Overview Page End Users UI Overview User InterfaceSupported Browsers Log In to the UILogging In as the Root Administrator Root Administrators UI OverviewUsing SSH Keys for Authentication Changing the Root PasswordCreating an Instance from a Template that Supports SSH Keys Creating the SSH Keypair Output is something similar to what is given belowLogging In Using the SSH Keypair Resetting SSH KeysCreating an Instance Page Overview of Projects Using Projects to Organize Users and ResourcesConfiguring Projects Setting Up InvitationsSetting Project Creator Permissions Setting Resource Limits for ProjectsCreating a New Project Adding Members to a ProjectSending Project Membership Invitations Adding Project Members From the UI Accepting a Membership InvitationSuspending or Deleting a Project Using the Project ViewPage Overview of Provisioning Steps Steps to Provisioning Your Cloud InfrastructureFirst Region The Default Region Adding Regions optionalAdding a Region Adding Third and Subsequent Regions Deleting a Region Adding a Zone Create a Secondary Storage Mount Point for the New ZonePrepare the System VM Template Steps to Add a New Zone Network Offering Description Basic Zone ConfigurationSteps to Provisioning Your Cloud Infrastructure Page Advanced Zone Configuration Page Steps to Provisioning Your Cloud Infrastructure Page NFS Vmfs Adding a PodAdding a Cluster Add Cluster KVM or XenServerAdd Cluster OVM Add Cluster vSphere VMware Cluster Size LimitAdding a vSphere Cluster Steps to Provisioning Your Cloud Infrastructure Page Adding a Host Adding a Host XenServer, KVM, or OVMRequirements for XenServer, KVM, and OVM Hosts Warning KVM Host Additional Requirements Adding a XenServer, KVM, or OVM HostAdding a Host vSphere Adding Primary StorageAdding Secondary Storage Adding an NFS Secondary Staging Store for Each Zone Initialize and Test Steps to Provisioning Your Cloud Infrastructure Service Offerings Compute and Disk Service OfferingsCreating a New Compute Offering Creating a New Disk Offering System Service Offerings Modifying or Deleting a Service OfferingCreating a New System Service Offering For more information, see .7, Stopping and Starting VMs Page Page Isolated Networks Setting Up Networking for UsersOverview of Setting Up Networking for Users About Virtual NetworksIndividual Network Service ProvidersNetwork Service Providers Support Matrix Runtime Allocation of Virtual Network ResourcesACL Support Matrix for an Isolated Network CombinationSupport Matrix for Shared Network Combination Support Matrix for Basic Zone Network OfferingsCreating a New Network Offering Supported Services Description Isolated Shared See Section Remote Access VPN Changing the Network Offering on a Guest Network Creating and Changing a Virtual Router Network Offering Page Page Working With Virtual Machines About Working with Virtual MachinesBest Practices for Virtual Machines Install Required Tools and Drivers VM LifecycleMonitor VMs for Max Capacity Creating a VM from a template Creating VMsCreating a VM from an ISO Configuring Usage of Linked Clones on VMwareAppending a Display Name to the Guest VM’s Internal Name Accessing VMsAssigning VMs to Hosts Stopping and Starting VMsChange Affinity Group for an Existing VM Affinity GroupsCreating a New Affinity Group Assign a New VM to an Affinity GroupVirtual Machine Snapshots for VMware View Members of an Affinity GroupDelete an Affinity Group Configuring VM Snapshots Using VM SnapshotsLimitations on VM Snapshots Changing the VM Name, OS, or Group CPU and Memory Scaling for Running VMs Changing the Service Offering for a VMLimitations Configuring Dynamic CPU and RAM ScalingHow to Dynamically Scale CPU and RAM Updating Existing VMsMoving VMs Between Hosts Manual Live Migration Resetting the Virtual Machine Root Volume on RebootRecovering a Destroyed VM Deleting VMsWorking with ISOs Adding an ISO Changing a VMs Base Image Attaching an ISO to a VMPage 102 Working With Hosts Scheduled Maintenance and Maintenance Mode for HostsVCenter and Maintenance Mode XenServer and Maintenance ModeWorking With Hosts To take a server out of Maintenance ModeDisabling and Enabling Zones, Pods, and Clusters Removing HostsRemoving XenServer and KVM Hosts Re-Installing HostsUsing Cisco UCS as Bare Metal Host CloudPlatform Maintaining Hypervisors on HostsAssociating a Profile with a UCS Blade Registering a UCS ManagerDisassociating a Profile from a UCS Blade Changing Host PasswordOver-Provisioning