Citrix Systems 4.2 manual How Gslb Works in CloudPlatform

Page 176

Chapter 16. Managing Networks and Traffic

Load Balancing or Content Switching Virtual Servers: According to Citrix NetScaler terminology, a load balancing or content switching virtual server represents one or many servers on the local network. Clients send their requests to the load balancing or content switching virtual server’s virtual IP (VIP) address, and the virtual server balances the load across the local servers. After a GSLB virtual server selects a GSLB service representing either a local or a remote load balancing or content switching virtual server, the client sends the request to that virtual server’s VIP address.

DNS VIPs: DNS virtual IP represents a load balancing DNS virtual server on the GSLB service provider. The DNS requests for domains for which the GSLB service provider is authoritative can be sent to a DNS VIP.

Authoritative DNS: ADNS (Authoritative Domain Name Server) is a service that provides actual answer to DNS queries, such as web site IP address. In a GSLB environment, an ADNS service responds only to DNS requests for domains for which the GSLB service provider is authoritative. When an ADNS service is configured, the service provider owns that IP address and advertises it. When you create an ADNS service, the NetScaler responds to DNS queries on the configured ADNS service IP and port.

16.9.1.2. How GSLB Works in CloudPlatform

Global server load balancing is used to manage the traffic flow to a web site hosted on two separate zones that ideally are in different geographic locations. The following is an illustration of how GLSB functionality is provided in CloudPlatform: An organization, xyztelco, has set up a public cloud

that spans two zones, Zone-1 and Zone-2, across geographically separated data centers that are managed by CloudPlatform. Tenant-A of the cloud launches a highly available solution by using xyztelco cloud. For that purpose, they launch two instances each in both the zones: VM1 and VM2 in Zone-1 and VM5 and VM6 in Zone-2. Tenant-A acquires a public IP, IP-1 in Zone-1, and configures a load balancer rule to load balance the traffic between VM1 and VM2 instances. CloudPlatform orchestrates setting up a virtual server on the LB service provider in Zone-1. Virtual server 1 that is set up on the LB service provider in Zone-1 represents a publicly accessible virtual server that client reaches at IP-1. The client traffic to virtual server 1 at IP-1 will be load balanced across VM1 and VM2 instances.

Tenant-A acquires another public IP, IP-2 in Zone-2 and sets up a load balancer rule to load balance the traffic between VM5 and VM6 instances. Similarly in Zone-2, CloudPlatform orchestrates setting up a virtual server on the LB service provider. Virtual server 2 that is setup on the LB service provider in Zone-2 represents a publicly accessible virtual server that client reaches at IP-2. The client traffic that reaches virtual server 2 at IP-2 is load balanced across VM5 and VM6 instances. At this point Tenant-A has the service enabled in both the zones, but has no means to set up a disaster recovery plan if one of the zone fails. Additionally, there is no way for Tenant-A to load balance the traffic intelligently to one of the zones based on load, proximity and so on. The cloud administrator of xyztelco provisions a GSLB service provider to both the zones. A GSLB provider is typically an ADC that has the ability to act as an ADNS (Authoritative Domain Name Server) and has the mechanism to monitor health of virtual servers both at local and remote sites. The cloud admin enables GSLB as a service to the tenants that use zones 1 and 2.

166

Image 176
Contents Page Page User Services Overview Getting More Information and HelpConcepts Cloud Infrastructure ConceptsSteps to Provisioning Your Cloud Infrastructure Service OfferingsSetting Up Networking for Users Working With Virtual Machines Working With Hosts 103Working with Templates 113 Working With Storage 129Working with Usage 141 Managing Networks and Traffic 147Page Tuning 249 Troubleshooting 251Working with System Virtual Machines 229 System Reliability and High Availability 233Event Types 259 Alerts 261 Getting More Information and Help Additional Documentation AvailableCitrix Knowledge Center Contacting Support ChapterPage What Is CloudPlatform? ConceptsWhat Can CloudPlatform Do? Multiple Hypervisor SupportDeployment Architecture Overview Management Server Overview Cloud Infrastructure OverviewNetworking Overview More InformationPage Page About Zones Cloud Infrastructure ConceptsAbout Regions Cloud Infrastructure Concepts About Pods About Clusters About Hosts About Primary StorageAbout Secondary Storage About Physical NetworksBasic Zone Network Traffic Types Advanced Zone Guest IP Addresses Basic Zone Guest IP AddressesAdvanced Zone Network Traffic Types Advanced Zone Public IP Addresses System Reserved IP AddressesAll zones A zone that uses advanced networkingPage Accounts Accounts, Users, and DomainsBehavior of Dedicated Hosts, Clusters, Pods, and Zones How to Use Dedicated HostsDedicating Resources to Accounts and Domains Adding an Ldap Server Using an Ldap Server for User AuthenticationConfiguring an Ldap Server Trust Store Trust Store Password Search Base Example Ldap Configuration CommandsRemoving an Ldap Configuration ApacheDS Query FilterActive Directory SSL Keystore Path and Password Search User Bind DNPage User Services Overview Page User Interface Supported BrowsersLog In to the UI End Users UI OverviewRoot Administrators UI Overview Logging In as the Root AdministratorCreating an Instance from a Template that Supports SSH Keys Using SSH Keys for AuthenticationChanging the Root Password Output is something similar to what is given below Creating the SSH KeypairCreating an Instance Logging In Using the SSH KeypairResetting SSH Keys Page Using Projects to Organize Users and Resources Configuring ProjectsSetting Up Invitations Overview of ProjectsSetting Resource Limits for Projects Setting Project Creator PermissionsSending Project Membership Invitations Creating a New ProjectAdding Members to a Project Accepting a Membership Invitation Adding Project Members From the UIUsing the Project View Suspending or Deleting a ProjectPage Steps to Provisioning Your Cloud Infrastructure Overview of Provisioning StepsAdding a Region First Region The Default RegionAdding Regions optional Adding Third and Subsequent Regions Deleting a Region Prepare the System VM Template Adding a ZoneCreate a Secondary Storage Mount Point for the New Zone Steps to Add a New Zone Basic Zone Configuration Network Offering DescriptionSteps to Provisioning Your Cloud Infrastructure Page Advanced Zone Configuration Page Steps to Provisioning Your Cloud Infrastructure Page NFS Adding a Pod VmfsAdd Cluster OVM Adding a ClusterAdd Cluster KVM or XenServer Adding a vSphere Cluster Add Cluster vSphereVMware Cluster Size Limit Steps to Provisioning Your Cloud Infrastructure Page Requirements for XenServer, KVM, and OVM Hosts Warning Adding a HostAdding a Host XenServer, KVM, or OVM Adding a XenServer, KVM, or OVM Host KVM Host Additional RequirementsAdding Primary Storage Adding a Host vSphereAdding Secondary Storage Adding an NFS Secondary Staging Store for Each Zone Initialize and Test Steps to Provisioning Your Cloud Infrastructure Creating a New Compute Offering Service OfferingsCompute and Disk Service Offerings Creating a New Disk Offering Creating a New System Service Offering System Service OfferingsModifying or Deleting a Service Offering For more information, see .7, Stopping and Starting VMs Page Page Setting Up Networking for Users Overview of Setting Up Networking for UsersAbout Virtual Networks Isolated NetworksNetwork Service Providers Network Service Providers Support MatrixRuntime Allocation of Virtual Network Resources IndividualSupport Matrix for an Isolated Network Combination ACLSupport Matrix for Shared Network Combination Network Offerings Support Matrix for Basic ZoneCreating a New Network Offering Supported Services Description Isolated Shared See Section Remote Access VPN Changing the Network Offering on a Guest Network Creating and Changing a Virtual Router Network Offering Page Page Best Practices for Virtual Machines Working With Virtual MachinesAbout Working with Virtual Machines Monitor VMs for Max Capacity Install Required Tools and DriversVM Lifecycle Creating VMs Creating a VM from a templateConfiguring Usage of Linked Clones on VMware Creating a VM from an ISOAccessing VMs Appending a Display Name to the Guest VM’s Internal NameStopping and Starting VMs Assigning VMs to HostsAffinity Groups Creating a New Affinity GroupAssign a New VM to an Affinity