and Service Offering Limits Balloon Driver Setting Over-Provisioning RatiosLimitations on Over-Provisioning in XenServer and KVM Requirements for Over-ProvisioningVlan Provisioning Service Offering Limits and Over-ProvisioningAdding Non Contiguous Vlan Ranges Vlan Allocation ExampleAssigning VLANs to Isolated Networks Requirements for Templates Default TemplateWorking with Templates Creating Templates OverviewPrivate and Public Templates Creating a Template from an Existing Virtual MachineWorking with Templates Uploading Templates Creating a Template from a SnapshotWorking with Templates Exporting Templates Creating a Windows TemplateSystem Preparation for Windows Server 2008 R2 Working with Templates Page Working with Templates System Preparation for Windows Server 2003 R2 Importing Amazon Machine Images Create a grub entry in /boot/grub/grub.conf Exit out of chroot Converting a Hyper-V VM to a Template Adding Password Management to Your Templates Linux OS Installation Windows OS InstallationDeleting Templates 128 Working With Storage Storage OverviewPrimary Storage NFS support Local storage support Storage over-provisioning Storage TagsWorking With Storage Fiber Channel supportChanging the Secondary Storage IP Address Maintenance Mode for Primary StorageSecondary Storage Best Practices for Secondary StorageChanging Secondary Storage Servers Working With VolumesCreating a New Volume Using Local Storage for Data VolumesTo Create a New Volume Uploading an Existing Volume to a Virtual MachineHypervisor Disk Image Format Attaching a VolumeVM Storage Migration Detaching and Moving VolumesMigrating a VM Root Volume to a New Storage Pool Migrating a Data Volume to a New Storage PoolResizing Volumes Working with Snapshots Reset VM to New Root Disk on RebootVolume Deletion and Garbage Collection To enable root disk reset on VM rebootIncremental Snapshots and Backup Volume StatusAutomatic Snapshot Creation and Retention Snapshot Restore VMware Volume Snapshot PerformanceSnapshot Job Throttling Working with Usage Configuring the Usage ServerAlerttypeusagesanityresult = Working with UsageSetting Usage Limits Parameter Name Definition Globally Configured LimitsDefault Account Resource Limits Per-Domain Limits Managing Networks and Traffic Guest TrafficNetworking in a Pod Managing Networks and Traffic Networking in a ZoneBasic Zone Physical Network Configuration Advanced Zone Physical Network ConfigurationConfiguring Isolated Guest Network Configure Public Traffic in an Advanced Zone Configuring a Shared Guest Network Limitation Using Security Groups to Control Traffic to VMsAbout Security Groups Security Groups in Advanced Zones KVM OnlyEnabling Security Groups Adding a Security GroupAdding Ingress and Egress Rules to a Security Group External Firewalls and Load Balancers MPX About Using a NetScaler Load BalancerVPX Configuring SNMPCommunity String on a Rhel ServerInitial Setup of External Firewalls and Load Balancers Adding a Load Balancer Rule Load Balancer RulesConfiguring AutoScale Prerequisites Configuration Managing Networks and Traffic Updating an AutoScale Configuration Disabling and Enabling an AutoScale ConfigurationSticky Session Policies for Load Balancer Rules Health Checks for Load Balancer RulesRuntime Considerations Global Server Load Balancing About Global Server Load BalancingComponents of Gslb How Gslb Works in CloudPlatform Configuring Gslb For more information, see Configuring a Gslb Virtual Server4 Enabling Gslb in NetScaler Prerequisites and GuidelinesAdding a Gslb Rule Assigning Load Balancing Rules to Gslb Using Multiple Guest Networks Reconfiguring Networks in VMsAdding an Additional Guest Network Removing a Network Selecting the Default NetworkPrerequisites Adding a NetworkGuest IP Ranges Acquiring a New IP AddressReleasing an IP Address Dedicating IP Address Ranges to an Account Reserving Public IP Addresses and VLANs for AccountsDedicating Vlan Ranges to an Account Gateway NetmaskStart IP End IP IP Reservation Considerations IP Reservation in Isolated Guest NetworksConfiguring Multiple IP Addresses on a Single NIC Best PracticesReserving an IP Range Assigning Additional IPs to a VM Port Forwarding and StaticNAT Services ChangesUse Cases GuidelinesMultiple Subnets in Shared Network Prerequisites and GuidelinesAdding Multiple Subnets to a Shared Network About Elastic IP Managing Networks and Traffic About Portable IP Portable IPsConfiguring Portable IPs Acquiring a