Group Change Affinity Group for an Existing VMDelete an Affinity Group Virtual Machine Snapshots for VMwareView Members of an Affinity Group Limitations on VM Snapshots Configuring VM SnapshotsUsing VM Snapshots Changing the VM Name, OS, or Group Changing the Service Offering for a VM CPU and Memory Scaling for Running VMsConfiguring Dynamic CPU and RAM Scaling How to Dynamically Scale CPU and RAMUpdating Existing VMs LimitationsResetting the Virtual Machine Root Volume on Reboot Moving VMs Between Hosts Manual Live MigrationWorking with ISOs Recovering a Destroyed VMDeleting VMs Adding an ISO Attaching an ISO to a VM Changing a VMs Base ImagePage 102 Scheduled Maintenance and Maintenance Mode for Hosts VCenter and Maintenance ModeXenServer and Maintenance Mode Working With HostsTo take a server out of Maintenance Mode Disabling and Enabling Zones, Pods, and ClustersRemoving Hosts Working With HostsRe-Installing Hosts Using Cisco UCS as Bare Metal Host CloudPlatformMaintaining Hypervisors on Hosts Removing XenServer and KVM HostsRegistering a UCS Manager Associating a Profile with a UCS BladeChanging Host Password Disassociating a Profile from a UCS BladeOver-Provisioning and Service Offering Limits Setting Over-Provisioning Ratios Limitations on Over-Provisioning in XenServer and KVMRequirements for Over-Provisioning Balloon DriverService Offering Limits and Over-Provisioning Vlan ProvisioningVlan Allocation Example Adding Non Contiguous Vlan RangesAssigning VLANs to Isolated Networks Default Template Working with TemplatesCreating Templates Overview Requirements for TemplatesWorking with Templates Private and Public TemplatesCreating a Template from an Existing Virtual Machine Creating a Template from a Snapshot Uploading TemplatesWorking with Templates System Preparation for Windows Server 2008 R2 Exporting TemplatesCreating a Windows Template Working with Templates Page Working with Templates System Preparation for Windows Server 2003 R2 Importing Amazon Machine Images Create a grub entry in /boot/grub/grub.conf Exit out of chroot Converting a Hyper-V VM to a Template Adding Password Management to Your Templates Deleting Templates Linux OS InstallationWindows OS Installation 128 Primary Storage Working With StorageStorage Overview Storage Tags Working With StorageFiber Channel support NFS support Local storage support Storage over-provisioningMaintenance Mode for Primary Storage Secondary StorageBest Practices for Secondary Storage Changing the Secondary Storage IP AddressWorking With Volumes Creating a New VolumeUsing Local Storage for Data Volumes Changing Secondary Storage ServersUploading an Existing Volume to a Virtual Machine To Create a New VolumeAttaching a Volume Hypervisor Disk Image FormatDetaching and Moving Volumes VM Storage MigrationMigrating a Data Volume to a New Storage Pool Migrating a VM Root Volume to a New Storage PoolResizing Volumes Reset VM to New Root Disk on Reboot Volume Deletion and Garbage CollectionTo enable root disk reset on VM reboot Working with SnapshotsAutomatic Snapshot Creation and Retention Incremental Snapshots and BackupVolume Status Snapshot Job Throttling Snapshot RestoreVMware Volume Snapshot Performance Configuring the Usage Server Working with UsageWorking with Usage Alerttypeusagesanityresult =Setting Usage Limits Globally Configured Limits Parameter Name DefinitionDefault Account Resource Limits Per-Domain Limits Networking in a Pod Managing Networks and TrafficGuest Traffic Networking in a Zone Managing Networks and TrafficConfiguring Isolated Guest Network Basic Zone Physical Network ConfigurationAdvanced Zone Physical Network Configuration Configure Public Traffic in an Advanced Zone Configuring a Shared Guest Network Using Security Groups to Control Traffic to VMs About Security GroupsSecurity Groups in Advanced Zones KVM Only LimitationAdding Ingress and Egress Rules to a Security Group Enabling Security GroupsAdding a Security Group External Firewalls and Load Balancers About Using a NetScaler Load Balancer MPXConfiguring SNMPCommunity String on a Rhel Server VPXInitial Setup of External Firewalls and Load Balancers Load Balancer Rules Adding a Load Balancer RuleConfiguring AutoScale Prerequisites Configuration Managing Networks and Traffic Disabling and Enabling an AutoScale Configuration Updating an AutoScale ConfigurationRuntime Considerations Sticky Session Policies for Load Balancer RulesHealth Checks for Load Balancer Rules Components of Gslb Global Server Load BalancingAbout Global Server Load Balancing How Gslb Works in CloudPlatform Configuring Gslb For more information, see Configuring a Gslb Virtual Server4 Prerequisites and Guidelines Enabling Gslb in NetScalerAdding a Gslb Rule Assigning Load Balancing Rules to Gslb Adding an Additional Guest Network Using Multiple Guest NetworksReconfiguring Networks in VMs Selecting the Default Network PrerequisitesAdding a Network Removing a NetworkReleasing an IP Address Guest IP RangesAcquiring a New IP Address Reserving Public IP Addresses and VLANs for Accounts Dedicating IP Address Ranges to an AccountStart IP End IP Dedicating Vlan Ranges to an AccountGateway Netmask IP Reservation in Isolated Guest Networks IP Reservation ConsiderationsReserving an IP Range Configuring Multiple IP Addresses on a Single NICBest Practices Port Forwarding and StaticNAT Services Changes Use CasesGuidelines Assigning Additional IPs to a VMAdding Multiple Subnets to a Shared Network Multiple Subnets in Shared NetworkPrerequisites and Guidelines About Elastic IP Managing Networks and Traffic Portable IPs About Portable IPGuidelines Configuring Portable IPsAcquiring a Portable IP Enabling or Disabling Static NAT Static NATTransferring Portable IP Egress Firewall Rules in an Advanced Zone Configuring an Egress Firewall RuleIP Forwarding and Firewalling Deny Configuring the Default Egress PolicyAllow Firewall Rules IP Load Balancing Port ForwardingDNS and Dhcp Remote Access VPNConfiguring Remote Access VPN Using Remote Access VPN with Windows Using Remote Access VPN with Mac OS Setting Up a Site-to-Site VPN ConnectionSee .27, Configuring a Virtual Private Cloud Creating and Updating a VPN Customer Gateway NoteManaging Networks and Traffic Page Creating a VPN gateway for the VPC Updating and Removing a VPN Customer GatewayCreating a VPN Connection Note CidrManaging Networks and Traffic Restarting and Removing a VPN Connection Isolation in Advanced Zone Using Private Vlan About Private VlanCreating a PVLAN-Enabled Guest Network PrerequisitesAbout Inter-VLAN Routing Page Major Components of a VPC Configuring a Virtual Private CloudAbout Virtual Private Clouds VPC Network Considerations Network Architecture in a VPCConnectivity Options for a VPC Adding a Virtual Private Cloud Adding Tiers Managing Networks and Traffic Creating ACL Lists Configuring Network Access Control ListAbout Network ACL Lists Creating an ACL Rule Creating a Tier with Custom ACL List Assigning a Custom ACL List to a TierAdding a Private Gateway to a VPC Source NAT on Private Gateway See .27.5.2, ACL on Private GatewayACL on Private Gateway Creating a Static RouteBlacklisting Routes Deploying VMs to the TierDeploying VMs to VPC Tier and Shared Networks Acquiring a New IP Address for a VPC Releasing an IP Address Alloted to a VPC Enabling or Disabling Static NAT on a VPC Adding Load Balancing Rules on a VPC Load Balancing Public Traffic Public LBCreating a Network Offering for Public LB Creating a Public LB Rule Load Balancing Tier-to-Tier traffic Internal LB How Does Internal LB Work in VPC?Enabling Internal LB on a VPC Tier Creating an Internal LB Rule Adding a Port Forwarding Rule on a VPC Removing Tiers TCP UDPPersistent Network Considerations Persistent NetworksEditing, Restarting, and Removing a Virtual Private Cloud Creating a Persistent Guest Network Working with System Virtual Machines System VM TemplateMultiple System VM Support for VMware Console ProxyChanging the Console Proxy SSL Certificate and Domain Working with System Virtual MachinesConfiguring the Virtual Router Virtual RouterBest Practices for Virtual Routers Upgrading a Virtual Router with System Service OfferingsSecondary Storage VM HA-Enabled Virtual Machines System Reliability and High AvailabilityHA for Management Server Dedicated HA HostsConfiguring the API Request Rate Primary Storage Outage and Data LossSecondary Storage Outage and Data Loss Limiting the Rate of API RequestsLimitations on API Throttling 236 Using Tags to Organize Resources in the Cloud Managing the CloudManaging the Cloud Setting Configuration ParametersAbout Configuration Parameters Setting Global Configuration Parameters Setting Local Configuration ParametersGranular Global Configuration Parameters Cluster.cpu.allocated.capacity.disablThethr Changing the Database Configuration Administrator AlertsSnmp Alert Details Customizing Alerts with Global Configuration SettingsSending Alerts to External Snmp and Syslog Managers Configuring Snmp and Syslog Managers Syslog Alert DetailsCustomizing the Network Domain Name Deleting an Snmp or Syslog ManagerStopping and Restarting the Management Server Provisioning and Authentication API CloudPlatform APIAllocators User Data and Meta DataCloudPlatform API Tuning Performance MonitoringIncrease Management Server Maximum Memory Set Database Buffer Pool SizeSet and Monitor Total VM Limits per Host Configure XenServer dom0 MemoryTuning Troubleshooting EventsEvent Logs Event NotificationLong Running Job Events TroubleshootingStandard Events Event Log Queries Deleting and Archiving Events and AlertsPermissions ProcedureWorking with Server Logs Using cloud-bugtool SymptomLog Collection Utility cloud-bugtool Data Loss on Exported Primary StorageRecovering a Lost Virtual Router Maintenance mode not working on vCenterSolution CauseUnable to power on virtual machine on VMware Unable to deploy VMs from uploaded vSphere templateLoad balancer rules fail after changing network offering Appendix A. Event Types 260 Appendix B. Alerts Appendix B. Alerts
Related manuals
Manual 6 pages 23.94 Kb Manual 194 pages 3.03 Kb