Portable IPGuidelines Static NAT Transferring Portable IPEnabling or Disabling Static NAT Configuring an Egress Firewall Rule IP Forwarding and FirewallingEgress Firewall Rules in an Advanced Zone Configuring the Default Egress Policy AllowDeny Firewall Rules Port Forwarding IP Load BalancingRemote Access VPN Configuring Remote Access VPNDNS and Dhcp Using Remote Access VPN with Windows Setting Up a Site-to-Site VPN Connection Using Remote Access VPN with Mac OSCreating and Updating a VPN Customer Gateway Note See .27, Configuring a Virtual Private CloudManaging Networks and Traffic Page Updating and Removing a VPN Customer Gateway Creating a VPN gateway for the VPCCidr Creating a VPN Connection NoteManaging Networks and Traffic Restarting and Removing a VPN Connection About Private Vlan Isolation in Advanced Zone Using Private VlanPrerequisites Creating a PVLAN-Enabled Guest NetworkAbout Inter-VLAN Routing Page Configuring a Virtual Private Cloud About Virtual Private CloudsMajor Components of a VPC Network Architecture in a VPC Connectivity Options for a VPCVPC Network Considerations Adding a Virtual Private Cloud Adding Tiers Managing Networks and Traffic Configuring Network Access Control List About Network ACL ListsCreating ACL Lists Creating an ACL Rule Assigning a Custom ACL List to a Tier Creating a Tier with Custom ACL ListAdding a Private Gateway to a VPC See .27.5.2, ACL on Private Gateway Source NAT on Private GatewayCreating a Static Route ACL on Private GatewayDeploying VMs to the Tier Deploying VMs to VPC Tier and Shared NetworksBlacklisting Routes Acquiring a New IP Address for a VPC Releasing an IP Address Alloted to a VPC Enabling or Disabling Static NAT on a VPC Load Balancing Public Traffic Public LB Adding Load Balancing Rules on a VPCCreating a Network Offering for Public LB Creating a Public LB Rule How Does Internal LB Work in VPC? Load Balancing Tier-to-Tier traffic Internal LBEnabling Internal LB on a VPC Tier Creating an Internal LB Rule Adding a Port Forwarding Rule on a VPC TCP UDP Removing TiersPersistent Networks Editing, Restarting, and Removing a Virtual Private CloudPersistent Network Considerations Creating a Persistent Guest Network Console Proxy Working with System Virtual MachinesSystem VM Template Multiple System VM Support for VMwareWorking with System Virtual Machines Changing the Console Proxy SSL Certificate and DomainVirtual Router Configuring the Virtual RouterUpgrading a Virtual Router with System Service Offerings Secondary Storage VMBest Practices for Virtual Routers Dedicated HA Hosts HA-Enabled Virtual MachinesSystem Reliability and High Availability HA for Management ServerLimiting the Rate of API Requests Configuring the API Request RatePrimary Storage Outage and Data Loss Secondary Storage Outage and Data LossLimitations on API Throttling 236 Managing the Cloud Using Tags to Organize Resources in the CloudSetting Configuration Parameters About Configuration ParametersManaging the Cloud Setting Local Configuration Parameters Setting Global Configuration ParametersGranular Global Configuration Parameters Cluster.cpu.allocated.capacity.disablThethr Administrator Alerts Changing the Database ConfigurationCustomizing Alerts with Global Configuration Settings Sending Alerts to External Snmp and Syslog ManagersSnmp Alert Details Syslog Alert Details Configuring Snmp and Syslog ManagersDeleting an Snmp or Syslog Manager Customizing the Network Domain NameStopping and Restarting the Management Server User Data and Meta Data Provisioning and Authentication APICloudPlatform API AllocatorsCloudPlatform API Set Database Buffer Pool Size TuningPerformance Monitoring Increase Management Server Maximum MemoryConfigure XenServer dom0 Memory TuningSet and Monitor Total VM Limits per Host Event Notification TroubleshootingEvents Event LogsTroubleshooting Standard EventsLong Running Job Events Deleting and Archiving Events and Alerts Event Log QueriesProcedure Working with Server LogsPermissions Data Loss on Exported Primary Storage Using cloud-bugtoolSymptom Log Collection Utility cloud-bugtoolCause Recovering a Lost Virtual RouterMaintenance mode not working on vCenter SolutionUnable to deploy VMs from uploaded vSphere template Unable to power on virtual machine on VMwareLoad balancer rules fail after changing network offering Appendix A. Event Types 260 Appendix B. Alerts Appendix B. Alerts
Related manuals
Manual 6 pages 23.94 Kb Manual 194 pages 3.03 Kb