4.2 specifications

Citrix Systems, a leading provider of virtualization solutions and cloud computing technologies, released version 4.2 of its popular software, Citrix XenApp, which was previously known as Presentation Server. This version marked a significant evolution in providing users with remote access to applications and desktops, emphasizing simplicity, performance, and security.

One of the standout features of Citrix XenApp 4.2 is its improved application streaming capabilities. This technology allows applications to be delivered to users in real-time, reducing the need for extensive local installations and enhancing the user experience. With application streaming, administrators can efficiently manage applications on a central server while ensuring that users have immediate access to the necessary tools.

Another highlight of this version is the enhanced security measures put in place to protect sensitive data. Citrix XenApp 4.2 includes support for SSL encryption, providing a secure communication channel for data transmitted between the server and clients. This is particularly crucial for businesses that need to comply with strict data protection regulations. Additionally, the integration of endpoint security features ensures that unauthorized access to applications is minimized.

Performance enhancements are also a critical focus in this release. Citrix optimized the delivery of applications over various network conditions, ensuring that users experience minimal latency regardless of their location. This was achieved through the incorporation of SmartAccess and SmartControl technologies, which allow administrators to set policies based on user roles, device types, and network conditions. This level of granularity enables organization-wide security without compromising on usability.

The user experience was further improved with a revamped interface, making it easier for end-users to access their applications and data. Simplified menus, clear navigation paths, and the ability to customize user settings contributed to a more efficient workflow, allowing users to focus on their tasks rather than struggling with the software.

Finally, Citrix XenApp 4.2 was designed to be highly scalable. Organizations of all sizes could deploy this solution to deliver applications efficiently, adapting to their specific needs as their user base grows or changes. This flexibility is crucial for businesses looking to future-proof their IT investments while maintaining optimal performance.

In summary, Citrix XenApp 4.2 stands out with its enhanced application streaming, robust security features, improved performance under varying conditions, user-friendly interface, and scalability, making it an ideal choice for organizations seeking to leverage virtualization for remote access to applications and desktops.