4.2 specifications

Citrix Systems, a leading provider of virtualization solutions and cloud computing technologies, released version 4.2 of its popular software, Citrix XenApp, which was previously known as Presentation Server. This version marked a significant evolution in providing users with remote access to applications and desktops, emphasizing simplicity, performance, and security.

One of the standout features of Citrix XenApp 4.2 is its improved application streaming capabilities. This technology allows applications to be delivered to users in real-time, reducing the need for extensive local installations and enhancing the user experience. With application streaming, administrators can efficiently manage applications on a central server while ensuring that users have immediate access to the necessary tools.

Another highlight of this version is the enhanced security measures put in place to protect sensitive data. Citrix XenApp 4.2 includes support for SSL encryption, providing a secure communication channel for data transmitted between the server and clients. This is particularly crucial for businesses that need to comply with strict data protection regulations. Additionally, the integration of endpoint security features ensures that unauthorized access to applications is minimized.

Performance enhancements are also a critical focus in this release. Citrix optimized the delivery of applications over various network conditions, ensuring that users experience minimal latency regardless of their location. This was achieved through the incorporation of SmartAccess and SmartControl technologies, which allow administrators to set policies based on user roles, device types, and network conditions. This level of granularity enables organization-wide security without compromising on usability.

The user experience was further improved with a revamped interface, making it easier for end-users to access their applications and data. Simplified menus, clear navigation paths, and the ability to customize user settings contributed to a more efficient workflow, allowing users to focus on their tasks rather than struggling with the software.

Finally, Citrix XenApp 4.2 was designed to be highly scalable. Organizations of all sizes could deploy this solution to deliver applications efficiently, adapting to their specific needs as their user base grows or changes. This flexibility is crucial for businesses looking to future-proof their IT investments while maintaining optimal performance.

In summary, Citrix XenApp 4.2 stands out with its enhanced application streaming, robust security features, improved performance under varying conditions, user-friendly interface, and scalability, making it an ideal choice for organizations seeking to leverage virtualization for remote access to applications and desktops.